Achieving Government Cybersecurity Compliance – NIST

Over the past few years, there has been much attention paid in the technology security trade press to the need for companies to become “NIST SP 800-171 Compliant.” Much of this has focused on the need for compliance to be achieved by the end of December 2017. However, with the deadline now 6 months behind [...]

2018-07-16T17:06:28+00:00July 16th, 2018|Tags: , |

Genians wins Cisco Hackcamp 2018!

Genians’ Next-Gen Network Access Control solutions enhance Cisco’s DNA framework We’re very pleased to announce that Team Genians has just won first place at the Cisco Hackcamp 2018 competition on May 25th, 2018, in Seoul, South Korea. As part of Cisco’s “DevNet” program, the purpose of Hackcamp is to bring together and challenge advanced developers from [...]

2018-06-22T14:57:24+00:00May 29th, 2018|Tags: , , , |

Part II – Empower Your IT/OT Convergence with Genians Next-Gen NAC Capabilities

Converging and integrating OT and IT therefore often requires a “modernization” effort to bring legacy OT systems up-to-date so they can safely be connected to an enterprise’s network without compromising overall systems availability and business continuity. Most legacy OT systems will require some level of upgrading or outright replacement in order to be manageable, secure, [...]

2018-05-22T08:19:31+00:00May 9th, 2018|Tags: , |

Part 1 – The age-old separation of IT and OT (Operational Technology) has begun to erode with the emergence of IoT

Over the past few years, we have heard a great deal about the rapidly emerging revolution in the Internet of Things (IoT). Indeed, major analysts like Gartner and Forrester have predicted that we are now in the process of moving from some 10 billion network-connected IoT devices to approximately 25 billion in the next 3 [...]

2018-05-22T08:19:51+00:00May 8th, 2018|Tags: , |

Genians helps global bank secure all enterprise endpoint devices

With Genians, this global bank achieves optimal visibility for all IP-enabled devices across its branches in 24 countries, where it consistently ensures the highest levels of systems security, availability, and regulatory compliance. Background & Requirements This customer is a large financial services company with more than 1,000 branch locations across the United States, [...]

2018-05-09T17:14:03+00:00May 7th, 2018|

Genians helps nationwide postal system fully automate IT security

With Genians, Korea’s major postal services now manage network access far more securely and productively Background & Requirements South Korea’s postal system is comprised of two major divisions, many affiliated agencies, and several thousand regional offices across the country. This large, highly-distributed organization is required to ensure the highest levels of security and [...]

2018-05-09T17:10:11+00:00April 15th, 2018|

Genians helps world’s largest shipbuilder become more secure

With Genians, the largest shipbuilding enterprise in the world now maintains consistent cybersecurity policy management, enforcement, remediation, and auditing to secure their internal network resources Background & Requirements The world’s largest shipbuilding company was experiencing challenges in viewing and controlling all aspects of their global enterprise network infrastructure. Even though the company had [...]

2018-05-09T17:10:12+00:00March 15th, 2018|

Next Generation of NAC Capabilities

As the challenges identified above manifest themselves increasingly, NAC platforms will need to be highly responsive to marketplace dynamics and the overall threat landscape – and accordingly innovative as well. The essential characteristics required of NAC technology going forward is that it provides enterprises with the flexibility required for them to carry out their business [...]

2018-05-09T17:17:40+00:00January 22nd, 2018|

Why Still Network Access Control (NAC)?

Network-connected end devices remain a major cybersecurity point of vulnerability. Network Access Control (NAC) technology provides the ability to lock down network access in a way and to an extent that no other cyber defense product category does. Cyber threats in today’s enterprises are focused on multiple attack surfaces across the entire range of network-connected [...]

2018-05-09T17:19:16+00:00January 8th, 2018|

What is Network Access Control?

One of the first business barometers you can use to see how important a technology solution is to your organization is demand. While there are exceptions, chances are that if the best practices of companies guide them to adoption of a certain IT product or service, or of transition to a new adoption model (such as [...]

2018-05-09T17:19:42+00:00January 1st, 2018|