Australia's Loop Technology Updates its Managed SIEM Service based on Intel Security

PATRICK BUTLER | April 26, 2016

article image
Loop technology is an authorized Intel security Managed Service Provider (MSP) specializing in providing IT security services to enterprises throughout Australia. Their challenge is to continue to expand managed services offerings in response to rapidly growing demand. They chose McAfee to overcome this challenge. They have implemented McAfee enterprise security manager, ePolicy Orchestrator (ePO), network security platform, email protection, next generation firewall and advanced threat defense. The results of implementing McAfee were provides SIEM (Security Information and Event Management) managed service to strengthen clients' stance in compliance audits and offers powerful integrated solution for loop to deliver fully managed security services.

Spotlight

Carbonite

Carbonite provide the peace of mind that comes with protecting your digital life. Our cloud solutions make data durable. Our goal is to enable a world in which important data is always protected, available and useful. We began with a personal backup product that was simple and affordable. Today we're applying the same simplicity and affordability to powerful business continuity solutions for small businesses.

OTHER ARTICLES

Protecting against Cybersecurity Threats when Working from Home

Article | March 11, 2020

With the spread of the novel coronavirus (COVID-19), many organizations are requiring or permitting employees to work remotely. This post is intended to remind employers and employees that in the haste to implement widespread work-from-home strategies, data security concerns cannot be forgotten.Employers and employees alike should remain vigilant of increased cybersecurity threats, some of which specifically target remote access strategies. Unfortunately, as noted in a prior blog post, cybercriminals will not be curtailing their efforts to access valuable data during the outbreak, and in fact, will likely take advantage of some of the confusion and communication issues that might arise under the circumstances to perpetrate their schemes. Employees working from home may be accessing or transmitting company trade secrets as well as personal information of individuals. Inappropriate exposure of either type of data can lead to significant adverse consequences for a company.

Read More

A Closer Look at the Microsoft Exchange Server Cyberattacks

Article | May 13, 2021

We recently posted an article that highlighted the high-profile Microsoft Exchange hack that impacted hundreds of thousands of organizations across the globe. (This article offered some recommendations on how this could have been avoided as well as a special three-month offer to help any company who may have been affected.) Since this cyber attack, even more details are emerging. For example, the White House recently urged victims to quickly patch applications and systems and pushed for them to do it as quickly as possible. One senior administration official emphasized that the window to update these systems could be measured in hours, not even days.

Read More

Critical Gaps Remain in Defense Department Weapons System Cybersecurity

Article | March 13, 2020

While the U.S. military is the most effective fighting force in the modern era, it struggles with the cybersecurity of its most advanced weapons systems. In times of crisis and conflict, it is critical that the United States preserve its ability to defend and surge when adversaries employ cyber capabilities to attack weapons systems and functions. Today, the very thing that makes these weapons so lethal is what makes them vulnerable to cyberattacks: an interconnected system of software and networks. Continued automation and connectivity are the backbone of the Department of Defense’s warfighting capabilities, with almost every weapons system connected in some capacity. Today, these interdependent networks are directly linked to the U.S. military’s ability to carry out missions successfully, allowing it to gain informational advantage, exercise global command and control, and conduct long-range strikes. An example of such a networked system is the F-35 Joint Strike Fighter, which the Air Force chief of staff, Gen. David Goldfein, once called “a computer that happens to fly.” Underpinning this platform’s unrivaled capability is more than 8 million lines of software code.

Read More

What is Ransomware and What You Need to Know to Stay Safe?

Article | March 5, 2020

While there may be more than 1 billion pieces of malware prowling the internet for a chance to infect victims, one particular piece of nastiness has been inflicting financial losses and security headaches for years.Known as ransomware, its sole purpose is to block access to computer systems or files until the victim pays a ransom. These ransom demands fluctuate wildly, from the equivalent of a couple of hundred dollars to several hundred thousand. In the simplest terms, ransomware is a piece of malicious software that prevents users from using their devices or accessing their personal or important files, unless a sum of money is paid. Payment is usually demanded in cryptocurrency, such as Monero or Bitcoin. Victims are told to purchase these digital assets and then transfer them to the attackers.

Read More

Spotlight

Carbonite

Carbonite provide the peace of mind that comes with protecting your digital life. Our cloud solutions make data durable. Our goal is to enable a world in which important data is always protected, available and useful. We began with a personal backup product that was simple and affordable. Today we're applying the same simplicity and affordability to powerful business continuity solutions for small businesses.

Events