• The Secret to Effective Remote Access VPN Management

    globe data lock
    Data Security · VPN

    The EU General Data Protection Regulation

    Data protection is going to get expensive: The EU General Data Protection Regulation is on its way.

    Endpoint Management · Internet of Things · IT policy · VPN

    The Secret to Effective Remote Access VPN Management

    According to Ponemon Institute, the growing number of employees using multiple personal and company-owned mobile devices to connect to corporate networks is the biggest endpoint security threat today....


    Progress through partnership

    A VPN needs both a client and remote gateway. While NCP offers a complete solution with Secure Enterprise Client and Secure Enterprise VPN Server, some manufacturers only develop their own gateways....

    2 Factor Authentication · Awards · Endpoint Management · VPN

    NCP Secure Enterprise iOS Client Wins Government Security Award

    The Government Security Awards (“The Govies”), organized by Security Today magazine, once again bestowed its top Network Security honors upon NCP. The awards were presented at a ceremony during ISC...

    Data protection
    Cybercrime · Data Security · VPN

    The ten most serious cyber crimes and data breaches to date

    People are often quick to adapt – now we don’t seem to blink an eyelid when we read news about another hacked server and the loss of a few million records of personal data. Only the most spectacular...

    Endpoint Management · Internet of Things · IT policy · VPN

    Strategies for Managing Large-Scale VPN Deployments

    Large organizations today are experiencing a rapid evolution in technology that is challenging traditional security systems and infrastructures.

    IT policy · VPN

    When plan B needs a plan C

    Just a few days ago, news began circulating on the internet of a strange problem with Cisco routers which was easy to identify as it caused complete failure. Shortly afterwards, Cisco issued a warning...

    Cybersecurity Strategy · Public Hotspot · VPN · Wi-Fi

    Simple steps to a secure public hotspot connection

    In just a short time, our working lives have been transformed. 

    Cloud · Cybersecurity Strategy · Internet of Things · Mobile · Shows · VPN

    IIoT, Mobile and Cloud Security Take Center Stage at RSAC 2017

    The RSA Conference (RSAC) is a regular highlight in the IT security calendar.

    Cybersecurity Strategy · Internet of Things · VPN

    A priority on today’s to do list: Please secure remote access once and for all!

    Most IT devices have some form of remote access, whether via web browser or app. As long as devices are accessed by an authorized user from within an internal network, this isn’t a problem....

    This website uses cookies

    We use cookies to personalize content and analyze access to our website. You can find further information in our data protection policy.