Ryan Francis

Author Archives: Ryan Francis

New products of the week 4.11.16

New products of the weekOur roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow. ClearSlide for Gmail Key features: Available to all ClearSlide users, ClearSlide for Gmail is an easy-to-install Google Chrome app that is designed to increase salesperson productivity and improve the quality of CRM data by automatically logging all outbound emails, prospect views, and content engagement directly back to Salesforce and Microsoft Dynamics.  More info.To read this article in full or to leave a comment, please click here

New products of the week 4.11.16

New products of the weekOur roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow. ClearSlide for Gmail Key features: Available to all ClearSlide users, ClearSlide for Gmail is an easy-to-install Google Chrome app that is designed to increase salesperson productivity and improve the quality of CRM data by automatically logging all outbound emails, prospect views, and content engagement directly back to Salesforce and Microsoft Dynamics.  More info.To read this article in full or to leave a comment, please click here

New products of the week 4.4.16

New products of the weekOur roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow.kiteworks (Microsoft Office 365 Enhancements)Key features: Accellion’s content platform, kiteworks, now extends Microsoft Office Online to content stored on-premise and in the cloud without having to duplicate files. These capabilities are largely enabled by Accellion’s ongoing collaboration with Microsoft and reflect a common interest in making enterprise employees productive and more secure. Features include full text search for documents (folder, name and contents), real-time collaboration editing / co-authoring for Office Online documents stored across the cloud and on-premise systems, and office online integration with access to files stored on SharePoint, Documentum, OpenText, Microsoft OneDrive, Box, Dropbox and other content systems. More info.To read this article in full or to leave a comment, please click here

New products of the week 4.4.16

New products of the weekOur roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow.kiteworks (Microsoft Office 365 Enhancements)Key features: Accellion’s content platform, kiteworks, now extends Microsoft Office Online to content stored on-premise and in the cloud without having to duplicate files. These capabilities are largely enabled by Accellion’s ongoing collaboration with Microsoft and reflect a common interest in making enterprise employees productive and more secure. Features include full text search for documents (folder, name and contents), real-time collaboration editing / co-authoring for Office Online documents stored across the cloud and on-premise systems, and office online integration with access to files stored on SharePoint, Documentum, OpenText, Microsoft OneDrive, Box, Dropbox and other content systems. More info.To read this article in full or to leave a comment, please click here

New products of the week 3.28.16

New products of the weekOur roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow. Harmony Breach AnalyticsKey features: The Harmony Breach Analytics platform reads customer log data to provide contextually-aware threat intelligence and retrospective analysis. This reduces SOC and SIEM workloads by providing threat intelligence customer specific. More info.To read this article in full or to leave a comment, please click here

Security spring cleaning time

Get rid of that stuff collecting dustImage by ThinkstockAs new security threats continue to emerge and security teams find themselves stuck in the cycle of piling on new products and policies each time they receive an alert notification, true functions of security programs get lost in the clutter. As melting snow and longer days promise that spring is right around the corner, take this time to start fresh and “spring clean” your security ecosystems. To help get you started, these infosec professionals provide guidelines for what to check off on a security spring-cleaning list.To read this article in full or to leave a comment, please click here

New products of the week 3.21.16

New products of the weekOur roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow.Appthority Android AppKey features: Provides customers with comprehensive on-device monitoring and protection for employees and enterprises with the ability to know an app’s risk and compliance status before it ever gets installed on their device. More info.To read this article in full or to leave a comment, please click here

New products of the week 3.21.16

New products of the weekOur roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow.Appthority Android AppKey features: Provides customers with comprehensive on-device monitoring and protection for employees and enterprises with the ability to know an app’s risk and compliance status before it ever gets installed on their device. More info.To read this article in full or to leave a comment, please click here

How to respond to ransomware threats

Don't jumpImage by ThinkStockRansomware is obviously analogous to kidnapping, and dealing with the perpetrators can feel much like negotiating with a jumper standing on the edge of high-rise roof. The Institute for Critical Infrastructure Technology recently released a report that in part describes how to deal with criminals when they are holding your data hostage. The report talks of what to do once a breach has been found.To read this article in full or to leave a comment, please click here

New products of the week 3.14.16

New products of the weekOur roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow.Thunder CFWKey features: Thunder CFW is the first converged security solution for service providers, cloud providers and large enterprises that includes a high-performance Gi / SGi firewall with integrated DDoS protection and carrier grade NAT and data center firewall with server load balancing and DDoS protection. Thunder CFW also includes a high-performance secure web gateway with integrated explicit proxy, URL filtering and SSL insight, IPSec site-to-site VPN and aGalaxy centralized management support. More info.To read this article in full or to leave a comment, please click here

Verizon provides a behind the scenes look at data breaches

Interesting detailsImage by ThinkstockThe Verizon RISK Team performs cyber investigations for hundreds of commercial enterprises and government agencies annually across the globe. In 2015, they investigated more than 500 cybersecurity incidents. They shared some of the details in a recent report of how they solved the cyber crimes.To read this article in full or to leave a comment, please click here

New products of the week 3.7.16

New products of the weekOur roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow.cVu 3240NGKey features: cPacket cVu 3240NG is the most powerful distributed Network Performance Monitoring and Diagnostics (NPMD) solution on the market, delivering proactive real-time analysis, 40G line-rate performance analytics and complete packet inspection across L2-L7. More info.To read this article in full or to leave a comment, please click here

New products of the week 3.7.16

New products of the weekOur roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow.cVu 3240NGKey features: cPacket cVu 3240NG is the most powerful distributed Network Performance Monitoring and Diagnostics (NPMD) solution on the market, delivering proactive real-time analysis, 40G line-rate performance analytics and complete packet inspection across L2-L7. More info.To read this article in full or to leave a comment, please click here

New products of the week 2.29.2016

New products of the weekOur roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow. Savvius VigilKey features: Savvius Vigil is the security industry’s first network appliance capable of intelligently selecting, capturing, and storing months of relevant network data to enable rapid investigation of security incidents. More info.To read this article in full or to leave a comment, please click here

New products of the week 2.22.2016

New products of the weekOur roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow.Skytap Provider for VagrantKey features: The Skytap Vagrant plugin provides a common interface for all Vagrant resources, and offers software engineering teams the ability to instantly synchronize a local development stack with on-demand cloud-based environments. More info.To read this article in full or to leave a comment, please click here

New products of the week 2.22.2016

New products of the weekOur roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow.Skytap Provider for VagrantKey features: The Skytap Vagrant plugin provides a common interface for all Vagrant resources, and offers software engineering teams the ability to instantly synchronize a local development stack with on-demand cloud-based environments. More info.To read this article in full or to leave a comment, please click here

How to prevent shadow IT

Stopping the armchair IT folksImage by Mette1977 What do complex IT policies, outdated software and lack of IT-supported services have in common? They all contribute to shadow IT, which occurs when employees circumvent procedures to use unapproved services and software. The last thing employees want to do when working on a project is check in with the IT department, so how can IT provide employees with necessary resources so shadow IT is no longer an issue? These InfoSec professionals share their suggestions for preventing shadow IT before it becomes the new normal. To read this article in full or to leave a comment, please click here

New products of the week 2.15.2016

New products of the weekOur roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow.VMware Workspace ONEKey features: Workspace ONE delivers a digital workspace that integrates device management, application delivery and identity management technologies to offer combined benefits on a single secure mobile platform to enable management and delivery of business critical resources.To read this article in full or to leave a comment, please click here

New products of the week 2.15.2016

New products of the weekOur roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow.VMware Workspace ONEKey features: Workspace ONE delivers a digital workspace that integrates device management, application delivery and identity management technologies to offer combined benefits on a single secure mobile platform to enable management and delivery of business critical resources.To read this article in full or to leave a comment, please click here

Don’t touch the malware at this museum

Malware moments you wish to forgetImage by Jelene Morris (modified)Jason Scott, archivist and software curator for the Internet Archive, and Mikko Hypponen, chief research officer of F-Secure, have brought together this group of malware to mark some of the early viruses. Here are only a few, with another batch to be displayed soon.To read this article in full or to leave a comment, please click here