Liongard extends its Data & Automation Platform to Windows workstation with the Launch of EndPoint Visibility.
Mreža je okosnica svakog informacijskog sustava i bez obzira na to koji tip usluge pružate, bilo da se radi o sigurnosti, dokumentaciji korisničkih okruženja ili proaktivnom nadzoru i optimizaciji poslovnog sustava, kvaliteta vaše usluge će ovisiti o tome koliko dobro poznajete mrežni sustav. Zapravo, mogli bi reči da bez detaljnog uvida u mrežni sustav jednostavno ne možete pružiti kvalitetnu uslugu, bez obzira na tip usluge koji pružate i pokušat ćemo u nastavku teksta obrazložiti tu tvrdnju.
For years, Antivirus (AV) solutions were the major players on protecting customer endpoints. But as the threat landscape has shifted, we’ve seen the emergence of newer solutions built to deal with some of the problems inherent in AV.
You may have heard the term “endpoint detection and response (EDR)” crop up over the past few years. These solutions were put on the market specifically to adapt to the evolution of the threat landscape. Replacing your AV product with EDR is definitively a step in the right direction, but choosing the right product is not an easy task. You are for sure wondering about how effective these solutions are in addressing the real-world threats.
In case you haven't joined our latest Altaro workshop you can still see the recording here. In this session we took a deep dive under Altaro VM Backup surface with Dr. Carsten Haak, shared few tips, tricks and best practice examples.
Find out how BlackFog prevented #dataexfiltration and detected Microsoft Exchange Server hack before it really became a thing.
In this special session we took a deep dive with BlackFog's VP of Business Development, Thomas T. Madsen, as he analyzed security breach that happened few weeks ago to IT Service provider that along with other solutions, uses #BlackFog to protect their clients from data loss. Even with having several different security layers in place the whole system was compromised, but attackers were not able to exfiltrate any data as BlackFog kept all gates closed leaving them empty handed.
During this session we have also explained how to minimize cyber security issues by focusing on data privacy for endpoints and by applying multiple layers of security around it (geo blocking, suspicious address blocking, malwaretising, social media, fake news, profiling, dark web control etc.).