This website uses cookies

We use cookies to personalize content and analyze access to our website. You can find further information in our data protection policy.

  • The Secret to Effective Remote Access VPN Management

    Cybersecurity Strategy · Data Security · Encryption · VPN

    Trouble in store? Don’t forget VPN

    For a couple of years now security breaches in the retail sector have seldom been out of the headlines. Breaches at large retail chains like Target, Neiman Marcus and The Home Depot in 2014 were...

    Cybersecurity Strategy · Encryption · Public Hotspot · VPN

    Threats at Public Hotspots

    Germany is reported to be increasingly left behind in terms of digitization in public spaces. The reason: There are just not enough hotspots available. A political decision has now been taken to...

    Data Security · Encryption · Endpoint Management · VPN

    Big data, big security questions

    Half of enterprises today store sensitive information within big data environments (up from 31 percent in 2015). Influential agencies like ENISA warn there are considerable cyber risks from using big...

    NCP WTP Sponsor
    Cybersecurity Strategy · Data Security · VPN

    NCP sponsors Nürnberger Versicherungscup 2016

    NCP’s mission is to help businesses perform at the top of their game through strong and agile remote data communications access. With this in mind it is appropriate that NCP is sponsoring the Women’s...

    Encryption · Endpoint Management · Mobile · VPN

    Mobile payments and security -- money walks, money talks

    Once upon a time a mobile phone was something we used for talking. Today making a call ranks sixth on the list of most common uses for a mobile phone. Now there’s a new kid on the block that, in time,...

    Data protection
    2 Factor Authentication · Cybersecurity Strategy · Data Security

    The national economic protection strategy in Germany and real life

    When it comes to security, public authorities in any country also want to represent their interests, some more intensively than others. Germany is not lacking in initiatives and organizations that...

    Cybersecurity Strategy · Encryption · Endpoint Management · Internet of Things

    Internet of Things raises fresh security challenges for industry

    For many years industries like oil and gas, electricity, agriculture and utilities have relied on operational communications infrastructure outside the main corporate network to collect data and...

    Online Data Security Concept
    Data Security · Encryption · SSL

    SSL: Still Secure When Configured Correctly

    The Secure Socket Layer (SSL ) protocol is under attack: in recent months, a succession of vulnerabilities and successful breaches have raised questions about the effectiveness of this ubiquitous...

    Cybersecurity Strategy · Data Security · Encryption · Endpoint Management · VPN

    Web of Spies

    Ever since Edward Snowden revealed the extent of state-sponsored espionage over the Internet in 2013 businesses have been acutely aware of just how vulnerable data communications are to being...

    Cloud · Cybersecurity Strategy · Data Security · Encryption · VPN

    Cloud Security Pitfalls to Avoid

    Cloud computing technology is fast becoming an attractive alternative to maintaining IT systems and applications on premise. In-house management and maintenance of IT is costly and resource-hungry....