One of the big use cases for having an SSL VPN is the ability to grant secure access to internal company websites to your remote users. This is generally done by reverse proxying and when it works right it’s a great way of securing your internal sites that you would rather not have directly facing […]
Is Outsourcing IT A Good Idea?
Security is an important part of any business and ensuring that the business is fully protected can be a very time consuming job, this is especially the case when organizations are not willing to expand and trust external security providers, thus most of their IT work is allocated to the in-house IT department. These tasks […]
The Requirements Quagmire: Sidestep a Common Single Sign-On Implementation Issue
A good foundation is just as crucial in implementing a technology, like Single Sign-On, as it is in building a sturdy structure. In implementing a technology initiative, that foundation starts with acquiring and documenting the business and technology requirements in a clear manner. All too often the lack of properly documented requirements right from the […]
Success to Having Maximum Security When it Comes to Mobility
Mobility can be challenging if it is not managed correctly. Incorporating mobility into the business strategy can effectively extend and establish the organisations potential as well as employee productivity. However, this can place excessive demands and pressure on the IT administrators, management and security team. The reason for the increased burden and pressure on the […]
New trends – Password Manager and BYOD
A recent Gartner survey of CIOs estimates that by 2017, half of all employers will require employees to buy their own devices. When I read this statistic, the first two questions that entered by mind was: How will workers react if BYOD becomes mandatory? With strict policies on security, device choices and the growing variety […]