Blog

Blog

Tips for Managing Physical, Virtual, Cloud Environments

IT infrastructure is complex today. On-prem. Off-prem. Virtualization. The cloud. It’s up to IT to build this infrastructure, then distribute resources from its many miscellaneous parts to various services in the most efficient way possible. With so many different environments to track—many of them walled off from one another in data silos—service issues can be difficult to diagnose and...
Blog

How to Generate Revenue in AP

Accounts Payable not only doesn't have to be a cost center these days. But automating AP can actually make it a profit center.
Blog

The Ultimate Guide to Investing in Secure File Transfer Software

Are you struggling to secure your file transfers? Need to invest in secure file transfer software but aren’t sure where to look? We’ve got you covered. Walk through the buying process, from start to finish, with this free Ultimate Secure Managed File Transfer Buyer’s Guide.
Blog

Network Security and the Fourth Pillar

The three crumbling pillars of network securityWhy is network security getting harder?Access control, firewall and Intrusion Prevention Systems are failing to keep attackers from reaching vulnerable systems and network administrators have added as many layers beyond those as possible to no avail. This is a problem because successful attacks are often done with these solutions in place and being...
Blog

Closing The Door on Network Attacks

Network security scanningYour network is 100 times more likely to be attacked with a known exploit than an unknown one. And the reason behind this is simple: There are so many known exploits and the complexity of networks is so great that the chances are good that one of these known vulnerabilities are present and will allow an attacker access to your data.The number of networks worldwide is so...
Blog

Pen Testing Alternative Improves Security and Reduces Costs

Our definition of penetration testingPen testing (penetration testing) is the discovery of vulnerable network equipment or applications by evaluating their response (behavior) to specially designed requests. In some cases a payload (message, marker or flag) is delivered to prove beyond a doubt that the vulnerability can be exploited. Pen testing is usually a manual and expensive undertaking that...
Blog

Security Testing the Internet of Things: Dynamic testing (Fuzzing) for IoT security

What is the Internet of Things (IoT)?The Internet of Things (IoT) encompasses any and all products that are connected to the internet or to each other. Any product which requires connection to a home, car or office network to deliver its complete set of features falls under this broad term. In fact cars themselves are now a component of the IoT as they now exchange data with the manufacturer...
Blog

Employ Active Network Scanning to Eliminate High Risk Vulnerabilities

Keeping up with new vulnerability discoveriesWith hundreds of new vulnerabilities announced each month, active network scanning is essential. An automated, frequently used vulnerability assessment and management solution is your best option for the elimination of corporate network vulnerabilities.Enterprise now needs proactive, routine network scanning to keep up with internal changes and external...
Blog

Do You Collect Personal Data in Europe? GDPR Applies!

Calculating the cost of GDPR complianceThe EU General Data Protection Regulation (GDPR) is unique in the field of compliance standards for its establishment of financial penalties for the loss or mismanagement of personal data of EU citizens. And those fines are higher and more likely to be assessed than any existing standard. Any company that does business with EU citizens (or controls or...
Blog

Penetration Testing Tools You Can Use

Pen testing always includes a vulnerability assessmentPenetration testing is all about identifying network security weaknesses before they are exploited internally or externally. The best pen testers bring a range of tools and experience to each gig and a key tool they will use is vulnerability assessment.The experience level, tools used, findings and the report you get from each penetration test...
Blog

A SIEM that Speaks IBM i

Organizations of all sizes can benefit from capturing, logging, and responding to security events in real time, but one important operating system is often overlooked: IBM i.
Blog

GDPR Playbook

It’s time to play hardball – Fight and win the GDPR battle with a leader, plan and rock star team.Yes. We know GDPR is here. Can we talk about something else now?Nope, not if you haven’t done all your due diligence to implement best practices and comply. Ignorance has been bliss but it’s not an excuse post May 25, 2018.We’ve already seen GDPR come down with hard on day 1 of its enforcement with...