
Our Blog
BeyondTrust. Essential Cybersecurity Survival Strategies for 2022 & Beyond
In cyberspace, there exists no safe harbor. Every organization with a digital presence is exposed…
5 minutes read
Multi-cloud threat detection and response with Sophos XDR
Sophos Extended Detection and Response (XDR) now goes even further in the public cloud, adding…
4 minutes read
Sophos ZTNA is now available!
We’re starting off the new year with a big announcement – a new Sophos product!…
3 minutes read
HelpSystems. How Your Business Can Benefit from End-to-End Automation
Automation used to be a tool that was almost exclusively used in the most technical…
5 minutes read
Datto. Backup Strategy: What is the 3-2-1 backup rule?
What is the 3-2-1 Backup Rule? The 3-2-1 backup rule states that you should have…
4 minutes read
BeyondTrust. Managing Privileged Access across Multicloud IT Environments
Admin, superuser, root – different names for the same concept: an account that has total…
6 minutes read
The Sophos Switch Series is Now Available
This is a highly anticipated product release, which couldn’t come at a better time. If…
4 minutes read
HelpSystems. Data Privacy vs. Data Security: What’s the Difference?
Understandably, the terms data security and data privacy are frequently muddled together and sometimes used…
6 minutes read
Sophos Named a Gartner Peer Insights™ Customer’s Choice for Endpoint Protection Platforms
Customers have spoken–naming Sophos an October 2021 Gartner Peer Insights Customers’ Choice for Endpoint Protection…
6 minutes read
BeyondTrust Launches Cloud Privilege Broker to Help Organizations Gain Control Over Permissions and Entitlements Across Multicloud Environments
BeyondTrust announced the release of BeyondTrust Cloud Privilege Broker, a new solution built from the…
5 minutes read