This website uses cookies

We use cookies to personalize content and analyze access to our website. You can find further information in our data protection policy.

OK
German
  • The Secret to Effective Remote Access VPN Management

    more
    SEC_Govies_2017_web
    2 Factor Authentication · Awards · Endpoint Management · VPN

    NCP Secure Enterprise iOS Client Wins Government Security Award

    The Government Security Awards (“The Govies”), organized by Security Today magazine, once again bestowed its top Network Security honors upon NCP. The awards were presented at a ceremony during ISC...

    Data protection
    Cybercrime · Data Security · VPN

    The ten most serious cyber crimes and data breaches to date

    People are often quick to adapt – now we don’t seem to blink an eyelid when we read news about another hacked server and the loss of a few million records of personal data. Only the most spectacular...

    pexels-photo-90333
    Endpoint Management · Internet of Things · IT policy · VPN

    Strategies for Managing Large-Scale VPN Deployments

    Large organizations today are experiencing a rapid evolution in technology that is challenging traditional security systems and infrastructures.

    network
    IT policy · VPN

    When plan B needs a plan C

    Just a few days ago, news began circulating on the internet of a strange problem with Cisco routers which was easy to identify as it caused complete failure. Shortly afterwards, Cisco issued a warning...

    pexels-photo-238480
    Cybersecurity Strategy · Public Hotspot · VPN · Wi-Fi

    Simple steps to a secure public hotspot connection

    In just a short time, our working lives have been transformed. 

    rsa-conference-image_full-size
    Cloud · Cybersecurity Strategy · Internet of Things · Mobile · Shows · VPN

    IIoT, Mobile and Cloud Security Take Center Stage at RSAC 2017

    The RSA Conference (RSAC) is a regular highlight in the IT security calendar.

    Security
    Cybersecurity Strategy · Internet of Things · VPN

    A priority on today’s to do list: Please secure remote access once and for all!

    Most IT devices have some form of remote access, whether via web browser or app. As long as devices are accessed by an authorized user from within an internal network, this isn’t a problem....

    pexels-photo-96612
    Cybersecurity Strategy · Internet of Things · VPN

    Careful Connections are Key to Mitigating Cyber-Attacks on IIoT Systems

    Energy plants and factories have always been prime targets for delivering a devastating setback and psychological blow against an enemy.

    2 Factor Authentication · Cybersecurity Strategy · Data Security

    Top 5 security vulnerabilities are always the same

    The research and analyst firm techconsult issued a summary of the five major security vulnerabilities in SMEs and public organizations in Germany at the start of 2017. Their annual study...

    pexels-photo-204475
    Cybercrime · Data Security · Encryption · Mobile · VPN

    Mitigating Retail Vulnerabilities

    Retailers are top targets for cybercriminals.