Palo Alto Training with Savant Solutions

By Caleb Kwong | Dec 31, 2021 |
image of digits with "palo alto training"

While there are many resources available to choose from, not all training programs are created equal. Palo Alto Networks (PAN) is a world-renowned cybersecurity company lauded for their education and certifications. We offer a variety of educational courses and bundles for cybersecurity professionals seeking Palo Alto training.

Read More

How We Perform Cybersecurity Assessments

By Caleb Kwong | Dec 6, 2021 |
image of lock with "how we perform cybersecurity assessments"

Cybersecurity is no longer optional for modern organizations. However, it’s hard to know what you need without knowing where you already are. This is why, at Savant Solutions, we are proud to offer comprehensive cybersecurity assessments for our clients. This process can help your team gain a deeper understanding into where their systems are most protected and most vulnerable from cyberattacks.  

Read More

Top 5 Cybersecurity Best Practices

By Caleb Kwong | Nov 1, 2021 |
image of text "cybersecurity awareness month"

October was Cybersecurity Awareness Month. While it’s always important to have good technology habits, it’s now more critical than ever. Cybercrime is on the rise around the world, and nobody wants to be a target. Criminals will try just about anything to gain unauthorized access to accounts and a single breach can leave anyone scrambling to recover. Sadly, cybersecurity best practices are…

Read More

Why You Should Consider Zero Standing Privilege

By Caleb Kwong | Sep 27, 2021 |
pixelized locks in blue

For large companies, one compromised account can endanger an entire network. The solution is a Zero Standing Privilege model.

Read More

Cohesity’s Modern Backup and Recovery Approach

By Caleb Kwong | Aug 23, 2021 |
graphic of files for download

Data is any modern enterprise’s most precious digital resource and, like any other valuable asset, it should be securely accessible at all times. Unfortunately, this valuable resource often becomes a costly and risky liability when mishandled. Data management service providers now face an ever-growing abundance of data fragmentation across different sources, silos, clouds, and software applications. Industry-leading cybersecurity firm Cohesity brings remarkable innovation to data backup, recovery, and fragmentation with their comprehensive solutions DataPlatform and DataProtect. We have…

Read More

Palo Alto’s Cortex XDR Solution

By Caleb Kwong | Jul 20, 2021 |
Savant Logo with laptop and phone in background

Having Extended Detection and Response (XDR) technology can provide holistic visibility so your team is not overwhelmed with alerts and various silos of security programs. Here are the various benefits of this type of cybersecurity technology:

Read More

Network Access Control and Mobile Enterprise

By Caleb Kwong | Jun 30, 2021 |
Savant Logo with laptop and phone in background

Network Access Control (NAC) policies tend to be more robust and flexible than traditional edge-focused control protocols. We have chosen to explore in detail a few key components of Aruba’s award-winning ClearPass NAC platform as it pertains to mobile enterprise.

Read More

The Benefits of Managed Detection and Response Solutions

By Caleb Kwong | May 18, 2021 |
Man looking at network informaiton

Data breaches can lead to numerous business risks, such as system downtime, equipment failure, or even legal consequences. Outsourcing key technical duties to trained industry experts provides organizations an affordable alternative to staffing, training, and maintaining their own internal information technology (IT) departments.

Read More

The Top Threats to the Cloud – Azure & the AWS

By Caleb Kwong | Mar 16, 2021 |
Finger pointing at lock

In these uncertain times, especially with that of COVID-19, many businesses across Corporate America are looking for new alternatives in which to not only protect their digital assets, but also their IT/Network infrastructures.  Because of this, they are now moving entirely to a Cloud-based platform, making use of the juggernauts known as Azure and the…

Read More

The Impacts of Compromised Credentials

By Caleb Kwong | Mar 3, 2021 |
hand with cell phone

Cyberattackers are not interested in finding targets en masse, but rather, they are now interested in selecting just a few and finding their weakest spots.

Read More