Symtrex Inc.

Cyber Security Specialist

Call - 866-431-8972 | Send an Email | Request a Quote
Visit Us On FacebookVisit Us On TwitterVisit Us On Linkedin
  • Home
  • Profile
    • Contact Us
    • Security News
    • White Papers
  • Services
    • Compliance Regulations
      • PCI DSS Suite of Products
      • HIPAA/Hitech
      • SOX – Sarbanes Oxley
      • DCID 6/3/NISPOM Chapter 8/JAFAN DoD
      • NERC/FERC
    • Industry Consulting and Implementation
      • Banking and Financial
      • Energy/Utilities
      • Healthcare
      • Retail/Hospitality
    • Security Assessment
  • Security Solutions
    • Sophos
    • Endpoint Security Solutions
      • Bitdefender Business Solutions
      • Sophos Endpoint Protection
    • Forensic Solution – Threat Hunter
    • Network Access Control
      • NetShield
        • NetShield
    • NGFW – UTM – Perimeter Security
      • Sophos Network Protection
    • Security Awareness Training
      • KnowBe4 – Security Awareness Training
      • Sophos Phish Threat
  • White Papers
    • Sophos Webinar Series
  • Security News
    • Blog
    • Sophos Webinar Series
  • Free Security Tools

Mobile Device Management Buyers Guide

2013/03/07 by admin

Mobile devices make life easier for your users. But how do you strike a balance between security and productivity?

Mobile device management (MDM) solutions allow IT organizations to centrally manage, monitor and support mobile devices. MDM solutions should also simplify administration while enhancing mobile security. But do you know what features to look for? How do you choose the right one?

This Mobile Device Management Buyers Guide explains the product features and capabilities you should look for when considering your options.

This guide gives you the information you need to:

  • Ask the right questions of vendors
  • Look for the right capabilities and features
  • Make the right choice for your business

Download - Sophos Mobile Device Management Buyers Guide

Filed Under: antivirus, byod, compliance, endpoint, industry, Security News

Sharpening Endpoint Security

2013/03/05 by admin

By John H. Sawyer, Dark Reading

Of all the IT elements that you must secure in your organization, the endpoints are the most elusive. A flaw in an end user device can lead to a breach at the very core of your business, so hardening those endpoints is key to preventing those breaches.

Endpoints are as hard to define as they are to protect. The term traditionally referred to desktops and laptops, but endpoints now encompass smartphones, tablets, point-of-sale machines, bar code scanners, multifunction printers and practically any other device that connects to the company network. Without a well-conceived strategy, keeping track of and securing these devices is difficult and frustrating. [Read More]

Filed Under: antivirus, byod, compliance, endpoint, Security News

Another Java exploit spreading

2013/03/04 by admin

Dan Kaplan, Executive Editor - SC Magazine

In what has become a familiar refrain, security researchers have spotted another Java zero-day vulnerability under active attack.

Network security company FireEye said the vulnerability being exploited in the wild is present in the most up-to-date versions of Java SE software: version 6 Update 41 and version 7 Update 15, researchers Darien Kindlund and Yichong Lin wrote in a blog posted Thursday. [Read More]

Filed Under: antivirus, Security News

Security Threat Report 2013

2013/03/03 by admin

New platforms and changing threats

Download the Security Threat Report 2013 from Sophos. Reflecting on a very busy year for cyber security, I would like to highlight some key observations for 2012. No doubt, the increasing mobility of data in corporate environments is one of the biggest
challenges we faced in the past year. Users are fully embracing the power to access data from
anywhere. The rapid adoption of bring your own device (BYOD) and cloud are really accelerating
this trend, and providing new vectors of attack [Security Threat Report 2013]

Filed Under: antivirus, byod, Cloud, compliance, endpoint, industry, PCI, Products, Security News, Unified Threat Management

Nearly two-thirds of organizations are already infected with bots

2013/02/22 by admin

22 February 2013
70% of those infections communicate with their C&C servers at least once every two hours, and more than half of organizations across the globe have had malware downloaded onto their networks via these bots.

This is the shocking result of an analysis by Check Point of 888 public and private organizations worldwide, drawing information from its Check Point ThreatCloud, its global network of threat sensors, and 3D Security Reports conducted at those organizations during 2012. [Read More]

Filed Under: antivirus, industry, NetClarity, Security News

  • « Previous Page
  • 1
  • …
  • 21
  • 22
  • 23
  • 24
  • Next Page »

Let us help answer any questions you may have

requestmoreinformation.fw

Security News and Updates

  • Was my information part of a breach?
  • Phishing and stolen credentials
  • Ransomware is the Biggest Threat for Small to Medium Businesses

RSS SecurityWeek

  • Colorado City Pays $45,000 Ransom After Cyber-Attack
  • Vulnerabilities in Protocol Gateways Can Facilitate Attacks on Industrial Systems
  • Federal Program Offers New Cybersecurity Tool for Elections

Contact

  • Contact Us

Request More Info

  • Request Quote

Site Map

  • Site Map

© Copyright 2016 Symtrex Inc. ; All Rights Reserved · Privacy Statement