This website uses cookies

We use cookies to personalize content and analyze access to our website. You can find further information in our data protection policy.

OK

Post of category Endpoint Management

Cybersecurity Strategy · Data Security · Digital Signage · Encryption · Endpoint Management · Internet of Things · IT policy · VPN

Connecting IIoT Security and Remote Access to Bridge the Gap Between Operational IT and Product/Production IT

In many industries, technology is developing faster than the ability to secure it. As the Industrial Internet of Things (IIoT) permeates finance, retail, logistics, telecommunications, and healthcare...

Cybersecurity Strategy · Data Security · Digital Signage · Endpoint Management · Internet of Things

Protecting Industrial Intelligence Against Attacks

In recent years, many of the world’s isolated industrial control systems (ICS) in manufacturing and critical infrastructure have been joined with information technology (IT) networks. There are clear...

Cybersecurity Strategy · Data Security · Encryption · Endpoint Management

Business travelers should fly under the radar

Thanks to the constant availability of today’s mobile network coverage and public Wi-Fi hotspots, we tend to take connectivity for granted. Our smartphones and mobile devices are with us wherever we...

Cybersecurity Strategy · Encryption · Endpoint Management

Vulnerabilities: a never ending story

Vulnerabilities in software are one of the most important attack vectors for hackers. Unpatched software has been responsible for dozens of large-scale and unfortunately successful attacks in the...

Blog · Data Security · Encryption · Endpoint Management · Internet of Things

What does built-in IIoT security look like?

What Does Built-in IIoT Security Look Like? Companies are racing to take advantage of new revenue opportunities, operational efficiencies and cost savings offered by the multitude of IP-connected...

Cloud · Data Security · Endpoint Management

Using the public cloud securely

Cloud usage has become a rule rather than an exception in businesses of all sizes. In 2016, cloud usage in all businesses reached 65 percent in Germany. It doesn't matter how large or small a company...

Data Security · Endpoint Management

Cover up to avoid unwanted close-ups

Video surveillance is a sensitive issue, as the discussions about more cameras in public places show. It is no wonder that cameras on devices used in private areas which are capable of taking close-up...

Cybersecurity Strategy · Data Security · Endpoint Management · Internet of Things · IT policy · Privacy · VPN

Top Concerns for Digital Assistants in the Workplace

Digital assistants like Amazon’s Alexa/Echo, Apple Homekit and Google Home are increasingly becoming part of the connected home. The Alexa for Business Platform, announced at the end of 2017, is set...

vpn
Cybersecurity Strategy · Encryption · Endpoint Management · IT policy · VPN

Four Common Myths about VPNs

A Virtual Private Network (VPN) is a useful tool that encrypts data before it passes across the public Internet and then decrypts it when it reaches its destination. Rather like shutters on the...

macbook-apple-imac-computer-39284
BYOD · Data Security · Endpoint Management · Internet of Things · Mobile · VPN

Enabling Secure Remote Connectivity for Apple Devices

With over one billion active users worldwide, Apple continues to offer the most diverse product line from Apple Watches to Macs, to iPads and iPhones.