Beiträge verschlagwortet mit VPN

Cloud · Encryption · Rethink Remote Access · virtualization · VPN

A Closer Look at Cloud VPNs

Virtual Private Networks as a Service (VPNaaS), Managed Security Service Providers (MSSP) and Cloud Remote Access are different solutions addressing the same market requirement – the ability for...

End of XP
Industry Commentary · IT policy · Rethink Remote Access · VPN · Windows 8

Long Live Windows XP…. And Mobile Security

At one point or another, we’ve all been blindsided by news that has literally changed our lives. Though we’re often left momentarily stunned, it’s imperative to figure out how to adjust and carry on....

Encryption · Industry Commentary · IT policy · VPN

Why Enterprises Are Struggling So Much with Encryption

Encryption. For most organizations, the need for it is very apparent, but for some reason, its implementation often falls well short of goals and expectations. The obvious question here is: why? A...

Encryption · Industry Commentary · Mobile · VPN

A Closer Look at the Android VPN Flaw

It’s been a rough couple of years for Android devices. Sure, there may have been more than 900 million of them activated in 2013 alone, but those impressive sales numbers do nothing to inhibit cyber...

Encryption · IT policy · VPN

Stopping Remote Access Breaches with “Honey”

Encryption has long been one of the most effective tools to prevent the exposure of sensitive data. As such, hackers are constantly working on new ways to crack encryption algorithms and exploit...

Industry Commentary · IT policy · Mobile · VPN

The Workplace of the Future and What It Means for Network Security

The convergent trends of BYOD, the consumerization of IT and mobility are causing rapid shifts in employees’ expectations for their work environment. Employees are driving the change by working...

Encryption · Industry Commentary · VPN

Target and Neiman Marcus Hacks: The Network Security Lesson to Learn

Even if you’re not one of the tens of millions of customers that have had your credit card data stolen and sold on the black market, you’ve almost certainly heard about the Target hack that occurred...

Cloud · Industry Commentary · Rethink Remote Access · VPN

The Internet of Vulnerable Things: Why Remote Access Security is Critical

A new worm that targets embedded devices started to spread during the holiday season. The Zollard worm, which targets various devices running on Linux, has brought to light the numerous security...

Encryption · Industry Commentary · Rethink Remote Access · VPN

New Study Reiterates the Dangers of Advanced Persistent Threats for Network Security

When we last spoke about advanced persistent threats (APTs), the New York Times had just fallen victim to an attack that used malware to create new network patterns that allowed it to remain...

Industry Commentary · IT policy · Mobile · VPN

Network Security: IT Professionals’ Top Priority for 2014

Chances are if you’re reading this blog, you understand how vital it is for enterprises today to secure remote access to their corporate networks. It looks like that understanding is becoming more...

Diese Webseite verwendet Cookies

Wir verwenden Cookies, um Inhalte zu personalisieren und die Zugriffe auf unsere Website zu analysieren. Weitere Informationen finden Sie in unserer Datenschutzerklärung.

OK