Masergy
Did you mean
implementation
Filter By Type

Search results

European Information Security Directive Looms Large for CISOs

Blog - Transforming IT

European Information Security Directivedavid.venable
January 19, 2016 - CISOs whose companies do business in Europe will soon have to review and in all probability update their security infrastructure and processes in response to the European Union’s Cyber-Security Directive that was released last month.

3 Ways That NFV Can Boost Network Security

Blog - Transforming IT

nfvray.watson
November 4, 2015 - In mid-October, the leading standards group ETSI declared that security in the Network Functions Virtualization (NFV) environment represents both a major challenge and enormous opportunity.

Time to Start Managing Cyber Security Risk

Blog - Transforming IT

david.venable
May 6, 2015 - The risk of cyber security threats is growing exponentially and failure to address it in a concerted way can result in serious consequences.

Additional Attack Vector Found for “Redirect to SMB” Vulnerability

Blog - Transforming IT

Security Alertcraig.dabreo
April 24, 2015 - Details on new attack vectors for an 18-year-old vulnerability called “Redirect to SMB” were recently published, which could allow an attacker to redirect the user to a malicious SMB server and steal user credentials.

SSL Needs to Go

Blog - Transforming IT

SSLdavid.venable
March 26, 2015 -

Endpoint Security: The Threat Stops Here

Blog - Transforming IT

Endpoint Protectioncraig.dabreo
February 19, 2015 - The last line of cyber security defense for most organizations is endpoint security. Virtually all customers deploy some form of antivirus and anti-malware software on PCs, laptops, mobile devices and their trusted computing base (TCB).

Understanding Cloud-based Unified Communications

Blog - Transforming IT

Cloud UCdean.manzoori
December 10, 2014 - Cloud-based unified communications is being widely adopted due to its ability to deliver cost savings and flexibility to businesses and their employees.

How Cloud-based Network Analytics Can Enhance Network Forensics

Blog - Transforming IT

Cloud-Based Network Analyticsjames.hilving
August 15, 2012 - Learn the critical lessons enterprise companies learn when they use a high-performance network with built-in analytics and granular control.

How Cloud Computing Changes the Role of IT

Blog - Transforming IT

Role of ITdavid
January 6, 2015 - Cloud computing requires IT staffs to take on the role of provisioning services, negotiating contracts and collaborating with users on app requirements.

Microsoft Warns of SandWorm and Other Zero-Day Vulnerabilities

Blog - Transforming IT

Security Alertcraig.dabreo
October 14, 2014 - Microsoft warns of SandWorm and other Windows zero-day vulnerabilities.

REQUEST A FREE CONSULTATION