2013

Industry Commentary · IT policy · VPN

Adobe Hacked: The Frightening Implications for Network Security

It seems barely more than a few weeks can pass without news of a major global company being targeted by cyber criminals. The latest to find a bullseye on its back is Adobe. The software company —...

Endpoint Management · IT policy · Shows · VPN

BYOD, Policy Compliance Top Remote Access Concerns at Interop New York 2013

Another Interop New York conference has come and gone, and as usual, there were plenty of thought-provoking discussions. Unsurprisingly, security was a hot topic at this year’s event, with BYOD and...

Mobile · Shows · VPN · Wi-Fi

5 Ways to Keep Your Data Secure While Traveling to Interop NY

By Patrick Oliver Graf, General Manager, Americas of NCP engineering

Endpoint Management · IPsec · IT policy · SSL · VPN

Do You Plan to Use the Per App VPN Feature in iOS 7?

Despite the rise of the bring-your-own-device (BYOD) movement in recent years, Apple’s popular iPhone and iPad haven’t really been geared toward making the lives of enterprise IT administrators any...

Endpoint Management · IT policy · Mobile · Rethink Remote Access · SSL

Developing a Comprehensive Remote Access Security Framework

As previously discussed, mobility and bring-your-own-device (BYOD) programs have become staples of today’s working world. As such, it is more important than ever to recognize that the overall...

IPsec · Mobile · VPN

The Need for Network Security in the Face of Android Vulnerabilities

We’ve given Android at lot of attention over the past year, and rightfully so. The operating system is, after all, the most widely used in the world. Yet, with each version and new feature that Google...

2 Factor Authentication · Endpoint Management · IT policy · Rethink Remote Access · VPN

The Role of People-Centric Security Systems and Defense in Depth

Is it possible that IT administrators are actually doing too much to secure their corporate networks? Given the rate at which the enterprise security landscape changes, it almost seems like a...

Certificates · Endpoint Management · Industry Commentary · VPN

Why Elliptic Curve Cryptography is Necessary for Secure Remote Access

Recently, there have been many advances in cracking encryption algorithms that are the basis for the most common cryptography systems, such as Diffie-Hellman, RSA and DSA. Experts warn that within the...

2 Factor Authentication · Endpoint Management · IPsec · Posts · Rethink Remote Access · SSL · VPN

Countering Advanced Persistent Threats with Comprehensive Network Security

The technological savvy and tenacity of cyber criminals has never been greater, and IT administrators trying to prepare for impending attacks are often left backpedaling. With all of the different...

2 Factor Authentication · Endpoint Management · Industry Commentary · Shows

Black Hat 2013: Key Takeaways on Remote Access Security

With the books closed on what was quite possibly the most controversial Black Hat conference ever, let’s take a few minutes to reflect on all of the hot button issues relating to remote access that...

This website uses cookies

We use cookies to personalize content and analyze access to our website. You can find further information in our data protection policy.

OK