Security IT Summit | Forum Events Ltd Security IT Summit | Forum Events Ltd Security IT Summit | Forum Events Ltd Security IT Summit | Forum Events Ltd Security IT Summit | Forum Events Ltd

Posts Tagged :

Industry Spotlight

INDUSTRY SPOTLIGHT: Falanx penetration testing

960 640 Guest Post

To minimise risks from hackers you need to think and act like a hacker.

Penetration testing does just that, pseudo hackers attack your systems to help expose and fix vulnerabilities.

Whether it’s web applications, internal networks, mobile devices or wireless networks, penetration testing is critical to ensure high levels of cyber security. But why, when and how often should you penetration test?

Find out more at: https://falanx.com/cyber/why-when-and-how-often-should-you-pen-test/

INDUSTRY SPOTLIGHT: EveryCloud – Email Security

960 640 Stuart O'Brien

EveryCloud partners with Gartner and Forrester cloud security leaders to access, compare and improve your cloud security capabilities.

We assist you to build combined solutions from products that suit your needs and goals and assist with GDPR data protection compliancy. From Cloud Access Security (CASB), Identity Access Management (IAM) and Email & Web Security, our solutions offer you the full protection and control to keep your business safe.

Solution Focus:

We assist business’ to secure their mailbox and not just their email server! Providing up to the minute intelligence and protection from mature and emerging threats.

INDUSTRY SPOTLIGHT: EveryCloud – Identity Access & Management

960 640 Stuart O'Brien

EveryCloud partners with Gartner and Forrester cloud security leaders to access, compare and improve your cloud security capabilities.

We assist you to build combined solutions from products that suit your needs and goals and assist with GDPR data protection compliancy.

From Cloud Access Security (CASB), Identity Access Management (IAM) and Email & Web Security, our solutions offer you the full protection and control to keep your business safe.

Solution Focus:

We assist you to securely connect to the technologies and services that your business uses, with one integrated service that is born and built in the cloud.

INDUSTRY SPOTLIGHT: EveryCloud Cloud Access Security

960 640 Stuart O'Brien

EveryCloud partner with Gartner and Forrester, cloud security leaders to access, to compare and improve your cloud security capabilities.

We assist you to build combined solutions from products that suit your needs and goals and assist with GDPR data protection compliancy. From Cloud Access Security (CASB), Identity Access Management (IAM) and Email & Web Security, our solutions offer you the full protection and control to keep your business safe.

Solution Focus:

We assist you to govern your business’ cloud usage with visibility and control, protect and prevent the loss of sensitive data and guard against cloud-based threats such as malware and ransomware.

INDUSTRY SPOTLIGHT: Gallagher access control systems

1024 683 Stuart O'Brien

Does your access control system allow you to implement, enforce and report on business policies and processes at every point using physical security infrastructure and command centre?

If not, it should. Access management can be based on individual competencies allowing your business to effectively manage compliance with business policy and government regulations.

Features and benefits

  • Check personnel at the door to make sure they are capable, qualified and compliant.
  • Monitor inductions, licenses, training and qualifications to only allow people access to areas they are qualified to be in.
  • Use random cardholder selection to check competencies and licensing.
  • Import competencies, images, roles and access rights from existing human resources, contractor management, or enterprise identity management systems.
  • Real-time audit trail provides prompt and reliable decision-making information.

Competency-based access management

  • Access management can be based on individual competencies.
  • Safety – is the employee inducted, trained, licensed and fit for work?
  • Equipment – does the employee have the right safety equipment?
  • Security – does the employee have the right clearance?
  • Regulatory compliance – are there other requirements the employee has to meet?
  • Validity periods and competence expiry can also be monitored. Access decisions are delivered to the individual instantly by the door reader or display monitor, or via SMS.
  • A variety of messages can be displayed which prompt the employee to proactively address any forthcoming issues that arise. If access is denied, then the individual is immediately informed of the appropriate corrective action.

The benefits of competency-based access management are:

  • Automatic enforcement of business OH&S rules and policies.
  • Reducing production disruption caused by presence of non-compliant staff.
  • Tangible evidence of duty of care to staff and customers.
  • Automatic compliance with government regulations.
  • Reduction in financial penalties for non-compliance.
  • Reduction in legal risks arising from employee accident claim.
  • Reduced likelihood of an employee failing to maintain access requirements.

www.gallagher.com

Varonis Systems

INDUSTRY SPOTLIGHT: Varonis Systems

960 640 Stuart O'Brien

In 2003 a large oil and gas company nearly had a disaster. They spent millions of dollars capturing hi-resolution images of the ocean floor and stored them on their file servers. One day these images were gone.

Were they accidentally deleted? Deliberately stolen? Two storage experts discovered that there was no record of what had happened, and no easy way to figure it out.

From this potential disaster, these storage experts saw opportunity. File systems were growing exponentially in complexity and size. Data was becoming more valuable than ever, and it needed to be better protected.

And so in 2005, those storage experts – Yaki Faitelson and Ohad Korkus – founded Varonis to give organizations more visibility into their data, and to protect their critical information.

Varonis protects sensitive information from insider threats, automates time-consuming tasks, and extracts valuable insights from enterprise data.

www.varonis.com

LogRhythm

INDUSTRY SPOTLIGHT: LogRhythm

960 640 Stuart O'Brien

LogRhythm, the leader in security intelligence and analytics, empowers organisations around the globe to rapidly detect, respond to and neutralize damaging cyber threats.

The company’s patented and award-winning platform uniquely unifies next-generation SIEM, log management, network and endpoint forensics and advanced security analytics.

In addition to protecting customers from the risks associated with cyber threats, LogRhythm provides unparalleled compliance automation and assurance and enhanced IT intelligence.

www.logrhythm.com

CensorNet

INDUSTRY SPOTLIGHT: CensorNet Cloud Security

960 640 Stuart O'Brien

CensorNet, the complete cloud security company, helps organisations to effectively manage and control the use of cloud applications in their business.

The company provides a unified and multi-layered approach to securing the cloud via its purpose built, multi-functional cloud security platform that delivers integrated web security, email security, CASB and adaptive multi-factor authentication.

This provides organisations with security-focused visibility and control over user access, data and assets to allow access while controlling outcomes and allows businesses to address the security, audit, compliance and productivity issues associated with the use of cloud applications and devices.

CensorNet enables organisations to control Shadow IT, safely implement BYOD initiatives and protect from cyber threats.

www.censornet.com

Bomgar

INDUSTRY SPOTLIGHT: Bomgar Secure Access Solutions

960 640 Stuart O'Brien

Bomgar is the leader in Secure Access solutions that empower businesses – its leading privileged access management and secure remote support solutions help security, IT and support professionals improve productivity and security by enabling secure, controlled connections to any system or device, anywhere in the world.

Bomgar offers the most secure remote access and support technology on the planet. Each encrypted connection is outbound, so you can connect without VPN or firewall changes.

You can leverage Active Directory and LDAPS to manage authentication, require multi-factor authentication, define more than 50 permissions for technicians and privileged users, and capture a detailed audit log of every remote connection.

For more information, visit www.bomgar.com.

10Duke

INDUSTRY SPOTLIGHT: 10Duke Authentication & Authorisation

960 640 Stuart O'Brien

10Duke provides authentication and authorisation as-a-service solutions for leading consumer and technology brands worldwide such as Trimble, Unilever, Savills, Volvo, Rovio and more.

Our products are used to address three primary use cases:

The 10Duke Identity Provider – enables Single Sign-On (SSO) for customers accessing applications, whether they are desktop, mobile or web, using either their preferred email (direct login), their company ID (domain login) or their favourite social ID (social login).

The 10Duke Identity Bridge – a cloud-based service that provides Single Sign-On (SSO) capability for employees and contractors to seamlessly access multiple SaaS applications with the same username and password without the need to login separately to each service.

The 10Duke Entitlements – gives you control of the delivery and licensing of your applications; it provides an engine to dynamically create and manage the licenses you offer to customers and supports a wide variety of license models.

  • 1
  • 2