Security and Trust

By John Stewart I’m proud to say that Cisco has joined other leading technology companies in an amicus brief arguing that the U.S. Government exceeded existing law in its demand that Apple write software to allow unlocking of the iPhone used by one of the San Bernardino terrorists. The brief argues that a vague, 225-year old statute – the All Writs act – should not be the basis for an open-ended government ability to demand that a company change its products. It also articulates that []

Source:: Cisco Security Notice

Security and Trust

By John Stewart I’m proud to say that Cisco has joined other leading technology companies in an amicus brief arguing that the U.S. Government exceeded existing law in its demand that Apple write software to allow unlocking of the iPhone used by one of the San Bernardino terrorists. The brief argues that a vague, 225-year old statute – the All Writs act – should not be the basis for an open-ended government ability to demand that a company change its products. It also articulates that []

Source:: Cisco Security Notice

Walking the Tightrope of Security and Usability

By Khelan Bhatt Here at the RSA Conference 2016, the theme this year is Connect to Protect. It is a fitting theme for a gathering of security professionals, given the widespread adoption of cloud and mobile technologies that make doing business and sharing information easier than ever. The need for securing data regardless of where it resides and is consumed thus becomes paramount. In my recent discussions with fellow conference attendees, a common thread has emerged: a major impediment to protecting data in []

Source:: Cisco Security Notice

Walking the Tightrope of Security and Usability

By Khelan Bhatt Here at the RSA Conference 2016, the theme this year is Connect to Protect. It is a fitting theme for a gathering of security professionals, given the widespread adoption of cloud and mobile technologies that make doing business and sharing information easier than ever. The need for securing data regardless of where it resides and is consumed thus becomes paramount. In my recent discussions with fellow conference attendees, a common thread has emerged: a major impediment to protecting data in []

Source:: Cisco Security Notice

Oberberg-Online wird 20 – Gewinnspiel März

Oberberg-Online wird 20 – Gewinnspiel März

Auf zur zweiten Gewinnspielrunde in unserem Jubiläumsjahr. Im März gibt es 5 mal je ein USB-Headset h340 von Logitech zu gewinnen.

Seit 20 Jahren sind wir der IT- und TK-Dienstleister und Lösungsanbieter für den Mittelstand im Bergischen Land.

Unser Jubiläumsgewinnspiel bietet bis zur Jubiläumsveranstaltung im Oktober monatlich die Möglichkeit, attraktive Preise zu erhalten. Auf unserer Webseite wird die jeweilige Spielrunde angekündigt und mit der korrekten Beantwortung der Gewinnspielfrage landen Sie auch schon im Lostopf des jeweiligen Monats. Alle Fragen lassen sich mit Hilfe unserer Webseite beantworten. Die Lösung findet man z.B. im Bereich unserer Technologiepartner.

Los geht´s hier: Oberberg-Online Jubiläumsgewinnspiel

Digitization Compels a Fresh Approach to Network Security

By Andrew Peters We know that organizations today must digitize to thrive, with the CIO and IT teams at the helm of the transformational journey. Why does this matter? Because businesses must find ways to deliver more modern business operations as well as satisfying customer and workplace experiences or quickly fall behind their digitized competitors. This digital transformation needs technology platforms made for digital business to bring-out new applications faster, make IT quicker and simpler – and of course do this all securely. []

Source:: Cisco Security Notice

Digitization Compels a Fresh Approach to Network Security

By Andrew Peters We know that organizations today must digitize to thrive, with the CIO and IT teams at the helm of the transformational journey. Why does this matter? Because businesses must find ways to deliver more modern business operations as well as satisfying customer and workplace experiences or quickly fall behind their digitized competitors. This digital transformation needs technology platforms made for digital business to bring-out new applications faster, make IT quicker and simpler – and of course do this all securely. []

Source:: Cisco Security Notice

Cisco Firepower Management Center Brings Security Into Focus

By Joseph O’Laughlin IT Teams gain insight and focus with the industry’s most comprehensive NGFW management – before, during and after attacks. As we discussed in our last two posts, most organizations today secure their networks using disparate technologies that are unable to work together. Legacy NGFWs are not threat-focused but rather focused rather on controlling applications. Nor are they fully integrated from a security perspective (which we covered in our last post ) or from a management perspective, which we’ll tackle in this post. In order to []

Source:: Cisco Security Notice