OUR BLOG

Arctic Wolf MDR

By Caleb Kwong | May 27, 2022 |
image of wolf howling at moon

Arctic Wolf’s cutting-edge managed detection and response (MDR) solution offers 24/7 real-time incident response and containment. We’re reviewing some of the main benefits of this system.

Read More

CMMC 2.0: A New Federal Standard

By Caleb Kwong | Apr 29, 2022 |
image of shield with lock

The US Department of Defense (DoD) knows cyber security is critical. DoD contractors are a major target of frequent, complex attacks. In 2020, the DoD started the Cybersecurity Maturity Model Certification (CMMC) program. This sought to combat threats and protect data with rules, training, and assessments. In March 2021, the DoD reviewed and refined CMMC…

Read More

What is Proofpoint?

By Caleb Kwong | Mar 29, 2022 |
image of cityscape with lock over it

Criminals know the easiest way into your company is through its staff. They use many tactics to gain access to data and accounts. Email is the main attack vector targeting users with admin access. In fact, over 90% of attacks start with an email, according to a recent report from Verizon. Experts at Proofpoint know…

Read More

Infoblox and DNS Security

By Caleb Kwong | Feb 28, 2022 |
image of person with hand on computer mouse

Data breaches are common threats facing today’s companies. They occur for many reasons, from user error to bad actors. It’s crucial to protect systems from breaches to avoid lost data, clients, and revenue. Best practices go a long way in cutting breaches linked to human error. Although, key frameworks such as the Domain Name System…

Read More

Ping Identity Custom IAM Solutions

By Caleb Kwong | Feb 10, 2022 |
tech image with "ping identity custom IAM solutions"

Today’s businesses are adjusting to shifting models and expectations. Remote work and cloud applications both present great opportunities for growth, as well as challenges to security. The wrong decision in these instances can severely impact costs, risks, revenue, and complexity. Successful organizations employ automated systems which enhance their data protection, user control, and overall flexibility

Read More

Palo Alto Training with Savant Solutions

By Caleb Kwong | Dec 31, 2021 |
image of digits with "palo alto training"

While there are many resources available to choose from, not all training programs are created equal. Palo Alto Networks (PAN) is a world-renowned cybersecurity company lauded for their education and certifications. We offer a variety of educational courses and bundles for cybersecurity professionals seeking Palo Alto training.

Read More

How We Perform Cybersecurity Assessments

By Caleb Kwong | Dec 6, 2021 |
image of lock with "how we perform cybersecurity assessments"

Cybersecurity is no longer optional for modern organizations. However, it’s hard to know what you need without knowing where you already are. This is why, at Savant Solutions, we are proud to offer comprehensive cybersecurity assessments for our clients. This process can help your team gain a deeper understanding into where their systems are most protected and most vulnerable from cyberattacks.  

Read More

Top 5 Cybersecurity Best Practices

By Caleb Kwong | Nov 1, 2021 |
image of text "cybersecurity awareness month"

October was Cybersecurity Awareness Month. While it’s always important to have good technology habits, it’s now more critical than ever. Cybercrime is on the rise around the world, and nobody wants to be a target. Criminals will try just about anything to gain unauthorized access to accounts and a single breach can leave anyone scrambling to recover. Sadly, cybersecurity best practices are…

Read More

Why You Should Consider Zero Standing Privilege

By Caleb Kwong | Sep 27, 2021 |
pixelized locks in blue

For large companies, one compromised account can endanger an entire network. The solution is a Zero Standing Privilege model.

Read More

Cohesity’s Modern Backup and Recovery Approach

By Caleb Kwong | Aug 23, 2021 |
graphic of files for download

Data is any modern enterprise’s most precious digital resource and, like any other valuable asset, it should be securely accessible at all times. Unfortunately, this valuable resource often becomes a costly and risky liability when mishandled. Data management service providers now face an ever-growing abundance of data fragmentation across different sources, silos, clouds, and software applications. Industry-leading cybersecurity firm Cohesity brings remarkable innovation to data backup, recovery, and fragmentation with their comprehensive solutions DataPlatform and DataProtect. We have…

Read More