Blog

Cloud Computing: Friend or Foe?

Cloud Computing: Friend or Foe?

The benefits of moving more and more to the cloud are now proven. What do IT teams need to know when contracting with cloud service providers and the communications service providers delivering access and transmission services?

Sep 27, 2018 Read More→
Security or Efficiency? Why Not Have Both?

Security or Efficiency? Why Not Have Both?

A lot is being written about information security; opinions, suggestions, surveys, even conspiracy theories roam around, and news on a prominent organization’s data breach make headlines more often than ever, these days. It is not that people are just catching on to the significance of security and have recently become aware of the consequences.

Sep 21, 2018 Read More→
A New Level of Granularity for Access Management: Privileged Task Automation

A New Level of Granularity for Access Management: Privileged Task Automation

The future of securing network infrastructure, data, applications and the proliferation of devices enterprises need to secure is in automation.

Sep 14, 2018 Read More→
Securing the Next Generation of Private Networks for Enterprises

Securing the Next Generation of Private Networks for Enterprises

More and more enterprises are turning to their trusted Communications Service Providers (CSPs) to manage more and more of their network and, increasingly, cloud-based services as part of digital transformation initiatives.

Sep 03, 2018 Read More→
 Coming in First: Gartner Says PAM Should Be the Top Priority for CISOs

Coming in First: Gartner Says PAM Should Be the Top Priority for CISOs

In a post by Gartner’s Jill Beadle, Privileged Access Management (PAM) was named the number one security project Chief Information Security Officers (CISOs) should invest in to reduce risk on a significant scale in large enterprises.

Aug 16, 2018 Read More→