Author: Ganesh Umapathy

Ganesh Umapathy

About: Ganesh Umapathy

Website
https://www.sonicwall.com/
Profile
Ganesh is the Product Marketing Manager for SMA product line, where he drives go-to-market strategies, product marketing lifecycle and sales enablement. Ganesh has over 8 years of experience working in the technology industry. His previous roles include Product Management and Marketing consultant for fortune 500 companies. He has also worked in various capacities ranging from a software engineer to a IT consultant. Ganesh holds an MBA from University of Washington, Seattle and a bachelor’s degree in electronics & instrumentation engineering from India.
As we know, email is the most popular attack vector used by threat actors to carry out targeted cyber attacks. In fact, more than 90 percent of cyber attacks start with a phishing email campaign. It is the easiest way for a cyber criminal to enter a network and execute tactics to accomplish an objective — be it data exfiltration, delivering a malicious payload or phishing for credentials.
FacebookTwitterGoogle+LinkedIn
Email is vital to business communications and operations. However, as the volume of email increases, so too does the amount of ransomware, phishing, business email compromise (BEC), spoofing, spam and virus attacks. What’s more, government regulations (e.g., PCI, HIPAA, GDPR, etc.) now hold your business accountable for protecting confidential data, ensuring it is not leaked and supporting the secure exchange of email that contains sensitive customer data or confidential information.
FacebookTwitterGoogle+LinkedIn
Moving to the cloud and enabling mobility are top IT priorities for organizations of all sizes. Today, most business have adopted a hybrid IT model, which includes legacy on-premise applications in local data centers and popular SaaS applications hosted in the cloud. Securing this hybrid IT environment, while providing a consistent experience — with anytime, any device, any application access to authenticated users — remains a key challenge for the IT department.
FacebookTwitterGoogle+LinkedIn
On May 25, 2018, the European Union (EU) will introduce its General Data Protection Regulation (GDPR). The GDPR is a set of regulations meant to protect personal data of EU residents, and enforces data privacy rules on how organizations collect, store and use the information. Failure to comply with the EU GDPR regulation carries heavy penalties including fines of up to €20 Million or 4 percent of global turnover.
FacebookTwitterGoogle+LinkedIn
Email security has become a big concern for organizations, thanks to phishing campaigns that deliver ransomware. Recently, there has been no shortage of notable cyber attacks. The Google Docs attack, Docusign phishing attack, Gannet phishing attack, and Jaff ransomware and its variants were all delivered through phishing emails.  Most recently, the WannaCry ransomware attack was spread through an SMB vulnerability.
FacebookTwitterGoogle+LinkedIn
SMA OS 8.6
Smartphones, laptops and internet connectivity have become necessities of life. We move around with powerful computing devices in our pockets or backpacks. This “on-the-go” lifestyle has transformed the way we work. Employees today want on demand access to resources and the ability to be productive from anywhere.  Organizations too are embracing cloud and mobile, and allowing employees to use their personal devices for work.
FacebookTwitterGoogle+LinkedIn
Email has been around since the 1970s. Today, everyone and every business uses email for their communications. To put things in perspective, according to Radicati group – 122 business emails were sent and received per user per day in 2015! That is a lot of email for humans to process without making a bad judgement call.
FacebookTwitterGoogle+LinkedIn
We are midway through the shopping season this year and already online retail shopping is having record sales. According to Adobe, final numbers indicate that Black Friday surpassed estimates, with $3.34 billion – 21.6 percent growth, year-over-year. Mobile accounted for $1.2 billion, a 33 percent increase from the year before. Gartner predicts that 70 percent of mobile employees will use their personal smart devices to conduct work by 2018.
FacebookTwitterGoogle+LinkedIn
The way business professionals work has changed dramatically over the last several years, and continues to at an ever-growing rate. They are on the go and working from different locations across all hours using many devices to allow for a work/life balance. We have become an “always-on” society. Workers are also doing more work remotely, whether it be at a coffee shop, on the train to work, or on a business trip from a hotel room.
FacebookTwitterGoogle+LinkedIn
Secure Mobile Access
The exponential proliferation of mobile devices in the workplace, both employer issued and personally owned, has increased the demand on businesses to enable secure mobile access to company applications, data and resources. Often, mobile users are using the same device for both business and personal use, resulting in the intermingling of business and personal data and applications.
FacebookTwitterGoogle+LinkedIn