March 2018

Blog · Data Security · Encryption · Endpoint Management · Internet of Things

What does built-in IIoT security look like?

What Does Built-in IIoT Security Look Like? Companies are racing to take advantage of new revenue opportunities, operational efficiencies and cost savings offered by the multitude of IP-connected...

Cloud · Data Security · Endpoint Management

Using the public cloud securely

Cloud usage has become a rule rather than an exception in businesses of all sizes. In 2016, cloud usage in all businesses reached 65 percent in Germany. It doesn't matter how large or small a company...

Blog · Cybersecurity Strategy · Data Security · Encryption

To Succeed, Open Banking Must First Allay Privacy Concerns

The banking industry in the UK and the rest of Europe is undergoing a quiet revolution. Under new rules, EU banks must share the data of consenting customers with third parties. Designed to increase...

Data Security · Endpoint Management

Cover up to avoid unwanted close-ups

Video surveillance is a sensitive issue, as the discussions about more cameras in public places show. It is no wonder that cameras on devices used in private areas which are capable of taking close-up...

Blog · Cloud · Data Security · VPN

Key risks for enterprises committing sensitive data to the cloud

Economic benefits of migrating enterprise IT environments to services providers are starting to outweigh the security concerns hovering over cloud computing. Until recently, organizations have...

This website uses cookies

We use cookies to personalize content and analyze access to our website. You can find further information in our data protection policy.

OK