Security

Think Forward.

  • Cisco ISE and Cisco DNA Network Security Feat. Img

Cisco ISE and Cisco DNA Pair for Increased Network Security

We’ve spoken before about the merits of Cisco’s Identity Services Engine (ISE) platform. As the market-leading, next-generation secure Network Access Control (NAC) solution, Cisco ISE provides the visibility and control that you need to safeguard your networks. More specifically, Cisco ISE’s software-defined platform: Detects and defends against threats Delivers actionable threat and mitigation data Provides granular user and [...]

2024-06-19T10:41:32-04:00December 7th, 2018|Infrastructure, Networking, Security|
  • Questions to Ask During Antivirus PoC

Questions to Ask During Your Next Antivirus PoC

It’s expected that, when you purchase new hardware, the machine will come with antivirus software already installed. But this “complimentary” inclusion has the tendency to lull some end users into a false sense of security, leading them to believe that they don’t need to implement additional protection. Protecting your critical data should go well beyond relying on baseline, [...]

2018-11-16T10:17:21-05:00November 16th, 2018|Security|
  • DDoS Resiliency in AWS Feat. Img

Creating DDoS Resiliency in AWS

The average number of Distributed Denial of Service (DDoS) attacks doubled from January 2017 to January 2018. Not only are DDoS attacks growing in frequency, but they are also becoming more complex due to lack of security for IoT connected devices and recent Memcached software exploits. Are you secure in your DDoS resiliency in AWS? With Gartner predicting [...]

2018-10-10T09:37:19-04:00October 10th, 2018|Cloud, DDoS, Security|
  • Cloud Security Best Practices img

Cloud Security Best Practices: Are You Secure?

You’ve heard it before. A company gets breached, its critical data made available, and its brand suffers as a result. Hacking events like these demonstrate how vulnerable organizations (and their users) can be. With such grim headlines, it’s not surprising that some companies are still reticent to adopt cloud technologies. Implementing and following cloud security best practices can [...]

2024-06-18T11:46:04-04:00October 2nd, 2018|Cloud, Security|
  • Gartner's Market Guide for DDoS Mitigation Services

Gartner’s Market Guide for DDoS Mitigation Services

Distributed Denial of Service (DDoS) attacks have been on the rise, leaving organizations scrambling for more consistent ways to mitigate the risks. Gartner's Market Guide for DDoS Mitigation Services highlights the solutions that address these risks. Since 2013, DDoS Mitigation has grown steadily out of the Web Application Firewall (WAF) sector to become its own market. As it [...]

2018-09-25T12:47:28-04:00September 25th, 2018|Security|
  • stoplight with walking sign lit up

Gigamon for Network Traffic Control: Planning Your Next Network Build

Despite the pace of IT innovation, there is still no one network tool that does everything well. As a result, companies need to layer their security tools to build the most robust line of defense and response protocols, like network traffic control. Addressing your visibility issues alone isn’t enough— if you do not configure all your components seamlessly, [...]

2018-09-12T08:55:19-04:00September 12th, 2018|Networking, Security|
  • cybersecurity insurance vs irr

Cybersecurity Insurance vs IRR as Part of IT

We could spend this time discussing the merits of cybersecurity insurance vs IRR (Incident Response and Remediation) protocols. But we would be writing about a false dichotomy. A strong cybersecurity approach requires alignment between prevention and coverage. Unfortunately, a lot of people think along these lines instead: “If I have a good plan in place, then I’ll be [...]

2018-09-04T08:17:39-04:00September 4th, 2018|Cybersecurity, Security|
  • FireEye iSight deep dive

FireEye iSight: A Deep Dive into Proactive Cybersecurity

With today’s breach rates, it is no longer enough to build up your external defenses and hide within them—you must reposition your security strategy to be more proactive. You need to implement technologies like FireEye iSight that not only defend, but also seek out intel from deep within the threat landscape itself. Info-Sec Needs a Fourth Pillar Currently, [...]

2024-06-19T10:42:37-04:00August 28th, 2018|Security|
  • FireEye MDR threat detection

FireEye MDR Threat Detection: The Proactive Approach to Cybersecurity

In today’s threat landscape, a traditional, prevention-only approach to cybersecurity leaves an organization vulnerable to advanced attacks. That’s why advanced threat detection and incident response have become top priorities for businesses that want to improve security defenses. As such, many companies are looking to reposition with solutions with FireEye MDR threat detection, wanting to switch from “reactive” to [...]

2024-06-19T10:43:27-04:00August 21st, 2018|Security|
  • Gartner’s Market Guide for Network Access Control

Gartner’s Market Guide for Network Access Control: Cisco ISE Remains a Leader

Gartner's Market Guide for Network Access Control helps security and IT leaders better understand the top NAC solutions available to them. To further inform your own NAC initiatives, the security experts at Adapture review Gartner’s industry findings and discuss the reasons behind the continued success of one of the NAC Magic Quadrant “Leaders”—Cisco Identity Services Engine (ISE). As [...]

2024-06-20T10:43:56-04:00August 6th, 2018|Infrastructure, Security|
Go to Top