Upon completion of a Symantec Endpoint Protection (SEP) health check and/or SEP14 upgrade readiness assessment, the next step is to perform the upgrade to version 14. Ensuring the current SEP implementation has been designed, implemented and managed in line with best practice is one of the foundational pillars of a solid cyber security strategy. Download […]
10 July 2017 Symantec Managing Director for the Pacific Region Ian McAdam joins Ronnie on the couch to discuss Symantec, current security trends in the industry, security threats, barriers to cyber security, the biggest mistakes people make around security, it’s future and more. SOME KEY POINTS IN THE VIDEO INCLUDE [3.15] Ian McAdam, Managing Director […]
Encryption keys and encryption key management are an important consideration when you are looking at implementing an encryption strategy. I will provide an overview of public key infrastructure (PKI) and pretty good privacy (PGP) key management. 1.1 PKI Key Management PKI is a centrally managed encryption strategy. The advantage to a PKI is that it […]
The use of public clouds is continuing to increase and information security professionals must understand the native security provided by the public cloud vendor and the gaps that must be filled by the end-user. Just as in the case of a physical data centre there is an expectation that public cloud providers maintain a certain […]
You know that feeling when you walk into a room and feel like something is watching you? You turn around and BAM there’s an enormous huntsman sitting on your wall. After you’re done freaking out, you wonder how long it’s been sitting there without your notice. Hackers are like that Huntsman spider. It’s a lot […]
For more information download the ATP brochure: advanced-threat-protection-network-ds-en Get in contact with Insentra today for all your security needs.