Security Insights
-
Cybersecurity Resolutions: Reevaluate These 3 Components Of The Security Infrastructure In 2019
1/3/2019
As each year winds down, we tend to look at the coming new year with hope and determination. We will get on that treadmill, we will eat less cake, and we will adopt sound security principals. However, the reality is, we change very little from year to year. That is until something happens to shock our systems.
-
Capitalize On This Golden Age Of Technology Innovation
12/12/2014
Managed IT services are expected to grow at a CAGR (compound annual growth rate) well into the double digits.
-
CompTIA Breakaway: MSPs' Feedback Leads To New Level Platforms Product
8/3/2011
Whenever I have the chance to do product release briefings, I make sure to ask why and how a product enhancement or new feature came to be. More often than not, the answer is simple enough: our partners were asking for it. Such is the case with Level Platforms’ release of its network audit product, which helps MSPs evaluate and aggregate important network data for use in the selling cycle. By Gennifer Biggs, security, storage, and managed services editor
-
Industrial Cyber Attacks Provide New Opportunities For Security VARs
4/18/2011
The U.S. Center for Cyber Security says the state of cyber security in the United States has made the nation vulnerable to attacks on its entire infrastructure, from the desktop to the Internet to the national power grid. By Allison Ash, Guidance Software
-
Ten Ways The IT Department Enables Cybercrime
1/26/2011
We hope that by now you’ve already read Kaspersky Lab’s whitepaper, “Waging War At The Endpoint.” If not, please download and read that whitepaper prior to proceeding (in the resource section.) “Waging War At The Endpoint” focuses on the real target for cybercriminals today—the endpoint, or the employee. By Kaspersky Lab
-
White Paper: Ten Ways The IT Department Enables Cybercrime
1/26/2011
We hope that by now you’ve already read Kaspersky Lab’s whitepaper, “Waging War At The Endpoint.” If not, please download and read that whitepaper prior to proceeding (in the resource section.) “Waging War At The Endpoint” focuses on the real target for cybercriminals today—the endpoint, or the employee. By Kaspersky Lab
-
Case Study: CA SiteMinder Provides The Authentication Infrastructure For 400,000 Hitachi, Ltd., Employees
12/29/2010
Hitachi faced identity management issues from both a user perspective and a management perspective. Users had to have several different identities and passwords while management struggled to ensure the user information was accurate. Hitachi therefore decided to build a shared authentication infrastructure for the whole Hitachi Group. By CA Technologies
-
CA SiteMinder Provides The Authentication Infrastructure For 400,000 Hitachi, Ltd., Employees
12/29/2010
Hitachi faced identity management issues from both a user perspective and a management perspective. Users had to have several different identities and passwords while management struggled to ensure the user information was accurate. Hitachi therefore decided to build a shared authentication infrastructure for the whole Hitachi Group. By CA Technologies
-
The Road To Integrated Systems
5/18/2010
For years, industry and analysts have been touting the benefits of integrated systems that would improve the decision-making process by taking information from disparate functions and processes and organizing it efficiently. By Honeywell Security
-
White Paper: The Road To Integrated Systems
5/18/2010
For years, industry and analysts have been touting the benefits of integrated systems that would improve the decision-making process by taking information from disparate functions and processes and organizing it efficiently. By Honeywell Security