Uncategorized

/Uncategorized

5 Key Findings from 2019 Cloud Adoption and Risk Report

Cloud services are now a vital part of corporate life, bringing a momentous opportunity to accelerate business through their ability to quickly scale, allowing us to be agile with our resources, and providing new opportunities for collaboration. The typical organization uses, on average, 1,935 cloud services spanning enterprise-ready services procured by the IT department such [...]

October 25th, 2018|Uncategorized|0 Comments

Innovating Data Loss Prevention: From Device to Cloud

Companies of all sizes are adopting cloud-based services, such as Microsoft Office 365, as a way to give their end-users greater flexibility and easier access to core business applications. This requires corporate IT departments to re-examine their current data security posture such as data loss prevention (DLP) policies to better monitor and control sensitive data [...]

October 20th, 2018|Uncategorized|0 Comments

The Evolution of Zero Trust: Next Gen Access

he Zero Trust security framework was first developed by John Kindervag in 2009 while he was at Forrester Research. Zero Trust challenged the traditional security model of a firewall forming a perimeter between a trusted internal network and an untrusted external one. This security approach breaks down if a threat actor is able to penetrate that [...]

September 26th, 2018|Uncategorized|0 Comments

When People Are the Perimeter, We Need a Zero Trust Approach to Security

Data is the new oil—an observation not lost on hackers. In a world of growing interconnectivity, our most valuable digital assets—including our digital identities–have never been so exposed. After all, attackers of the digital age now simply log in, using stolen credentials to gain access to protected documents and privileged information. Relying on usernames and [...]

September 22nd, 2018|Uncategorized|0 Comments

AWS vs Azure vs Google Cloud Market Share 2018

Overview of Cloud Market in 2018 and Beyond Industry analyst firm Gartner predicts that the infrastructure-as-a-service (IaaS) market will grow by 35.9% in 2018–only a slight decrease from 38.6% in 2017–to reach $40.8 billion by the end of the year. IaaS shows no sign of slowing down in the foreseeable future, and is expected to reach $83.5 [...]

August 29th, 2018|Uncategorized|0 Comments

AWS Security Configuration Checklist

Amazon Web Services (AWS), the leader in the public cloud infrastructure-as-a-service (IaaS) market, offers a broad set of global compute, storage, database, analytics, application, and deployment services that help organizations move faster, lower IT costs, and scale applications. According to Amazon, over one million active AWS customers are reaping the cost and productivity advantages they [...]

August 12th, 2018|Uncategorized|0 Comments

AWS vs Azure vs Google Cloud Market Share 2018

Overview of Cloud Market in 2018 and Beyond Industry analyst firm Gartner predicts that the infrastructure-as-a-service (IaaS) market will grow by 35.9% in 2018–only a slight decrease from 38.6% in 2017–to reach $40.8 billion by the end of the year. IaaS shows no sign of slowing down in the foreseeable future, and is expected to reach $83.5 [...]

July 27th, 2018|Uncategorized|0 Comments

Eight Security Capabilities You Need to Protect Your Amazon Web Services Infrastructure

The worldwide infrastructure as a service (IaaS) public cloud market grew 31 percent in 2016 to total $22.1 billion, up from $16.8 billion in 2015, and is expected to show the fastest growth over the next five years compared to platform as a service (PaaS) and software as a service (SaaS), according to Gartner. With increasing adoption of IaaS platforms, we also see [...]

July 21st, 2018|Uncategorized|0 Comments

Protecting Your Organization Against Privileged Attacks

In recent years, the threat of cyber attacks has grown steadily. Many large enterprises have suffered devastating attacks, despite having security resources in place. Why are so many falling prey to attacks? The answers are manifold, but one of the leading causes is the misuse and abuse of privileges, opening up an easy path for [...]

June 27th, 2018|Uncategorized|0 Comments

5 Tips for Using Adaptive Authentication Right

Adaptive Multi-factor Authentication is a powerful feature that adds flexibility to Multi-Factor Authentication (MFA). Depending on your login context – for example, I'm accessing the system from a country I never did before – the MFA authentication is required. In simple words: with Adaptive MFA, depending on your context, the MFA shows up (or not): [...]

June 13th, 2018|Uncategorized|0 Comments