Data Visibility & Protection

How Wichita State University Improved Endpoint Visibility & Control
Juanma Rodriguez
How Wichita State University Improved Endpoint Visibility & Control

Long gone are the days when institutional data sits within a single, secure perimeter. Sensitive information now resides on multiple mobile endpoints handled by users who are constantly making changes to them. As more and more higher education institutions adopt 1:1 device programs, the challenge of securing that data only amplifies. Wichita State University (WSU), a public university in Wichita, Kansas that serves about 15,000 students, has experienced a...

READ MORE
How to Succeed in the Digital Healthcare Frontier
Josh Mayfield
How to Succeed in the Digital Healthcare Frontier

Healthcare is data. To effectively treat patients and create new forms of care, information must be shared, analyzed, and transmitted across several devices, among a number of healthcare professionals, insurance providers and other third parties. The sensitive nature of this personal information has long made healthcare an attractive target to cyber criminals while the complex nature of the industry creates continued struggles to protect the data, as frequent data...

READ MORE
Securing Shadow IT Starts with Automation
Jason Short
Securing Shadow IT Starts with Automation

Shadow IT is a modern security challenge for the very best reasons – your users rely on it to find new and arguably innovative ways to be more productive. While getting more done more effectively isn’t a bad thing, rogue applications that aren’t supported and maintained by IT is. While we haven’t seen Shadow IT in the headlines as much recently, the problem remains very real. Gartner estimated 38%...

READ MORE
How Emergency Communications of Southern Oregon Improved Security and Achieved Compliance
Kim Ellery
How Emergency Communications of Southern Oregon Improved Security and Achieved Compliance

According to a recent survey, most people (71 percent) want their state and local governments to spend more money on preventative cybersecurity measures and even more people (74 percent) think officials should take steps to better secure constituents’ personal data. Constituent demand isn’t the only demand driver however. Compliance demands also illustrate state and local governments have their work cut out for them when it comes to bolstering security....

READ MORE
How Greenville Health Systems Improved Endpoint Security and Achieved HIPAA Compliance
Kim Ellery
How Greenville Health Systems Improved Endpoint Security and Achieved HIPAA Compliance

On average, data breaches cost healthcare organizations $408 per record according to the 2018 Cost of a Data Breach Report by the Ponemon Institute and commissioned by IBM. Across all industries, healthcare has seen the priciest of data breaches for the last 8 years running. To boost security, Greenville Health System, a not for profit, patient-centered healthcare network that serves upstate South Carolina and the surrounding area, knew they...

READ MORE