The EU General Data Protection Regulation
Data protection is going to get expensive: The EU General Data Protection Regulation is on its way.
The Secret to Effective Remote Access VPN Management
According to Ponemon Institute, the growing number of employees using multiple personal and company-owned mobile devices to connect to corporate networks is the biggest endpoint security threat today....
Progress through partnership
A VPN needs both a client and remote gateway. While NCP offers a complete solution with Secure Enterprise Client and Secure Enterprise VPN Server, some manufacturers only develop their own gateways....
NCP Secure Enterprise iOS Client Wins Government Security Award
The Government Security Awards (“The Govies”), organized by Security Today magazine, once again bestowed its top Network Security honors upon NCP. The awards were presented at a ceremony during ISC...
The ten most serious cyber crimes and data breaches to date
People are often quick to adapt – now we don’t seem to blink an eyelid when we read news about another hacked server and the loss of a few million records of personal data. Only the most spectacular...
Strategies for Managing Large-Scale VPN Deployments
Large organizations today are experiencing a rapid evolution in technology that is challenging traditional security systems and infrastructures.
When plan B needs a plan C
Just a few days ago, news began circulating on the internet of a strange problem with Cisco routers which was easy to identify as it caused complete failure. Shortly afterwards, Cisco issued a warning...
Simple steps to a secure public hotspot connection
In just a short time, our working lives have been transformed.
IIoT, Mobile and Cloud Security Take Center Stage at RSAC 2017
The RSA Conference (RSAC) is a regular highlight in the IT security calendar.
A priority on today’s to do list: Please secure remote access once and for all!
Most IT devices have some form of remote access, whether via web browser or app. As long as devices are accessed by an authorized user from within an internal network, this isn’t a problem....