Why Enterprises are Being Breached & How to Stop the Attacks

2017 has been a record year for cyberattacks on large enterprises, following years and years of less publicized but equally massive breaches. We are officially at the beginning of an era of widespread, targeted attacks, and we can expect to see more and more as cyber criminals continue to invest in their own software to […]

Read More

Access Control Security for Linux Environments: An Open and Shut Case

Enterprises are adopting more open platforms and technologies for all the right reasons: they can avoid expensive and complex vendor lock-ins, while also taking advantage of the increasingly robust ecosystem of applications and software that simply works better in a Unix/Linux environment. As more and more attacks are coming from inside organizations, managing privileged users […]

Read More

Financial Services Compliance: Raising the Bar

Financial services companies have long been leaders in leveraging technology, and as more and more fintech innovations permeate the world’s largest banks, brokerages, credit card companies, insurance companies and other related businesses, the upside associated with having more data and running more efficiently using software automation is that the “attack surface” is increasing. While the […]

Read More

Across the EU, Heightened Standards Securing Networks and Information Systems: Implementing the NIS Directive

The recently announced publication of ETSI TR 103 456, a technical report released by the European Telecommunications Standards Institute, raises not only awareness of the coming NIS Directive, but provides solid technical information vital to the implementation of the European Union’s legislation on cybersecurity.  Adopted by the European Parliament in July 2016, and entered into […]

Read More

Impact of Market Communications Partnership

Recently, we proudly highlighted our partnership with Market Communications. Headquartered in New York City, Market Communications expert team of professionals have a long history of working with financial institutions of all sizes, globally. At the time of the partnership announcement, Market Communications already implemented Krontech’s Single Connect solution for a large global bank for whom […]

Read More

Protect What You Connect: Krontech’s Vision, Our Collective Mission

Today Krontech introduced our new theme and tagline: Protect What You Connect™.   We have not taken the common path – we are disrupters and innovators, not because it is cool to be, but because we all share a common desire to protect what we connect.   These are more than just words to our […]

Read More

Will Legacy Infrastructure Strike Back?

Despite all of the investments being made in transforming networks, both those of service providers and the enterprises they serve, legacy equipment sitting in today’s networks will be around for some time. Why?   First, networks are big, complicated beasts and most IT and OT teams are transforming networks location by location, application by application, […]

Read More

Human Error to Intentional Misdeeds: From Downtime to Disaster

The hot news lately has been about the compromise of networks by outside intruders. The facts show that internal breaches, whether intentional or accidental, done innocently or with malicious intent, comprise nearly half of all hacks. Here are a few statistics:   43% of data breaches are internal, according to a recent Intel study. While external breaches […]

Read More

Privileged Task Automation: The Natural Extension of Privileged Access Management

A lot has been written about Privileged Access Management (PAM) and for good reason. The number of individuals required to run a modern network – or networks in the context of our multi-network, multi-cloud world – continues to grow.   Gartner cites as reason to invest in PAM the risk of breaches and insider threats, […]

Read More

Sustaining Efficiency While Securing IT Operations

Given the dramatic growth of networks, applications and the equipment powering those applications, the complexity of managing access to service provider and enterprise networks is, in parallel, growing exponentially.   The number of end-users, end-points, and the variety of business applications is adding pressure on network operations and IT teams who are tasked with ensuring […]

Read More