Posts tagged with VPN

Endpoint Management · IT policy · VPN

Why a User-Centric Approach is Required for Network Security

Is your enterprise one of the many that are "subject to the whims of fickle consumer-business users" when it comes to adopting new technology?

Industry Commentary · Mobile · VPN

BYOD and Its Risks to Network Security

In the not-so-distant past, when enterprises lacked ubiquitous high-speed Internet connections and the means to provide employees with remote access, organizations were far more likely to enforce...

Industry Commentary · IT policy · VPN

Are Your Employees Undermining Your Network Security?

Enterprises are constantly fighting to stay one step ahead of hackers, from upgrading endpoints using the now vulnerable Windows XP to Windows 8 or implementing more secure remote access technologies...

Industry Commentary · Mobile · VPN

Mobile Malware and the Corporate Network

Cybersecurity threats are constantly evolving, and for IT teams looking to patch the latest vulnerability (i.e. Heartbleed), trying to prevent the next attack is a full-time job in itself. However,...

Industry Commentary · IT policy · VPN

Remote Workers Demand VPNs

With more companies going global, and more employees spread across multiple geographic locations, the demand for remote access technologies has never been greater. The good news is that telecommuting...

Cloud · Encryption · Rethink Remote Access · virtualization · VPN

A Closer Look at Cloud VPNs

Virtual Private Networks as a Service (VPNaaS), Managed Security Service Providers (MSSP) and Cloud Remote Access are different solutions addressing the same market requirement – the ability for...

End of XP
Industry Commentary · IT policy · Rethink Remote Access · VPN · Windows 8

Long Live Windows XP…. And Mobile Security

At one point or another, we’ve all been blindsided by news that has literally changed our lives. Though we’re often left momentarily stunned, it’s imperative to figure out how to adjust and carry on....

Encryption · Industry Commentary · IT policy · VPN

Why Enterprises Are Struggling So Much with Encryption

Encryption. For most organizations, the need for it is very apparent, but for some reason, its implementation often falls well short of goals and expectations. The obvious question here is: why? A...

Encryption · Industry Commentary · Mobile · VPN

A Closer Look at the Android VPN Flaw

It’s been a rough couple of years for Android devices. Sure, there may have been more than 900 million of them activated in 2013 alone, but those impressive sales numbers do nothing to inhibit cyber...

Encryption · IT policy · VPN

Stopping Remote Access Breaches with “Honey”

Encryption has long been one of the most effective tools to prevent the exposure of sensitive data. As such, hackers are constantly working on new ways to crack encryption algorithms and exploit...

This website uses cookies

We use cookies to personalize content and analyze access to our website. You can find further information in our data protection policy.

OK