4 Questions With ITAM Insider & Why You Need an ITAM Solution Right Now

  In light of LANDESK recently being named Champion by the Info-Tech Research Group in the IT Asset Management Vendor Landscape Report (check out the report below!), we spoke with ITAM Product Marketing Manager Jason Christensen to get a better understanding of ITAM and what it means for business today.   1. What are the […]

Outstanding Results – Check Point Achieves 3rd NSS Recommended Rating This Year

  Great news! I’m glad to report we achieved another NSS Recommended in their recent NGIPS Group Test! This is our 3rd NSS Recommended this year and our 13th since we began working with NSS Labs in 2011. The previous two tests this year measured our Next Generation Firewall capabilities and the Breach Detection System […]

Huawei Named as a Leader in 2016 Gartner Magic Quadrant for General-Purpose Disk Arrays

  A vendor in the Leaders quadrant has the market share, credibility, and marketing and sales capabilities needed to drive the acceptance of new technologies. These vendors demonstrate a clear understanding of market needs, they are innovators and thought leaders, and they have well-articulated plans that customers and prospects can use when designing their storage […]

Insider Security Breach

  What's more of a threat to a company's data security: insiders or outsiders?   Figure 1. Percent of breaches per threat Actor category within Insider and Privilege Misuse2   While many organizations focus their security efforts on their network border, it is the insider that perhaps poses the most risk to cyber-security. Insider threats […]

CONQUERING THE RISING THREAT OF MALVERTISING

The recent shift in enterprise application platforms from desktop to mobile has brought with it many exciting benefits, which organizations have recognized and leveraged to provide a more flexible and convenient workplace. Unfortunately, individuals and groups with less honorable intentions have also taken notice of this shift. In fact, a report from ISACA predicts a massive rise […]

Q&A With Phil Richards, CSO: Vulnerability and How it Leads to Cybersecurity Attacks

With the current wave of cybersecurity attacks, businesses everywhere are scrambling to protect their digital assets and prevent high-impact security breaches. One of the most crucial steps a company can take is to take a look at their system’s vulnerabilities. We recently sat down with LANDESK’s Chief Security Officer, Phil Richards, to gain deeper insights […]

Threat Advisories and Attack Reports

The Rapid Evolution of Mirai Abstract The infamous Mirai botnet was responsible for the top three DDoS attacks in 2016, against Brian Krebs, OVH and DynDNS. Taking over hundreds of thousands of Internet of Things (IoT) devices, it stunned the IT industry with traffic volumes exceeding 1Tbps. Since its source code became available via a […]

TIBCO’s 2017 Tech Predictions

With the close of 2016 behind us, we are facing a fresh, brand-new year and all of its possibilities. This season often has us wondering, discussing, and working toward what’s ahead. We put our heads together for a TIBCO think tank and compiled this lis of predictions for 2017. Here are our tech thoughts for […]

No-Compromise Digital Transformation

What does Digital Transformation really mean? In post eight of our series, learn why it's essential to engage your employees as well as your customers. Tradeoffs are necessary in business negotiations, but some things aren’t negotiable. You can’t sacrifice security for access, for example. You can’t inhibit business agility by making processes too complex. And when […]

Carbonite Acquires Double-Take Software

Carbonite, Inc. (NASDAQ:CARB), a leading provider of data protection solutions for small and midsize businesses, announced it has acquired Double-Take Software, an affiliate of Vision Solutions, Inc. and Clearlake Capital. The acquisition enhances Carbonite’s existing suite of data protection solutions for small and midsize businesses (SMB) with high availability technology that significantly minimizes downtime. Carbonite […]