News & Articles - Page 78
Channel Strong Positive Vibes Tour Hitting the Road Again
The multivendor, traveling event is prepping for 10 stops through the Midwest in May.
Sophos Introduces XDR Solution
The new product, unveiled alongside a cross-vendor security framework, combines data from multiple Sophos and third-party systems to identify and block sophisticated attacks that any one of those platforms might miss on its own.
Public-Private Task Force Issues Framework for War on Ransomware
While that war is winnable, emphasizes Datto CISO Ryan Weeks (pictured), a task force contributor, it will take years of coordinated global effort plus either self-imposed or government-mandated MSP regulations.
Secure Remote Access Is a Zero-Trust Priority
Research from ESG finds zero trust implementation helped smooth the work-from-home transition.
Egnyte Introduces Governance Solution and Service for Mid-Market Businesses
The dashboard and associated health check service are designed to make inventorying security dangers, prioritizing them, devising solutions, and implementing safeguards simpler for companies that can’t afford the solutions that larger organizations use.
How MSPs Can Capitalize on Digital Transformation
Optimize services and the ISV ecosystem economic opportunity around technologies designed to help SMBs improve productivity and collaboration, while maintaining proper security and governance.
Expanding the Circle of Safety
CDN Technologies has a three-pronged approach to safety: protecting clients, employees, and the MSP business.
Trend Micro Revises Partner Program to Reward and Recruit Cloud-First Members
A new benefits structure is designed to establish parity between resellers of on-premises security products and the often younger, cloud-oriented partners Trend Micro needs to keep pace with accelerating adoption of cloud computing.
Sophos Ships Firewalls with High-Performance TLS Inspection
The vendor’s new XGS Series appliances contain a secondary processor that frees up capacity on the core CPU, enabling the devices to check encrypted traffic for hidden malware at dramatically faster speeds.
Phish’ Are ‘Friends,’ Not Food—How Phishers Are Posing as the Former
Phishing scams have gotten increasingly sophisticated during the pandemic, incorporating a personal targeted approach, social engineering, authentic-looking fake login pages, and more.