McAfee Cloud Single Sign On

Inicio de sesión único en la nube de McAfee

Simplifique y proteja el acceso a las aplicaciones de la nube.

Próximos pasos:

Descripción general

McAfee Cloud Single Sign On acaba con los quebraderos de cabeza que representa para los usuarios finales tener que gestionar numerosas contraseñas para las aplicaciones de Internet. McAfee Cloud Single Sign On permite aplicar los criterios empresariales al acceso a las aplicaciones web y mejora la productividad de los responsables de TI y los usuarios finales gracias a la eliminación de los requisitos de restablecimiento de contraseñas.

Conectores a Internet listos para usar: consiga una integración inmediata con las aplicaciones de la Web más populares, como Salesforce.com y Google Apps. No es necesario codificarlo ni adquirir ninguna herramienta. Todo lo que tiene que hacer es escoger, configurar y asignar usuarios a la aplicación de la nube. La implementación inmediata se traduce en una mayor rentabilidad de la inversión y menor tiempo de amortización. Admite cuatro modelos de autenticación distintos, por lo que proporciona el rango más amplio de cobertura de aplicaciones.

Elimine las preocupaciones por las contraseñas: reduzca los riesgos relacionados con las contraseñas de acceso a la nube para reforzar la seguridad corporativa y reduzca las solicitudes de restablecimiento de contraseñas para aumentar la productividad de TI y los usuarios.

Autenticación robusta incorporada: la seguridad es la mayor preocupación que mencionan los clientes acerca de la migración de los datos y las aplicaciones a la nube. Cloud Single Sign On proporciona una autenticación de dos factores incorporada, basada en la solución líder del sector McAfee One Time Password.

Recupere el control del ciclo de vida de la seguridad del acceso a la nube: McAfee Cloud Single Sign On permite a TI gestionar con eficacia el acceso a la nube gracias al inicio de sesión único, el aprovisionamiento y desaprovisionamiento de las aplicaciones de la nube con Active Directory, la autenticación robusta y el monitoreo y la generación de reportes consolidados.

Opción de implementación híbrida: McAfee Cloud Single Sign On puede desplegarse in situ, en la nube o de ambas formas, todo a un precio de suscripción bajo. La posibilidad de elegir el modelo de implementación que mejor se adapte a las necesidades de cada empresa ofrece la máxima flexibilidad sin poner en peligro la seguridad o la facilidad de administración.

SIEM tools are key to improving incident response
Protect your servers, from physical to virtual to cloud.
AV-Test Signature-less IPS Report

Características y beneficios

Mejore la facilidad de uso y la productividad a partir de un inicio de sesión único (SSO)

McAfee Cloud Single Sign On mejora la experiencia de los usuarios al eliminar la necesidad de recordar varias combinaciones de identificación de usuario y contraseña. Además, refuerza los requisitos de seguridad corporativos y reduce las solicitudes de restablecimiento de contraseñas.

Compatibilidad ampliada con gran variedad de aplicaciones

Acepta cuatro métodos distintos de integración con las aplicaciones web, tales como los estándares de sector SAML, OpenID y OAuth, así como el inicio de sesión único para una amplia variedad de aplicaciones web internas y de la nube.

Refuerce la seguridad con la autenticación de dos factores.

Fortalezca la seguridad general del acceso a las aplicaciones y reduzca el riesgo de pérdida de datos y fraude con la aplicación de políticas para el uso obligado de la autenticación. McAfee Cloud Single Sign On incluye un módulo OTP (contraseña de un solo uso) que facilita todo lo necesario para implementar una autenticación rigurosa en el acceso a las aplicaciones de la nube. La aplicación Pledge flexible y fácil de usar de McAfee One Time Password —disponible en ediciones in situ y SaaS— entrega la contraseña de un solo uso utilizando cualquier smartphone (iPhone, Android, etc.) o PC (Windows o Mac). Otras opciones para entregar la contraseña de un solo uso son mensajes SMS, correo electrónico, mensajería instantánea y tokens USB. Además admite la tecnología de protección de la identidad (Intel Identity Protection Technology) de los procesadores Intel.

Mayor productividad con aprovisionamiento automático

Aumente la productividad y disminuya el tiempo de inactividad al aprovisionar y desaprovisionar cuentas de la nube de forma sincronizada con el directorio corporativo. Las reglas de negocio permiten incorporar con rapidez y facilidad a los nuevos usuarios y asignarles a aplicaciones específicas en función de sus atributos de identidad. Los cambios de los atributos de los usuarios se sincronizan de forma automática en todas las cuentas de las aplicaciones de la nube. Las cuentas de la nube se deshabilitan de forma inmediata cuando los empleados se eliminan del directorio corporativo, lo que mejora la seguridad al bloquear el acceso de exempleados a los datos confidenciales y facilita el cumplimiento de las normativas. Identifique las cuentas falsas o huérfanas para verificar que las cuentas de usuario SaaS coinciden con la política y garantizar que las aplicaciones solo tengan cuentas autorizadas.

Experiencias de los clientes

Beverly Hills Wealth Management (BHWM)

McAfee Cloud Single Sign On no solo puede significar una experiencia de usuario con la marca BHWM, sino que el sistema también se adapta para satisfacer las necesidades de los usuarios internos y externos, tanto con la capacidad de aprovisionamiento y desaprovisionamiento como con el inicio de sesión único basado en estándares.

Aspectos destacados
  • Más comodidad y productividad de los usuarios
  • Seguridad más sólida al eliminar las numerosas contraseñas y usar SAML para el inicio de sesión único federado.
  • Flexibilidad para agregar con rapidez y facilidad nuevas soluciones SaaS cuando las empresas crecen
  • Integración con los repositorios de identidad corporativos para el aprovisionamiento y desaprovisionamiento automáticos
  • Solución que aprovecha entornos rentables de nube, alojados, híbridos.

Leer el caso práctico completo

Messmer Catholic Schools

McAfee Cloud Single Sign On se utiliza como página y portal de inicio de sesión único de Messmer Catholic Schools y se integra de forma sencilla con Google Apps para la educación.

Aspectos destacados
  • Reducción de la carga de TI para el mantenimiento de cuentas
  • Eliminación de las llamadas relacionadas con contraseñas
  • Acceso de los profesores y estudiantes a las aplicaciones SaaS de forma más conveniente y eficaz

Leer el caso práctico completo

Platinum Group

El inicio de sesión único y seguro facilita la migración a la nube

Aspectos destacados
  • Mejor aceptación de la solución SaaS por parte de los usuarios ya que solo tienen que introducir una vez sus credenciales.
  • Solución más robusta gracias al uso de los tokens SAML estándar de la industria
  • Integración con los repositorios de identidad corporativos para el aprovisionamiento y desaprovisionamiento automáticos

Leer el caso práctico completo

Senior Service America, Inc.

McAfee instaló en menos de una hora un sistema con McAfee Cloud Single Sign On en el ambiente de prueba, lo que permitió que Senior Service America implementara el inicio de sesión único en su portal de partners.

Aspectos destacados
  • Mejor experiencia de usuario final con la comodidad del inicio de sesión único
  • Capacidad de agregar fácilmente más soluciones SaaS al portal a lo largo del tiempo
  • Despliegues más rápidos
  • Soporte 24 horas al día, 7 días a la semana, de los proveedores de TI globales más importantes de la industria
  • Aprovisonamiento y desaprovisionamiento para reducir los costes y mejorar la eficacia de TI

Leer el caso práctico completo

Requisitos del sistema

Los siguientes requisitos del sistema son los mínimos. Los requisitos reales variarán según la naturaleza de su entorno.

  Consola de gestión Portal de aplicaciones
Firewall para equipos de sobremesa
(On-Premise Edition)
Firefox 5, Internet Explorer 8, Chrome 16, Firefox 5,
Internet Explorer 7, Safari 5.1.2
Firewall para equipos de sobremesa
(SaaS Edition)
  IE 9 IE 10 Firefox Chrome
OS X 10.7     X X
Windows 8   X X X
Windows 7 X X X X
Windows Vista X   X X
Windows XP     X X
Navegador móvil
(On-Premise Edition)
No se admite Android 2.0,
dispositivos iOS y navegador Safari
Servidor
(On-Premise Edition)
Windows Server 2003, 2008 o 2008 R2;
Red Hat Enterprise Linux 5.4 Server y
Advanced Platform 5.0
32 bits o 64 bits
No aplica
Hardware
(On-Premise Edition)
Cualquier procesador con varios núcleos,
2 GB de RAM

Demostraciones / Vídeos

Demostraciones

Network Security Platform uses multiple detection engines to alert on today’s stealthy malware.

Use event correlation and progressive disclosure workflows to prioritize events, improve detection, and speed investigation.

Network Security Platform uses new advanced detection capabilities to uncover both known and unknown botnets.

Network Security Platform includes application visibility and control of over 1,100 applications and protocols.

A core element of any cloud security strategy is the enforcement of acceptable usage policies. See how McAfee Web Protection provides system and network administrators with more than 1,000 application controls to manage user’s access to specific cloud application functions, such as Facebook or YouTube.

Learn how McAfee Data Loss Prevention solution aligns data discovery, classification, policy management, and security controls with business requirements and processes.

Tutoriales

Learn how to configure McAfee Network Threat Behavior Analysis through our step-by-step installation tutorial.

After viewing this video, you will know what templates are and how to create them in McAfee Data Loss Prevention.

Vídeos

McAfee Application Control ensures only trusted applications run on servers and endpoints. It reduces risks from unauthorized software, boosts endpoint control, extends the viability of fixed-function systems without impacting performance, and lowers operating costs.

Outdated methods of malware detection leave crucial data at risk. Learn how McAfee solutions can prevent advanced malware attacks and protect valued assets.

Leverage this video to learn how to build consumer trust through online security

This demo video introduces ClickProtect, a feature of McAfee Email Protection that helps you eliminate the threats from embedded URLs within an email message.

This demo video introduces ClickProtect, a feature of McAfee Email Protection that helps you eliminate the threats from embedded URLs within an email message.

McAfee Cloud Single Sign On relieves the pain that end users have managing multiple passwords for cloud applications.

Ensure continuous compliance. McAfee Configuration Control prevents unauthorized changes on critical servers, boosts visibility into your environment, and streamlines internal and external IT audit processes.

McAfee Content Security Blade Server protects enterprise networks from spam, malware, and other intrusions with a single, high-performance solution. Based on next-generation blade server architecture, Content Security Blade Server reduces IT costs, cuts complexity, and easily scales by inserting additional scanning blades to address future capacity requirements.

In an age of ever-changing technology threats, McAfee helps protect critical infrastructure industries in all sectors with a cloud-to-endpoint security portfolio. Backed by the highest level of Global Threat Intelligence, McAfee delivers real-time visibility, the latest protections, and quick proof of compliance, plus optimized solutions for proprietary SCADA systems.

In an age of ever-changing technology threats, McAfee helps protect critical infrastructure industries in all sectors with a cloud-to-endpoint security portfolio. Backed by the highest level of Global Threat Intelligence, McAfee delivers real-time visibility, the latest protections, and quick proof of compliance, plus optimized solutions for proprietary SCADA systems.

Learn how Beverly Hills Wealth Management maximized SaaS access to user applications.

Learn why Riverside Healthcare chose McAfee Enterprise Mobility Management (McAfee EMM) to manage the influx of mobile phones and tablets on its network.

Premios y críticas

451 Research: evaluación de analistas de McAfee Cloud Identity Manager
La empresa de analistas 451 Research examina McAfee Cloud Single Sign On (antes McAfee Cloud Identity Manager) y la estrategia de gestión de la identidad y del acceso de McAfee y llega a la conclusión de que “…las bases tienen un gran alcance, desde el hardware de los dispositivos hasta la nube.”

SC Magazine: análisis de producto: McAfee Cloud Identity Manager
SC Magazine concede a McAfee Cloud Identity Manager 4,75 estrellas de un máximo de 5. "...hemos comprobado que McAfee Cloud Identity Manager es una buena inversión".

Noticias y acontecimientos

Recursos

Fichas técnicas

McAfee Next Generation Firewall S-Model Appliance Specifications

Find detailed technical specifications for six models of the McAfee Next Generation Firewall S-series.

McAfee Next Generation Firewall Roles and Licensing Options (english)

For technical specifications on the McAfee product listed above, please view the product data sheet.

McAfee Email Gateway Hardware Appliance Specifications (english)

For technical specifications on the McAfee product listed above, please view the product data sheet.

McAfee Web Gateway Appliance Specifications (english)

For a technical summary on the McAfee product listed above, please view the product data sheet.

McAfee Web Gateway Reverse Proxy and ICAP Deployment Options Data Sheet (english)

Web-based malware can be downloaded from external sites by users, or uploaded to internal systems if you provide access to external users, such as partners or contractors. This data sheet explains how the reverse proxy and Internet Content Adaptation Protocol (ICAP) features in McAfee Web Gateway enhance network security and block malware targeted at internal websites.

McAfee Next Generation Firewall Appliance Comparison (english)

Download a technical comparison of all McAfee Next Generation Firewall appliances.

FISMA Security Control Assessments (english)

McAfee Data Center Security Suite for Databases (english)

For a technical summary on the McAfee product listed above, please view the product data sheet.

McAfee Next Generation Firewall Modules (english)

For technical specifications on the McAfee product listed above, please view the product data sheet.

Intel Solid State Drive Management with McAfee Real Time Command (english)

McAfee Real Time Command revolutionizes security systems management with immediate visibility into system data and prompt interventions. Using McAfee Real Time Command and the Intel SSD Pro dynamic link library (DLL), IT professionals can more effectively track the health of Intel SSD Pro 1500 Series Opal-compliant drives and take proactive measures to reduce customer downtime.

McAfee Network Threat Response on CloudShield CS-4000 (english)

For a technical summary of the CloudShield product listed above, please view the product data sheet and learn how McAfee Network Threat Response on the CloudShield CS-4000 platform complements your existing network defenses.

McAfee Security Suite for Virtual Desktop Infrastructure (english)

For technical specifications on the McAfee product listed above, please view the product data sheet.

McAfee SIEM Supported Devices (english)

For a technical summary on the McAfee product integration listed above, please view the product data sheet.

McAfee Firewall/VPN Appliance Comparison (english)

Download a technical comparison of all McAfee Firewall/VPN appliances.

Libros blancos

SANS Survey: Incident Response – How to Fight Back (english)

SANS recently surveyed incident response (IR) teams to get a clearer picture of what they're up against today. The results are in; most organizations lack formalized IR plans, they expressed a need to collect and correlate threat intelligence and SIEM tools are their focus for improving IR capabilities.

Data Loss Prevention Best Practices for Healthcare (english)

Due to the ever-changing web of regulations that span federal, state, and local jurisdictions, healthcare organizations are being required more than ever to safeguard patient data, including electronic protected health information (ePHI). This paper explains how deploying a Data Loss Prevention system in a healthcare organization is one part of a broader data protection program.

Discover. Protect. Expand. (english)

Modern hybrid data centers, which embrace physical, virtual, and cloud servers, require a new security mindset. The biggest challenges faced by IT in this type of environment is workload discovery, comprehensive security with minimal performance impact, and management. This white paper offers insights into how McAfee Server Security Suites tackles all of these challenges and provides better visibility across the entire enterprise data center.

The Blended IPS: Leveraging Snort and Optimizing Malware Security (english)

This paper is to present the satisfied Snort user and open source security proponent with an effective way to add advanced malware detection and automated threat blocking to an existing Snort-based intrusion prevention system (IPS).

Preventing Targeted Attacks with McAfee's Advanced Threat Defense (english)

In this white paper, IDC outlines McAfee Advanced Threat Defense (ATD) within the context of the specialized threat analysis and protection market. Our centralized approach to malware analysis, deep integrations across the product portfolio, and three-pronged focus on "Find, Freeze, Fix" as a way of dealing with threats is unique within the market and provides a more holistic approach than other detection-oriented products.

Strengthening Security, Control, and Compliance for Retail OEMs and Their Customers (english)

This white paper provides retail OEMs and their customers with insights into the technologies that are part of the McAfee embedded security solution, along with security, management, and compliance benefits made possible by shipping retail devices with security built in. You’ll learn how this integrated solution goes beyond device protection and extends security across the entire retail environment.

Conquer the Top 20 Critical Security Controls (english)

The strength of the Critical Security Controls (CSCs) is their ability to reflect the consensus of successful experiences captured and refined over multiple revisions. The CSCs help organizations break down operational silos by providing a pragmatic blueprint detailing where to focus efforts to achieve the greatest results. This white paper maps the quick wins within the first five CSCs to associated McAfee products, services, and partner solution capabilities — all part of the Security Connected platform.

Jackpot! Money Laundering Through Online Gambling (english)

This in-depth report details a common way in which cyber thieves launder money – through online gambling sites.

Planes detallados de tecnología

Investigate Data Breaches (english)

McAfee enables enterprises to collect, analyze, and preserve security forensic information. With a solution that includes content- and context-aware SIEM, McAfee provides alerts to security events, as well analysis on how the attacked occurred, affected users, and compromised data — so you can better understand the severity of a security breach.

Reportes

McAfee Next Generation Firewall: Optimize Your Defense, Resilience, and Efficiency (english)

This eBook provides an in-depth overview of the features and benefits of the technologies within McAfee Next Generation Firewall.

Magic Quadrant for Mobile Data Protection 2014 (english)

McAfee positioned as a leader in Gartner’s Magic Quadrant for Mobile Data Protection.

What's Next Europe Report (english)

Find out what industry experts from the US and Europe are saying about advanced evasion techniques (AETs). You’ll learn why they are growing concern, why technology alone is not enough to keep them in check, and how they will shape the future of enterprise security.

2014 AV-TEST Comparative Cloud Gateway Test (english)

AV-TEST performed a comparative review of McAfee Web Protection in the Cloud and Websense Cloud Security 2014 and tested each against a set of malicious URLs with zero-day malware to determine their performance against the latest threats on the web.

SANS Report – Advanced Network Protection with McAfee Next Generation Firewall (english)

Evaluating next generation firewalls? See what the SANS Institute says about the management features and advanced security capabilities of the McAfee Next Generation Firewall.

McAfee Advanced Threat Defense Test Results (english)

AV-TEST performed a test of the McAfee Advanced Threat Defense appliance to determine its malware detection capabilities.

What's Next: Industry Experts Speak Out on Advanced Evasion Techniques (english)

Get our experts' opinions on Advanced Evasion Techniques (AETs)- delivery mechanisms used to disguise advanced persistent threats (APTs) and permit them to slip through network security undetected.

Magic Quadrant for Secure Email Gateways (english)

Gartner recognizes McAfee as a visionary in the Gartner Magic Quadrant for Secure Email Gateways, as published on July 1, 2014.

McAfee Positioned in Leaders Quadrant of the Magic Quadrant for SIEM (english)

Broad adoption of SIEM technology is being driven by the need to detect threats and breaches, as well as by compliance needs. Early breach discovery requires effective user activity, data access and application activity monitoring. Vendors are improving threat intelligence and security analytics. Leading analyst firm Gartner has placed McAfee as a Leader in the Magic Quadrant for Security Information and Event Management.

[Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.]

McAfee Positioned in the Leaders Quadrant for 2014 Magic Quadrant for Secure Web Gateways (english)

Leading analyst firm Gartner has placed McAfee as a Leader in the Magic Quadrant for Secure Web Gateways.

Secure Web Gateways (SWGs) utilize an advanced array of techniques, such as URL filtering, malware detection and application control technology, to protect organizations and enforce Internet policy compliance. The evolving threat landscape has forced SWG vendors to respond by adding technologies to defend against advanced threats and in this Magic Quadrant Gartner analyzes each vendor’s approach to advanced threat defense.

Data Center IPS Comparative Analysis: Total Cost of Ownership (english)

By using total cost of ownership (TCO) instead of purchase price, t is possible to factor in management of the device via labor costs associated with product installation, maintenance, upkeep, and tuning.

ESG Lab Validation Report: McAfee Advanced Threat Defense (english)

This ESG Lab Validation report documents hands-on testing of McAfee Advanced Threat Defense, a key component of McAfee’s end-to-end solution for addressing advanced malware. Testing was designed to explore how the solution accurately detects advanced malware using a layered approach, the speed and effectiveness of responding to an attack, and the operational efficiencies of this integrated solution.

eBook: Securing the Evolving Datacenter (english)

This report highlights ways security technologies and services are evolving to provide the visibility and control needed to deploy workloads flexibly in the evolving datacenter, which spans both private and public clouds.

NSS Labs Enterprise EPP Comparative Analysis, Socially Engineered Malware (english)

Learn about why NSS Labs ranked McAfee as the top vendor for endpoint protection products for socially engineered malware protection, exploit protection, and phishing protection.

Resúmenes de soluciones

Manage Risk and Security (english)

This solution guide addresses the importance of implementing a strategic security and risk management program focused on prevention and protection, reducing incidents and risks across the enterprise, across every device, and across the entire IT infrastructure.

McAfee Enterprise Security Manager, Services Solutions for Managed Service Providers (MSPs)

McAfee Enterprise Security Manager offers the advanced scalability, flexibility, and control you need to protect your customers’ business, and grow yours.

McAfee Total Protection for Data Loss Prevention (english)

McAfee Total Protection for DLP safeguards intellectual property and ensures compliance by protecting sensitive data wherever it lives — on the network, in storage systems, or at the endpoint, while saving time and money with centralized deployment, management, and reporting.

Prioritize and Remediate Critical Risks Found by McAfee Vulnerability Manager (english)

McAfee Vulnerability Manager and Skybox Risk Exposure Analyzer (REA) combine to give customers an advanced solution to identify IT vulnerabilities, prioritize and evaluate security risks and attack scenarios, and mitigate critical risks before they cause harm.

McAfee Next Generation Firewall: Complete IPS Technology (english)

McAfee Next Generation Firewall provides comprehensive IPS capabilities, including a flexible deployment options (hardware, software, or virtual appliances), evasion-proof detection against today’s most advanced attacks, broad inspection coverage, and much more.

Data Center Server Security Suites (english)

McAfee Data Center Server Security Suites deliver the industry’s first comprehensive solution for securing mission-critical services in today’s mixed physical and virtual environments.

Expand Virtualization, Maintain Security (english)

McAfee Management for Optimized Virtual Environments AntiVirus (McAfee MOVE AntiVirus) tailors security systems to the special technical and management requirements of virtualization.

Seven Myths About Advanced Malware (english)

Advanced Malware — you know you don’t want it to infiltrate your systems, but do you know how to prevent it? This solution guide debunks the seven most common advanced malware myths to ensure you properly secure your systems from even the most evasive threats.

SIEM Compliance Made Easy (english)

The McAfee SIEM solution, Enterprise Security Manager, addresses today’s complex compliance challenges by combining an established unified compliance framework with superior abilities to collect, retrieve, and protect the data required to assess and demonstrate compliance in real time. It’s tightly integrated log collection, management, analysis, and reporting improves an organization’s ability to meet compliance requirements through frameworks, streamlined workflow, and automation.

Securing the Internet of Things (english)

The Internet of Things (IoT, or Internet-connected smart devices) is rapidly changing the way we live and the way we do business. McAfee is working closely with OEMs to address the expanding security requirements of IoT devices for every layer—devices, connections, the cloud, and data centers.

McAfee Delivers Comprehensive Threat Protection for the Financial Services Industry (english)

This solution brief explains how the McAfee Security Connected approach provides advanced threat protection for the financial services industry and prevents targeted attacks.

Smarter BYOD (english)

As Gartner predicts, BYOD is here to stay and will soon become the rule rather than the exception. Users are eager to embrace the trend, but IT is reticent for good reason. This solution brief shows IT how to successfully get a handle on BYOD with a scalable strategy and integrated solutions that fall under the umbrella of the Security Connected framework from McAfee.

Real-Time Forensics Takes Network Security to the Power of Two (english)

NIKSUN's NetDetector/NetDetectorLive expands security monitoring by combining signature-based intrusion detection system (IDS) functionality with statistical anomoly detection, analytics, and deep forensics with web reconstruction and packet-level decodes.

Comunidad

Blogs

  • The Security Impact of Shadow IT: December #SecChat
    McAfee Enterprise - diciembre 5, 2013
    Is something dangerous lurking in the shadows of your organization? That’s the question we sought to answer by commissioning Stratecast to research the use of unauthorized Software-as-a-Service (SaaS) applications in the workplace. The findings revealed that widespread risk for companies is originating from the use of unauthorized apps within the workplace. According to the study, […]
  • Taking Shadow IT Out of the Shadows
    Lynda Statdtmueller - diciembre 4, 2013
    Look around your office. Flip through your business contact list. Chances are that four out of five of your colleagues are violating company IT rules. This startling revelation comes from a recent Software-as-a-Service (SaaS) survey conducted by Stratecast and sponsored by McAfee. The survey set out to examine “shadow IT,” defined as employees’ use of […]
  • Is There Something Phishy In Your Inbox?
    David Bull - noviembre 20, 2013
    Phishing is a widespread problem. According to Allen Paller, director of research at the SANS Institute, 95% of all attacks on enterprise networks are the result of successful spear phishing. Can you tell if this email is legitimate or not? Think about this: How many packages does your company receive in a typical day? Likely […]
  • How Much Are Your Assets Worth?
    Cybermum Australia - septiembre 26, 2013
    Now, if your tax returns are up to date and you have a healthy relationship with a financial planner, I have no doubt you could answer this question in an instant. But what about your other assets? And I am not referring to your children because clearly they are priceless – most of the time!! […]
  • Hackers are Cashing in on Instagram Likes
    Gary Davis - septiembre 9, 2013
    They say popularity has its price. This saying holds a new weight when it comes to the growing influence of social media. In fact, your “Likes” may be worth more to hackers than your credit card number. As counterintuitive as it may seem, your social clout has become the new target of hackers. And they’re […]