Tag Archives: Network Security

The Changing Mobile Worker: Balancing Productivity and Security

As an IT veteran, I have observed and helped drive tremendous change, not just in the technologies we use but how we use them. Among the more dramatic shifts has been the definition of being a mobile worker. When I was a mainframe programmer in the late 80’s, being “highly mobile” meant I could log in at any mainframe terminal in the office, do my programming, submit my jobs to the queue and do my (internal only) email.

Read the source article at EMC IT’s Journey to the Private Cloud

Advertisements

Does Your Organization Still Lack Basic Controls to Protect Unattended Workstations?

For years, analysts have been reporting on the risks of unattended employee workstations. For example, a user who sits down at a co-worker’s PC could access sensitive data, send email from the PC owner’s account or even introduce malware into the network. To make matters worse, such misuse of an unattended workstation is difficult to detect and prove.

Read the source article at Home – Dell Community

How to Make Your Network Security Infrastructure Future-Ready

It is clear that today’s businesses require reliable network connectivity, and access to both corporate and Internet resources. Connections to and from business units, external customers and SOHOs are all equally important to ensure continuity. Business runs all day, every day, even in off hours. Most companies run operations around the clock, so it is important to realize that solid business continuity strategy and redundancy technology should be considered and implemented.

Read the source article at Home – Dell Community

Black Hat 2015: 10 Security Threats To Watch

Hackers and security researchers converged in Las Vegas this week to reveal the latest and greatest threats facing security professionals today. In presentations at the Black Hat 2015 conference, demonstrations showed how the rise of the Internet of Things, connected devices, new mobile technologies and other developments have opened up the door to more threats than ever before.

Read the source article at crn.com

Seamlessly Integrated Physical Security Solutions

PTS Physical Security Solutions offers a turnkey solution to address all your physical security needs. Utilizing cutting edge technologies offered by our partners, PTS offers the following solutions: Video Surveillance, Access Control, and Central Management. PTS’s primary Physical Security platform is Genetec’s Security Center (Unified Platform), which has applications for Video Surveillance, Door Access control, License Plate Recognition, Alarm Panel Integration and other third party capabilities. These applications are all viewable on one simple Customer Interface.

Read the source article at Data Center Design

Storage and Security: Five Things You Need to Understand

In light of a number of recent breaches spanning healthcare, retail, and even government, I thought it would be nice to take a second and focus on storage and security. Here’s the reality: with so many new types of applications being developed (both internally and in the cloud), new concepts around security are emerging which directly impact storage technologies.

Read the source article at Data Center Knowledge

A managed workspace is a secure workspace

Supporting an expanding mobility program or bring-your-own-device (BYOD) initiative can quickly become a complex undertaking for your IT group. As administrators try to stay afloat, managing and supporting a diverse array of device types, operating systems, applications, user policies and more, security can be put at risk.

Read the source article at Home – Dell Community

BYOD and security: Can you have both?

If you allow employees to use their personal devices for work, are you exposing your organization to new security risks? Attempted security breaches are on the rise, and employee smartphones, tablets and laptops could provide new pathways for malware, viruses and hacking. What can you do to protect enterprise information, applications and networks while still supporting your organization’s bring-your-own-device (BYOD) program?

Read the source article at Home – Dell Community

How New Types of DDoS Affect the Cloud

At a recent security meeting with a large healthcare organization, I had the privilege of looking at the logs of a private cloud infrastructure which I helped design. They showed me a couple of interesting numbers and what looked like possible DDoS attacks. Except, they were different. The security admin mentioned that he, and colleagues in different organizations, have been seeing a spike in malicious DDoS attacks against their systems.

Read the source article at Data Center Knowledge