Category: Articles

Managed Services: Defined

What are Managed Services? Managed Services are the process of outsourcing business functions, traditionally mandatory internal responsibilities, to an outside party, for continuous oversight and management. The most commonly managed business functions exist in the...

Secure Data Partners with Project Compassion NFP

Secure Data Technologies Continues Commitment to St. Louis Community When Secure Data launched the BUY LOCAL campaign earlier this year, we made a commitment to add local jobs, target additional partnerships with local businesses, grow existing local client...

Do You Buy Local?

Please consider doing business with locally owned companies, who have local employees and local business partners.This map shows the Headquarters of some of the most well known Technology Solution Providers working in the St. Louis market.  Unfortunately, there is a...

ASSET SEGMENTATION: THE KEY TO CONTROL

Automated asset segmentation and classification helps focus strong security controls where they are needed most. Segmentation, an established concept, continues to deliver value across multiple disciplines. We are all likely familiar with the concept of market...

HYPER-CONVERGENCE DEFINITION

Hyper-convergence (hyperconvergence) is a type of infrastructure system with a software-centric architecture that tightly integrates compute, storage, networking and virtualization resources and other technologies from scratch in a commodity hardware box supported by...

USING SECURITY METRICS TO DRIVE ACTION

Benjamin Franklin famously said, “An ounce of prevention is worth a pound of cure.” Unfortunately, no amount spent on prevention can guarantee 100% protection. Successful CISOs must make pragmatic decisions that balance risk and budget. To do this, it is critical to...

GARTNER: MAGIC QUADRANT FOR SECURE EMAIL GATEWAYS

The secure email gateway market is experiencing renewed interest due largely to an increase in targeted phishing attacks. Vendors are responding with URL link protection and attachment sandboxing, but have not addressed social engineering attacks with no payload....

BLACK HAT 2015: IOT DEVICES CAN BECOME TRANSMITTERS TO STEAL DATA

It’s possible to get a printer and other inexpensive network and Internet of Things devices to transmit radio signals that are detectable far enough away that they could be used to steal data from compromised networks, a researcher tells the Black Hat 2015 conference....

IDC: ADOPTION OF TABLETS AND 2-IN-1S IS ACCELERATING

The latest International Data Corporation (IDC) study on tablets in enterprises reveals that tablet penetration is accelerating in companies in the U.K., France, and Germany, and is expected to reach more than 15% of the total client device base by 2018, up from 6% in...

WHAT HAPPENS AFTER A CYBER ATTACK

Around this time last year a large online auction website went public to announce they had been breached and millions of customer records were compromised. They were not alone, 2014 was marked by high-profile cyber attacks to high street and online retailers....