dcsimg

New ‘Least Privilege Cybersecurity for Dummies’ eBook!

This new eBook covers everything from the basic concepts of least privilege cybersecurity to key steps to plan your strategy. With more than 80 percent of breaches involving the compromise of IT and business user credentials (IDs and passwords), organizations are limiting privileged access to services, applications, data, and systems as a top priority. This free 16-page eBook describes how … [Read more...]

TeamViewer signs VAD Technologies

TeamViewer, a global leader in secure remote connectivity solutions, has appointed VAD Technologies as a distribution partner for the Middle East. The new partnership is intended to build a strong eco-system for TeamViewer and its new disruptive solutions such as TeamViewer Pilot, TeamViewer IoT and TeamViewer Tensor in the Gulf region. VAD Technologies will provide its specialized reseller … [Read more...]

The Evolution of MDaemon – 1996-2019 & Beyond!

In the early to mid nineties, our founder and CEO Arvel Hathcock recognized the need for a less expensive, easier to manage alternative to Microsoft Exchange Server for small-to-medium businesses. With solid programming skills and an entrepreneurial spirit, he created the MDaemon Email Server and launched MDaemon Technologies. As word about MDaemon spread and customers began sending feedback, … [Read more...]

Malwarebytes Selected as SC Media 2019 Excellence Award Finalist

Malwarebytes™, the leading advanced endpoint protection and remediation solution, today announced that it has been recognized as an Excellence Award Finalist in the "Best SME Security Solution" category of the 2019 SC Awards. Finalists are recognized for outstanding leadership and providing superior security products to the cybersecurity industry. Winners will be announced at the SC Awards … [Read more...]

Thycotic Ends 2018 with Record-Setting Quarter

Thycotic, provider of privileged access management (PAM) solutions for more than 10,000 organizations worldwide, today announced that it has ended a stellar 2018, outperforming 2017 with a 45 percent year-over-year sales growth. In addition to its sales growth, Thycotic also added 285 new customers in Q4 alone and 858 for 2018 overall. In addition to its on-premise enterprise-class PAM solution, … [Read more...]

Reduce malware dwell-time & the need to re-image infected endpoints!

According to research conducted by the Ponemon Institute, malicious or criminal data breaches take an average of 229 days to identify and 82 days to contain. The time required to remediate these incidents is substantial, often taking hours just to re-image a single endpoint. Lengthy dwell time and time-consuming re-imaging seem inevitable to an experienced IT team. Malwarebytes Incident Response … [Read more...]

TeamViewer Releases Update for TeamViewer IoT with Advanced Feature Set

TeamViewer®, a global leader in secure remote connectivity solutions, today released an update to its dedicated Internet of Things (IoT) solution, TeamViewer IoT. With the latest version of TeamViewer IoT, the German connectivity powerhouse further strengthens its offering in the IoT space. With the update, TeamViewer IoT provides enhanced configuration and troubleshooting qualities as well as … [Read more...]

LepideAuditor Adds Data Discovery and Classification Functionality

Lepide is a provider of Data-Centric Audit and Protection (DCAP) solutions that enable organizations to improve their approach to data security and meet compliance demands more easily. They do this through their award-winning DCAP solution – LepideAuditor.The new edition of LepideAuditor introduces data discovery and classification technology that has been completely developed and supported in … [Read more...]

SolarWinds adds SDN monitoring support to network management portfolio

SolarWinds announced a broad refresh to its network management portfolio, as well as key enhancements to the Orion Platform. Designed to address the increasing adoption of SDN technology—Cisco ACI in particular—SolarWinds Network Performance Monitor helps customers monitor logical components of their SDN environment, including APICs, tenants, application profiles, endpoint groups, and physical … [Read more...]

A Brief Introduction to the Nessus Vulnerability Scanner

Nessus is one of the many vulnerability scanners used during vulnerability assessments and penetration testing engagements, including malicious attacks. This article will focus on this vulnerability scanner, discussing the fundamentals that one needs to have before getting started with the tool, the different scanning capabilities that it provides, what it takes to run the tool and how results … [Read more...]