Securing a Network: Forescout’s Core Capabilities

A problem that plagues organization’s capability to achieve complete endpoint protection is the inability to identify every device connected to the network.  In other words, organizations struggle to achieve full visibility.  To help solve that problem, Forescout Technologies revolutionized device visibility with a proven process attained through agentless visibility.     As discussed in this post, device visibility is essential to…

Read More

Securing a Network: Agentless Visibility

In order to successfully secure a network, it requires multiple, simultaneous steps ranging from endpoint protection to managing a SIEM.  However, the simple fact is that a network cannot be fully secure if there are unknown connected devices or applications.  Therefore, gaining full visibility of the threat landscape is a critical component in combating the ever-evolving threat landscape.  …

Read More

What your IT team can be doing instead of managing your SIEM

Having a lot on your to-do list isn’t always a bad thing. Except for when one task takes up all your time – like managing your company’s SIEM.  A SIEM is critical to the security of a company, but the practically of managing one isn’t ideal.  Managing a SIEM strains both human and financial resources, and often…

Read More

Managing a SIEM vs. A Managed SIEM

IT departments clearly have its hands full with daily tasks spanning from managing computer systems, maintaining the network infrastructure, troubleshooting issues, managing SIEM to hardware and software maintenance, both network and device protection and much more.  With rapidly growing digital footprints and infrastructures, IT departments’ responsibilities won’t be slowing down any time soon.   In correlation with…

Read More

Your fleet’s technology is going EOL, now what?

Outfitting your fleet with the latest and greatest technology isn’t as simple as going to the local Best Buy and buying equipment.  Instead, there are budgets, red tape, RFPs, time restraints that lengthen and influence the buying process.  Whether your fleet is 10 cars or 200, it’s not always straightforward to equip it with the right technology.  …

Read More

Managing the Flow of Devices (better than Lucy)

If you are a fan of classic comedy television, you probably know this “I love Lucy” skit: In this situation, Lucy and Ethel have no problem with the slow trickle of chocolates, but the belt speeds up and the influx of Chocolates is just too great for the ladies, despite their creative efforts! As an…

Read More

How drones are keeping communities safe

Imagine dispatch getting a call about an active crime/incident and within two minutes command has eyes on the scene – but there is no officer there.  Instead a drone is circling the scene from 200 ft. in the sky.  The military has been leveraging un-manned aerial vehicles (now commonly known as drones) since the WW1 to enter…

Read More

Healthcare breaches: The epidemic people aren’t talking about

Research estimates healthcare data breaches may cause as many as 2,100 deaths a year in the United States And within the last month… Mar. 20, 2019 – Zoll Medical: 277,319 patients personal information was exposed Mar. 4, 2019 – Rush System for Health: 45,000 patients personal data compromised Feb. 22, 2019 – UConn Health: more than 326,000 patients personal data compromised Feb.…

Read More

5 tips to protect your information and passwords

In today’s digital world, virtually everything uses a password. We use them to get into our phones and computers, to access our bank and social media accounts. Essentially, we put in a password for every account that requires a username.  But why? To secure and protect our data. Passwords help to authenticate who we are.…

Read More

Are you in love with your managed service provider?

5 signs it’s not the one Falling head over heels for your managed service provider isn’t something you probably ever dreamed of as a child but if you don’t get butterflies thinking about your MSP and what it does for your organization, then it’s probably not the one.  Just because it may get the job done,…

Read More