Frank Ohlhorst - Article Archives - Page 1

VIPRE Cloud Brings Machine Learning to Next-Generation Anti-Malware

October 5, 2017
The latest iteration of VIPRE Cloud calls on the power of AI to deliver a comprehensive anti-malware system that eliminates many of the shortcomings of on-premise data security solutions.
READ MORE

Comodo AEP Eschews Tradition to Bring a New Level of Protection to the Enterprise

June 8, 2017
Comodo’s Advanced Endpoint Protection (AEP) brings AI-powered analysis and a default-deny containment approach to the enterprise.
READ MORE

Sophos Intercept X Brings an End to Ransomware

March 27, 2017
Intercept X from Sophos brings a bandolier of silver bullets to the ransomware fight, leaving cybercriminals scattering for cover.
READ MORE

TrackVia Combines Low-Code Apps with Security Best Practices

March 22, 2017
The drive to digital transformation encourages use of low-code application development platforms, but these tools often overlook security, leaving enterprises exposed to unknown threats. TrackVia injects security back into the application development equation using a low-code platform that speeds development yet institutes protection.
READ MORE

TopSpin Makes Intelligent Deception a Hacker's Worst Nightmare

March 14, 2017
Setting a trap using deceptive techniques may just snare many a hacker.
READ MORE

NetMotion Leverages Software-Defined Trend to Secure Mobile Devices

February 7, 2017
NetMotion Mobility combines provisioning, governance and security into a package any network admin could love.
READ MORE

Enforcing Password Complexity without Alienating Users

October 6, 2014
Protecting passwords from compromise is a challenge for IT managers, who must deal with attacks that aim to compromise systems while giving users the simplicity they want.
READ MORE

Free Tool Fights Advanced Evasion Techniques

September 2, 2014
AETs are designed to evade next generation firewalls. A free tool can help security admins identify potential weaknesses in firewalls.
READ MORE

Fighting Advanced Persistent Threats with Emulation

July 8, 2014
A layered approach to security is the key to fighting advanced persistent threats (APTs).
READ MORE

5 Free Tools for Compliance Management

June 23, 2014
Most IT pros consider compliance a hassle. Yet the tools of compliance can empower security technologies and simplify risk management. Better yet, some of those tools are free.
READ MORE

Application Performance Management Offers Security Benefits

May 22, 2014
Administrators use application performance management (APM) tools to meet ebbs and flows of demand. But few leverage the security benefits offered by APM solutions.
READ MORE

Packets' Place in Network Security

April 16, 2014
Enterprises have long relied on network monitoring tools to troubleshoot connectivity problems. The same tools have evolved into an important way to ensure networks are secure.
READ MORE

6 Steps for Fighting SQL Injection

March 25, 2014
Database usage is on the rise, as well as the applications that interconnect databases, meaning that SQL injection should still be a top concern for IT security pros.
READ MORE

SAML Promises to Boost Cloud Security

March 10, 2014
IT administrators are struggling to deal with the implications that cloud services have on security. SAML and related technologies such as single sign-on can help.
READ MORE

Virtual Appliances Boost Network Security

December 26, 2013
Unified security appliances help enterprises manage multiple security services, but keeping such devices up to date while incorporating scale is a challenge. Can virtualization help?
READ MORE