Simplifique la gestión de actualizaciones de terceros para Intune con Patch Connect Plus

Los administradores y técnicos de TI de todo el mundo que buscan llevar la gestión de parches de terceros a la nube o incluso ampliar sus funciones de gestión de endpoints pueden empezar a celebrar, ya que Patch Connect Plus…
The post Simplifique la g… Continue reading Simplifique la gestión de actualizaciones de terceros para Intune con Patch Connect Plus

3 Alert Sources That Will Keep Your SOC Busy and Welcome Automation in 2021

With the work-from-home shift showing little signs of letting up and new IT spending habits taking shape, organizations should prepare…
The post 3 Alert Sources That Will Keep Your SOC Busy and Welcome Automation in 2021 appeared first on Siemplify.
Continue reading 3 Alert Sources That Will Keep Your SOC Busy and Welcome Automation in 2021

UEM: Es tiempo de asegurar los navegadores de su empresa.

Al hablar de gestión unificada de endpoints (UEM – Unfied Endpoint Management), es usual que los administradores de TI piensen en computadoras, switches e incluso dispositivos móviles. Pero, ¿qué pasa con los navegadores? También son endpoints esencia… Continue reading UEM: Es tiempo de asegurar los navegadores de su empresa.

Bolstering Corporate Security Post-COVID-19

In the new work-from-home reality, corporate security paradigms, and attitudes, must change The COVID-19 pandemic continues to affect the world in many ways, both health-wise and from a business standpoint. As we adjust to what is likely a new normal … Continue reading Bolstering Corporate Security Post-COVID-19

Qualys Delivers on Promise to Automate Endpoint Security

Qualys this week announced the availability of a Vulnerability Management, Detection and Response (VMDR) platform based on a single agent that detects endpoint vulnerabilities and automates the patching of those systems. Sumedh Thakar, president and c… Continue reading Qualys Delivers on Promise to Automate Endpoint Security

3 Steps to Controlling Access Inside the Network

As traffic on the network increases, so do potential vulnerabilities. Network access should be managed more tightly to keep data secure. For years, IT security has been focused primarily on defending the enterprise network from external threats by pro… Continue reading 3 Steps to Controlling Access Inside the Network

Using Behavioral Analytics to Fight Ransomware

The recent attacks on the City of Baltimore and the Norsk Hydro energy facility in Norway are among the latest incidents that show that ransomware, a part of a larger range of criminal extortion, continues to be a significant threat to organizations. … Continue reading Using Behavioral Analytics to Fight Ransomware

Security’s Greatest Enemy: Endpoints Disguised as ‘Stuff’

When considering the security of the devices that make up the internet of things (IoT), all endpoints must be considered in the risk equation. For years the standard model for non-traditional IT assets—such as printers, IoT, ICS, and anything connecte… Continue reading Security’s Greatest Enemy: Endpoints Disguised as ‘Stuff’