Posts tagged with "MFA"



How to Extend ZTA to Your Mobility Infrastructure
Blog | Endpoint Protection · 27. June 2023
When the government deploys mobile devices to their employees, the military and federal agencies face several challenges due to the nature of their operations and the sensitivity of the information they handle. Military and federal agencies handle sensitive and classified information, requiring strict adherence to compliance regulations and classification guidelines. Deploying mobile devices while maintaining data confidentiality and integrity presents challenges in terms of encryption, access...

Demystifying Cybersecurity: Zero Trust Architecture in a Nutshell
Blog | Endpoint Protection · 08. May 2023
Nowadays most employees are provided with the ability to work remotely and access their work data and services from virtually any location, on any device, and at any time. While this may be an improvement in terms of offering employees more of a work-life balance, employees still have one *little* thing to worry about: SECURITY. Easier access to more services from more devices and locations translates into an exponentially increased surface of attack, so a comprehensive security strategy must...

How ISEC7 Addresses Government Endpoint Protection Needs
Blog | Endpoint Protection · 18. April 2023
Whether your organization's digital workplace and/or mobile enterprise supports federal field operators in high-risk locations, tactical warfighters, CSfC deployments or internal data administration, ISEC7 can support your unique requirements within a government setting. Zero Trust Endpoint Protection As executive orders push the government towards a Zero Trust architecture strategy, ISEC7 can help government agencies deploy a Zero Trust security strategy, incorporate Zero Trust elements into...

Demystifying Technology: Zero-Knowledge Encryption
Blog | Endpoint Protection · 06. March 2023
Context Data is the new gold and must be protected from any unauthorized access. Cybersecurity attacks and data breaches are unfortunately happening every single day, and no organization, no matter its size or area of business, is safe from it. Most organizations are exponentially using cloud-based solutions, such as Software-as-a-Service (SaaS), to run applications and use online services like email or instant messaging without having to deal with the cost of maintaining them.

Solution Highlight: DRACOON
Blog | Endpoint Productivity · 30. January 2023
What is DRACOON? DRACOON is an Enterprise File Sync and Share (EFSS) solution developed in Germany, providing a secure data center for corporate and classified data.

Demystifying Security: Enterprise File Sync and Share (EFSS)
Blog | Endpoint Productivity · 11. January 2023
What is the challenge? Until recently, the easiest way to share documents or files with other employees was either using a USB drive (for large documents) or sending them by emails, if size allowed; email was also the option of choice when sending documents to external contacts. For larger documents, external providers like WeTransfer were used to temporally hold the file for the recipient to later retrieve and download.

Considerations When Moving to the Cloud
30. November 2022
In the past few years, with the rise of mobile devices and the need to access all services from anywhere on any type of device, organizations have been leveraging cloud providers to host more and more services, seeking to optimize both cost and availability. It seems like the obvious way forward for most organizations is to partially move to the cloud while maintaining their current on-premises infrastructure (a hybrid environment), or to move to the cloud completely. Moving to the cloud has...

Lessons Learned from a System Major Hack
Blog | Endpoint Protection · 18. October 2022
How Can We Prevent This? Once we understand what happened and how, it is now time to learn from it and build a plan to remedy it and ensure such scenarios cannot happen in the future. You know the saying, “Fool me once...” However, in this case, we know that this very company was allegedly hacked a couple of years ago and ended up paying a ransom to the hacker to delete the stolen data and “keep it quiet”; but based on what occurred, it looks like they did not learn from this and still...

Public Service Announcement: Browser in the Browser (BITB) Attacks
Blog | Endpoint Protection · 17. May 2022
With cybersecurity attacks getting increasingly sophisticated, phishing attempts have grown from convincing emails, SMS, or phone calls to convincing Single Sign-On (SSO) prompts that can expose your corporate users. Continuing the growing trend of sophisticated cyberattacks, a new attack has been reported recently that you should know about: Browser in the Browser (BITB) attack. It takes advantage of the SSO security feature used by most organizations. 

Demystifying Security: Conditional Access
Blog | Endpoint Management · 03. May 2022
What is the challenge? Nowadays, with employees able to access work resources from different types of devices (e.g., desktop, tablet, mobile phone) and different locations (e.g., office, home, public), the challenge for security and mobility teams is ensuring that only authorized devices are allowed onto the network. It’s also about striking the right balance that allows users/employees to be productive from anywhere, at any time, while still protecting corporate resources. Conditional Access...

Show more