Providing a stable network and maintaining control over network applications is critical for organisations where nearly all communication uses a shared network infrastructure. Network administrators face a dynamic environment with a growing number of applications and increasing data flow, BYOD, virtualisations, distributed infrastructure and cloud services.
The official blog from Satisnet Ltd
Privileged users present an increasing opportunity to potential attackers. There are two classes of privileged users on your network today: the users of your cloud-based applications such as SalesForce and NetSuite, and your system administrators. Any attacker who is able to compromise a desktop, laptop or mobile device of one of these users has unrestricted access to your data.
Another interesting case study by Aerohive looks at long-term care provider Daybreak Venture. The company wanted to expand its wireless network across its 75 facilities and realised its existing Cisco solution wasn’t going to meet its needs. It had geographically distant sites and many nursing homes in older buildings which presented infrastructure challenges.
More than half of CEOs will have a senior digital leader role in their staff by the end of 2015, according to the 2014 ‘CEO and Senior Executive Survey’ by Gartner, Inc. The company says that by 2017, one-third of large enterprises will also have a Digital Risk Officer (DRO) role or equivalent.
Within the last month, roughly 900,000 Android users have been targeted with a form of ransomware called “ScarePackage.” The malware accuses the user of being a criminal and claims that the FBI has locked their phone, and the only way to regain access data is to pay a “fine”of a few hundred dollars.
VMTurbo has announced the release of VMTurbo v4.7, which aims to provide end-to-end control (compute, storage, fabric, and network) across the virtualized stack and tighter converged infrastructure alignment to better manage all resources across the Virtualized Data Center.
Most people are aware of what cloud computing has to offer, and the fact that scales easily and it provides access to data anytime and from anywhere. But how does it apply to Shavlik products? How are Shavlik products taking advantage of cloud computing in order to provide benefits to the customer?
FireEye reports that Advanced Persistent Threat (APT) groups are targeting the pharmaceutical industry, compromising systems and stealing vital information, and perhaps putting lives at risk. Recent reports of theft of personal data of healthcare providers’ patients reinforces FireEye’s belief that the industry is a goldmine for APT actors.
Recent high-profile zero-day vulnerabilities (e.g. Heartbleed) have grabbed a lot of media attention and caused IT departments to commit resources to dealing with them. While this is understandable, it has meant that organisations are being left open to increased risk.
Gartner has named Sophos in its Leaders Quadrant in the Gartner Magic Quadrant for Unified Threat Management for the third year in a row. The Magic Quadrant is based on an assessment of a company’s ability to execute and completeness of vision. In the past year Sophos released our SG Series appliances, their fastest ever UTM devices, and has achieved impressive growth in the market.
The phrase “Shadow IT” is becoming increasingly popular and refers to SaaS products and services used by employees without the knowledge or approval of the IT department. These services include business productivity, social media, file sharing, storage and backup. Frost & Sullivan recently surveyed line of business (LOB) and IT managers, and 80% of respondents admitted using non-approved SaaS applications for their work.
VMTurbo recently commissioned TechValidate, a trusted authority for creating customer evidence content, to survey their customer base. The firm contacted over 150 customers thorough the world across a variety of industries and asked them about the challenges they solved with VMTurbo, how this complements other tools in their virtual datacenters, and their overall perception of the value provided.
Thycotic has published a useful ‘Getting Started Guide’ for anyone who uses their Secret Server enterprise password management tool to store, distribute, monitor and update privileged and shared accounts. The company is encouraging the sharing of their blog post with your non-IT teams, including Marketing, Human Resources and Finance, to help them get started with Secret Server.
Tenable has released an update to SecurityCenter CV’s Log Correlation Engine, making it easier to integrate Continuous Monitoring in your IT infrastructure. The company recommends that customers of these products consider upgrading to take advantage of the new self-monitoring and enhanced integration features in this release.
If your organisation is anything like the majority, your enterprise data is being stored in a multitude of different locations, both on-premise and in the cloud, including some places you may not even be aware of. Employes are taking it upon themselves to use cloud services and are struggling to find the information they need when they need it.
Adobe has issued an urgent warning to Windows users to update their installations of Adobe Reader and Acrobat, after it was discovered that a critical vulnerability allowing circumvention of sandbox protection on the Windows platform is being exploited by attackers.
The media frenzy this week about a Russian cyber gang amassing 1.2 billion user credentials including emails and passwords hasn’t been helped by the fact that the security firm behind the revelations, Hold Security, seems to be holding back the details for financial gain by offering breach notification services to businesses starting at $120 per year.
Microsoft has announced in a blog post that it will cease to support version 8 of its Internet Explorer web browser in January 2016 and is encouraging its users to upgrade, primarily for security reasons. Furthermore, the company has also said that after this date, only the most recent version of Internet Explorer available for a supported operating system will receive technical support and security updates.