McAfee Cloud Single Sign On

McAfee Cloud Single Sign On

클라우드 응용프로그램 액세스 간소화 및 보호

다음 단계:
  • McAfee와 상담
    McAfee를 구매할 준비가 되셨거나 구매 전에 알고싶은 내용이 있으십니까? McAfee 전문가와 상담해 보십시오. 월요일부터 금요일까지 상담 서비스를 이용하실 수 있습니다. 영어로만 제공됨.
  • 리셀러 찾기
  • 연락처
  • 전화: 82 2 3458 9800

개요

McAfee Cloud Single Sign On은 최종 사용자가 클라우드 응용프로그램의 여러 암호를 관리해야 하는 부담을 덜어줍니다. McAfee Cloud Single Sign On을 사용하면 클라우드 응용프로그램 액세스에 대해 기업 표준을 적용할 수 있고 암호 재설정 요청을 없애줌으로써 IT와 최종 사용자의 생산성을 향상시킬 수 있습니다.

플러그 앤 플레이 클라우드 싱글 사인온 커넥터 — Salesforce.com과 Google Apps와 같은 대중적인 수백 개의 클라우드 응용프로그램과 즉각적으로 통합할 수 있습니다. 코딩을 해야 하거나 별도의 도구 키트를 구매할 필요가 없습니다. 사용자를 선택해 구성하고 클라우드 응용프로그램에 할당하기만 하면 모든 준비는 끝납니다. 빠른 구현으로 ROI(return on investment)를 향상시키고 가치 실현 시간을 단축합니다. 각기 다른 4개의 인증 모델에 대한 지원은 가장 폭넓은 응용프로그램 범위를 제공합니다.

골치 아픈 암호 문제 제거 — 클라우드 액세스의 암호 관련 위험을 줄임으로써 기업 보안을 향상시키는 동시에 암호 재설정 요청을 대폭 줄임으로써 IT와 최종 사용자의 생산성을 향상시킵니다.

내장된 강력한 인증 — 보안은 고객들이 클라우드로의 데이터 및 응용프로그램 이동과 관련하여 가장 크게 우려하는 부분입니다. Cloud Single Sign On은 업계 최고의 McAfee One Time Password 솔루션에 기반을 둔 내장형 2단계 인증을 제공합니다.

클라우드 액세스 보안 라이프사이클의 제어 회복 — McAfee Cloud Single Sign On을 사용하면 IT는 Active Directory, 강력한 인증 및 통합 모니터링 및 보고와 동기화된 클라우드 응용프로그램의 싱글 사인온, 프로비저닝 및 디프로비저닝을 통해 클라우드 액세스를 효과적으로 관리할 수 있습니다.

하이브리드 배포 옵션 — McAfee Cloud Single Sign On은 독보적인 구내형, 클라우드 또는 혼합형 배포 옵션을 제공하며, 이 모두에 저렴한 단일 가입 비용이 부과됩니다. 고객의 특유한 비즈니스 요구에 가장 적합한 배포 모델을 선별, 선택할 수 있으므로, 보안 또는 관리 용이성이 그대로 유지되면서 최대 유연성이 실현됩니다.

Protect your Azure environment with McAfee Endpoint Security

Learn More

IoAs: Act earlier and more definitively to disrupt attacks

Learn More

Intel Security perspectives:

Get the latest insights from Mike Fey on Dark Reading

Read Now

기능 및 이점

SSO(단일 로그온)로 사용 편의성 개선 및 생산성 향상

McAfee Cloud Single Sign On을 구현하면 여러 사용자 ID/암호 조합을 기억해야 하는 번거로움이 해소될 뿐 아니라 기업 보안 조건을 적용할 수 있고 암호 재설정 요청이 줄어 사용자 환경이 개선됩니다.

다양한 응용프로그램에 대한 지원 확대

SAML, OpenID 및 OAuth와 같은 업계 표준을 포함하여 웹 응용프로그램과 통합하는 4가지 각기 다른 방법을 지원하기 때문에 다양한 클라우드와 내부 웹 응용프로그램에 대한 SSO 지원을 제공할 수 있습니다.

2단계 인증을 통한 보안 강화

전반적인 응용프로그램 액세스 보안을 강화하고 정책 기반 인증 시행을 통해 데이터 유실 및 사기 위험을 줄여줍니다. McAfee Cloud Single Sign On에는 민감한 웹 응용프로그램에 적합한 강력한 인증을 구현하는 데 필요한 모든 것을 제공하는 OTP(일회성 암호) 모듈이 포함되어 있습니다. 유연하고 사용하기 쉬운 McAfee One Time Password Pledge 앱은(구내형 또는 SaaS 에디션 모두에서 사용 가능) 스마트폰(iPhone, Android 등) 또는 PC(Windows 또는 Mac)를 사용하여 OTP를 제공합니다. 기타 OTP 제공 옵션에는 SMS 문자 메시지, 이메일, 메신저 및 USB 토큰이 포함되고 Intel 프로세서의 경우 Intel IPT(Identity Protection Technology)에 대한 지원이 포함됩니다.

자동 프로비저닝으로 생산성 향상

기업 디렉터리와 동기화된 클라우드 계정을 자동으로 프로비저닝하거나 디프로비저닝함으로써 생산성을 향상시키고 가동 중단을 줄이십시오. 비즈니스 규칙을 사용하면 새로운 사용자를 신속하고 쉽게 온보딩하고 이들에게 개별 ID 특성에 따라 특정 응용프로그램을 할당할 수 있습니다. 사용자 속성의 변경사항은 클라우드 응용프로그램의 전체 계정에 걸쳐 자동으로 동기화됩니다. 클라우드 계정은 직원이 기업 디렉터리에서 제거되면 자동으로 비활성화되므로 이전 사용자가 중요한 데이터에 액세스하는 것을 차단하고 컴플라이언스 규제정책을 촉진하기 때문에 보안을 개선할 수 있습니다. 로그 또는 미사용 계정을 식별하여 SaaS 사용자 계정이 정책과 일치하는지 확인하므로 응용프로그램에 인증된 계정만 존재하게 할 수 있습니다.

고객 사례

Beverly Hills Wealth Management(BHWM)

프로비저닝/디프로비저닝과 표준 기반 SSO 기능을 모두 갖춰, McAfee Cloud Single Sign On은 BHWM 브랜딩 환경을 사용자에게 제공할 수 있을 뿐 아니라 내/외부 사용자의 요구를 모두 충족하도록 조정될 수 있습니다.

주요 사항
  • 최종 사용자의 편의와 생산성 향상
  • 여러 암호를 제거하고 통합 SSO에 SAML을 사용함으로써 더욱 강력해진 보안
  • 회사가 성장함에 따라 새로운 SaaS 솔루션을 신속하고 쉽게 추가할 수 있는 유연성
  • 기업 아이덴티티 리포지토리와의 통합으로 자동 프로비저닝/디프로비저닝 구현
  • 비용 효율적인 호스트 하이브리드 클라우드 환경을 활용하는 솔루션

전체 모범 사례 읽기

Messmer Catholic Schools

McAfee Cloud Single Sign On이 Messmer Catholic Schools의 SSO 로그인 페이지 및 포털 역할을 하여 Google Apps for Education과의 원활한 통합을 제공합니다.

주요 사항
  • 계정을 유지 관리하기 위한 IT 로드 감소
  • 암호 관련 호출 제거
  • 직원과 학생이 SaaS 응용프로그램에 더욱 효율적이고 편리하게 액세스 가능

전체 모범 사례 읽기

Platinum Group

안전한 싱글 사인온 덕분에 클라우드로 마이그레이션 가능

주요 사항
  • 사용자들이 자격 증명을 한 번만 입력하면 되므로 SaaS 솔루션에 대한 뛰어난 사용자 승인 확보
  • 업계 표준 SAML 토큰을 사용하므로 보안이 더욱 강력해짐
  • 기업 아이덴티티 리포지토리와의 통합으로 자동 프로비저닝/디프로비저닝 구현

전체 모범 사례 읽기

Senior Service America, Inc.

McAfee는 1시간 이내에 테스트 환경에 McAfee Cloud Single Sign On 시스템을 설치할 수 있으므로, Senior Service America는 파트너 포털에 SSO를 구현할 수 있었습니다.

주요 사항
  • 편리한 SSO를 통해 최종 사용자 환경 개선
  • 시간이 지남에 따라 포털에 더 많은 SaaS 솔루션을 쉽게 추가할 수 있는 기능
  • 신속한 배포 기능
  • 업계 최고의 글로벌 IT 공급업체에서 24시간 연중무휴로 지원
  • 프로비저닝과 디프로비저닝을 통해 비용 절감 및 IT 효율성 개선

전체 모범 사례 읽기

시스템 사양

다음은 최소 시스템 사양만을 나타낸 것입니다. 실제 사양은 사용자 운영 환경의 특성에 따라 다릅니다.

  관리 콘솔 응용프로그램 포털
데스크톱 브라우저
(구내형 에디션)
Firefox 5, Internet Explorer 8 Chrome 16, Firefox 5,
Internet Explorer 7, Safari 5.1.2
데스크톱 브라우저
(SaaS 에디션)
  IE 9 IE 10 Firefox Chrome
OS X 10.7     X X
Windows 8   X X X
Windows 7 X X X X
Windows Vista X   X X
Windows XP     X X
모바일 브라우저
(구내형 에디션)
지원되지 않음 Android 2.0,
iOS 장치 및 Safari 브라우저
서버
(구내형 에디션)
Windows Server 2003, 2008 또는 2008 R2;
Red Hat Enterprise Linux Server 및
Advanced Platform 5.0
32비트 또는 64비트
해당사항 없음
하드웨어
(구내형 에디션)
모든 Intel 멀티 코어 서버 프로세서,
2GB RAM

데모 / 비디오

데모

Network Security Platform is an intrusion prevention appliance that uses multiple detection engines to alert on today’s stealthy malware.

Use event correlation and progressive disclosure workflows to prioritize events, improve detection, and speed investigation.

Network Security Platform uses new advanced intrusion detection capabilities to uncover both known and unknown botnets.

Network Security Platform includes application visibility and control of over 1,100 applications and protocols.

A core element of any cloud security strategy is the enforcement of acceptable usage policies. See how McAfee Web Protection provides system and network administrators with more than 1,000 application controls to manage user’s access to specific cloud application functions, such as Facebook or YouTube.

비디오

McAfee Threat Intelligence Exchange integrates, automates, and simplifies to decisively reduce TCO and optimize enterprise security. It eliminates complexity, provides instantaneous speed, and illuminated knowledge that can lower operating costs while streamlining protection and response ― all while freeing valuable security team resources.

McAfee Application Control ensures only trusted applications run on servers and endpoints. It reduces risks from unauthorized software, boosts endpoint control, extends the viability of fixed-function systems without impacting performance, and lowers operating costs.

Outdated methods of malware detection leave crucial data at risk. Learn how McAfee solutions can prevent advanced malware attacks and protect valued assets.

Outdated methods of malware detection leave crucial data at risk. Learn how McAfee solutions can prevent advanced malware attacks and protect valued assets.

Leverage this video to learn how to build consumer trust through online security

This demo video introduces ClickProtect, a feature of McAfee Email Protection that helps you eliminate the threats from embedded URLs within an email message.

This demo video introduces ClickProtect, a feature of McAfee Email Protection that helps you eliminate the threats from embedded URLs within an email message.

McAfee Cloud Single Sign On relieves the pain that end users have managing multiple passwords for cloud applications.

Ensure continuous compliance. McAfee Configuration Control prevents unauthorized changes on critical servers, boosts visibility into your environment, and streamlines internal and external IT audit processes.

McAfee Content Security Blade Server protects enterprise networks from spam, malware, and other intrusions with a single, high-performance solution. Based on next-generation blade server architecture, Content Security Blade Server reduces IT costs, cuts complexity, and easily scales by inserting additional scanning blades to address future capacity requirements.

In an age of ever-changing technology threats, McAfee helps protect critical infrastructure industries in all sectors with a cloud-to-endpoint security portfolio. Backed by the highest level of Global Threat Intelligence, McAfee delivers real-time visibility, the latest protections, and quick proof of compliance, plus optimized solutions for proprietary SCADA systems.

Learn how Beverly Hills Wealth Management maximized SaaS access to user applications.

자습서

After viewing this video, you will know what action rules are and how to create them in McAfee Data Loss Prevention

Learn how to configure McAfee Network Threat Behavior Analysis through our step-by-step installation tutorial.

After viewing this video, you will know what templates are and how to create them in McAfee Data Loss Prevention.

상/리뷰

451 Research: McAfee Cloud Identity Manager에 대한 분석가 평가
분석 업체 451 Research에서는 McAfee Cloud Single Sign On(이전의 McAfee Cloud Identity Manager)과 McAfee의 ID 및 액세스 권한 관리 전략을 살펴보고 “…장치 하드웨어에서 클라우드에 이르기까지 기초가 매우 튼튼하다”고 평한 바 있습니다.

SC Magazine: McAfee Cloud Identity Manager 제품 검토
SC Magazine은 McAfee Cloud Identity Manager에 최고 등급 별 5개 중에서 4.75개를 부여했습니다. "...McAfee Cloud Identity Manager가 그 값어치를 한다는 사실을 확인했습니다."

뉴스/이벤트

리소스

기술 청사진

Investigate Data Breaches (English)

McAfee enables enterprises to collect, analyze, and preserve security forensic information. With a solution that includes content- and context-aware SIEM, McAfee provides alerts to security events, as well analysis on how the attacked occurred, affected users, and compromised data — so you can better understand the severity of a security breach.

데이터시트

McAfee Rogue System Detection (English)

This data sheet explains how McAfee Rogue System Detection fully integrates with McAfee ePolicy Orchestrator to provide real-time discovery of rogue systems connected to the network to offer greater network visibility and protection.

McAfee ePO Cloud (English)

For a technical summary on the McAfee product integration listed above, please view the product data sheet.

McAfee 5700 Scan Engine and .DATs (English)

For a technical summary on the McAfee product listed above, please view the product data sheet.

McAfee Next Generation Firewall

위에 나열된 McAfee 제품의 기술 요약은 제품 데이터 시트를 참조하십시오.

McAfee Next Generation Firewall Appliance Comparison (English)

Download a technical comparison of all McAfee Next Generation Firewall appliances.

McAfee Firewall/VPN

위에 나열된 McAfee 제품의 기술 요약은 제품 데이터 시트를 참조하십시오.

McAfee Next Generation Firewall Roles and Licensing Options (English)

For technical specifications on the McAfee product listed above, please view the product data sheet.

McAfee Next Generation Firewall Modules (English)

For technical specifications on the McAfee product listed above, please view the product data sheet.

McAfee Firewall/VPN Appliance Comparison

위에 나열된 McAfee 제품의 기술 요약은 제품 데이터 시트를 참조하십시오.

McAfee Security Management Center

위에 나열된 McAfee 제품의 기술 요약은 제품 데이터 시트를 참조하십시오.

McAfee Next Generation Firewall MIL-320

위에 나열된 McAfee 제품의 기술 요약은 제품 데이터 시트를 참조하십시오.

Additional Subscriptions for McAfee Next Generation Firewall

위에 나열된 McAfee 제품의 기술 요약은 제품 데이터 시트를 참조하십시오.

McAfee Virtual Contexts

위에 나열된 McAfee 제품의 기술 요약은 제품 데이터 시트를 참조하십시오.

McAfee Next Generation Firewall S-Model Appliance Specifications

Find detailed technical specifications for six models of the McAfee Next Generation Firewall S-series.

Global Threat Intelligence for Enterprise Security Manager (English)

For a technical summary on the McAfee product listed above, please view the product data sheet.

Identify Data Risk In Your Organization (English)

Identify the risks to your vital information that exist within your organization so that you can take appropriate measures to prevent exposure and potentially damaging consequences.

McAfee Email Gateway Hardware Appliance Specifications (English)

For technical specifications on the McAfee product listed above, please view the product data sheet.

McAfee Endpoint Protection for SMB

위에 나열된 McAfee 제품의 기술 요약은 제품 데이터 시트를 참조하십시오.

McAfee SIEM Supported Devices (English)

For a technical summary on the McAfee product integration listed above, please view the product data sheet.

SIEM Solutions from McAfee (English)

Continuously monitor, identify, investigate, and resolve threats.

백서

SANS White Paper: Be Ready for a Breach with Intelligent Response (English)

How do we get more visibility into attacks across our environments, improve our response, and reduce response time? The solution is automating functions that should be automated and connecting the dots between detection systems and response. Connecting these dots and applying intelligence provides responders rich context into the observed behaviors for taking action. Integrating these processes improves accuracy, while reducing time, manpower, and costs involved in detecting and managing events. This white paper explores how to achieve this.

Calculating the Business Value of Next Generation Firewall — IDC (English)

This white paper articulates the business benefits derived by companies that have deployed a NGFW solution. The data is based on in–depth interviews with eight McAfee customers. These companies were mostly large organizations with an average employee base of 7,082. Interviewees came from a variety of industries — energy, financial services, manufacturing, retail, service provider, technology, and education.

Factory of the Future (English)

This paper discusses, in a question-and-answer format, insights shared by Vice President and Chief Security and Privacy Officer (CSPO) Malcolm Harkins and team members at Intel Corporation and Intel Security on the process of reshaping security for its fabrication plant infrastructure.

Direct or Transparent Proxy: Choose the right configuration for your gateway. (English)

Secure web gateways are essential in today’s connected world, but which proxy configuration should you choose: direct or transparent? This white paper guides you through the pros and cons and makes recommendations that will help you secure your company and your users more effectively.

SANS Survey: Incident Response – How to Fight Back (English)

SANS recently surveyed incident response (IR) teams to get a clearer picture of what they're up against today. The results are in; most organizations lack formalized IR plans, they expressed a need to collect and correlate threat intelligence and SIEM tools are their focus for improving IR capabilities.

보고서

When Minutes Count (English)

How experts fight advanced threats with real-time SIEM and identification of eight key indicators of attack.

Network Performance and Security (English)

This report discusses how CIOs and CISOs can avoid risky tradeoffs and boost threat defenses by deploying next-generation firewalls that are built for both security and network performance.

Network Performance and Security Executive Summary (English)

This is the executive summary to the report discussing how CIOs and CISOs can avoid risky tradeoffs and boost threat defenses by deploying next-generation firewalls that are built for both security and network performance.

What's Next: Industry Experts Speak Out on The Network Performance and Security Trade-Off (English)

Industry Experts Speak Out: The Network Performance and Security Trade-Off report is a collection of insights and opinions from network security experts discussing the common and risky tradeoff many organizations are forced to make between network performance and security.

SANS Analytics and Intelligence Survey (English)

This paper explores the use of analytics and intelligence today and exposes the impediments to successful implementation. Organizations that are deploying analytics and intelligence properly are experiencing faster response and detection times, as well as greater visibility. However, many are confused about how to integrate and automate their intelligence collection processes.

Security Value Map — NSS Labs (English)

McAfee NGFW 5206 appliance is compared directly with 11 competitive next-generation firewall products.  Detailed comparisons are provided across the categories of security, performance, and total cost of ownership (TCO) and presented in an aggregated graph.

Throughput and Scalability Report McAfee NGFW 5206 — Miercom (English)

Independent testing lab Miercom performed comprehensive throughput and scalability testing on the McAfee NGFW 5206 appliance. Testing was performed with application control, deep packet inspection, and antivirus enabled, and in configurations of one to four clusters.

McAfee Next Generation Firewall review by Frank Ohlhorst, Enterprise Networking Planet (English)

Threats aimed at corporate entities and enterprises are rapidly evolving, with targeted attacks becoming the norm and advanced persistent threats (APTs) increasing. What's more, APTs have been further fueled by the rise of advanced evasion techniques (AETs), which help APTs bypass firewalls, security appliances, and endpoint security products. The answer to APTs and AETs is advanced next-generation firewall software. This technology review examines the McAfee Next Generation Firewall solution that's designed to quell today's security concerns by combining a plethora of security technologies with obfuscation techniques that successfully thwart attacks.

McAfee Security vs. Network Performance Research (English)

This report explains the results of the Spiceworks Voice of IT survey, which polled more than 500 IT professionals about their organizations’ network security practices compared to performance.

McAfee Next Generation Firewall: Optimize Your Defense, Resilience, and Efficiency (English)

This eBook provides an in-depth overview of the features and benefits of the technologies within McAfee Next Generation Firewall.

NSS Labs Next Generation Firewall Product Analysis — NGF-1402 v5.7.1 (English)

McAfee Next Generation Firewall awarded NSS Labs’ “Recommended” for the third year in a row.

Magic Quadrant for Mobile Data Protection 2014 (English)

McAfee positioned as a leader in Gartner’s Magic Quadrant for Mobile Data Protection.

SANS Report: Critical Security Controls: From Adoption to Implementation (English)

A recent SANS survey provides an in-depth look at the primary industries adopting critical security controls and how they approach implementation.

What's Next: Industry Experts Speak Out on Advanced Evasion Techniques (Europe) (English)

Find out what industry experts from the US and Europe are saying about advanced evasion techniques (AETs). You’ll learn why they are growing concern, why technology alone is not enough to keep them in check, and how they will shape the future of enterprise security.

2014 AV-TEST Comparative Cloud Gateway Test (English)

AV-TEST performed a comparative review of McAfee Web Protection in the Cloud and Websense Cloud Security 2014 and tested each against a set of malicious URLs with zero-day malware to determine their performance against the latest threats on the web.

솔루션 개요

Advanced Threat Defense for Network IPS (English)

Many of today’s unknown, zero-day threats evade traditional signature-based defenses. The addition of third-party sandbox appliances can help, but they have several limitations: high cost of deployment, reliance on a generic virtualized environments, and limited analysis techniques, making the sandbox vulnerable to crafty malware designed to bypass analysis. McAfee Network Security Platform IPS and McAfee Advanced Threat Defense work together to find sophisticated threats, freeze them so they cannot infiltrate, and fix the damage done.

Hybrid Email Security: Maintain privacy while gaining benefits of the cloud (English)

Information confidentiality and reduced configuration flexibility are often cited as reasons for not taking advantage of cloud-based email security. This brief discusses how hybrid security can enable organizations with these concerns to enjoy the benefits of the cloud without sacrifice.

Advanced Threat Defense for Next-Generation Firewalls (English)

Next-generation firewalls certainly offer expanded network security for branch offices and remote locations, but they can’t find and block stealthy, advanced malware. Through the Security Connected approach from McAfee, Advanced Threat Defense and McAfee Next Generation Firewall work hand-in-hand to find and freeze today’s evasive and targeted cyberattacks.

McAfee Enterprise Security Manager and McAfee Threat Intelligence Exchange (English)

There’s no doubt that organizations face significant challenges protecting their intellectual property and critical assets from the emerging threats that target their environments. This solutions brief highlights how McAfee® Enterprise Security Manager and McAfee Threat Intelligence Exchange work together to provide organizations with exactly what they need to fight today’s advanced threats.

McAfee Threat Intelligence Exchange and Endpoint Protection (English)

McAfee Threat Intelligence Exchange and McAfee Advanced Threat Defense work together to provide enterprises with automated, adaptive threats response, which reduces time-to-containment of malicious files. The moment a file is convicted, the entire security infrastructure is informed and updated immediately, providing greatly enhanced visibility and control, from endpoint to network.

Security in Unison (English)

McAfee Threat Intelligence Exchange and McAfee Advanced Threat Defense work together to provide enterprises with automated, adaptive threat response, which reduces time-to-containment of malicious files. The moment a file is convicted, the entire security infrastructure is informed and updated immediately, providing greatly enhanced visibility and control, from endpoint to network.

McAfee Enterprise Security Manager and McAfee Threat Intelligence Exchange (English)

Deliver Context-Aware, Prioritized Threat Intelligence Across Your Enterprise.

McAfee Threat Intelligence Exchange and Endpoint Protection (English)

Get cutting-edge endpoint visibility, control, and protection.

A Case for the Value of SIEM: The Security Evolution (English)

With the advent of big data, traditional SIEM solutions that focus only on logging and compliance reporting fall short of the demands of today’s enterprises for threat intelligence, correlation, and remediation. McAfee Enterprise Security Manager, the core of the McAfee SIEM solution, is both smart and fast. Its proprietary information management back end, purpose-built for managing big data, offers the critical combination of intelligence and speed.

커뮤니티

블로그

  • The Security Impact of Shadow IT: December #SecChat
    McAfee Enterprise - 12월 5, 2013
    Is something dangerous lurking in the shadows of your organization? That’s the question we sought to answer by commissioning Stratecast to research the use of unauthorized Software-as-a-Service (SaaS) applications in the workplace. The findings revealed that widespread risk for companies is originating from the use of unauthorized apps within the workplace. According to the study, […]
  • Taking Shadow IT Out of the Shadows
    Lynda Statdtmueller - 12월 4, 2013
    Look around your office. Flip through your business contact list. Chances are that four out of five of your colleagues are violating company IT rules. This startling revelation comes from a recent Software-as-a-Service (SaaS) survey conducted by Stratecast and sponsored by McAfee. The survey set out to examine “shadow IT,” defined as employees’ use of […]
  • Is There Something Phishy In Your Inbox?
    David Bull - 11월 20, 2013
    Phishing is a widespread problem. According to Allen Paller, director of research at the SANS Institute, 95% of all attacks on enterprise networks are the result of successful spear phishing. Can you tell if this email is legitimate or not? Think about this: How many packages does your company receive in a typical day? Likely […]
  • How Much Are Your Assets Worth?
    Cybermum Australia - 9월 26, 2013
    Now, if your tax returns are up to date and you have a healthy relationship with a financial planner, I have no doubt you could answer this question in an instant. But what about your other assets? And I am not referring to your children because clearly they are priceless – most of the time!! […]
  • Hackers are Cashing in on Instagram Likes
    Gary Davis - 9월 9, 2013
    They say popularity has its price. This saying holds a new weight when it comes to the growing influence of social media. In fact, your “Likes” may be worth more to hackers than your credit card number. As counterintuitive as it may seem, your social clout has become the new target of hackers. And they’re […]