Oasis Technology, Inc.

oasistechnology.com

Since 1979, Oasis’ clients have benefited from the company’s in-depth knowledge and breadth of experience that comes from having 60 technology experts on staff. We don’t have sales people. Our clients talk to local, knowledgeable help desk and support technicians who combine clear communication and interpersonal skills with top notch IT skills and knowledge.

C-Suite On Deck

Responsive image

Feature market insights and perspectives from top C-Level executives, elite technology influencers and thought leaders from your company here. This signature initiative has garnered immense support...

Contact Us

Events

Related News

Network Threat Detection

LACEWORK QUARTERLY CLOUD THREAT REPORT SHOWS THE AUTOMATED TECHNIQUES CYBERCRIMINALS ARE USING TO ATTACK BUSINESSES IN THE CLOUD

Lacework | August 31, 2021

news image

Lacework, the data-driven security platform for the cloud, today released its quarterly cloud threat report, unveiling the new techniques and avenues cybercriminals are infiltrating to profit from businesses. The rapid shift of applications and infrastructure to the cloud creates gaps in the security posture of organizations everywhere. This has increased the opportunities for cybercriminals to steal data, take advantage of an organization's assets, and to gain illicit network...

Read More

CYBERATTACK SHUTS DOWN E-LEARNING FOR TWO DAYS IN NEW PALESTINE

wthr | August 06, 2020

news image

The Community School Corporation of Southern Hancock County was back online Thursday. But a cyberattack on the school district’s internet network prevented remote learning the previous two days in the first week of school. "To be unable to offer that right out of the gate is frustrating, especially frustrating knowing that this was a malicious attack on our system and not something of our own doing,” said Wes Anderson, CSC Southern Hancock County director of school and community...

Read More

Data Security, Platform Security, Software Security

OPENTEXT PARTNERS WITH MAD SECURITY TO IMPROVE RESPONSE TIME TO CYBERTHREATS AND SHRINK THE ATTACK SURFACE

OpenText | October 20, 2022

news image

Today, OpenText™ , a global leader in information management with an extensive security solution portfolio, announced a partnership between OpenText Network Detection & Response (NDR) technology and MAD Security. This joint solution from OpenText and MAD Security will empower customers to cut false positive security alerts significantly and protect sensitive government data against advanced cyber threats. MAD Security, a managed security service provider (MSSP) that help...

Read More

BACKED BY CLEARLAKE CAPITAL AND TA ASSOCIATES, IVANTI ANNOUNCES MOBILEIRON TO FURTHER AUTOMATE AND SAFE ENDPOINTS

prnewswire | September 28, 2020

news image

Ivanti, Inc. , which automates IT and Security Operations to discover, manage, secure and service from cloud to edge, and is backed by affiliates of Clearlake Capital Group, L.P. (together with its affiliates, "Clearlake") and TA Associates, today announced it has signed definitive agreements to acquire MobileIron Inc. ("MobileIron"), a leading provider of mobile-centric unified endpoint management solutions, and Pulse Secure LLC ("Pulse Secure"), a leading provider...

Read More
news image

Network Threat Detection

LACEWORK QUARTERLY CLOUD THREAT REPORT SHOWS THE AUTOMATED TECHNIQUES CYBERCRIMINALS ARE USING TO ATTACK BUSINESSES IN THE CLOUD

Lacework | August 31, 2021

Lacework, the data-driven security platform for the cloud, today released its quarterly cloud threat report, unveiling the new techniques and avenues cybercriminals are infiltrating to profit from businesses. The rapid shift of applications and infrastructure to the cloud creates gaps in the security posture of organizations everywhere. This has increased the opportunities for cybercriminals to steal data, take advantage of an organization's assets, and to gain illicit network...

Read More
news image

CYBERATTACK SHUTS DOWN E-LEARNING FOR TWO DAYS IN NEW PALESTINE

wthr | August 06, 2020

The Community School Corporation of Southern Hancock County was back online Thursday. But a cyberattack on the school district’s internet network prevented remote learning the previous two days in the first week of school. "To be unable to offer that right out of the gate is frustrating, especially frustrating knowing that this was a malicious attack on our system and not something of our own doing,” said Wes Anderson, CSC Southern Hancock County director of school and community...

Read More
news image

Data Security, Platform Security, Software Security

OPENTEXT PARTNERS WITH MAD SECURITY TO IMPROVE RESPONSE TIME TO CYBERTHREATS AND SHRINK THE ATTACK SURFACE

OpenText | October 20, 2022

Today, OpenText™ , a global leader in information management with an extensive security solution portfolio, announced a partnership between OpenText Network Detection & Response (NDR) technology and MAD Security. This joint solution from OpenText and MAD Security will empower customers to cut false positive security alerts significantly and protect sensitive government data against advanced cyber threats. MAD Security, a managed security service provider (MSSP) that help...

Read More
news image

BACKED BY CLEARLAKE CAPITAL AND TA ASSOCIATES, IVANTI ANNOUNCES MOBILEIRON TO FURTHER AUTOMATE AND SAFE ENDPOINTS

prnewswire | September 28, 2020

Ivanti, Inc. , which automates IT and Security Operations to discover, manage, secure and service from cloud to edge, and is backed by affiliates of Clearlake Capital Group, L.P. (together with its affiliates, "Clearlake") and TA Associates, today announced it has signed definitive agreements to acquire MobileIron Inc. ("MobileIron"), a leading provider of mobile-centric unified endpoint management solutions, and Pulse Secure LLC ("Pulse Secure"), a leading provider...

Read More

Resources

resource image

Enterprise Security, Platform Security, Software Security

API Security: Best Practices for Vulnerability Mitigation

Whitepaper

resource image

Enterprise Security, Platform Security, Software Security

Optimizing Your Zero Trust Environment for Secure Video Conferencing

Whitepaper

resource image

Platform Security, Software Security, Cloud Security

Introduction to Netskope Cloud Firewall

Video

resource image

Enterprise Security, Platform Security, Software Security

API Security: Best Practices for Vulnerability Mitigation

Whitepaper

resource image

Enterprise Security, Platform Security, Software Security

Optimizing Your Zero Trust Environment for Secure Video Conferencing

Whitepaper

resource image

Platform Security, Software Security, Cloud Security

Introduction to Netskope Cloud Firewall

Video

Events

C-Suite On Deck

Responsive image

Feature market insights and perspectives from top C-Level executives, elite technology influencers and thought leaders from your company here. This signature initiative has garnered immense support...

Contact Us