Novell is now a part of Micro Focus

Novell Cool Solutions

Tag Archives: ZENworks Endpoint Security Management

What’s New in ZENworks 11.4.2 Endpoint Security and Full Disk Encryption

Darrin VandenBos

By:

June 2, 2016 1:52 pm

Reads:1,482

Score:Unrated

ZENworks 11 SP 4 System Update 2 (11.4.2) is now available. This release fixes over 30 defects (see TID 7017469 for details) in Endpoint Security and Full Disk Encryption. Here are some highlights of customer-reported defects that are fixed: Endpoint Security — More fields for USB device matching in the Storage Device Control policy: The …

+read more

Tags: , , ,
Categories: Endpoint Management, Technical, ZENworks, ZENworks Endpoint Security Management, ZENworks Full Disk Encryption

Is Your C-suite In The Dark About Your Business’s Cybersecurity?

Gil Cattelain

By:

November 6, 2015 10:26 am

Reads:4,391

Score:Unrated

Fears about cybersecurity threats are reaching a fever pitch across the enterprise due to the multitude of legal and financial ramifications that follow an attack. Still, there is a big disconnect between enterprise IT departments and executives regarding cybersecurity. The reason for this is that, despite all of the widespread ballyhoo about the need for …

+read more

Tags: , , ,
Categories: Expert Views, General, PR Blog, ZENworks

Now Is the Time to Double Down on Endpoint Security

Gil Cattelain

By:

October 2, 2015 8:58 am

Reads:907

Score:Unrated

This is Jake, your VP of sales: Jake is everyone’s favorite employee. He’s great at his job, makes the company a lot of money and is friendly and easy-going. He’s probably the least suspicious person in your enterprise, and the last person you would expect to be a digital security liability. The truth, however, is …

+read more

Tags: , , , ,
Categories: Expert Views, PR Blog, ZENworks

Your Firewall Is Weak: Here’s Why

Gil Cattelain

By:

June 18, 2015 11:46 am

Reads:2,178

Score:Unrated

Now that the majority of professional football teams are overhauling their defensive strategies in preparation for the 2015 NFL season, it’s a great time to stop and consider your own network’s line of defense: your firewall. What’s the connection between football and your network, you ask? A football team needs a combination of a strong …

+read more

Tags: , , ,
Categories: Expert Views, PR Blog, ZENworks

Medical Devices: The New Target for Cybercriminals

Gil Cattelain

By:

June 11, 2015 1:50 pm

Reads:2,774

Score:Unrated

When it comes to hacking, no device is off limits from cyberthieves—including medical devices—a new report from TrapX Security shows. According to Dark Reading, the report—set to be released at some point next week—names at least three separate instances where malware has recently been discovered lurking on critical hospital medical equipment—specifically systems such as an …

+read more

Tags: , , ,
Categories: Expert Views, PR Blog, ZENworks

From Gold to Fool’s Gold: Transform Your Data Through Encryption to Make It Useless to Hackers

Gil Cattelain

By:

February 19, 2015 1:31 pm

Reads:3,827

Score:Unrated

Your business harbors a trove of sensitive data in its back-end servers that hackers would love to exploit for monetary value. These files can range drastically in value, depending on factors such as the type of information they contain and the industry. In healthcare, for instance, stolen patient records can sell for as much as …

+read more

Tags: , , , ,
Categories: Expert Views, PR Blog, ZENworks

Your Business’s Network Is Bigger Than You Think

Gil Cattelain

By:

February 12, 2015 2:06 pm

Reads:3,630

Score:Unrated

You head the IT department of a small to midsized business (SMB) with 1,000 employees or less. But is this the true size of your network? It could actually be much larger than the total number of employees in your organization due to the amount of devices that your workers use to access your business’s …

+read more

Tags: , , , , ,
Categories: Expert Views, PR Blog, ZENworks

Forrester Names Novell ZENworks a ‘Strong Performer’ in Endpoint Encryption

Gil Cattelain

By:

February 5, 2015 11:17 am

Reads:2,912

Score:Unrated

There are two ways that you can store sensitive corporate information in your database: in a regular format using plain text or in a protected format using advanced ciphering. In information technology (IT), the act of ciphering digital information is called encryption, and it’s one of the safest and strongest methods of devaluing private data …

+read more

Tags: , , , , , ,
Categories: Expert Views, PR Blog, ZENworks

How to Keep Your Data Safe in a Collaborative Work Environment

Gil Cattelain

By:

October 23, 2014 11:48 am

Reads:4,375

Score:Unrated

Your business just created a confidential document outlining a groundbreaking new product it is developing. This document will be used to educate your core team members in marketing, sales and customer support about your business’s new product prior to its release. You might also have to share the top secret file with one or more …

+read more

Tags: , , , , ,
Categories: Expert Views, General, PR Blog, ZENworks

Security: A Growing Concern in the U.S. Financial Sector

Gil Cattelain

By:

October 9, 2014 10:15 am

Reads:3,087

Score:Unrated

Right now all eyes are on the financial services industry following the recent high-profile cyber attacks on JPMorgan Chase and nine other U.S. banking institutions. As of this writing, at least 83 million U.S. households and businesses are confirmed to have been affected by the attack. This number is expected to grow as more information …

+read more

Tags: , , , , , ,
Categories: Expert Views, General, PR Blog, ZENworks

RSS

© Micro Focus