Symtrex Inc.

Cyber Security Specialist

Call - 866-431-8972 | Send an Email | Request a Quote
Visit Us On FacebookVisit Us On TwitterVisit Us On Linkedin
  • Home
  • Profile
    • Contact Us
    • Security News
    • White Papers
  • Services
    • Compliance Regulations
      • PCI DSS Suite of Products
      • HIPAA/Hitech
      • SOX – Sarbanes Oxley
      • DCID 6/3/NISPOM Chapter 8/JAFAN DoD
      • NERC/FERC
    • Industry Consulting and Implementation
      • Banking and Financial
      • Energy/Utilities
      • Healthcare
      • Retail/Hospitality
    • Security Assessment
  • Security Solutions
    • Sophos
    • Endpoint Security Solutions
      • Bitdefender Business Solutions
      • Sophos Endpoint Protection
    • Forensic Solution – Threat Hunter
    • Network Access Control
      • NetShield
        • NetShield
    • NGFW – UTM – Perimeter Security
      • Sophos Network Protection
    • Security Awareness Training
      • KnowBe4 – Security Awareness Training
      • Sophos Phish Threat
  • White Papers
    • Sophos Webinar Series
  • Security News
    • Blog
    • Sophos Webinar Series
  • Free Security Tools

Sharpening Endpoint Security

2013/04/08 by admin

Information Week Reports
John Sawyer | 03/04/13

With the perimeter of your organization expanding to include laptops, smartphones, and more, this article provides some very useful and timely information.

Sharpening Endpoint Security

Filed Under: antivirus, byod, Cloud, compliance, endpoint, industry, Log Management, PCI, Products, profile, Security News, Snare, Snare Agents, Unified Threat Management

LogPoint releases Version 5.1.2

2013/03/13 by admin

Logo_Logpoint_smLogPoint has released version 5.1.2.

The highlights for this release include a number of enhancements. A selection of these are outlined below:

  • Fresh new colour theme for web interface
  • Snare Agent collector is added to collect events from windows server on its native port 6161
  • Alert and correlation rules can be transferred to LDAP Users
  • Selected repos and time-range for the last search is remembered
  • NetFlow templates are stored and indesxed together with NetFlow Data Packets
  • User can select the number of logs to be reported for “Simply Search Query” in the report template wizard

If you are looking for a more robust SIEM, contact us for a webinar, or a trial to test this within your own environment.

 

Filed Under: compliance, Log Management, PCI, Security News, Snare Agents

Snare System Promotion

2013/03/12 by admin

The Snare System version 6 has been released since October. This update version has a number of enhanced features such as drag and drop objectives, improved reporting, robust collection. Intersect Alliance is currently offering the system with a discount, available until April 15, 2013. This promotion provides for a Snare Server with 25 Enterprise Snare Agents at almost 50% off the MSRP pricing. If you are interest, please contact us to register your interest and secure the pricing.

Filed Under: Log Management, PCI, Security News, Snare, Snare Agents

Mobile Device Management Buyers Guide

2013/03/07 by admin

Mobile devices make life easier for your users. But how do you strike a balance between security and productivity?

Mobile device management (MDM) solutions allow IT organizations to centrally manage, monitor and support mobile devices. MDM solutions should also simplify administration while enhancing mobile security. But do you know what features to look for? How do you choose the right one?

This Mobile Device Management Buyers Guide explains the product features and capabilities you should look for when considering your options.

This guide gives you the information you need to:

  • Ask the right questions of vendors
  • Look for the right capabilities and features
  • Make the right choice for your business

Download - Sophos Mobile Device Management Buyers Guide

Filed Under: antivirus, byod, compliance, endpoint, industry, Security News

Sharpening Endpoint Security

2013/03/05 by admin

By John H. Sawyer, Dark Reading

Of all the IT elements that you must secure in your organization, the endpoints are the most elusive. A flaw in an end user device can lead to a breach at the very core of your business, so hardening those endpoints is key to preventing those breaches.

Endpoints are as hard to define as they are to protect. The term traditionally referred to desktops and laptops, but endpoints now encompass smartphones, tablets, point-of-sale machines, bar code scanners, multifunction printers and practically any other device that connects to the company network. Without a well-conceived strategy, keeping track of and securing these devices is difficult and frustrating. [Read More]

Filed Under: antivirus, byod, compliance, endpoint, Security News

  • « Previous Page
  • 1
  • …
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • Next Page »

Let us help answer any questions you may have

requestmoreinformation.fw

Security News and Updates

  • Was my information part of a breach?
  • Phishing and stolen credentials
  • Ransomware is the Biggest Threat for Small to Medium Businesses

RSS SecurityWeek

  • Oracle's October 2020 CPU Contains 402 New Security Patches
  • US Officials Link Iran to Emails Meant to Intimidate Voters
  • Microsoft Says Most TrickBot Servers Are Down

Contact

  • Contact Us

Request More Info

  • Request Quote

Site Map

  • Site Map

© Copyright 2016 Symtrex Inc. ; All Rights Reserved · Privacy Statement