Security

Think Forward.

  • Cisco-ISE-Blog

Four Questions Before Deploying a NAC Solution 

You have been tasked with deploying a NAC solution. Unfortunately, IT leaders taking on this endeavor often find themselves confronted with some ugly truths about their network infrastructure and the bandwidth of their internal resources. ADAPTURE Cisco ISE expert Andy Thompson addresses four common questions utilizing his experiences with the industry-leading NAC solution Cisco ISE.   Question: What Can I Expect While Deploying a NAC Solution?  Answer: [...]

2021-03-02T17:16:51-05:00March 2nd, 2021|Cybersecurity, Infrastructure, Security|
  • Close the Cybersecurity Gap with Managed Cisco ISE

Closing the Cybersecurity Gap with Managed Cisco ISE Services

ADAPTURE Solutions Architect Andy Thompson writes about why companies are turning to Managed Cisco ISE Services for a more comprehensive and effective cybersecurity solution. Ask just about any CTO or CSO what keeps them up at night.  The consensus of those individuals would be: “Do users that have access to our network that makes them capable of seeing [...]

2020-11-16T11:47:02-05:00November 16th, 2020|Cybersecurity, Infrastructure, Security|
  • Mist, the AI-Driven Network

Securing Your Business with an AI-Driven Network

As we continue to work through these challenging times, businesses need to rely on secure cloud services to support the health and safety of individuals using or visiting customers’ facilities. It is incumbent upon enterprise networks to adopt measures that create safe spaces. Companies are making the transition to an AI-driven network strategy to ensure their infrastructure and [...]

2020-09-30T10:49:41-04:00September 30th, 2020|Infrastructure, Networking, Security|
  • Cisco SecureX

Cisco SecureX: Cisco’s New Integrated Cybersecurity Solution

Your data center is full of individual solutions, many of which are incompatible. The complexity of the technology industry means that organizations are often running operations across dozens of tools from different OEMs that come with a plethora of varying dashboards, inconsistent integration, and inconsistent patching and maintenance demands. For cybersecurity professionals, gathering data across all your endpoints is [...]

2024-11-22T09:43:16-05:00August 14th, 2020|Cloud, Cybersecurity, Infrastructure, Security|
  • Taking the "I" out of "IT"

Thinking Forward: Taking the “I” Out of IT

It’s no longer the 1990s−but the phrase “information technology” is still stuck there. It's time to consider taking the "I" out of "IT." All technology contains/handles/processes information. The phrase “information technology” just repeats what we already know. Technology focuses on hosting, moving, and protecting data. To continue using “information technology” is the equivalent of saying “financial money.” For [...]

2020-07-29T17:49:43-04:00July 29th, 2020|Cloud, Infrastructure, Security|
  • The Chaos of Zero Trust Architecture

The Current Chaos of Zero Trust Architecture

Everyone seems to agree that organizations need to move to a zero trust architecture, but zero trust in action currently ranges from a single area that can be “zero trust-like” to a complete environment being considered a zero trust architecture… But there aren’t actually agreed upon standards as of yet. Which means almost every security vendor has their [...]

2020-06-30T15:50:36-04:00June 30th, 2020|BYOD, Cybersecurity, Security|
  • Biggest Issue with Cybersecurity

The Biggest Issue with Cybersecurity

The biggest issue with cybersecurity is budget. Every day, businesses work to maximize their bottom line—to do more with less, as it were.  This is an old way of looking at business, and it leads to what a friend of mine coined “technology debt.”  Technology debt can affect much more than application performance or your capital expenditures (CAPEX).  [...]

2020-05-29T17:33:27-04:00May 29th, 2020|Cybersecurity, Security|
  • Work From Home Remotely with a Secure Remote Work Solution

Secure Remote Work Solutions for a Virtual Workforce

The world has changed, seemingly overnight, causing significant disruptions to business and personal life. Protective measures are being taken to slow the spread of the virus—including social distancing from other people and avoiding venues with large crowds. Companies are forced to quickly make decisions and purchases to acquire secure remote work solutions and foster collaboration. With recommendations from [...]

2020-04-30T14:45:25-04:00April 30th, 2020|Cybersecurity, Security|
  • Understanding Ransomware-as-a-Service

Understanding Ransomware-as-a-Service (RaaS)

Ransomware-as-a-service (RaaS) is a dangerous type of Software-as-a-Service (SaaS) provided as an easy-to-use cyber-criminal attack platform. With this cyberattack, actors gain illegitimate access to companies’ information technology resources and proceed to block legitimate access while demanding payment for the release of resources and data that rightfully belongs to the business. Victims are often notified via a lock screen where a [...]

2024-11-01T16:49:27-04:00February 14th, 2020|Cybersecurity, Ransomware, Security|
  • Azure Cloud Security - Know Your Native Azure Tools

Locking Down Your Azure Cloud Security

With public cloud comes increased flexibility, enhanced storage, and much more – but it also comes with a shared responsibility model. Organizations storing sensitive data in public cloud, like Azure, have a duty to manage its security. Because of this, some businesses are reluctant to rely on public cloud. However, your Azure cloud environment has native tools that [...]

2023-03-09T16:14:23-05:00January 31st, 2020|Cloud, Security|
Go to Top