Tag: Encryption

Times are extremely restless for security teams as they face highly motivated adversaries, and the onslaught of very active and progressive cyber-attacks.  Today’s hacking techniques are stealthy, unpredictable in nature and waged by skillful attackers capable of developing innovative ways of circumventing security defenses. One new and more popular way that is becoming a status quo among malware writers today is the malicious use of encryption.

FacebookTwitterGoogle+LinkedIn

When the SonicWall community separated from Dell and announced our SecureFirst Partner Program 150 Days ago, we confirmed our commitment to 100 percent fulfillment through channel partners. Since then, more than 10,000 partners across 90 countries have registered as SonicWall resellers, including 2,000 new partners.

I cite these statistics not only as a testament to the global reach of SonicWall’s solutions but as a reminder of the heightened security landscape that causes businesses to seek out our partners and solutions in the first place.

FacebookTwitterGoogle+LinkedIn

Summertime means different things to different people. Whether it be kids enjoying time off from school, or parents taking long family vacations, summertime gives everyone an opportunity to re-energize and re-focus.

Everyone that is “¦ including hackers.

Threats to your infrastructure don’t take a vacation, and if you’re entrusted with securing your organization email, it’s important to not leave your guard down during these warm summer days.

FacebookTwitterGoogle+LinkedIn

Summertime means different things to different people. Whether it be kids enjoying time off from school, or parents taking long family vacations, summertime gives everyone an opportunity to re-energize and re-focus.

Everyone that is “¦ including hackers.

Threats to your infrastructure don’t take a vacation, and if you’re entrusted with securing your organization email, it’s important to not leave your guard down during these warm summer days.

FacebookTwitterGoogle+LinkedIn

If you’re like the majority of internet users, you mostly access the internet from your mobile devices. And by the way, so do your customers. In fact, 2014 was the year that mobile traffic exceeded legacy PC traffic on the internet. Business success, now more than ever, requires that you provide a great, mobile user experience, Email continues to be a key communication tool for business.

FacebookTwitterGoogle+LinkedIn

Protecting sensitive or confidential data is not just good business. For some, it’s legally required and subject to audit. For example, HIPAA regulations require organizations to take reasonable steps to ensure the confidentiality of all communications that contain patient or customer information. Health service providers and their business associates and contractors who touch or handle Protected Health Information (PHI) are subject to these rules.

FacebookTwitterGoogle+LinkedIn