Today’s organizations hold extremely sensitive information in their workstations. From passwords to personal emails, financial records, customer databases, an external attacker, a malicious employee or even an innocent, but negligent employee, are able to leak sensitive data and condemn the organization to failure, if proper solutions are not implemented.
While DLP is crucial to prevent such incidents from happening and cannot be replaced, it can be used with other complementary technologies so that it will improve overall data security.1. Encryption
By encrypting files or emails, you will make sure that they are protected from unwanted access. If you use encryption, all your confidential information will be safe even if you decide to move it to a different device.
For example, EasyLock is a cross-platform data encryption solution that is going to help you …Read more
Future smartphones will come with a virtual SIM, meaning without a physical SIM card.
With the introduction of the iPad mini 2 in late 2014 Apple has already started to go in this direction. Since then, iPads in North America are still shipped with a real SIM card but it is not assigned to a carrier, allowing the user to select the carrier.
The next steps involve Apple and Samsung to remove the physical SIM card entirely and use only a virtual SIM (called also eSIM) that will allow them be the providers. Users will have a subscription with Apple, for example, for the cell / data service, instead of having directly with the carrier. Apple might even become a MVNO (meaning a mobile virtual network operator) relying on real carriers infrastructure. The process is similar to Apple Pay relying on Credit Card providers and their infrastructure – it will do the same with mobile carriers.
You might…Read more
Wearables are deemed personal devices – those we use to keep track of our fitness progress, stay on top of important notifications, help us sleep better, remind us to eat healthier, and so on. But there is more to wearable devices, as they become part of the BYOD family in the workplace, as well as finding their own niches in the enterprise.
The growing potential of wearables for use in the workplace is getting noticed, one early device being the Motorola WT4000 Wearable System that allows for simplified inventory tracking and on-demand access to product information. Since 2004, Tesco PLC has been utilizing such devices to help employees efficiently take inventory in their various warehouses.
According to recent reports, consumers are interested in owning wearables in exchange for rewards, such as lower insurance rates. Some corporations are tapping in this concept, including Target…
At the core of any data security software purchase, there should be a data security strategy.The strategy should contain clear objectives, the methods to accomplish them, the tools to do so, an implementation phase, and, of course, evaluation of how the process is running. At the very beginning of strategy building, designated people for key roles should be established and everyone should know their responsibilities. This is the ideal situation, but it isn’t something we encountered too often.
The typical case involves the IT Manager or CSO who creates the strategy and is also the one to choose the software that will be implemented. The business manager approves the budget and the IT Administrator ends up managing several tools, each one dealing with a different vulnerability. Somewhere along the line, a disconnection intervenes and managers fail to reunite the key people and to…Read more
Since we launched My Endpoint Protector, our cloud-based Data Loss Prevention (DLP) and Mobile Device Management (MDM) solution, we have noticed several things about organizations’ perspective towards using this type of tool in the cloud. The attitude towards using SaaS DLP solutions mainly depends on the region, company size, industry, compliance and the organizations’ objectives when it comes to protecting data.
Organizations from regions like USA and Western Europe are more open to implement DLP and MDM in the cloud, while those from CEE, APAC and LATAM prefer to have the on-premise solution. The main reason is compliance, since there are several data protection laws that require data security solutions to be implemented on-premise. Skepticism towards cloud data security solutions also plays an important role. However, companies that do implement SaaS, report…Read more
The threat landscape has always been composed of both external (i.e. hackers) and internal threats (i.e. employees). Regardless of the security threat and whether or not the malicious intent is present, IT departments have always relied on technology to provide a wide range of solutions – from AVs to Firewalls, IPS, and many others. However, all solutions have one vulnerability in common: the human factor. “Human Error Steve” has got everything covered – from incorrect policy configurations as part of the IT department to sending e-mails to wrong recipients as part of any other department. So what options are there in the face of a threat present no matter what? Is this really such a big issue?How big is the issue?
There is an abundance of statistics that provide insight into the size of the problem as well as some huge stories that made the news.
If you’re interested in figures,…Read more
Now in its 6th year, Computing Security Awards UK honors data security solutions and vendors for their achievements in protecting businesses against data breaches and keeping them secure. The awards are worldwide recognized and industry leaders participate each year. What’s great about CS Awards is that finalists and winners are elected by visitors and readers of Computing Security Magazine, users of the solutions, data security experts, bloggers, IT administrators, etc., so you get to be involved in the process and have a say in the outcome.Endpoint Protector 4 chosen DLP Solution of the Year in 2014
For us it’s the 4th year to participate in the DLP Solution of the Year category. In 2014 we were named winners in this category and we are very proud of this achievement. Data Loss Prevention is our specialty and since last year we released a lot of great features like SIEM integration,…Read more
Recently there have been many articles about the newly discovered Android vulnerability. Although the stories started to appear from the 27th of July, the exploited has been brought to Google’s attention back in April and May by Joshua Drake, a researcher at the mobile security company Zimperium zLabs. It was patched by Google in the latest versions but Android users are not safe yet. So let’s take a look of what Stagefright is/does, what we can do to protect our Android devices and what the future may hold for users.What is Stagefright?
From a technical point of view, Stagefright is a collection of seven bugs. Their designations are: CVE-2015-1538, CVE-2015-1539, CVE-2015-3824, CVE-2015-3826, CVE-2015-3827, CVE-2015-3828, and CVE-2015-3829. The libraries… Too much info? OK, let’s go with the easier explanation.
Stragefright is a bug that affects ~95% of the Android devices…Read more
We’re a security company so we cannot help but celebrating SysAdmin Day from a data security perspective, especially because managing security tools is becoming really challenging for them.
To all SysAdmins out there…it’s a day when you are spoiled with rewards and contests and all eyes are on you. It’s also the day when you can shed your sorrows and tell the world your most painful experiences. We have also prepared a cute / sarcastic contest, depending on how you look at it. This year it’s celebrated on 31st of July, but we decided to run the contest the whole week. This is our way of saying thanks for your efforts in raising awareness within your companies regarding data security and for your constant feedback and contribution to improving InfoSec, among others.
We all like to go on the memory lane sometimes and for you, it usually means to go out for a beer with your friends after…Read more
It’s the first day at Mac IT Conf and we’re set up and looking forward to welcome the first visitors.
For us, it is the second year participating as exhibitors to the world’s premier event for “Deploying Apple in the Enterprise.”
If last year, MacWorld, the consumer show, got more attention, this year, all eyes are on the enterprise.
There are a series of interesting sessions like:
- CIO Perspectives on Apple in the Enterprise: The MacIT Leadership Panel
- CSO/CISO Roundtable: A Day In the Life of a Security Leader and others.
There will also be a recap for WWDC2015, so if you didn’t attend you can take advantage of the panel discussions regarding the relevance of Apple updates for the enterprise. You can also read here about WWDC highlights.
We will also have a presentation entitled It’s a Mac, Mac World and Data…Read more