Beiträge aus der Kategorie: Endpoint Management

Endpoint Management · IT policy · VPN

Why a User-Centric Approach is Required for Network Security

Is your enterprise one of the many that are "subject to the whims of fickle consumer-business users" when it comes to adopting new technology?

Endpoint Management · Mobile · VPN

New Ways to Secure Mobile Devices for BYOD

The discussion on BYOD centers on whether employees working more efficiently on their personal devices is worth whatever network security vulnerabilities are sown when enterprises allow numerous...

Endpoint Management · IT policy · Mobile

Will Network Security Concerns Sink Government BYOD?

The Department of Homeland Security (DHS) issued a warning last week that the computer network of a public utility company had been compromised by a "sophisticated threat actor," likely through a...

2 Factor Authentication · Endpoint Management · Industry Commentary

The Target Breach: How Network Security Best Practices Could Have Prevented It

Who would have thought that an HVAC system could lead to the data of millions of people being compromised? Target surely didn’t. Recently, it has come to light that the Target breach hackers likely...

Endpoint Management · IPsec · IT policy · VPN

Developing a Comprehensive Remote Access Security Framework: Network Health and Trust

The need for a comprehensive remote access security framework cannot be emphasized enough. Those looking for proof of this concept need look no further than the recent Adobe hacking, and the chilling...

Endpoint Management · IPsec · Mobile · SSL · VPN · Wi-Fi

Vehicle VPNs, Part Two: Business World Implications

In recent years, remote access security has become a major focus of IT departments in businesses small and large. The rapid growth in the use of smartphones and tablet computers, the...

Endpoint Management · IT policy · Shows · VPN

BYOD, Policy Compliance Top Remote Access Concerns at Interop New York 2013

Another Interop New York conference has come and gone, and as usual, there were plenty of thought-provoking discussions. Unsurprisingly, security was a hot topic at this year’s event, with BYOD and...

Endpoint Management · IPsec · IT policy · SSL · VPN

Do You Plan to Use the Per App VPN Feature in iOS 7?

Despite the rise of the bring-your-own-device (BYOD) movement in recent years, Apple’s popular iPhone and iPad haven’t really been geared toward making the lives of enterprise IT administrators any...

Endpoint Management · IT policy · Mobile · Rethink Remote Access · SSL

Developing a Comprehensive Remote Access Security Framework

As previously discussed, mobility and bring-your-own-device (BYOD) programs have become staples of today’s working world. As such, it is more important than ever to recognize that the overall...

2 Factor Authentication · Endpoint Management · IT policy · Rethink Remote Access · VPN

The Role of People-Centric Security Systems and Defense in Depth

Is it possible that IT administrators are actually doing too much to secure their corporate networks? Given the rate at which the enterprise security landscape changes, it almost seems like a...

Diese Webseite verwendet Cookies

Wir verwenden Cookies, um Inhalte zu personalisieren und die Zugriffe auf unsere Website zu analysieren. Weitere Informationen finden Sie in unserer Datenschutzerklärung.

OK