Beiträge aus der Kategorie: Endpoint Management

laptop computer
Endpoint Management · VPN

Endpoint Security: The Cornerstone of the Cybersecurity Puzzle

Some enterprises occasionally fail to realize that many of the differing cybersecurity services available today aren’t optional add-ons but necessary, oftentimes critical, pieces of a complete...

Endpoint Management · Uncategorized

How a Remote Access VPN Extends the Reach of Your IT Staff

What do the federal government’s Office of Personnel Management (OPM), Ashley Madison and Target have in common?

Channel Link Logo
Endpoint Management · VPN

NCP Channel Alliance Partner Program Takes Center Stage at Channel Link 2015

Given that three in four executives now say Bring-Your-Own-Device (BYOD) initiatives pose the greatest security risk to their companies, it shouldn't be surprising that companies have tasked their IT...

Luxury Hotel Interior
Endpoint Management · IPsec

Open Haus: VPN Path Finder

Whenever Katelyn O’Shaughnessy checks into a hotel, room size isn't anywhere near her top concern. As she told the Los Angeles Times in a story about the hotel preferences of Millennials, "You can...

Endpoint Management

NCP engineering and Tech Data Expand Secure Remote Access to SMB Market

In what’s being described by the president of the National Small Business Association (NSBA) as “a step in the right direction,” the U.S. Congress decided to take up legislation that would help the...

young couple using a digital tablet
Endpoint Management · Mobile

How to Resolve the BYOD Stand-Off between Employees and IT

"Try to please everyone, and you'll end up pleasing no one." This is one of those classic, ubiquitous statements that can apply to any number of situations. Take the Bring-Your-Own-Device (BYOD)...

Endpoint Management · Industry Commentary

SXSW: Three Cybersecurity, Remote Access Takeaways from Austin

[caption id="attachment_5732" align="alignright" width="300"] Image via Creative Commons/John Chandler (CC BY-NC-SA 2.0)[/caption]

NCP Webinar
Endpoint Management · Rethink Remote Access

How to Manage Secure Communications in M2M Environments

For all the talk of the Internet of Things (IoT) and machine-to-machine (M2M) communications making our lives easier, there always seems to be a cautionary tale involving security of these devices...

Endpoint Management

Battlefield Mobile: Threats Targeting In-Motion Endpoints Climbed in 2014

By now, cybersecurity veterans are well-versed in the most common attack vectors exploited by hackers to breach their corporate networks. Brute force attacks, phishing schemes, SQL injections –...

Endpoint Management · IT policy

The Risk Within: Could an Ex-Employee Be Responsible for the Sony Hack?

One month ago, we asked, "What network security lessons can we learn from the Sony attack?" Since then, new information has been slow to trickle out, save for the FBI's mid-December statement that...

Diese Webseite verwendet Cookies

Wir verwenden Cookies, um Inhalte zu personalisieren und die Zugriffe auf unsere Website zu analysieren. Weitere Informationen finden Sie in unserer Datenschutzerklärung.