Blog
eBay Breach Highlights the Value of Monitoring Security-Related Events
By Robin Tatam on Fri, 03/24/2017
The importance of monitoring your computer system and personal information simply cannot be overstated. In today's online environment, hackers hungry for users' account information and other sensitive details seem to be lurking around every corner. To keep these attackers at bay, companies must always have an eye on system and account activity, and be able to react quickly...
Blog
Cracking the Problem of Endpoint Security
By Robin Tatam on Fri, 03/24/2017
Endpoint security has been a hot topic in the technology and corporate sectors for a few years. Especially with the emergence of bring-your-own-device practices, it has become even more critical to put safeguards in place to ensure the security of sensitive information.
Blog
Single Sign-On and the Dangers of Active Directory
By Robin Tatam on Fri, 03/24/2017
Active Directory is a staple of enterprise IT and it nominally ensures secure, authenticated access to a company's core business applications. It can become problematic if it isn't properly monitored and supported by up-to-date security software, modern hardware, and access controls. Accordingly, system administrators face many potential risks when working with Active Directory.
Blog
IBM i: The Backbone of the Banking Industry
Tue, 03/21/2017
Highly regulated organizations such as those in the banking industry have a strong history with IBM i, and for good reason—the platform offers an unprecedented level of security.
Blog
2 Ways Encryption Protects You Even After a Data Breach
Fri, 03/17/2017
The growing threats to data highlight the need for multiple layers of defense. Encryption is a critical layer that protects your organization from some of the most devastating consequences of a data breach.