Category: Uncategorized

The First Building Block of a Strong Cyber Security Plan

by Justin Smith – Brite, President and COO An effective cyber security plan is an intricate web of tools and systems working together.  From firewalls and endpoints to on premise technology and the cloud, the security footprint is expanding and when it comes to securing it you have to start somewhere.  The somewhere? Visibility. Why…

Read More

5 Cyber Security Projects for Public Safety Departments

A cyber security plan and strategy – one essential element of an organization that wouldn’t make the list if I asked you to describe a public safety department. Whether it be police, fire or campus safety, there are a set of things that everyone would list out like patrol cars, radios, computers, interview rooms, body…

Read More

Proactively Mitigating the Effect of Disaster

Even a fire can’t halt the pace of business for BriteStar customers A disaster of any kind can take down a business in minutes.  Before the digital age, physical damage to a business’s operations was the main concern.  Now, as companies have become more reliant on IT infrastructure, damage to digital assets or disrupting access to those…

Read More

Securing a Network: Illumio’s PCE

If you’ve been following our previous posts, then you might have picked up on a trending topic that is critical in today’s security landscape. Visibility. In case you missed the other posts or just need a recap to jog your memory – if you don’t know what’s on your network (either device, application or user), then you can’t fully…

Read More

Securing a Network: Gain Control of Network Traffic

We’ve said it a million times, everyone has said it a million times – threats are evolving, networks are becoming more dynamic and traditional security approaches are no longer enough.  These days, the combination of the influx of connected devices and changes to networks, creates the necessity of having full visibility and the ability to take…

Read More

Securing a Network: Forescout’s Core Capabilities

A problem that plagues organization’s capability to achieve complete endpoint protection is the inability to identify every device connected to the network.  In other words, organizations struggle to achieve full visibility.  To help solve that problem, Forescout Technologies revolutionized device visibility with a proven process attained through agentless visibility.     As discussed in this post, device visibility is essential to…

Read More

Securing a Network: Agentless Visibility

In order to successfully secure a network, it requires multiple, simultaneous steps ranging from endpoint protection to managing a SIEM.  However, the simple fact is that a network cannot be fully secure if there are unknown connected devices or applications.  Therefore, gaining full visibility of the threat landscape is a critical component in combating the ever-evolving threat landscape.  …

Read More