Tag: Network Security

Does Your Organization Still Lack Basic Controls to Protect Unattended Workstations?

For years, analysts have been reporting on the risks of unattended employee workstations. For example, a user who sits down at a co-worker’s PC could access sensitive data, send email from the PC owner’s account or even introduce malware into the network. To make matters worse, such misuse of an unattended workstation is difficult to detect and prove.

Read the source article at Home – Dell Community

The Changing Mobile Worker: Balancing Productivity and Security

As an IT veteran, I have observed and helped drive tremendous change, not just in the technologies we use but how we use them. Among the more dramatic shifts has been the definition of being a mobile worker. When I was a mainframe programmer in the late 80’s, being “highly mobile” meant I could log in at any mainframe terminal in the office, do my programming, submit my jobs to the queue and do my (internal only) email.

Read the source article at EMC IT’s Journey to the Private Cloud

Black Hat 2015: 10 Security Threats To Watch

Hackers and security researchers converged in Las Vegas this week to reveal the latest and greatest threats facing security professionals today. In presentations at the Black Hat 2015 conference, demonstrations showed how the rise of the Internet of Things, connected devices, new mobile technologies and other developments have opened up the door to more threats than ever before.

Read the source article at crn.com

How to Make Your Network Security Infrastructure Future-Ready

It is clear that today’s businesses require reliable network connectivity, and access to both corporate and Internet resources. Connections to and from business units, external customers and SOHOs are all equally important to ensure continuity. Business runs all day, every day, even in off hours. Most companies run operations around the clock, so it is important to realize that solid business continuity strategy and redundancy technology should be considered and implemented.

Read the source article at Home – Dell Community

Seamlessly Integrated Physical Security Solutions

PTS Physical Security Solutions offers a turnkey solution to address all your physical security needs. Utilizing cutting edge technologies offered by our partners, PTS offers the following solutions: Video Surveillance, Access Control, and Central Management. PTS’s primary Physical Security platform is Genetec’s Security Center (Unified Platform), which has applications for Video Surveillance, Door Access control, License Plate Recognition, Alarm Panel Integration and other third party capabilities. These applications are all viewable on one simple Customer Interface.

Read the source article at Data Center Design

Storage and Security: Five Things You Need to Understand

In light of a number of recent breaches spanning healthcare, retail, and even government, I thought it would be nice to take a second and focus on storage and security. Here’s the reality: with so many new types of applications being developed (both internally and in the cloud), new concepts around security are emerging which directly impact storage technologies.

Read the source article at Data Center Knowledge

Seven Things Solution Providers Must Know About Data Breaches

Solution providers should undertake a data protection strategy that includes both robust protection and backup efforts and be sure not to skimp on updates or penetration testing, according to a system integrator CEO.

Read the source article at itbestofbreed.com

3 Reasons Hybrid Cloud is Much More Secure Than You Think

Hybrid cloud adoption continues to gain momentum, and businesses across nearly every industry are eagerly working to infuse agility into their organization by adopting the hybrid cloud model. The message is clear: “We like this. It works.”

Read the source article at VMware Blogs

IT Infrastructure Investment Set to Increase in 2015

SMBs are feeling optimistic about 2015 and prioritizing IT infrastructure investment. Hardware replacement, network security, server upgrades and wireless upgrades lead the wish list according to a recent survey of SMB leadership.

Read the source article at Midsize Insider

A managed workspace is a secure workspace

Supporting an expanding mobility program or bring-your-own-device (BYOD) initiative can quickly become a complex undertaking for your IT group. As administrators try to stay afloat, managing and supporting a diverse array of device types, operating systems, applications, user policies and more, security can be put at risk.

Read the source article at Home – Dell Community