by Varsha K | Jan 5, 2021 | Cyber security, Data Security, Managed File Transfer, MFT Solution, Secure File Transfer, Secure Folder Sharing, Security
A countless amount of data is being processed through the internet every single day (and every hour, minute, second, millisecond) of that day. And, given our current climate, sharing files over the internet is more important than ever. You’re probably sharing...
by Dutta | Sep 10, 2020 | ADM, Cable Management, Centralized Visibility Over All Files, Cloud Security, Cloud/Data Center Security, CMDB, Comprehensive Discovery, Comprehensive Infrastructure Management, Data Automation, Data Center Automation, Data Center Infrastructure Management, DCIM, Discovery & Inventory, IP Address Management, IPAM, IT Inventory & Asset Management, Security
Cloud Recommendation Engine Improvements Device42 now includes Global Cloud Recommendation Engine Settings you can use to select options for your CRE reports and also schedule a daily sync to populate the CRE data used by the new...
by Dutta | Aug 19, 2020 | Automate WorkFlow, Cyber security, Data Protection, Data Security, Encryption, Managed File Transfer, MFT Solution, Secure File Transfer, Secure Folder Sharing, Security
Does your business rely on the Secure Copy Protocol (SCP) to enable remote users to exchange files with each other and with customers and business partners? If so, it might be time to consider another approach! In 2019, ZDNet identified the Secure Copy...
by Dutta | Aug 10, 2020 | Automate WorkFlow, Cyber security, Discovery, IT Security, Mapping, MFT Solution, Network Configuration Management, Network Monitoring, Regulatory Compliance, Secure File Transfer, Secure Folder Sharing, Security, Traffic Analysis
With most office workers still working at home, the network has now become the major linkage between employees and their jobs. Unfortunately, this means that the effects of DDoS attacks (Distributed Denial of Service)—large-scale attacks which rely on flooding...
by Dutta | Aug 10, 2020 | Access Control, Content Aware Protection, Cyber security, Data Leakage Prevention - DLP, Data Loss Prevention, Data Protection, Data Security, Device Control, Encryption, Mobile Device Management, Security
Mid-market companies underpin many of the world’s leading economies. In Germany, they account for the largest share of the country’s economic output and employ 60% of all workers. In the US, they have almost double the annual growth rate of a Fortune 500...
by Dutta | Aug 9, 2020 | Cyber security, Data Classification, Data Identification, Data Protection, Data Security, Regulatory Compliance, Security, Security Automation
So far, 2020 has not played out the way most people thought it would at the end of 2019. Cybersecurity specialists have been talking about the “dissolving perimeter” for years; systems have been slowly moving outside of the tight confines of a corporate data centre to...