• The Secret to Effective Remote Access VPN Management

    Cybersecurity Strategy · VPN

    Threat Intelligence-as-a-Service brings SIEM Within Reach of SMEs

    Organizations are being targeted by cybercriminals more than ever. According to the latest statistics from Symantec, 52.4% of phishing attacks in December 2015 were against small and medium-sized...

    globe data lock
    Data Security

    The World after Safe Harbor

    In October 2015, the European Court of Justice (ECJ) declared the Safe Harbor Agreement for transferring data to the USA invalid. The decision was based on a lawsuit filed by the Austrian, Maximilian...

    Business infographic icons set. Illustration eps10
    Cybersecurity Strategy · IT policy

    Big Data and IT Security – SIEM as an Analysis Tool

    Over the last few years, gleaning useful information from massive amounts of data has also become more difficult for IT security and approaches to Big Data and information analysis are a critical...

    Cybersecurity Strategy · VPN

    Back to Basics: Tackling the Fundamental Cybersecurity Solutions [VIDEO]

    It’s fair to say that organizations, particularly larger enterprises, are making more concerted efforts nowadays to invest heavily and quickly into cybersecurity. Just a few short years ago,...

    laptop computer
    BYOD · VPN

    A Look at BYOD in 2016

    Happy 2016! It’s a new year, and a time for fresh resolutions to improve your life over the next 12 months, whether that involves running a marathon, getting a new job or taking that trip abroad...


    Open Haus: Seamless Roaming [VIDEO]

    Imagine this: You’re sitting on the train, trying to get your work done, when your Wi-Fi connection – not always the most reliable on trains – drops out. Maybe you manage to re-connect in a few...

    laptop computer
    Endpoint Management · VPN

    Endpoint Security: The Cornerstone of the Cybersecurity Puzzle

    Some enterprises occasionally fail to realize that many of the differing cybersecurity services available today aren’t optional add-ons but necessary, oftentimes critical, pieces of a complete...

    2 Factor Authentication

    Open Haus: Multi-Factor Authentication [VIDEO]

    NCP has been present at a number of industry events throughout the year, from it-sa in Nuremberg to SC Congress in New York to INTERFACE in Denver. While these gatherings offer great opportunities for...

    Padlock Icon Computer Key Showing Safety Security And Protected
    Certificates · Industry Commentary

    Does Bringing an ’Ethical Hacker’ In House Pay Off?

    A study last year estimated that the global losses from cybercrime ranged from $375 to $575 billion – for just 2014 alone. This figure is only expected to get higher with each passing year as...

    smartphone mobile

    ‘Tis the Season: Why Cyberattackers Set their Sights on the Holidays

    The holiday shopping season is back again and now in full gear. With Black Friday and Cyber Monday kicking off the annual frenzy, shoppers are already rummaging through department stores or scouring...