PRODUCTS

Cyber Security Elements by NSS

Uncategorized

Sophos Report: The State of Cloud Security 2020

As cybercriminals continue to take advantage of the public cloud in their attacks, Sophos commissioned an independent survey of 3,521 IT managers across 26 countries* to reveal the reality of cloud security in 2020. The 2020 cloud security reality The survey provides fresh new insight into the cybersecurity experiences of organizations using the public cloud,

Sophos Report: The State of Cloud Security 2020 Read More »

Sophos. Stop ProLock ransomware with three layers of protection from Intercept X

ProLock ransomware emerged on the threat scene in March, a retooled and rebranded version of PwndLocker. As SophosLabs reveals in its detailed analysis, while ProLock ransomware gives you the first eight kilobytes of decryption for free, it can still cause significant business disruption and economic damage. Protect against ProLock with Sophos Intercept X Intercept X

Sophos. Stop ProLock ransomware with three layers of protection from Intercept X Read More »

Sophos. Extend visibility across your entire cloud environment

We are excited to announce that Intercept X for Server Advanced with EDR has been enhanced with powerful cloud visibility features from Cloud Optix. In addition to even more detail on your AWS, Azure, and GCP cloud workloads, this integration gives customers critical insights into their wider cloud environments, including security groups, hosts, shared storage,

Sophos. Extend visibility across your entire cloud environment Read More »

BeyondTrust. Secure Every Privilege, Every Time

Most privileged access management solutions just focus on passwords. BeyondTrust is different. Our innovative Universal Privilege Management approach to cyber security secures every user, asset, and session across your enterprise. Deployed as SaaS or on-premises, BeyondTrust’s Universal Privilege Management approach simplifies deployments, reduces costs, improves usability, and reduces privilege risks. Go Beyond Passwords Passwords are

BeyondTrust. Secure Every Privilege, Every Time Read More »

Sophos. Full-disk encryption is the first line of defense

Increased remote working makes it more important than ever to secure computers and the data on them. With the huge number of laptops that are lost, misplaced, or stolen every day, a crucial first line of defense for devices is full-disk encryption. With full disk encryption rolled out, admins can ensure sensitive company data can’t

Sophos. Full-disk encryption is the first line of defense Read More »

BeyondTrust. Remote Access, Cloud Adoption and Digital Transformation are Accelerating: PAM is the Key to Secure and Enable It

Work from home (WFH) and remote access have accelerated the digital transformation journey, and IT’s move to the cloud. Security programs must address visibility, continuous monitoring, and a unified identity and privilege model for the multicloud environment. Privileged access management solutions are a key enabler for the cloud security strategy because they can protect core

BeyondTrust. Remote Access, Cloud Adoption and Digital Transformation are Accelerating: PAM is the Key to Secure and Enable It Read More »

Netsparker. Web Application Security or Network Security – Do You Have to Choose?

In a cloud-first world, the traditional line between network security and application security is becoming blurred. Physical IT infrastructure can now be hidden behind layers of virtualization, and web applications are frequently designed, developed, tested, and deployed entirely in the cloud. At the same time, web applications have become the main target of cyberattacks and

Netsparker. Web Application Security or Network Security – Do You Have to Choose? Read More »

Remote learning: Top five cybersecurity risks for education

The ongoing pandemic is resulting in a crisis for schools, colleges, and universities the world over. With physical buildings closed, most educational institutes are moving to emergency remote learning and working. For most of them, the transition from physical to online models has happened too quickly. Without proper time to vet potential risks, their networks

Remote learning: Top five cybersecurity risks for education Read More »