Symtrex Inc.

Cyber Security Specialist

Call - 866-431-8972 | Send an Email | Request a Quote
Visit Us On FacebookVisit Us On TwitterVisit Us On Linkedin
  • Home
  • Profile
    • Contact Us
    • Security News
    • White Papers
  • Services
    • Compliance Regulations
      • PCI DSS Suite of Products
      • HIPAA/Hitech
      • SOX – Sarbanes Oxley
      • DCID 6/3/NISPOM Chapter 8/JAFAN DoD
      • NERC/FERC
    • Industry Consulting and Implementation
      • Banking and Financial
      • Energy/Utilities
      • Healthcare
      • Retail/Hospitality
    • Security Assessment
  • Security Solutions
    • Sophos
    • Endpoint Security Solutions
      • Bitdefender Business Solutions
      • Sophos Endpoint Protection
    • Forensic Solution – Threat Hunter
    • Network Access Control
      • NetShield
        • NetShield
    • NGFW – UTM – Perimeter Security
      • Sophos Network Protection
    • Security Awareness Training
      • KnowBe4 – Security Awareness Training
      • Sophos Phish Threat
  • White Papers
    • Sophos Webinar Series
  • Security News
    • Blog
    • Sophos Webinar Series
  • Free Security Tools

SolarWinds Study Reveals Hybrid IT is the Reality

2016/03/29 by admin

MarketWire - News Room - March 29, 2016

SolarWinds Study Reveals Hybrid IT is the Reality for Majority of Businesses; Security Concerns, New Skillsets Top of Mind for IT Professionals

According to the SolarWinds IT Trends Report 2016, Only 9 Percent of IT Professionals Say Their Organizations Have Not Migrated Any Infrastructure to the Cloud, While 62 Percent Report Security Remains the Greatest Challenge and Three-Quarters Indicate Resources and New Skills Are Still Needed

AUSTIN, TX-(Marketwired - March 29, 2016) - SolarWinds, a leading provider of powerful and affordable IT management software, today released the findings of its IT Trends Report 2016: The Hybrid IT Evolution. The study features insights from IT practitioners, managers and directors proving that the vast majority of businesses have shifted away from on-premises-only infrastructure to hybrid IT environments, creating new concerns and pressures for IT professionals.

“The findings of this year’s study paint a clear picture: cloud adoption is nearly ubiquitous, but it’s not now and will not in the foreseeable future be suitable for all workloads, and even if it were, very few if any companies would convert all of their existing applications to run in the cloud,” said Joel Dolisy, CIO, SolarWinds. “The resulting dynamic — one set of critical on-premises services connected with another set of services in the cloud — is hybrid IT. And at the center of this evolution is the IT professional who needs to ensure always-on performance of applications, devices, networks and systems — regardless of location. They need to be empowered with the support to gain the skills and tools required to properly monitor and manage hybrid IT environments, which in turn will allow businesses to truly unlock the potential of the cloud.”

Download the Solarwinds IT Trends Report 2016: the Hybrid IT Evolution

Read the article

Contact us for more information at 866-431-8972 or via email at [email protected]

Filed Under: Advanced Persistent Threat, Cloud, compliance, CyberThreats, endpoint, industry, Network Monitoring, PCI, Security News, SolarWinds

Would You know if your Network Was Breached

2016/03/09 by admin

Quickly identify and eliminate the most common IT Security Threats -

  • Spear Phishing
  • Escalation of Permissions
  • SQL Injection
  • Botnets
  • DDoS Attacks

Check out the new Threat Intelligence Feed from SolarWinds - Log and Event Manager

 

Filed Under: Advanced Persistent Threat, compliance, CyberThreats, Log Management, PCI, Products, SolarWinds

Looking for an SIEM?

2015/11/02 by admin

Reviewing the logs of your organization has long been a standard for organizations to analyze the activity of their networks. In recent years however, organizations are requiring more from their Security Information and Event Management tool. An SIEM Tool should have the following capabilities at a minimum:

  • Data aggregation
  • Correlation
  • Alerting
  • Dashboards
  • Compliance - Data Gathering and Reporting
  • Retention
  • Forensic analysis

According to one industry leader - SIEM products and services serve two purposes: providing centralized security logging and reporting for an organization, and aiding in the detection, analysis and mitigation of security incidents.

While the list of SIEM products is growing, a number of organizations are looking to independent third party analysis of these tools. If you are in the market for an SIEM or to replace your existing system, we invite you to review the following report.

Download Report

Filed Under: Advanced Persistent Threat, compliance, CyberThreats, Log Management, LogRhythm, Network Monitoring, PCI, Security News

LogRhythm Product Demonstration - Stopping Exfiltration

2015/08/25 by admin

This video demonstrates the ease and power of LogRhythm, and answers the question - what do you want to be woken up in the middle of the night for

LogRhythm, a leader in security intelligence and analytics, empowers organizations around the globe to rapidly detect, respond to and neutralize damaging cyber threats. The company’s award-winning platform unifies next-generation SIEM, log management, network and endpoint forensics, and advanced security analytics.

Filed Under: Advanced Persistent Threat, Cloud, compliance, CyberThreats, Log Management, Malware, PCI, Products, Security News

The first 24 hours

2015/06/16 by admin

While reading an ebook on PCI DSS from SC Magazine, there was a side bar that had steps to be taken within the first 24 hours after identifying a breach, by Matt Malone, CTO and founder of Assero Security.

  1. Record the date and time when the breach was discovered, as well as the current date and time when response efforts begin, i.e., when someone on the response team is alerted to the breach.
  2. Alert and activate everyone on the response team, including external resources, to begin executing a preparedness plan.
  3. Secure the premises around the area where the data breach occurred to help preserve evidence.
  4. Stop additional data loss. Take affected machines offline but do not turn them off or start probing into the computer until your forensic team arrives.
  5. Document everything known thus far about the breach: Who discovered it? Who reported it? To whom was it reported? Who else knows about it? What type of breach occurred? What was stolen? How was it stolen? What systems are affected? What devices are missing? etc.
  6. Interview those involved in discovering the breach and anyone else who may know about it. Document your investigation.
  7. Review protocols regarding disseminating information about the breach for everyone involved in this early stage.
  8. Assess priorities and risks based on what you know about the breach.
  9. Bring in your forensic firm to begin an in-depth investigation.
  10. Notify law enforcement, if needed, after consulting with legal counsel and upper management.

It is important to remember that for the most part Cyber Criminals are not specifically targeting large organizations, they merely see an IP address.

Contact us to find out more.

 

Filed Under: compliance, CyberThreats, PCI, Products, Security News

  • « Previous Page
  • 1
  • 2
  • 3
  • 4
  • …
  • 10
  • Next Page »

Let us help answer any questions you may have

requestmoreinformation.fw

Security News and Updates

  • Was my information part of a breach?
  • Phishing and stolen credentials
  • Ransomware is the Biggest Threat for Small to Medium Businesses

RSS SecurityWeek

  • 'Critical Severity' Warning for Malware Embedded in Popular JavaScript Library
  • REvil Ransomware Gang Hit by Law Enforcement Hack-Back Operation
  • Microsoft Introduces Security Program for Non-Profits

Contact

  • Contact Us

Request More Info

  • Request Quote

Site Map

  • Site Map

© Copyright 2016 Symtrex Inc. ; All Rights Reserved · Privacy Statement