IT Distribucija s osobnošću

Mrežna vidljivost

Mreža je okosnica svakog informacijskog sustava i bez obzira na to koji tip usluge pružate, bilo da se radi o sigurnosti, dokumentaciji korisničkih okruženja...

Endpoint Detection and Response Demystified

For years, Antivirus (AV) solutions were the major players on protecting customer endpoints. But as the threat landscape has shifted, we’ve seen the emergence...

Altaro Workshop - Best Practice, Tipps & Tricks

In case you haven't joined our latest Altaro workshop you can still see the recording here. In this session we took a deep dive...

BlackFog - Hafnium Exchange Hack Case Study

Find out how BlackFog prevented #dataexfiltration​ and detected Microsoft Exchange Server hack before it really became a thing.


In this special session we took a deep dive with BlackFog's VP of Business Development, Thomas T. Madsen, as he analyzed security breach that happened few weeks ago to IT Service provider that along with other solutions, uses #BlackFog​ to protect their clients from data loss. Even with having several different security layers in place the whole system was compromised, but attackers were not able to exfiltrate any data as BlackFog kept all gates closed leaving them empty handed.


During this session we have also explained how to minimize cyber security issues by focusing on data privacy for endpoints and by applying multiple layers of security around it (geo blocking, suspicious address blocking, malwaretising, social media, fake news, profiling, dark web control etc.).

Where to find and access N-able partner resources

In this short video you will find more details about N-able partner resources and where to find them.


<< < Stranica 2 od 6 > >>