Genians helps world’s largest shipbuilder become more secure

With Genians, the largest shipbuilding enterprise in the world now maintains consistent cybersecurity policy management, enforcement, remediation, and auditing to secure their internal network resources Background & Requirements The world’s largest shipbuilding company was experiencing challenges in viewing and controlling all aspects of their global enterprise network infrastructure. Even though the company had [...]

2018-05-09T17:10:12+00:00March 15th, 2018|

Next Generation of NAC Capabilities

As the challenges identified above manifest themselves increasingly, NAC platforms will need to be highly responsive to marketplace dynamics and the overall threat landscape – and accordingly innovative as well. The essential characteristics required of NAC technology going forward is that it provides enterprises with the flexibility required for them to carry out their business [...]

2018-10-10T07:44:54+00:00January 22nd, 2018|

Why Still Network Access Control (NAC)?

Network-connected end devices remain a major cybersecurity point of vulnerability. Network Access Control (NAC) technology provides the ability to lock down network access in a way and to an extent that no other cyber defense product category does. Cyber threats in today’s enterprises are focused on multiple attack surfaces across the entire range of network-connected [...]

2018-05-09T17:19:16+00:00January 8th, 2018|

What is Network Access Control?

One of the first business barometers you can use to see how important a technology solution is to your organization is demand. While there are exceptions, chances are that if the best practices of companies guide them to adoption of a certain IT product or service, or of transition to a new adoption model (such as [...]

2018-05-09T17:19:42+00:00January 1st, 2018|

The Biggest Cybersecurity Threats are Coming from Inside

Whether your organization is a business or involved in government, one of the highest cost scenarios is when there is a security event that originates with an inside source like an employee or contractor. That’s because these people often have unfettered access to the most sensitive information while not being able to be properly tracked. [...]

2018-05-09T17:34:48+00:00September 14th, 2017|Tags: , |

Staying Ahead of the IoT Security Curve With Reimaged NAC

The dramatic influx of IoT and other network-connected devices requires a radical new approach to management and security Download Now International Data Corp. forecasts that approximately 80 billion devices will be connected to the Internet by 2020, up from 11 billion today. This flood of internet of things (IoT) is expected to transform [...]

2018-05-23T11:50:37+00:00August 3rd, 2017|Tags: |

Resolving IP Conflicts and Manage IP Addresses Securely

If you manage a network, you know that sometimes things don’t always go smoothly when it comes to identifying devices. One such difficult, and somewhat common, scenario is needing to manage duplicate IP addresses. An IP conflict can happen for a variety of reasons. When it does, it can cause issues regarding worker productivity by [...]

2018-05-09T17:35:44+00:00July 6th, 2017|Tags: , , , |

Prepare for GDPR By Fundamentally Enhancing Security Compliance with Network Access Control

Whether you’re managing IT for a small business just getting started or a major multinational corporation, there are two critical concerns that you have to meet: security and regulations. The two often go hand in hand, though security usually concerns itself with safeguarding your firm’s assets and customer information. Regulatory concerns are related to government [...]

2018-08-07T09:22:32+00:00June 12th, 2017|Tags: , |

Protect Your Network by Identifying Rogue Access Point

Ask any kind of IT professional what their greatest challenge is and they will probably answer with “uncertainty.” Uncertainty can be caused by many things. Predicting employee behavior is nearly impossible. Often times, the biggest security vulnerabilities are caused by someone inside the firm who meant well, but implemented a solution without understanding the risks [...]

2018-08-07T09:24:07+00:00June 2nd, 2017|Tags: , |

Identifying Device Platforms Can Lower the Risk of Ransomware Attacks

It’s rare that situations that involve the IT community at large break through into mainstream consciousness. If you are a CIO, business owner, or network manager, every day brings challenges related to the integrity and security of your network. The general public doesn't usually hear about what happens every day in the world of IT. [...]

2018-05-09T17:37:17+00:00May 19th, 2017|Tags: , , |