Quantcast
Channel: Best Practices – Cloud Access
Browsing all 13 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

How do you eat a network security elephant?

One byte at a time. Now before you roll your eyes at my stupid pun, consider the deeper wisdom to this IT twist on an very old adage. Security is big. It encompasses a great many definitions, confronts...

View Article



Image may be NSFW.
Clik here to view.

Continuous monitoring is enough for compliance, but ISN’T enough for securing...

Every 4,000 miles or so I bring my car into have the oil changed, the brakes checked and tires rotated. Why? Because I know if I leave it to chance, at some point down the road something much more...

View Article

Image may be NSFW.
Clik here to view.

Mirror Mirror: the difference between Identity Management & Access Management

One of the biggest misconceptions in cloud security is the perception that identity management (IDaaS) and access management (SSO) are the same thing. They’re not. And it took a viewing of the famous...

View Article

What retailer BCBGMAXAZRIA learned about cloud security, SIEM

The following is an excerpt of the recently released case study on how a major retailer, BCBG, migrated to a cloud security platform and discovered how SIEM and Log Management capabilities enhanced...

View Article

Image may be NSFW.
Clik here to view.

Beyond building houses, homebuilders faced with IT security challenges too

Just as home builders across the country install state of the art security and anti-theft devices in many of the beautiful new homes they build, this consideration must extend to the personal and...

View Article


Image may be NSFW.
Clik here to view.

Analyzing the Top 10 benefits of Unified Security from the cloud (Part 1)

Of all the strategies and tactics available to prevent breaches, deter data leakage and theft, control access and secure beyond the so-called network perimeter, the one that is emerging as an...

View Article

Image may be NSFW.
Clik here to view.

Analyzing the Top 10 benefits of Unified Security from the cloud (Part 2)

If you missed Part 1: read it HERE More than security from the cloud, the concept of unified security takes the method another step forward in terms of best practices—the ability to deploy a holistic...

View Article

Unified Security: Avoid becoming a statistic

http://www.cloudaccess.com/wp-content/uploads/2013/10/CloudAccess_UnifiedSecurity_wmv.wmv Take 3 minutes to learn why this best practice is not only the next evolutionary step in IT security...

View Article


Image may be NSFW.
Clik here to view.

SECM vs SIEM—not more alphabet soup, but new proactive, integrated cloud...

Forrester Research’s recent white paper, called Security’s Cloud Revolution identified a new generation of protection best practices that expands the boundaries of traditional IT security solutions by...

View Article


Image may be NSFW.
Clik here to view.

CloudAccess wins prestigious 2015 Red Herring Top 100 Award

SAN DIEGO, CA – June 3, 2015 – Red Herring announced CloudAccess, a leading enterprise security solution developer, as its Top 100 North America award winner during special award ceremony in San...

View Article

Image may be NSFW.
Clik here to view.

4 Best Practices for Today’s Log Management

Log management has long been considered a staple of most organization’s security platforms. It is the foundation for threat detection, data analytics and compliance audits. It provides the definitive...

View Article

Image may be NSFW.
Clik here to view.

The Secret Sauce to User Provisioning

If you want the secret to user provisioning and de-provisioning in an enterprise setting, I’ll give you the one word answer, and then you can get on with the rest of your day… Integration. However, if...

View Article

Image may be NSFW.
Clik here to view.

Enterprise Security Magazine: Enabling a Holistic View of Security

This is a reprinted article from June 2018 edition of Enterprise Security Magazine. You can see the electronic version of this issue HERE The cloud-based security industry is exploding as businesses...

View Article

Browsing all 13 articles
Browse latest View live




Latest Images