by Dutta | Mar 28, 2019 | AI-Artificial Intelligence, Certification, Cyber security, Internet of Things, Training
Social media, both company profiles and employee profiles, can have a huge impact on your business as a whole. While the platforms themselves may not be actual threats, employees who ignore the rules and best practices of security while on these accounts may make it...
by Dutta | Mar 26, 2019 | Access Control, Content Aware Protection, Cyber security, Data Leakage Prevention - DLP, Data Loss Prevention, Data Security, Device Control, Discovery, Easy Lock, Encryption, Endpoint Security
Although better known for its privacy stipulations, the Gramm-Leach-Bliley Act (GLBA), also called the Financial Modernization Act of 1999, is a US federal law whose original purpose was to allow different types of financial institutions such as banks,...
by Dutta | Mar 24, 2019 | Bomgar Discovery Tool, Cyber security, Data Security, Identity Management and Access Control, Password Vault, Privileged Access Management, Privileged Identity Management, Security
When classifying the sensitivity of various types of data, few, if any, types of data rank higher in sensitivity than biometric data. Yet, while biometric data is increasingly collected with abandon, this practice is under-scrutinized, pushing us further in the...
by Dutta | Mar 14, 2019 | Alerting, Application Monitoring, Mapping, Network Monitoring, Network Traffic Analysis, Performance Monitoring, Reporting, Traffic Analysis
Many companies that never dreamed they’d be developing their own software are having to “roll their own.” Sometimes it’s an internal-use-only, as a custom layer over an existing platform like Salesforce, sometimes as a product they’re selling. This is what has driven...
by Dutta | Mar 12, 2019 | Content Aware Protection, Cyber security, Data Leakage Prevention - DLP, Data Loss Prevention, Data Security, Device Control, Easy Lock, Encryption, Endpoint Security, Mobile Device Management
A new release of Endpoint Protector is available for our clients and it presents the first version of a brand-new feature: Deep Packet Inspection. Currently available for macOS, the new functionality allows network traffic to be inspected for content....