What’s New in Endpoint Protector 5.2.0.5

What’s New in Endpoint Protector 5.2.0.5

A new release of Endpoint Protector is available for our clients and it presents the first version of a brand-new feature: Deep Packet Inspection. Currently available for macOS, the new functionality allows network traffic to be inspected for content....
MyWorkspace Feature Update: Connecting to Remote Apps using Session hint / TSVUrl

MyWorkspace Feature Update: Connecting to Remote Apps using Session hint / TSVUrl

The MyWorkspace team is thrilled to announce that connecting to remote apps using Session hint / TSVUrl (the Windows Server 2012/R2 way) is supported as of now. Connecting to Remote Apps using Session hint / TSVUrl Since Windows Server 2012/R2 the connection broker...
5 Best Practices for PCI DSS Compliance

5 Best Practices for PCI DSS Compliance

The Payment Card Industry Data Security Standard (PCI DSS) is a set of security requirements that helps businesses protect their payment systems from breaches, fraud and theft of cardholder data. Developed by the PCI Security Standards Council, PCI DSS...
Reducing Security Risks with Cross-Platform DLP

Reducing Security Risks with Cross-Platform DLP

Nowadays, the majority of businesses work with a mixture of device types and operating systems. Cross-platform Data Loss Prevention (DLP) solutions help diminishing security vulnerabilities in heterogeneous IT environments. Over the past decade, the organizations have...
5 Best Practices for Data Breach Prevention in 2019

5 Best Practices for Data Breach Prevention in 2019

In today’s digital economy an increasing volume of information is collected and data is turning not only into a more valuable, but also into a more vulnerable resource. For businesses it has become a key input for growth, differentiation and for maintaining...
5 steps to building a security practice

5 steps to building a security practice

The majority of my colleagues running a security practice ended up there by accident. Most of them inherited a security role through necessity or promotion and only a few choose a security career. Either way, we are special people that don’t see daylight...