PRODUCTS

Cyber Security Elements by NSS

Uncategorized

CyberArk Launches SAP-certified Privileged Access Security Solution

CyberArk, the global leader in privileged access security, today announced the availability of its SAP-certified CyberArk Privileged Access Security Solution. The solution can strengthen and extend security across SAP environments, including SAP ERP systems, by protecting against privileged access-related risk and credential compromise. The CyberArk Privileged Access Security Solution achieved SAP certification as Integrated with SAP […]

CyberArk Launches SAP-certified Privileged Access Security Solution Read More »

Privileged Access Security for Dummies: A Practical, “How-To” Guide from CyberArk

Savvy security practitioners understand that one of the most important, preventative steps they can take to bolster their cyber security posture is to secure privileged access – including privileged accounts, credentials and secrets. Protecting privilege is a process, and it’s often a key element of an enterprise-wide security program. Perhaps you are wondering if there

Privileged Access Security for Dummies: A Practical, “How-To” Guide from CyberArk Read More »

Sophos ranks #1 for endpoint protection by SE Labs

Sophos Intercept X Advanced was the top-ranked solution for both enterprise endpoint protection and small business endpoint protection in the new SE Labs endpoint protection test report (Apr-Jun 2018). Sophos received a 99% protection accuracy rating, 100% legitimate accuracy rating and 100% total accuracy rating. Each of these scores were the highest in the test.

Sophos ranks #1 for endpoint protection by SE Labs Read More »

Gartner names Sophos as a ‘Visionary’ in the first UEM Magic Quadrant

Sophos is proud to be positioned among the “Visionaries” in the 2018 Gartner Magic Quadrant for Unified Endpoint Management (UEM). Gartner states that: Unified endpoint management (UEM) tools combine the management of multiple endpoint types in a single console. UEM tools perform the following functions: Configure, manage and monitor iOS, Android, Windows 10 and macOS,

Gartner names Sophos as a ‘Visionary’ in the first UEM Magic Quadrant Read More »

The 5 W’s of Data Identification and Inventory

Eric Vanderburg, Vice President of Cybersecurity at TCDI, highlights the key questions to consider when identifying your organisation’s data, its importance and the level of protection required… I always figured that you would need to know what you have in order to protect it. However, I have seen far too many companies implement “best practices,”

The 5 W’s of Data Identification and Inventory Read More »

GlobalSign: How To Protect Your Start-Up From Ransomware

Cyber-attacks are making the lives of internet users very difficult. Ransomware in particular has been one of the most disruptive types of attack that hackers are using. Unfortunately, ransomware attacks are accelerating and intensifying with more victims each and everyday. Take the most recent example of WannaCry that took over the news at the end

GlobalSign: How To Protect Your Start-Up From Ransomware Read More »