The official blog from Satisnet Ltd

Real-world impact of Heartbleed: The web is just the start

Palo Alto NetworksSSL is hugely important to the modern Internet, and the Heartbleed vulnerability (CVE-2014-0160: OpenSSL Private Key Disclosure Vulnerability) compromised the integrity of communications across the entire Web. Palo Alto Networks is committed to protecting customers from the full spectrum of the threat, and has looked at just how much deeper this goes.

Read this post →

Analysing SAP Security Notes April 2014 Edition

OnapsisSAP is a complex and ever changing system, whether because of changes introduced to your SAP implementation to better suit your business or through the application of Security Notes (Patches) to ensure that newly disclosed vulnerabilities are mitigated.

Read this post →

Windows 8.1 Update – Microsoft forces users to update OS if they want future security updates

MicrosoftIn a week which saw the last ever security updates for Windows XP, Microsoft has also made another more modern version of its OS obsolete. Users of Windows 8.1 will no longer receive security updates unless they upgrade to Windows 8.1 Update.

Read this post →

Detect heartbleed exploits with Extrahop’s free download

ExtraHop LogoExtraHop has released a free download that can detect the heartbeats that are used in the Heartbleed exploit, revealing potential attacks against your SSL servers. This capability is available in the ExtraHop Discovery Edition, a free-forever virtual appliance.

Read this post →

Enterprise-class Wi-Fi enables productivity and collaboration

AerohiveAn interesting case study by Aerohive Networks highlights how organisations can reduce headaches and cut costs by deploying Aerohive’s Branch on Demand WiFi solution.

Read this post →

The Heartbleed Internet security vulnerability: What the experts are saying

Unless you’ve been hiding under a rock, it’s likely you’ve heard about the Heartbleed Internet security vulnerability, which has made headlines around the web over the last few days. Heartbleed is a just discovered security vulnerability that was introduced to OpenSSL about two years ago. Our providers have responded quickly, and here’s a round up of what some of them are staying about it:

Read this post →

Despite end of support, Windows XP remains world’s second most popular operating system

With less than a week to go before Microsoft pulls the plug on general support for Windows XP, the OS Microsoft released to the public in 2001 and replaced in 2007 is still the second most used OS on the planet, according to independent website analytics company StatCounter.

Read this post →

Satisnet Win IBM Security System Business Partner Award 2014

IBMAs an IBM partner and IT security software integrator, Satisnet has been awarded the prestigious Balanced Partnership Award at the IBM 2014 Security System Business Partner Awards in Las Vegas.

Read this post →

Nessus 5.2.6 now available with new features

TenableEarlier this week, Tenable announced and released a new UI (version 2.20) and engine (version 5.2.6) for their popular Nessus Scanner. Ordinarily this would not require a banner announcement, but with the new UI comes some extremely helpful new features for customers with multiple scanners, or who also have Tenables’ Perimeter Scanning Service.

Read this post →

Splunk DB Connect

SplunkThe purpose of this guide is to assist other Splunk users with the setup of the Splunk DB Connect application, and to try to answer some of questions posed on Splunk answers regarding this topic. I myself have spent some time configuring and troubleshooting the application to get it to work, and hopefully this blog will help those having difficulties.

Read this post →

IT Security is only as strong as the weakest link

AccellionA security system is only as strong as its weakest link. That’s one of the lessons enterprise IT teams can learn from the recent spate of security breaches. If partners can connect to an enterprise’s internal network, or enterprise employees regularly exchange files with partners, then the weakest link might be on a partner’s network.

Read this post →

New! Puppet Enterprise Supported Modules

Puppet LabsEarlier this week, Puppet Labs kicked off their new Puppet Enterprise supported module program by announcing the first set of such modules with the release of Puppet Enterprise 3.2.

Read this post →

How retailers can protect themselves from POS malware

ExtraHop LogoThe Target data breach in the USA continues to make headlines, most recently with the resignation of the CIO. But while the scale of the breach was large, Target is hardly the first and won’t be the last to get hit with a persistent threat.

Read this post →

Apple Releases iOS Security White Paper

Apple has released an updated white paper covering security in iOS, going into an unprecedented amount of detail about the security architecture and features of the company’s mobile OS.

Read this post →

What’s keeping IT execs up at night?

AccelopsInteresting infographic produced by Accelops. They asked IT executives who were attendees at Cloud Expo West about their priorities for 2014.

Read this post →

OATH, strong authentication, and what it means

celestix-logo-120-croppedYou’ve probably been hearing a lot about two factor authentication and the chances are you’ve come across the terms “OATH-compliant” and “Based on the OATH standards”.

Read this post →

AirWatch Workspace named as finalist in Best of Enterprise Connect award

AirWatchEnterprise Connect Orlando, produced by UBM Tech, today announced AirWatch Workspace is among six finalists for the Best of Enterprise Connect award, which recognizes exhibitors who have made significant technological advancements in enterprise communications and collaboration.

Read this post →

Coming soon: Shavlik Protect 9.1

ShavlikShavlik Protect 9.1 close to release, and Shavlik has shared some details about the release, which includes some useful enhancements and additions.

Read this post →

VMware, Puppet, EMC and SAP: Better Together

Puppet LabsIf you already have orchestration and automation in place, and you’re interested in adding SAP to your already automated environment, this should get you started.

Read this post →

Thycotic and ProxStop – responsive and proactive

ThycoticI was investigating strange behaviour back in November ’13, no, not MY strange behaviour – those who know me well will state quite clearly that my behaviour goes way beyond anything you’d want to investigate! No, this strange behaviour was repeated triggering of an API call from Thycotic’s Password Reset Server and verification provider ProxStop.

Read this post →