Raising the Bar on Cybersecurity: 10 New CounterACT® Features and Capabilities

Posted by & filed under Uncategorized.

Today’s blog is brought to you by our partner ForeScout.     Republished from ForeScout’s Blog Originally published on August 31, 2017 By Jennifer Geisler Vice President, Marketing Twitter: @GoGeisler   With the rapid influx and diversity of devices connecting to enterprise networks and the ever-evolving cybersecurity threat landscape, organizations are struggling to keep their physical… Read more »

ForeScout – More Than Your Average NAC

Posted by & filed under Security.

Today’s Brite Insight is brought to you by one of Brite’s certified ForeScout Engineers, Matt Ostrowski.  Matt specializes in unique ForeScout deployments and enjoys finding new ways to utilize the technology.    When people are first exposed to ForeScout, it is typically as a Network Access Control (NAC) solution. What is NAC? NAC is really… Read more »

Everybody Needs Something – Endpoint Security

Posted by & filed under Security.

Today’s blog is brought to you by Matt Dehond. Matt has been apart of Brite’s security team for over 2 years. Cyber-attacks have become the norm. Organizations are aware of the ongoing threats day in and day out, but there is an undeniably scary trend. Prevention of attacks should be the priority, but too many… Read more »

IoT: Securing the Unknown

Posted by & filed under BYOD, Security.

Today’s blog is brought to you by Matt Dehond.  Matt has been a part of Brite’s security team for 2 years.   Technology is an ever-changing field. The world has become more and more dependent on technology to get us through our daily tasks. While this has made life easier for most people and businesses, it also creates… Read more »

A New Wrinkle in Security Intelligence: The Power of Orchestration

Posted by & filed under Security.

Nervous system image

Reposted from ForeScout’s Blog | June 22, 2016 | By Pedro Abreu – Chief Strategy Officer   The human brain is an incredibly complex system that functions miraculously well when all of its components are working together as one unit. However, when something goes wrong and connections break down, as when a stroke occurs, the brain is no longer… Read more »

Managing the Flow of Devices (better then Lucy)

Posted by & filed under BYOD, Security.

If you are a fan of classic comedy television, you probably know this “I love Lucy” skit: In this situation, Lucy and Ethel have no problem with the slow trickle of chocolates, but the belt speeds up and the influx of Chocolates is just too great for the ladies, despite their creative efforts! As an… Read more »

See the forest for the Trees

Posted by & filed under Security.

The human nervous system includes 5 senses with a dedicated sensory system for each. While all important to our personal lives, Sight is probably most important in the professional lives of information security and technology staff. To make informed decisions, we need to See everything connected to the network and understand the meaning of critical… Read more »

How are you controlling BYOD devices?

Posted by & filed under BYOD, Security.

  Seeing is believing, control is even better. It is no secret that the number of connected devices has and will continuing to grow at an explosive rate.  Gartner estimates by 2020, the number of connected devices will exceed 20 billion. For me, it is pretty easy to believe their estimate.  Like most people, I… Read more »

Growing Threats of Bring Your Own Devices

Posted by & filed under BYOD.

Bring Your Own Devices (BYOD) concerns are growing as employees are using their personal devices in the workplace.  Previously, it was uncommon for someone to use a non-office appointed device, but now, according to a recent Ovum survey, nearly 70% of employees use personal devices in the workplace, while one third of this group are… Read more »

Combating BYOD Security Issues

Posted by & filed under Security.

Today, mobile devices come in all shapes and sizes, from smartphones, notebooks and tablets, to the new Smartwatch. While this mobility boosts efficiency through “anywhere, anytime access” to business systems it creates an equal amount of uncertainty and vulnerability for the organization. With 81% of employees currently using personal devices at work, security managers have… Read more »