Topic: Hardware - Page 43
Sophos Adds EDR Functionality to Intercept X
Available now through an early access program, the new addition to the vendor’s next-generation endpoint security solution allows users to analyze suspicious files and get targeted advice on responding to them from the SophosLabs threat intelligence database.
ASCII Success Summit Heads to New Jersey
The two-day educational and networking event touched on hot topics like the Internet of Things and and included business continuity lessons learned from Hurricane Harvey.
Enablement and Integration Are Next Steps for Continuum’s Security Strategy
Now that it’s launched security systems, Continuum plans to teach MSPs how to sell them and link them more tightly with its RMM product and outsourced help desk, according to Chief Revenue Officer Bob Kocis (pictured).
Device Authority and TeamViewer Partner to Improve Connectivity and Security in IoT
Device Authority and TeamViewer will together provide integrated connectivity, access management and data privacy for global IoT deployments at scale.
Continuum Rolls Out Compliance Management Tool and Security for Office 365
The compliance system lets MSPs assess, monitor, and produce reports for customers bound by the federal government’s HIPAA regulation. The Office 365 security capabilities extend protection previously available only for on-premises applications into the cloud.
Microsoft Showcases New VDI and Security Solutions at Ignite 2018
Two of many products announced at the vendor’s annual conference for IT pros, including several for IoT developers, the new virtual desktop and threat protection offerings are designed for use with the Microsoft 365 productivity and security bundle.
RapidFire Tools Adds Dark Web Scanning from ID Agent to Network Detective
Users of the popular vulnerability assessment tool now receive preliminary information about compromised user credentials at no additional cost. The integration is the first of roughly a dozen coming from ID Agent soon.
Global Study Finds Artificial Intelligence is Key Cybersecurity Weapon in the IoT Era
Research from Aruba and Ponemon Institute Shows Security Teams View Machine Learning and Network Visibility for Users and IoT Devices Essential for Battling Stealthy Threats Inside IT Infrastructures
Kaspersky Lab Report: IoT Malware Grew Three-Fold in H1 2018
Routers remain most popular attack vector, with DVRs, printers and washing machines also leveraged in IoT attacks
SolarWinds MSP Launches Threat Monitoring Service Program
The new offering, which arrives two months after the introduction of the vendor’s Threat Monitor product, is designed to connect MSP users of that system with carefully vetted providers of outsourced security operations center services.