Posted about Security

Wanna Patch Or Wanna Cry?

There was an interesting article in Financial Times this week that explains why it takes companies so long to patch their systems.

It’s a shame to always have to hear from security professionals “if you would have installed this patch, this update, this version you wouldn’t have been compromised”.

So, how can we accelerate patching operations to avoid such damaging attacks that are so successful? Let’s have a look.

Read more

WannaCry is Only the Beginning: New Age of Growing Ransomware Attacks Requires Greater Organizational Vigilance

The WannaCry (WCry) ransomware is spreading across organizations’ desktops and servers around the globe faster than wildfire and impacting virtually every business function.

This Ransomware can propagate between desktops and servers and uses a recent exploit, which was patched by Microsoft on March 14, yet has been slow to be adopted by many organizations.

Read more

Are you Vulnerable to the WannaCry Ransomware?

There’s a very high likelihood that you are vulnerable to WannaCry (WCry) and you don’t even know it. This ransomware is spreading across many organizations’ desktops and servers around the globe faster than the plague and impeding on different business functions.

Read more

Nexthink for Continuous Compliance Validation

AdobeStock_32675300

Most organizations conduct some form of periodic security compliance and audit function. Sometimes the evaluation is done for internal purposes and sometimes a formal external audit is required. Regardless of which type of compliance audit you are required to perform, it is generally best practice to use an independent tool to verify that your processes and systems are in compliance with established polices and regulations.

Nexthink End-user IT Analytics allows you to define and monitor in real-time your compliance criteria across Windows, Mac OS and Mobile devices. Nexthink’s unique real-time analytics captures all executions and all network connections being made by your endpoints and provides new visibility and insight into security compliance within your environment.

Check out this demo showing how Nexthink is able to proactively uncover issues related to security and compliance and provides continuous real-time monitoring to ensure your your environment matches your acceptable risk profile.

Shine a Brighter Light on Security Using End-user Experience Monitoring and Analytics

AdobeStock_34643216

Organizations use a wide variety of tools to track and manage security in their environment. Many of these tools are great at aggregating log files and other data but require significant human effort to manually locate and troubleshoot potential security issues. The following video demonstrates just how easy it is to leverage end-user experience monitoring and analytics from Nexthink to quickly analyze and understand when and how endpoints have been compromised. Using unique visualizations, you will be able to understand the scope of a security breach and how it occurred. Using this same real-time data, you can easily find the clues that will help prevent the spread of attacks and intrusions to other systems. Nexthink enables security analysts and IT Ops to have quick access to essential data from the endpoint that makes it easier to prevent and resolve security issues.

Check out this demo showing how Nexthink is able to proactively uncover issues that are affecting your security posture.