Infosec Cloud
Solutions. Services. Training.

June 2015 Update

We aim to provide you with a round-up of our latest offers and essential info to help increase your productivity and keep you secure.

2FA: When will you be using a Smart Watch to Authenticate?

Join us for an insight into the future of 2FA
We’ll discuss technology and market trends and share with you SecurEnvoy’s Tokenless Two Factor Authentication Roadmap.

apple-watch-6_1

 

 

 

 

 

 

Plus you’ll find out how users are currently deploying tokenless 2FA and the key challenges they are facing to achieve secure multi-factor authentication.

Event details:

Date: Thursday, 18th June 2015
Time: 1pm – 3.30pm, incl Buffet Lunch
Venue: Infinigate, London SE1 0UR

Email [email protected] to receive a copy of the full agenda.


Infosecurity Europe: 2nd – 4th June Olympia London

Europe’s number one information security event.

Featuring over 345 exhibiting vendors and services suppliers with the most diverse range of new products and services, an unrivalled education programme and over 15,000 industry professionals travelling from over 70 countries, it is the most important date in the calendar for Information Security professionals across Europe.

The Infosec Cloud team will be at the show this year and available to arrange vendor demos/meetings or just to meet for a coffee and a chat.

Please email [email protected] or call 01256 379970 to arrange to meet your Account Manager at the show. If you’ve not met the team yet, get in touch and we can help you plan your day.

Click Here for Free Registration >>

Note: Visitors not registered by 1st June (12:00pm BST) will be charged a £35 entrance fee.


Data Privacy – A Growing Concern among IT Pros

Dimension Data Report: The State of Data Privacy in 2015
Over 200 IT professional were surveyed for their opinion on the state of data privacy in enterprises.

Companies are certainly focused on securing data against external threats, but statistics show data privacy – ensuring that data isn’t misused, misappropriated, or publicly exposed by those who have authorised access – is a growing concern among IT pros.

You don’t need to be told about the urgency behind data privacy and security. Amid all the news about breaches and mishandled sensitive information, and your own business’ changing infrastructure, government regulations and data growth, it’s hard to keep up with the current state of the market — and what you need to do to stay ahead.

According to a recent survey by Dimensional Research, 93% of businesses are challenged by data privacy.

This Druva-sponsored survey of IT professionals responsible for corporate data in their organisations sheds light on attitudes, approaches, and challenges around ensuring the privacy of sensitive business and customer data.

Find out how enterprises rate their own ability to protect data and what they’re doing (or not doing) about it in the report. Email [email protected] to receive a copy of the report.


For more information or impartial advice, please email: [email protected] or call 01256 379970

 

Gartner Magic Quadrant: Wired and Wireless LAN Access Infrastructure

In this report Gartner evaluate a variety of LAN vendors providing converged access layer connectivity.

“Vendors are increasingly able to provide integrated hardware and network application solutions. Enterprises are expanding how users connect to the infrastructure, and vendors are providing new ways to differentiate.”

MQ_Wired-and-Wireless-LAN-Access-Infrastructure_2014

 

 

 

 

 

 

 

 


From the Gartner Report:

Today, the access layer market continues to evolve from two separate decisions, one being wired and the other being wireless, to a single unified access layer decision. Organizations continue to express a desire for a unified wired/WLAN access infrastructure in which the access is user-centric and incorporates location, time/date and duration of the connection, as well as what application the user or device is accessing to determine whether or not it will be allowed.

During inquiries, enterprise clients continue to say that they do not want to have to make trade-offs between the security, policy enforcement and management of their wired and wireless access networks. With limited growth in IT resources, administrators require one network management application, one access security solution, one guest access application or one policy enforcement solution with the flexibility to be deployed in a public cloud, private cloud or on-premises. This integration reduces the costs associated with the upfront capital expense of multiple network service applications — each dedicated to either the wired infrastructure or the wireless or cloud components.

This savings is also extended to the ongoing software maintenance costs of all access layer management, security and policy enforcement components, whether a single vendor implements the entire solution or the client has a multivendor environment. A single network service application for the access layer not only reduces operational overhead, but also eliminates the potential for conflicting policies as users access the network with an increasing number of diverse devices in diverse enterprise locations.

To read more, please email [email protected] to request your free copy of the full report.


Mimecast Recognised as Top Midmarket Cloud Email Vendor

Mimecast has been recognised by two leading midmarket IT organisations for providing email services in the cloud that meet the specific needs of medium-sized businesses. At the spring Midmarket CIO Forum, Mimecast was named “Best Vendor, Service,” and at the Midsize Enterprise Summit East, the company was awarded “Best Midsize Enterprise Summit Newcomer.”

As cyber-attacks on businesses happen on a seemingly regular basis now, it has become clear that no organisation, regardless of size, is safe. In particular, recent high-profile attacks have taught us that mid- or smaller-sized businesses are often a target of those trying to attack larger organisations, as they are seen as a soft way to infiltrate a supply chain.

Bekim Protopapa, General Manager, North America at Mimecast said: “Midmarket businesses must pay attention to their data security and deal with the same email-related risks as larger enterprises – they need to improve email security, protect data and prevent the threat from new attacks, like spear-phishing, but on a smaller budget and with limited IT resources.”

“Mimecast helps midmarket businesses get out of the business of running email on multiple point solutions, which can be costly, complex and eat-up valuable IT resources. We provide comprehensive security, archiving and continuity services for email in the cloud that allows businesses of all sizes to get the protection they need without prohibitive cost.”

Read more about Mimecast >>


  • Employee GDPR Awareness Training

  •  Identity-as-a-Service (IDaaS) solution

  • Tokenless Strong Authentication (MFA)

  • Next Gen Endpoint Security

  • Enquiry LinkedIn Spiceworks