Beiträge aus der Kategorie: Endpoint Management

SEC_Govies_2017_web
2 Factor Authentication · Awards · Endpoint Management · VPN

NCP Secure Enterprise iOS Client Wins Government Security Award

The Government Security Awards (“The Govies”), organized by Security Today magazine, once again bestowed its top Network Security honors upon NCP. The awards were presented at a ceremony during ISC...

pexels-photo-90333
Endpoint Management · Internet of Things · IT policy · VPN

Strategies for Managing Large-Scale VPN Deployments

Large organizations today are experiencing a rapid evolution in technology that is challenging traditional security systems and infrastructures.

Encryption · Endpoint Management · VPN

Side-step the Internet censorship threat

Most people in the Western world regard privacy as one of most fundamental rights in a democratic society. They also take it for granted that these democratic principles apply equally to the Internet....

shield
Data Security · Encryption · Endpoint Management · VPN

VPNs can ease privacy concerns

High profile data breaches at companies like Mossack Fonseca, Target, Home Depot and Wendy’s along with Government controversies like Edward Snowden and the FBI’s legal suit against Apple after the...

Connected Cars-pexels-photo-60803
Connected Cars · Encryption · Endpoint Management · Internet of Things

Connected cars: fresh safety hazards on the road ahead

Advances in connected car technology are set to radically alter the future of driving for everyone. Among the promised benefits is the ability for cars to ‘learn’ from each other, provide early...

big-data-1086802_1920
Data Security · Encryption · Endpoint Management · VPN

Big data, big security questions

Half of enterprises today store sensitive information within big data environments (up from 31 percent in 2015). Influential agencies like ENISA warn there are considerable cyber risks from using big...

hands-coffee-smartphone-technology
Encryption · Endpoint Management · Mobile · VPN

Mobile payments and security -- money walks, money talks

Once upon a time a mobile phone was something we used for talking. Today making a call ranks sixth on the list of most common uses for a mobile phone. Now there’s a new kid on the block that, in time,...

safe-913452_1920
Cybersecurity Strategy · Encryption · Endpoint Management · Internet of Things

Internet of Things raises fresh security challenges for industry

For many years industries like oil and gas, electricity, agriculture and utilities have relied on operational communications infrastructure outside the main corporate network to collect data and...

matrix-434035_1280
Cybersecurity Strategy · Data Security · Encryption · Endpoint Management · VPN

Web of Spies

Ever since Edward Snowden revealed the extent of state-sponsored espionage over the Internet in 2013 businesses have been acutely aware of just how vulnerable data communications are to being...

person-apple-laptop-notebook
Data Security · Endpoint Management · Wi-Fi

Staying Safe at Wi-Fi Hotspots

Wi-Fi hotspots in coffee shops, hotels, railway stations and airports have become a welcome resource for any business traveler, providing them with a convenient means to carry on working while on the...

Diese Webseite verwendet Cookies

Wir verwenden Cookies, um Inhalte zu personalisieren und die Zugriffe auf unsere Website zu analysieren. Weitere Informationen finden Sie in unserer Datenschutzerklärung.

OK