Category: Security

Cyber Security Awareness Month

Your 2019 Cheat Sheet   National Cyber Security Awareness Month is the perfect time to take a step back and assess cyber security habits and practices.  But rather than having to dig through hundreds of articles, we put together your 2019 Cyber Security Awareness Month cheat sheet.   Before we jump in, remember that there are plenty of…

Read More

IT Security: The Process That Never Stops

by David D’Agostino, VP of Operations People, process and technology, when optimized together, are the three keys to improved IT security. To take it a step further, a successful security program is not one with an end-state, but rather one that is approached as a continuous, orchestrated journey.  Over time following a path will lead…

Read More

Infrastructure Move Supports Growing Company

GP Flooring Solutions Mitigates IT Downtime During Office Move with Proactive Planning An office is more than just a building. It provides space to create culture, build camaraderie, encourage collaboration and ultimately conduct business operations. As a company grows, it often finds the need to move facilities, triggering an onslaught of logistical challenges. While the…

Read More

The First Building Block of a Strong Cyber Security Plan

by Justin Smith – Brite, President and COO An effective cyber security plan is an intricate web of tools and systems working together.  From firewalls and endpoints to on premise technology and the cloud, the security footprint is expanding and when it comes to securing it you have to start somewhere.  The somewhere? Visibility. Why…

Read More

Proactively Mitigating the Effect of Disaster

Even a fire can’t halt the pace of business for BriteStar customers A disaster of any kind can take down a business in minutes.  Before the digital age, physical damage to a business’s operations was the main concern.  Now, as companies have become more reliant on IT infrastructure, damage to digital assets or disrupting access to those…

Read More

Securing a Network: Gain Control of Network Traffic

We’ve said it a million times, everyone has said it a million times – threats are evolving, networks are becoming more dynamic and traditional security approaches are no longer enough.  These days, the combination of the influx of connected devices and changes to networks, creates the necessity of having full visibility and the ability to take…

Read More

Securing a Network: Forescout’s Core Capabilities

A problem that plagues organization’s capability to achieve complete endpoint protection is the inability to identify every device connected to the network.  In other words, organizations struggle to achieve full visibility.  To help solve that problem, Forescout Technologies revolutionized device visibility with a proven process attained through agentless visibility.     As discussed in this post, device visibility is essential to…

Read More

Securing a Network: Agentless Visibility

In order to successfully secure a network, it requires multiple, simultaneous steps ranging from endpoint protection to managing a SIEM.  However, the simple fact is that a network cannot be fully secure if there are unknown connected devices or applications.  Therefore, gaining full visibility of the threat landscape is a critical component in combating the ever-evolving threat landscape.  …

Read More