We’ve Been Recognized by Gartner

We have good news to share. Gartner, a leading independent provider of IT advisory and market intelligence, has mentioned us in their first ever “Gartner, Market Guide for Data-Centric Audit and Protection (Lowans and Perkins, Nov. 2014)”. Gartner has given us a check mark in all five Data-Centric Audit and Protection (DCAP) categories: Data Discovery,…

Continue Reading

The Journey to File Permission Perfection  

More devices than ever. More platforms to choose from. An expanding universe of data choices that can be both exciting and confusing at the same time. Tablets, phablets, laptops, iOS, Android, Windows, UNIX/Linux file servers, and NAS devices. Add SharePoint, Dropbox, Google Drive, and LinkedIn to the mix. These are all awesome platforms for allowing…

Continue Reading

no access

They get it! Here are three organizations that understand privacy…

If we need any more evidence that insiders have WAY too much access to user data, click on over to BuzzFeed’s report on the internal security policy of 29 tech companies. The BuzzFeed writers directly asked these companies questions about internal privacy policies covering data entrusted to them by their users and subscribers. Many didn’t…

Continue Reading

campbell-logo

Varonis Keeps Client and Company Data Protected and Private at Campbell Global

Campbell Global is a leader in sustainable timberland and natural resource investment. The company manages approximately 3.1 million acres of land globally and about $6.1 billion in assets. Based in Portland, Oregon, its 300 employees are spread throughout 25 offices. The company critically needed a reliable way to closely document, track and manage activity associated…

Continue Reading

Interview With NYU-Poly’s Professor Justin Cappos: Security Lessons From Retail Breaches

I had the chance to talk with cyber security expert Justin Cappos last month about the recent breaches in the retail sector. Cappos is an Assistant Professor of Computer Science at NYU Polytechnic School of Engineering. He’s well known for his work on Stork, a software installation utility for cloud environments. In our discussion, Professor…

Continue Reading

Ticket_booth_at_Jenkinson's_Boardwalk_Amusement_Park

Microsoft Fixes Kerberos Silver Ticket Vulnerability

The Kerberos Golden Ticket already had a mythic status in the hacking world even before this summer’s Black Hat conference rolled around. In theory, a hacker could create a universal authentication ticket and lurk forever in an organization’s IT system.  The how-to-accomplish part, though, was always a little murky. At the conference a lot of…

Continue Reading

tidy room

Feng Shui Fabulous

Happy New Year! One way to celebrate 2015 with fresh, new energy is to implement Feng Shui. Feng Shui is a popular practice in many Asian households to balance the energies of a space: promoting health, wealth and good luck. An important element of Feng Shui is to get rid of clutter. Clutter creates confusion,…

Continue Reading

What Is Group Policy?

One of the most indispensable features of Active Directory is Group Policy. Group Policy is a feature that allows you to centralize user and computer settings throughout a network. For example, if you have 1,000 PCs and you don’t want to spend an eternity manually configuring the shutdown/logoff/restart options in the “Start” menu, you can…

Continue Reading

Egyptian-Chariot

99.99% Report Brakes Slowing Down Their Car

(.01% were moving too quickly to comment.) “The whole point of a car is so I can get where I’m going quickly. I just can’t understand why they put the brake pedal right next to the accelerator. And the brakes are merciless now. Whenever I step on them I stop almost immediately. What were they…

Continue Reading

ipswich logo

Ipswich Hospital Chooses DatAnywhere

Ipswich Hospital NHS Trust is a busy district general hospital in Suffolk, England. Its 3,500 employees serve the medical needs for a community of over 350,000 people. The Ipswich IT Team was recently faced with an information security challenge. How do you share sensitive, internal documents from the hospital file system with third-party organizations (insurance,…

Continue Reading