White Papers & Case Studies

  1. Securing DECT Devices
    12/17/2018

    This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.

  2. How Machine Learning And Artificial Intelligence Drive MSP Success
    10/3/2018

    Change is the one constant in the IT world, and the way companies purchase and consume technology continues to transform and evolve. As customers continue to disrupt the IT value chain, a successful transition to cloud and hybrid models requires managed service providers (MSPs) to evolve their people, operations, and processes and employ advanced technology to secure their customers’ environments. 

  3. 2018 Threat Report Mid-Year Update
    10/3/2018

    One of the biggest security takeaways from the first half of 2018 is that we can never make our computer systems perfectly secure, and the underlying hardware can be just as susceptible to exploitable flaws as the software that runs on it. Two new vulnerabilities—Meltdown and Spectre—affected nearly every device with a CPU, making this one perhaps the worst first half ever in terms of computer security. While not the most severe we’ve ever seen, these vulnerabilities hit the entire ecosystem of computers due to flaws in how modern processors isolate private memory

  4. Security Awareness Training: The ROI For End User Education
    5/14/2018

    While any business that wants to stay afloat must regularly balance monetary costs against benefits, it is especially important for smaller businesses with more limited budgets to thoroughly vet their return on investment (ROI) before purchasing a new product or service. And, depending on budget constraints, many decisions must be made with potential risk in mind. For example, if the likelihood that a business would need a very specific type of costly insurance is extremely low, then there’s no point in wasting time or resources on that insurance, right?

  5. DNS Protection: An Overlooked Layer Of Cybersecurity
    4/4/2018

    Uncontrolled internet access is a high-risk activity for any business, regardless of size, but it is particularly dangerous for the small to medium- sized businesses (SMB) that make up a managed service providers’ client base. Unfortunately, endpoint security alone is no longer enough to keep clients safe from modern cyberattacks. And, as MSPs well know, remediating threats that have successfully infiltrated the network is challenging and extremely time-consuming. That’s why today’s MSPs are increasingly turning to services that can stop threats before they hit the network.

  6. Webroot 2018 Threat Report
    4/4/2018

    If there’s one thing that came through loud and clear in our analysis of malware and other threats in 2017, it’s that, when it comes to cybersecurity, change is the only constant. While analysts, researchers, and security companies worked quickly to identify and block emerging threats, attackers were just as quick in finding new ways to evade defenses. Phishing attacks became more targeted and successful, and most phishing sites were only online for 4-8 hours.

  7. Visibility From Your Network Into The Cloud: Today’s New Essentials
    3/6/2018

    The cloud is supposed to make everything simpler and more cost-effective for businesses and their users, but for network managers, it adds complexity. Cloud services are made available to users on demand via the internet. The services depend on extreme network reliability, and that reliability must extend beyond traditional corporate boundaries. 

  8. The Shortfalls Of Traceroute In Modern Multi-Path Networks
    3/6/2018

    Traceroute is a fantastically popular network troubleshooting tool. It is second in popularity only to ping. The reason is simple. Traceroute quickly shows you what network devices your traffic is going through to reach a destination, and gives an indication of what each of those devices’ performance is. Theoretically, you can quickly tell where your traffic stops, where your traffic is slowed, and what devices are important for this connectivity. Not only is this super helpful, but it’s also intuitive. It aligns with our mental model of how networks work. It just makes sense.

  9. VoIP Vs. Regular Phone Services: A Guide To IP Telephony
    2/23/2018

    Are you feeling lost in the recent evolution of voice communications? The shift from traditional telephone services to new technologies has developed so fast! Now that Voice over IP (VoIP) is the new trend, you to understand how it differs from regular telephony. Through this guide you will learn the essentials and understand what makes VoIP the best option for every business.

  10. Quarterly Threat Trends: The Service Provider's Look Into The Future
    1/9/2018

    Who wouldn’t want the ability to see what will happen in the future? Nowhere is this yearning greater than in the world of cybersecurity, where even a small glimpse of future threats could prevent a disastrous and costly breach. The security industry is looking to move beyond reactive mode and be proactive, automating the response to threats and preventing attacks before they happen.