Before wearables thrive in enterprise, consider these cultural and security issues

Wearables are deemed personal devices – those we use to keep track of our fitness progress, stay on top of important notifications, help us sleep better, remind us to eat healthier, and so on. But there is more to wearable devices, as they become part of the BYOD family in the workplace, as well as finding their own niches in the enterprise.

The growing potential of wearables for use in the workplace is getting noticed, one early device being the Motorola WT4000 Wearable System that allows for simplified inventory tracking and on-demand access to product information. Since 2004, Tesco PLC has been utilizing such devices to help employees efficiently take inventory in their various warehouses.
According to recent reports, consumers are interested in owning wearables in exchange for rewards, such as lower insurance rates. Some corporations are tapping in this concept, including Target…

Read more

Why Data Security needs to reunite business, HR and IT at the table

At the core of any data security software purchase, there should be a data security strategy.The strategy should contain clear objectives, the methods to accomplish them, the tools to do so, an implementation phase, and, of course, evaluation of how the process is running. At the very beginning of strategy building, designated people for key roles should be established and everyone should know their responsibilities. This is the ideal situation, but it isn’t something we encountered too often.

The typical case involves the IT Manager or CSO who creates the strategy and is also the one to choose the software that will be implemented. The business manager approves the budget and the IT Administrator ends up managing several tools, each one dealing with a different vulnerability. Somewhere along the line, a disconnection intervenes and managers fail to reunite the key people and to…

Read more

Why opt for the cloud-based DLP and MDM solution

September 15, 2015 Author: Data Loss Prevention 0 Comments

Since we launched My Endpoint Protector, our cloud-based Data Loss Prevention (DLP) and Mobile Device Management (MDM) solution, we have noticed several things about organizations’ perspective towards using this type of tool in the cloud. The attitude towards using SaaS DLP solutions mainly depends on the region, company size, industry, compliance and the organizations’ objectives when it comes to protecting data.

Organizations from regions like USA and Western Europe are more open to implement DLP and MDM in the cloud, while those from CEE, APAC and LATAM prefer to have the on-premise solution. The main reason is compliance, since there are several data protection laws that require data security solutions to be implemented on-premise. Skepticism towards cloud data security solutions also plays an important role. However, companies that do implement SaaS, report…

Read more

Human Error Steve – the biggest data security threat

September 1, 2015 Author: Data Loss Prevention 0 Comments

The threat landscape has always been composed of both external (i.e. hackers) and internal threats (i.e. employees). Regardless of the security threat and whether or not the malicious intent is present, IT departments have always relied on technology to provide a wide range of solutions – from AVs to Firewalls, IPS, and many others. However, all solutions have one vulnerability in common: the human factor. “Human Error Steve” has got everything covered – from incorrect policy configurations as part of the IT department to sending e-mails to wrong recipients as part of any other department. So what options are there in the face of a threat present no matter what? Is this really such a big issue?

How big is the issue?

There is an abundance of statistics that provide insight into the size of the problem as well as some huge stories that made the news.

If you’re interested in figures,…

Read more

Computing Security Awards 2015 nominations

Now in its 6th year, Computing Security Awards UK honors data security solutions and vendors for their achievements in protecting businesses against data breaches and keeping them secure. The awards are worldwide recognized and industry leaders participate each year. What’s great about CS Awards is that finalists and winners are elected by visitors and readers of Computing Security Magazine, users of the solutions, data security experts, bloggers, IT administrators, etc., so you get to be involved in the process and have a say in the outcome.

Endpoint Protector 4 chosen DLP Solution of the Year in 2014

For us it’s the 4th year to participate in the DLP Solution of the Year category. In 2014 we were named winners in this category and we are very proud of this achievement. Data Loss Prevention is our specialty and since last year we released a lot of great features like SIEM integration,…

Read more

Stagefright Android bug – general information and future exploits

Recently there have been many articles about the newly discovered Android vulnerability. Although the stories started to appear from the 27th of July, the exploited has been brought to Google’s attention back in April and May by Joshua Drake, a researcher at the mobile security company Zimperium zLabs. It was patched by Google in the latest versions but Android users are not safe yet. So let’s take a look of what Stagefright is/does, what we can do to protect our Android devices and what the future may hold for users.

What is Stagefright?

From a technical point of view, Stagefright is a collection of seven bugs. Their designations are: CVE-2015-1538, CVE-2015-1539, CVE-2015-3824, CVE-2015-3826, CVE-2015-3827, CVE-2015-3828, and CVE-2015-3829. The libraries… Too much info? OK, let’s go with the easier explanation.

Stragefright is a bug that affects ~95% of the Android devices…

Read more

SysAdmin Day 2015 contest – InfoSec Bloomers

We’re a security company so we cannot help but celebrating SysAdmin Day from a data security perspective, especially because managing security tools is becoming really challenging for them.

To all SysAdmins out there…it’s a day when you are spoiled with rewards and contests and all eyes are on you. It’s also the day when you can shed your sorrows and tell the world your most painful experiences. We have also prepared a cute / sarcastic contest, depending on how you look at it. This year it’s celebrated on 31st of July, but we decided to run the contest the whole week. This is our way of saying thanks for your efforts in raising awareness within your companies regarding data security and for your constant feedback and contribution to improving InfoSec, among others.

We all like to go on the memory lane sometimes and for you, it usually means to go out for a beer with your friends after…

Read more

Endpoint Protector at Mac IT Conference

It’s the first day at Mac IT Conf and we’re set up and looking forward to welcome the first visitors.
For us, it is the second year participating as exhibitors to the world’s premier event for “Deploying Apple in the Enterprise.”
If last year, MacWorld, the consumer show, got more attention, this year, all eyes are on the enterprise.

There are a series of interesting sessions like:

  • CIO Perspectives on Apple in the Enterprise: The MacIT Leadership Panel
  • CSO/CISO Roundtable: A Day In the Life of a Security Leader and others.

There will also be a recap for WWDC2015, so if you didn’t attend you can take advantage of the panel discussions regarding the relevance of Apple updates for the enterprise. You can also read here about WWDC highlights.

Endpoint Protector at Mac IT Conference 2015. Santa Clara, CA

 

We will also have a presentation entitled It’s a Mac, Mac World and Data…

Read more

The Most Common Myths about Data Loss Prevention

When it comes to Data Loss Prevention (DLP), you can’t afford to take any shortcuts. Believing that there are situations that couldn’t happen to you and that certain things are better left to chance is a huge mistake. Technology is definitely a godsend in today’s fast-paced society, but it can also be our undoing if the proper security precautions are not taken.

So where would you need to start to ensure that no valuable information is leaked? Well, getting your facts right is the best thing to do because you won’t make any crucial mistakes if you know what you are doing. Here are some common misconceptions you shouldn’t pay heed to:

1. Data loss prevention is too overwhelming, especially for small companies

Many business owners fall into the trap of believing that going with a DLP system means their entire company needs to start focusing all their efforts…

Read more

Mobile Device Management – Not just for security

There is no doubt that a Mobile Device Management (some call it Enterprise Mobility Management) Solution can help any organization safeguard their mobile employees and help navigate the BYOD-related pitfalls. Besides increasing productivity for the workforce in the field, a Mobile Device Management solution makes things easier for the IT admins that have to manage the mobile device fleet. However, an MDM tool can do much more.

A wide range of opportunities with Kiosk Mode

Enabling Kiosk Mode on an Android device (our Endpoint Protector MDM does this very well for Samsung devices) doesn’t require an MDM solution. It does, however, become essential when it comes to taking full advantage of all the benefits and cost savings Kiosk enabled mobile devices can bring. Having a smartphone or tablet locked into a single or only a few applications can turn an affordable device into a dedicated…

Read more