Cohesity’s Modern Backup and Recovery Approach

graphic of files for download

Data is any modern enterprise’s most precious digital resource and, like any other valuable asset, it should be securely accessible at all times. Unfortunately, this valuable resource often becomes a costly and risky liability when mishandled. Data management service providers now face an ever-growing abundance of data fragmentation across different sources, silos, clouds, and software applications. Industry-leading cybersecurity firm Cohesity brings remarkable innovation to data backup, recovery, and fragmentation with their comprehensive solutions DataPlatform and DataProtect. We have…

Read More

Palo Alto’s Cortex XDR Solution

Savant Logo with laptop and phone in background

Having Extended Detection and Response (XDR) technology can provide holistic visibility so your team is not overwhelmed with alerts and various silos of security programs. Here are the various benefits of this type of cybersecurity technology:

Read More

Network Access Control and Mobile Enterprise

Savant Logo with laptop and phone in background

Network Access Control (NAC) policies tend to be more robust and flexible than traditional edge-focused control protocols. We have chosen to explore in detail a few key components of Aruba’s award-winning ClearPass NAC platform as it pertains to mobile enterprise.

Read More

The Benefits of Managed Detection and Response Solutions

Man looking at network informaiton

Data breaches can lead to numerous business risks, such as system downtime, equipment failure, or even legal consequences. Outsourcing key technical duties to trained industry experts provides organizations an affordable alternative to staffing, training, and maintaining their own internal information technology (IT) departments.

Read More

The Top Threats to the Cloud – Azure & the AWS

Finger pointing at lock

In these uncertain times, especially with that of COVID-19, many businesses across Corporate America are looking for new alternatives in which to not only protect their digital assets, but also their IT/Network infrastructures.  Because of this, they are now moving entirely to a Cloud-based platform, making use of the juggernauts known as Azure and the…

Read More

The Zero Trust Framework

Introduction As we see the number of COVID19 cases spike out of control, the concept of the remote workforce is going to be around for a long time to come, most likely even into early 2022.  With this in mind, many businesses are now thoroughly assessing and taking stock of what they can do to…

Read More

The Impacts of Phishing During COVID19

BEC

Introduction There is no doubt that the COVID19 Pandemic has turned this world upside down, to degrees and proportions that have never seen before.  This is especially true from the standpoint of Cybersecurity.  While the threat landscape has been changing even well before all of this hit, it has exploded into new frontiers that are…

Read More