Beiträge aus der Kategorie: Endpoint Management

Channel Link Logo
Endpoint Management · VPN

NCP Channel Alliance Partner Program Takes Center Stage at Channel Link 2015

Given that three in four executives now say Bring-Your-Own-Device (BYOD) initiatives pose the greatest security risk to their companies, it shouldn't be surprising that companies have tasked their IT...

Luxury Hotel Interior
Endpoint Management · IPsec

Open Haus: VPN Path Finder

Whenever Katelyn O’Shaughnessy checks into a hotel, room size isn't anywhere near her top concern. As she told the Los Angeles Times in a story about the hotel preferences of Millennials, "You can...

Tech-Data-CMYK
Endpoint Management

NCP engineering and Tech Data Expand Secure Remote Access to SMB Market

In what’s being described by the president of the National Small Business Association (NSBA) as “a step in the right direction,” the U.S. Congress decided to take up legislation that would help the...

young couple using a digital tablet
Endpoint Management · Mobile

How to Resolve the BYOD Stand-Off between Employees and IT

"Try to please everyone, and you'll end up pleasing no one." This is one of those classic, ubiquitous statements that can apply to any number of situations. Take the Bring-Your-Own-Device (BYOD)...

vpn_blank13
Endpoint Management · Industry Commentary

SXSW: Three Cybersecurity, Remote Access Takeaways from Austin

[caption id="attachment_5732" align="alignright" width="300"] Image via Creative Commons/John Chandler (CC BY-NC-SA 2.0)[/caption]

NCP Webinar
Endpoint Management · Rethink Remote Access

How to Manage Secure Communications in M2M Environments

For all the talk of the Internet of Things (IoT) and machine-to-machine (M2M) communications making our lives easier, there always seems to be a cautionary tale involving security of these devices...

Endpoint Management

Battlefield Mobile: Threats Targeting In-Motion Endpoints Climbed in 2014

By now, cybersecurity veterans are well-versed in the most common attack vectors exploited by hackers to breach their corporate networks. Brute force attacks, phishing schemes, SQL injections –...

Endpoint Management · IT policy

The Risk Within: Could an Ex-Employee Be Responsible for the Sony Hack?

One month ago, we asked, "What network security lessons can we learn from the Sony attack?" Since then, new information has been slow to trickle out, save for the FBI's mid-December statement that...

Endpoint Management · Rethink Remote Access

Ex-Employees: All the Best, But Can We Have Our Personal Emails Back, Please?

It doesn’t matter if employees leave a company on unpleasant terms or quite amicably – it is absolutely essential that enterprises have solid, well-defined termination processes in place, and that...

Endpoint Management · IT policy

The Holidays Bring Both Cheer and Fear to Network Administrators

Almost one year ago to the day, the "most wonderful time of the year" became anything but for millions of Americans when news of the Target data breach broke. Not only did that attack force us all to...

Diese Webseite verwendet Cookies

Wir verwenden Cookies, um Inhalte zu personalisieren und die Zugriffe auf unsere Website zu analysieren. Weitere Informationen finden Sie in unserer Datenschutzerklärung.

OK