infographic

June 12, 2018
cyber security

The need for a low-maintenance endpoint management and response solution

MSSPs often look for ways in which they can expand their services in order to increase their revenues and keep up with customer demand. One way
May 16, 2018
HIPAA compliance

Security and Compliance in Healthcare Organizations

Ensuring Healthy Endpoint As a healthcare organization continues to improve treatment and patient care with new technologies, hackers look to exploit the vulnerabilities that come along
April 20, 2018
compliance

How to Ensure Compliance in an Organization

The Case for Clientless Endpoint Visibility and Management The biggest and most confounding challenge in enforcing corporate and regulatory compliance in any organization lies at the
October 30, 2017
bad rabbit

Endpoint Security When Ransomware is Rampant

The latest ransomware campaign has been targeting companies in Russia and Eastern Europe. The ransomware virus, called “Bad Rabbit,” was first detected on October 24th when
October 10, 2017
security

Yahoo Breach Gets Bigger, Showing Need for Endpoint Software

Verizon Communications, which acquired Yahoo earlier this year, recently revealed that all user email accounts have been compromised by hackers. Originally, Yahoo believed that only one
September 26, 2017
The U.S. Securities and Exchange Commission (SEC) headquarters

Cyber Attacks on Government Agencies Show Need Endpoint Management

The U.S. Securities and Exchange Commission displayed how vulnerable government agencies are to cyberattacks when it disclosed last week that hackers had breached its database. The
July 16, 2014

The Year of the Endpoint: Only 39% Have Advanced Endpoint Security in Place Even As 74% Agree Endpoints are ‘Most Vulnerable’ to an Attack

 An Overwhelming majority of VP and C-Level IT Leaders (83%) say antivirus solutions are not part of their future for protecting against advanced threats.   An
July 24, 2014

IT Business Edge Article: Endpoints Are Most Vulnerable Yet Not Well Secured

Where are you most vulnerable to a cyber attack? If you said your endpoints, like desktop computers and mobile phones, are most vulnerable to potential threats,
July 28, 2014

Investing in Cybersecurity

Investors have noticed the trend in companies focusing more on cybersecurity. CNN Money reported that “venture capital firms are expected to funnel $788 million into early-stage cybersecurity
August 4, 2014

The Key to Managing Passwords

From online banking to cloud storage, the Internet makes daily life easier. Still, one inconvenience for people is memorizing dozens of username and password combinations. Microsoft
August 8, 2014

IT Security Journal Article: Patch Plus: A Fresh Approach to Security Basics

Security professionals have a lot to contend with; contemplating even a short list of threat vectors can be overwhelming. The recent Gartner Security and Risk Management Summit in
August 13, 2014

Is Any Press Good Press?

You’ve heard the old saying that even bad press is good press.  American showman P. T. Barnum (1810-1891) is often credited for that infamous quote, promoting
November 11, 2015

Endpoint Security Infographic

Survey Shows Endpoints Still Vulnerable to Breach as Security Defenses Lag An alarming 89% of VP and C-Level IT Leaders have a heightened fear of a breach over
November 12, 2015

Promisec Survey: Endpoints Still Vulnerable to Breach as Security Defenses Lag

An alarming 89% of VP and C-Level IT Leaders have a heightened fear of a breach over the next year Only 32% of Respondents Have Advanced