Think Forward: The ADAPTURE Blog

Home /

F5 Reigns Supreme; Remains the Leader in Gartner’s Application Delivery Controller Magic Quadrant

Hot Points:

[...]

Disaster Recovery: Your Company’s Data Needs a Hero

From natural disasters - like Hurricane Sandy in October 2012 - to issues such as human error, malicious attacks, data corruption and storage failures, there are many “villains” seeking to harm your organization’s valuable data.

[...]

Audit Now: The Importance of an Audit-Ready Data Center

Compliance. If you’re in healthcare, finance, working on government contracts or accepting credit cards you’re probably already sick of this word. You know the acronyms: IRS-1075, FISMA, PCI-DSS, HIPAA, HITRUST, CSF, ISO 27000, FDA, SSAE16 — therefalse

[...]

5 Things To Do Before You BYOD

The company-issued Blackberry died, and no one cared. According to a 2014 Webroot survey (PDF), 61% of companies support bring your own device (BYOD) or the use of employee-owned devices for company functions. Because we no longer control everyfalse

[...]

Renting the Castle: F5 Cloud Security

Software is taking over the world. Have you heard that one before? The rise of public clouds like AWS and vCloud Air moves your data from your protected data center and into someone else’s domain. It’s one thing to protect your infrastructure if youfalse

[...]

Cloud Security in 7 Steps

We’ve talked about how the security breaches in 2014 can make IT security feel like a Hollywood slasher. Sticking together will help, but what about some practical tips for staying safe out there? 1. Protect more than the perimeter.

[...]

[WATCH] ADAPTURE Response to NSS Labs NGFW Report

The NSS Labs Report for Next Generation Firewalls was released earlier this year. Our Senior Security Consultant, Elliott Abraham, gives his professional opinion about the report and Dell SonicWall’s performance. Watch the video below.

[...]

A Gory Mess - Security Breaches of 2014... So Far

Heartbleed. Shellshock. Backoff. These aren’t titles to the latest Halloween thriller, but for those who know, they’re scary enough to be. 2014 has been a terrifying year for security. With attacks on Retail, eCommerce, Healthcare, Finance and evenfalse

[...]

PRESS RELEASE: Tim Cullen, ADAPTURE security expert, joins ACUTA Cyber Security Task Force

ADAPTURE Senior Security Consultant brings knowledge of cyber security to the educational organization

[...]

Will the Rise of VDI in Education Solve Our Problems?

Computers in education used to be relegated to small, relatively easy to manage “labs” where students would attend specialized “computer” classes that involved basic computer interaction and word processing education. As technology has grown in ourfalse

[...]

Leave a reply

Blog Categories

see all