PRODUCTS

Cyber Security Elements by NSS

Uncategorized

Datto. What Is SaaS Protection (Software as a Service)? (Part 2)

[vc_row][vc_column][vc_custom_heading heading_semantic=”h1″ text_size=”h1″ text_weight=”300″ text_color=”color-210407″]Datto. What Is SaaS Protection (Software as a Service)? (Part 2)[/vc_custom_heading][vc_column_text] Why the SaaS business model is a good fit for managed service providers Leveraging SaaS services for your clients is a great way to scale your service offerings. Software as a Service solutions are normally delivered by a license subscription […]

Datto. What Is SaaS Protection (Software as a Service)? (Part 2) Read More »

HelpSystems. Keeping Cloud Security Top Priority in Your Digital Transformation

Times are changing—employees are working from home, using more devices, and moving more data around than ever before. Organizations are recognizing that helping their employees to work and collaborate faster and more efficiently is key to surviving in an ever-changing and increasingly competitive market. While for some organizations, this may simply mean adding a new

HelpSystems. Keeping Cloud Security Top Priority in Your Digital Transformation Read More »

Datto. What Is SaaS Defense (Software as a Service)? (Part 1)

[vc_row][vc_column][vc_custom_heading heading_semantic=”h1″ text_size=”h1″ text_weight=”300″ text_color=”color-210407″]Datto. What Is SaaS Defense (Software as a Service)? (Part 1)[/vc_custom_heading][vc_column_text]SaaS stands for “Software as a Service” and is a cloud-based IT service. It is an on-demand software that can be accessed by the user via an internet connection. Saas is one of the most popular ways to provide business software

Datto. What Is SaaS Defense (Software as a Service)? (Part 1) Read More »

BeyondTrust. Managing Shared Accounts for Privileged Users: 5 Best Practices for Achieving Control and Accountability

Many IT organizations use shared accounts for privileged users, administrators, services, or applications so that they can have the access they need to perform an activity. Account sharing often entails use of the same account credentials to authenticate multiple users. Without proper management controls in place, the practice of account sharing presents significant security and

BeyondTrust. Managing Shared Accounts for Privileged Users: 5 Best Practices for Achieving Control and Accountability Read More »

Sophos. ZTNA strengthens security controls for remote workers

Remote access has been a component of the network since the days of acoustic, dial-up modems and the blazing fast speeds of 56 kbps. Well, perhaps not blazing fast. These modems eventually gave way to faster and more secure technologies, with virtual private networks (VPNs) hitting the market in the early 2000s. In today’s pandemic-dominated,

Sophos. ZTNA strengthens security controls for remote workers Read More »

Sophos Firewall OS v18.5 MR3 is Now Available

The product team is pleased to announce the latest maintenance release update for SFOS with important customer and partner requested features, as well as important security, performance, and reliability fixes. It is a critically important cybersecurity best-practise to keep your firewall updated with the latest firmware. SFOS v18.5 MR3 Highlight: DHCP Boot Option Configurations –

Sophos Firewall OS v18.5 MR3 is Now Available Read More »

Datto. Top 20 Most Common Hacker Behaviors

[vc_row][vc_column][vc_column_text]When the OWASP Top 20 Vulnerabilities was first published it revolutionized our industry’s approach to vulnerability management. Instead of playing wack-a-mole with thousands of individual vulnerabilities every time a new one was discovered, we approached vulnerability management by primarily addressing these Top 20 Techniques. Still considered “advanced”, behavioral detection has just begun to hit the

Datto. Top 20 Most Common Hacker Behaviors Read More »