Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Endpoint Security

Cybersecurity Insights - Cyber Insurance Now Requires MFA

Recent cybersecurity incidents and ransomware attacks are driving companies to apply for cyber insurance. When doing so, companies have been facing one new prerequisite to become eligible: multi-factor authentication protection of your assets. Companies looking into acquiring cyber insurance need to make sure they won’t be paying high premiums, or even have their applications denied. In this session, you will learn from Alexander Cagnoni, director of Authentication at WatchGuard.

Meeting PCI DSS Merchant Requirements with WatchGuard UTM, Total Security, Multi-Factor Authentication, And Wireless Solutions

If you are in the retail or hospitality industries, it's important to know exactly how your network security solution maps to PCI DSS standards. This white paper presents a straight-forward review of PCI requirements and how the WatchGuard platform delivers the capabilities you need to ensure mandates are met.

Deploying Zero-Trust Networks in the Era of COVID-19

The coronavirus pandemic has exposed business continuity inadequacies at many organizations, and highlighted the slow pace of progress in digital transformation. This new reality necessitates a departure from a traditional network-centric security model that assumes every device and user within the network should be trusted. In this eBook we will explore how the dynamics of COVID-19 have impacted security, outline the importance of a zero-trust approach, and discuss how WatchGuard can help your business deliver the security you need during these trying times.

Using the Responder Sweep Tool

The responder - or sweep sensor functionality - is designed for incident responders or any one else trying to get the ground truth on a box. With one click of a button you can get list of processes and modules, a list of any unsigned binary code, autoruns, services, drivers, network connections, which sockets are listening on which ports and what is active on the network. It will also look for hidden modules or any indicators that are new to your organization.

Manually Installing LimaCharlie Net

This video walks through the manual installation of LimaCharlie Net. LimaCharlie Net (lc-net) allows you to secure and monitor network access to your endpoints by providing advanced instrumented VPN access. lc-net endpoints appear like other endpoints in your LimaCharlie deployment, but they're quite different in nature. These lc-net endpoints need to be provisioned to be accessed. By provisioning an lc-net endpoint, you create a set of VPN credentials that can be used by a single device. One set of credentials should be used by only a single device, and not shared among devices.

Deploying Zero-Trust Networks in the Era of COVID-19: A Guide for Service Providers

The coronavirus pandemic has exposed business continuity inadequacies at many organizations, and highlighted the slow pace of progress in digital transformation. This new reality necessitates a departure from a traditional network-centric security model that assumes every device and user within the network should be trusted.

A Security Umbrella From A Single Vendor

Equipping your team with the most holistic cybersecurity stack is just as important as protecting your clients with the latest and greatest security solutions. There are many factors to consider before deciding which option would best benefit your business. Hear from Success Computer Consulting to learn what they consider as they're deciding which vendors to partner with.