What is a managed firewall? Benefits, offerings explained

December 7, 2020 | Mark Stone
Mark Stone

Mark Stone

Mark Stone is a content and copy writer with over a decade of experience covering technology, business, and cybersecurity. Earlier in his career, he was a cybersecurity analyst in the public sector. He lives in Kelowna, BC with his wife and two black cats.

December 7, 2020 | Mark Stone

What is a managed firewall? Benefits, offerings explained

This blog was written by a third party author A firewall can have all the security bells and whistles to keep the bad guys out, but firewalls are only as effective as the people managing them. To get the most out of a firewall, it must be properly managed to ensure it does what it’s supposed to: mitigate…

November 24, 2020 | Mark Stone

What is Third-Party Risk Management?

Creating and maintaining relationships with third parties brings about multiple risks. Whether your organization is large or small, it’s almost certain that you have business relationships with many third parties for specific types of operations. When operational data and confidential information are exchanged with third parties, that data and information are vulnerable to misuse and exploitation. This is…

Get the latest security news in your inbox.

Subscribe via email

RSS

November 17, 2020 | Mark Stone

What is unified endpoint management? UEM explained

This blog was written by a third party author. The business world is undergoing its most dramatic shift yet with the adoption of digital assets and workforce decentralization representing a huge business opportunity. These changes have led to added endpoints, or devices connecting to the network, and is enabling this transformation. But managing the volumes of these diverse endpoints and…

October 30, 2020 | Mark Stone

What is FedRAMP? Compliance and certification explained

This blog was written by a third party author The Federal Risk and Authorization Management Program (FedRAMP) is a compliance program established by the US government that sets a baseline for cloud products and services regarding their approach to authorization, security assessment, and continuous monitoring. The program’s governing bodies include the Office of Management and Budget (OMB), US…

October 29, 2020 | Mark Stone

Vulnerability scanning vs. Penetration testing: comparing the two security offerings

This blog was written by a third party author. It’s no secret: the number of security vulnerabilities organizations must contend with is overwhelming. According to a 2019 Risk Based Security report, there were 22,316 newly-discovered vulnerabilities last year. One Patch Tuesday disclosed a record number of 327 vulnerabilities in a single day. Just keeping up is becoming a monumental task. But…

October 28, 2020 | Mark Stone

What is endpoint detection and response? EDR security explained

This blog was written by a third party author. The evolving endpoint attack surface As recent global health events have changed the world, the cybersecurity landscape has changed along with it. Almost all organizations — large or small — have seen their attack surface grow. For those unfamiliar with the term, an attack surface represents the sum total of all…

October 21, 2020 | Mark Stone

Cloud firewall explained: what is firewall as a service?

This blog was written by a third party author As organizations continue moving away from hosting services and applications with onsite servers, the use of virtual machines and cloud-based security solutions like Firewall-as-a-service (FWaaS) is trending upward. With this shift away from traditional network security solutions, cloud firewall deployments have become the norm for many businesses.  Here are answers…

October 15, 2020 | Mark Stone

CMMC compliance explained: what is the Cybersecurity Maturity Model Certification?

This blog was written by a third party author With an escalating cybersecurity threat risk that doesn’t appear to be slowing down, the Department of Defense (DoD) has taken proactive measures in creating the Cybersecurity Maturity Model Certification (CMMC). The CMMC will soon be a requirement for any defense contractors or other vendors that are, or wish to…

September 23, 2020 | Mark Stone

What is mobile device management? MDM explained

This blog was written by a third party author. Not too long ago, the desktop computer was the primary computing device for enterprise employees. With the rise of mobile endpoints like smartphones, laptops and tablets, employees are connecting to corporate networks from a wide variety of places and devices. Today, especially with the popularity of the WFH (work from home)…

September 10, 2020 | Mark Stone

Firewalls explained: the different firewall types and technologies

This blog was written by a third party author. Finding the right network security tools to secure your sensitive data can be a significant challenge for any organization. Choosing a firewall may seem like a simple task, but companies can get overwhelmed by the different firewall types and options. Making the distinction between a firewall and other security solutions can…

September 9, 2020 | Mark Stone

What is Incident Response?

This blog was written by a third party author. As new types of security incidents are discovered, it is absolutely critical for an organization to respond quickly and effectively when an attack occurs. When both personal and business data are at risk of being compromised, the ability to detect and respond to advanced threats before they impact your business is…

August 26, 2020 | Mark Stone

IoT security explained

This blog was written by a third party author. The Internet of Things (IoT) is a term used to describe a system of interconnected computing devices that use the internet to send and receive data without requiring human to computer or human to human coordination. The world of IoT encompasses a wide variety of technologies, vendors, and connectivity methods. While…