by Dutta | Jun 13, 2019 | FlexNet Code, Patch Management, SAM, Security, Software License Optimization, Software Updater, Software Vulnerability Management, Vulnerability Assessment, Vulnerability Management
Over the last several years, billions of people have been victims of data breaches. According to the digital security firm Positive Technologies in a recent USA Today article, in the months of April, May and June of 2018 alone, 765 million people fell victim to a...
by Dutta | Jun 12, 2019 | Cyber security, Vulnerability Assessment, Vulnerability Management, Vulnerability Management, Web Security, Web Vulnerability Scanner
You are a developer. You put a lot of effort into making sure that your code is safe. You never trust user input, you use the best security-related development libraries. And then you make one small typo and everything is ruined. This is not fiction. Not long ago, a...
by Dutta | Jun 11, 2019 | Alerting, CPU Utilization, Cyber security, Dashboard, Data Security, Discovery, MFT Solution, Performance Monitoring, Secure File Transfer, Traffic Analysis
MFT solutions are now also available as cloud-based Software-as-a-Service (SaaS) offerings which can provide a number of benefits over traditional on-premise MFT offerings. Generally this means you’re getting all the capabilities of a full-featured MFT solution...
by Dutta | Jun 10, 2019 | AI-Artificial Intelligence, Certification, Cyber security, Data Security, Security, Security Training Certification
With the innovations in mobile technology and the cloud over the last few years, employees are now working from their own devices and remotely from their own homes more than ever. However, these advancements in modern remote tech do not come without their own risks as...
by Dutta | Jun 9, 2019 | Access Control, Content Aware Protection, Data Leakage Prevention - DLP, Data Security, Device Control, Discovery, Easy Lock, Encryption, Endpoint Security, Internet Security, Mobile Device Management, Mobile Security
Earlier this year, Japan became the first country to earn an adequacy decision from the European Commission after the enforcement of the EU’s General Data Protection Regulation (GDPR). This means that the Commission has decided the level of data...