Moving Beyond Proxies

Proxy deployments today have outlived their usefulness and practicality. They have joined a long list of legacy products, providing limited security functionality against today's advanced threats.

What mobile policy suits your organisation?

When should you ban personal mobile use? Is Choose your own device appropriate, or can you safely harness the cost savings of Bring Your Own Device? What about wearable technology? Is the issue the device, or the framework within which devices are used? Can security be moved to the data itself to minimise the impact of the access device? It depends what you want to protect and why. We look at the options and selection criteria.


Safeguarding the data when going mobile

Data security - at rest, on the device, on the server, or in transit - and the access to data on the network via mobile device, and potentially "Malicious mobile apps." We focus on the challenges and practical solutions.

Can a certificate improve security?

Security is a term commonly used in today's market place, but not all security is made equal. For many organisations, and for many vendors, security can mean many different things. Over the past few years a number of well known brands and institutions have been breached despite having had a high level of assurance that their corporate security was more than good enough.

Managing workforce mobile use

As employees increasingly have mobile access to the corporate network this webinar will discuss the steps organisations can take to minimise risk among their workforce and detail what a mobile device management policy should look like and how to enforce it.

Uncovering the threat: Uniting network and endpoint security for unmatched threat defence

When network and endpoint security solutions team up, the result is a strengthened security posture and full lifecycle solution to combat advanced threats.

Using client reputation to intelligently defend your web applications

A Web application firewall inspects requests and filters those that are deemed malicious. In comparison, Client Reputation focuses on the source of the request, and determines the extent to which that source has sent malicious requests in the past. This intelligence allows organisations to forecast intent and protect applications against Distributed Denial of Service and application layer attacks.

Sign up to our newsletters