The official blog from Satisnet Ltd

New INVEA-TECH white paper – FlowMon + Cisco: Advanced solution for network traffic visibility

inveatech-logo-120-croppedProviding a stable network and maintaining control over network applications is critical for organisations where nearly all communication uses a shared network infrastructure. Network administrators face a dynamic environment with a growing number of applications and increasing data flow, BYOD, virtualisations, distributed infrastructure and cloud services.

Read this post →

Cloud application users and administrators are the weakest link

TenablePrivileged users present an increasing opportunity to potential attackers. There are two classes of privileged users on your network today: the users of your cloud-based applications such as SalesForce and NetSuite, and your system administrators. Any attacker who is able to compromise a desktop, laptop or mobile device of one of these users has unrestricted access to your data.

Read this post →

Aerohive case study: Long-term care provider deploys mobile patient care

AerohiveAnother interesting case study by Aerohive looks at long-term care provider Daybreak Venture. The company wanted to expand its wireless network across its 75 facilities and realised its existing Cisco solution wasn’t going to meet its needs. It had geographically distant sites and many nursing homes in older buildings which presented infrastructure challenges.

Read this post →

Gartner predicts emergence of Digital Risk Officer

More than half of CEOs will have a senior digital leader role in their staff by the end of 2015, according to the 2014 ‘CEO and Senior Executive Survey’ by Gartner, Inc. The company says that by 2017, one-third of large enterprises will also have a Digital Risk Officer (DRO) role or equivalent.

Read this post →

Android phones hit by ransomware

Within the last month, roughly 900,000 Android users have been targeted with a form of ransomware called “ScarePackage.” The malware accuses the user of being a criminal and claims that the FBI has locked their phone, and the only way to regain access data is to pay a “fine”of a few hundred dollars.

Read this post →

What’s new in VMTurbo 4.7

VMTurboVMTurbo has announced the release of  VMTurbo v4.7, which aims to provide end-to-end control (compute, storage, fabric, and network) across the virtualized stack and tighter converged infrastructure alignment to better manage all resources across the Virtualized Data Center.

Read this post →

Tripwire issues healthcare malware infections alert

TripwireIn the light of this week’s news of a major breach of a Healthcare provider’s systems which resulted in the theft of patients’ personal details, Tripwire has issued an alert outlining how to create custom Tripwire IP360 rules to detect known versions of the malware used.

Read this post →

How Shavlik products use cloud computing

ShavlikMost people are aware of what cloud computing has to offer, and the fact that scales easily and it provides access to data anytime and from anywhere. But how does it apply to Shavlik products? How are Shavlik products taking advantage of cloud computing in order to provide benefits to the customer?

Read this post →

Targeted threat groups are pursuing the pharmaceutical industry

FireEyeFireEye reports that Advanced Persistent Threat (APT) groups are targeting the pharmaceutical industry, compromising systems and stealing vital information, and perhaps putting lives at risk. Recent reports of theft of personal data of healthcare providers’ patients reinforces FireEye’s belief that the industry is a goldmine for APT actors.

Read this post →

Attackers are using the distraction of high-profile vulnerabilities to evade detection

TripwireRecent high-profile zero-day vulnerabilities (e.g. Heartbleed) have grabbed a lot of media attention and caused IT departments to commit resources to dealing with them. While this is understandable, it has meant that organisations are being left open to increased risk.

Read this post →

5 reasons why Sophos is a Leader in the Gartner Magic Quadrant for UTM

SophosGartner has named Sophos in its Leaders Quadrant in the Gartner Magic Quadrant for Unified Threat Management for the third year in a row. The Magic Quadrant is based on an assessment of a company’s ability to execute and completeness of vision. In the past year Sophos released our SG Series appliances, their fastest ever UTM devices, and has achieved impressive growth in the market.

Read this post →

Shadow IT and what your company should be doing about it

AccellionThe phrase “Shadow IT” is becoming increasingly popular and refers to SaaS products and services used by employees without the knowledge or approval of the IT department. These services include business productivity, social media, file sharing, storage and backup. Frost & Sullivan recently surveyed line of business (LOB) and IT managers, and 80% of respondents admitted using non-approved SaaS applications for their work.

Read this post →

VMTurbo solves workload performance and efficiency challenges, according to customers

VMTurboVMTurbo recently commissioned TechValidate, a trusted authority for creating customer evidence content, to survey their customer base. The firm contacted over 150 customers thorough the world across a variety of industries and asked them about the challenges they solved with VMTurbo, how this complements other tools in their virtual datacenters, and their overall perception of the value provided.

Read this post →

Thycotic Secret Server: The Getting Started Guide for end-users

ThycoticThycotic has published a useful ‘Getting Started Guide’ for anyone who uses their Secret Server enterprise password management tool to store, distribute, monitor and update privileged and shared accounts. The company is encouraging the sharing of their blog post with your non-IT teams, including Marketing, Human Resources and Finance, to help them get started with Secret Server.

Read this post →

Tenable announces Log Correlation Engine 4.4

Tenable has released an update to SecurityCenter CV’s Log Correlation Engine, making it easier to integrate Continuous Monitoring in your IT infrastructure. The company recommends that customers of these products consider upgrading to take advantage of the new self-monitoring and enhanced integration features in this release.

Read this post →

Sophos Mobile Control 4.0 wins 5 Star rating from SC Magazine

SophosSophos Mobile Control version 4.0 has earned a 5 Star rating from SC Magazine, the highest level possible. The enterprise mobility management (EMM) solution makes it easy for organisations to manage all their devices, and the content and applications on them.

Read this post →

How many different places does your enterprise use for data storage?

AccellionIf your organisation is anything like the majority, your enterprise data is being stored in a multitude of different locations, both on-premise and in the cloud, including some places you may not even be aware of. Employes are taking it upon themselves to use cloud services and are struggling to find the information they need when they need it.

Read this post →

Adobe warns users to patch Acrobat

AdobeAdobe has issued an urgent warning to Windows users to update their installations of Adobe Reader and Acrobat, after it was discovered that a critical vulnerability allowing circumvention of sandbox protection on the Windows platform is being exploited by attackers.

Read this post →

Sophos offers some sensible advice following Russian hack

SophosThe media frenzy this week about a Russian cyber gang amassing 1.2 billion user credentials including emails and passwords hasn’t been helped by the fact that  the security firm behind the revelations, Hold Security, seems to be holding back the details for financial gain by offering breach notification services to businesses starting at $120 per year.

Read this post →

Support for Internet Explorer 8 to end in less than 18 months

MicrosoftMicrosoft has announced in a blog post that it will cease to support version 8 of its Internet Explorer web browser in January 2016 and is encouraging its users to upgrade, primarily for security reasons. Furthermore, the company has also said that after this date, only the most recent version of Internet Explorer available for a supported operating system will receive technical support and security updates.

Read this post →