ACS Alternative

  Krontech Introduces Offering for Companies Facing Cisco ACS End of Life Decisions Single Connect™: The Ideal Replacement for Cisco’s Access Control Server In December 2016, Cisco announced the end-of-sale and end-of life dates for their Secure Access Control System 5.5 (ACS). Customers with active service contracts will continue to receive support from the Cisco [...]
Read More

Why it’s more important than ever for healthcare systems to be protected by PAM

The healthcare industry has been struggling to deal with a growing number of cyberattacks on systems where private information and valuable medical data is stored. As providers and insurers continue their movement to the cloud for all the right reasons – scale, economics and support of new applications – the requirement to protect data and […]

Read More

Preparing for the Next California: Will More States Enact Consumer Privacy Laws?

Modeled after the European Union’s General Data Protection Regulation (GDPR), which was brought into force at the beginning of May 2018, the California Consumer Privacy Act (CCPA) was signed into law in June of the same year and although the requirements do not go into effect until Jan 1, 2020, many are already deliberating if […]

Read More

As Data Security and Privacy Regulations Tighten, Governance Solutions Are Growing

Audit, compliance, and governance solutions are growing at a rapid pace as part of the Identity Access Management (IAM) market, which is anticipated to grow at a CAGR of over 17% by 2024, according to a report by Grandview Research. The growing concern among organizations regarding data thefts of critical customer information is a major […]

Read More

Cybersecurity Insights from CDW: What Enterprise CISOs Need to Know About Internal Threats

Recently, CDW released a comprehensive, thought-provoking compilation of insights on cybersecurity, compiled and summarized by Sadik Al-Abdulla. We highly recommend spending time with this report, which is over 100 pages long, and shares the vision of several highly respected cybersecurity companies. “We have reached a tipping point when it comes to the volume and dynamics […]

Read More

There Is No True Cloud Security Without Comprehensive Command and Control

The most recent survey conducted by the SANS Institute (News – Alert) starts off by summarizing stunning breaches associated with sensitive data exposure based on misconfigured Amazon Simple Storage Service (S3) instances including a Verizon (News – Alert) partner who leaked the personal information of more than 14 million Verizon customers, voter data associated with the Republican party revealing private data of nearly 200 million […]

Read More

How Edge Computing Will Drive New Demands for Data Security, Infrastructure Integrity and New IT Policies

With the explosive growth of Internet of Things (IoT) devices and the related massive data produced at the edge of the network, the centralized cloud computing model is running up against limitations associated with bandwidth, computing resources, and the latency often associated when processing is done in the cloud instead of locally. Innovation and the […]

Read More

The Increasing Attack Surface in 2019

The “attack surface” is simply the total digital resources that are exposed to threats across the enterprise, and that attack surface is growing faster than ever before. In 2018, we saw a new level of criminal creativity in the way of adversarial AI algorithms, designed to do everything from creating a video of a former […]

Read More

In a Multi-Cloud World, It’s Time to Rethink Who Has Access To What

The biggest challenge in today’s multi-cloud world is not storing data or supporting applications, but securing that data all along the “digital supply chain.” Given the economics of the cloud, and the sense it makes to use different kinds of clouds for different applications, arguments to leverage cloud today are rock solid. With weak security […]

Read More

The First Major Breach Of 2019 And What This Australian Story Teachs US

The first data breach this year happened January 1, when the private data of 30,000 Australian civil servants was stolen in an email phishing attack. The incident occurred when a directory was downloaded by an unauthorized third party after a government employee received a phishing email, and while no financial information was compromised, the stolen […]

Read More