Posts tagged with "Multi Factor Authentication"



Demystifying Technology: Zero-Knowledge Encryption
Blog | Endpoint Protection · 06. March 2023
Context Data is the new gold and must be protected from any unauthorized access. Cybersecurity attacks and data breaches are unfortunately happening every single day, and no organization, no matter its size or area of business, is safe from it. Most organizations are exponentially using cloud-based solutions, such as Software-as-a-Service (SaaS), to run applications and use online services like email or instant messaging without having to deal with the cost of maintaining them.

Solution Highlight: DRACOON
Blog | Endpoint Productivity · 30. January 2023
What is DRACOON? DRACOON is an Enterprise File Sync and Share (EFSS) solution developed in Germany, providing a secure data center for corporate and classified data.

Demystifying Security: Enterprise File Sync and Share (EFSS)
Blog | Endpoint Productivity · 11. January 2023
What is the challenge? Until recently, the easiest way to share documents or files with other employees was either using a USB drive (for large documents) or sending them by emails, if size allowed; email was also the option of choice when sending documents to external contacts. For larger documents, external providers like WeTransfer were used to temporally hold the file for the recipient to later retrieve and download.

Considerations When Moving to the Cloud
30. November 2022
In the past few years, with the rise of mobile devices and the need to access all services from anywhere on any type of device, organizations have been leveraging cloud providers to host more and more services, seeking to optimize both cost and availability. It seems like the obvious way forward for most organizations is to partially move to the cloud while maintaining their current on-premises infrastructure (a hybrid environment), or to move to the cloud completely. Moving to the cloud has...

Lessons Learned from a System Major Hack
Blog | Endpoint Protection · 18. October 2022
How Can We Prevent This? Once we understand what happened and how, it is now time to learn from it and build a plan to remedy it and ensure such scenarios cannot happen in the future. You know the saying, “Fool me once...” However, in this case, we know that this very company was allegedly hacked a couple of years ago and ended up paying a ransom to the hacker to delete the stolen data and “keep it quiet”; but based on what occurred, it looks like they did not learn from this and still...

Demystifying Security: Conditional Access
Blog | Endpoint Management · 03. May 2022
What is the challenge? Nowadays, with employees able to access work resources from different types of devices (e.g., desktop, tablet, mobile phone) and different locations (e.g., office, home, public), the challenge for security and mobility teams is ensuring that only authorized devices are allowed onto the network. It’s also about striking the right balance that allows users/employees to be productive from anywhere, at any time, while still protecting corporate resources. Conditional Access...

Cyber Security Solutions
Blog | Endpoint Protection · 01. March 2022
Protecting your organization against cybersecurity threats is not as simple as installing the most expensive security products available on the market, but rather understanding your own business and security needs how those needs impact your infrastructure, all the components involved, how they are prone to cyberattacks, and how you can protect them.