Data Visibility & Protection

From Dark to Resilient Endpoints at RSA Conference 2018
Pam O'Neal
From Dark to Resilient Endpoints at RSA Conference 2018

If you feel as though your endpoint security strategy is more like a house of cards than an impenetrable wall, we’ve outlined steps you can take now to improve your overall security posture. If you’re going to be in San Francisco next week, be sure to stop by and see us in the South Expo booth #1539. Absolute security experts will demonstrate how to use technology already embedded in...

READ MORE
Creating a Compelling Case for Ongoing EdTech Investment
Harold Reaves
Creating a Compelling Case for Ongoing EdTech Investment

Many school districts face deficits in the coming fiscal year, so districts, schools and educators are getting more creative in their efforts to fund technology in the classroom. From public and private grants, to ‘crowdfunding,’ business partnerships and ballot initiatives, it has become increasingly challenging to maintain technology investment. Philadelphia’s school district recently reported an estimated $700 million deficit by 2020. Education funding in Iowa came under fire for...

READ MORE
What You Need to Know about GDPR Breach Disclosure, Response
Mark McGlenn
What You Need to Know about GDPR Breach Disclosure, Response

Incident response is a critical pillar of an effective endpoint security program, one that will gain importance as GDPR enforcement comes into play after May 25th. Organizations must be ready to react if and when an incident occurs in order to meet the stringent requirements that apply during an incident. Under Articles 33 & 34 of General Data Protection Regulation (GDPR), a personal data breach must be disclosed to supervisory...

READ MORE
2 Steps to Improve GDPR Security of Processing
Mark McGlenn
2 Steps to Improve GDPR Security of Processing

In the final countdown to GDPR enforcement on May 25th of this year, many UK and US firms are overestimating their state of readiness. 94 percent of FTSE 350 and 98 percent of Fortune 500 companies whose international business makes GDPR applicable believe they are on track to comply with GDPR, according to a recent survey, yet less than half of the same respondents have a GDPR taskforce and...

READ MORE
3 Steps to Asset Management and Software Auditing
Richard Henderson
3 Steps to Asset Management and Software Auditing

With the explosion of laptops, IoT, tablets, smartphones and other smart technologies, endpoints are the single largest group of devices inside your network today. Since they are critical for business getting done, endpoint disruption can have a significant impact on your day to day operations. Protecting them is paramount. There are four key pillars to building an endpoint security program that does its job well and I detail each of...

READ MORE