Information Week Reports
John Sawyer | 03/04/13
With the perimeter of your organization expanding to include laptops, smartphones, and more, this article provides some very useful and timely information.
Cyber Security Specialist
by admin
Information Week Reports
John Sawyer | 03/04/13
With the perimeter of your organization expanding to include laptops, smartphones, and more, this article provides some very useful and timely information.
by admin
LogPoint has released version 5.1.2.
The highlights for this release include a number of enhancements. A selection of these are outlined below:
If you are looking for a more robust SIEM, contact us for a webinar, or a trial to test this within your own environment.
by admin
The Snare System version 6 has been released since October. This update version has a number of enhanced features such as drag and drop objectives, improved reporting, robust collection. Intersect Alliance is currently offering the system with a discount, available until April 15, 2013. This promotion provides for a Snare Server with 25 Enterprise Snare Agents at almost 50% off the MSRP pricing. If you are interest, please contact us to register your interest and secure the pricing.
by admin
Mobile devices make life easier for your users. But how do you strike a balance between security and productivity?
Mobile device management (MDM) solutions allow IT organizations to centrally manage, monitor and support mobile devices. MDM solutions should also simplify administration while enhancing mobile security. But do you know what features to look for? How do you choose the right one?
This Mobile Device Management Buyers Guide explains the product features and capabilities you should look for when considering your options.
This guide gives you the information you need to:
by admin
By John H. Sawyer, Dark Reading
Of all the IT elements that you must secure in your organization, the endpoints are the most elusive. A flaw in an end user device can lead to a breach at the very core of your business, so hardening those endpoints is key to preventing those breaches.
Endpoints are as hard to define as they are to protect. The term traditionally referred to desktops and laptops, but endpoints now encompass smartphones, tablets, point-of-sale machines, bar code scanners, multifunction printers and practically any other device that connects to the company network. Without a well-conceived strategy, keeping track of and securing these devices is difficult and frustrating. [Read More]