Protect Archives - Page 2 of 4 - Enablis

Why is Secure Access Service Edge (SASE) in the news?

Posted on: June 3, 2020 | 3 minutes read

Here’s why Secure Access Service Edge (SASE) is a hot topic now. Since the end of last year Secure Access Service Edge (SASE) has been widely discussed as it supports the way in which organisation are currently evolving and digital transformation and remote working models.

Many recent articles explain why SASE is such a hot topic especially now, as many move to working from home models – so we can now officially say, the future of remote work is upon us.

Read more

Topics: , , , , , ,

An in-depth look at the Benefits of SASE

Posted on: June 1, 2020 | 4 minutes read

Gartner discusses the true benefits of implementing a Secure Access Service Edge (SASE) architecture and how it can support your business for the future state.

Read more

Topics: , , , , , ,

What is the importance of SASE to ensure your data is secure?

Posted on: May 29, 2020 | 3 minutes read

In this blog we discuss what SASE is, and why it’s such a hot topic for all types of businesses worldwide, and how your business could be left behind if you’re not evaluating the benefits of a SASE framework.

Read more

Topics: , , , , ,

2019 Crowdstrike Global Security Attitude Survey

Posted on: December 12, 2019 | 3 minutes read

The survey reveals that the time it takes Australian organisations to respond to a breach is slower than those of our overseas counterparts. Australian organisations take an average of 186 hours to respond, compared with the global average of 162 hours.

Read more

Mimecast: Leader in Gartner’s Enterprise Information Archiving Magic Quadrant

Posted on: December 9, 2019 | 3 minutes read

As a key partner in the Enablis Zero Trust Security Framework, we are proud of Mimecast’s achievement, which also establishes our offering as being best-of-breed. In addition to Mimecast, our Zero Trust offering also brings in the strengths of Crowdstrike, ZScaler and Okta – all Gartner Leaders in their field.

Read more

Can an organisation truly be passwordless? The answer is yes.

Posted on: October 3, 2019 | 3 minutes read

Let’s face it, we’ll all sick of passwords. But can an organisation truly be passwordless? The answer is YES. But what exactly is passwordless?

Read more

Crowdstrike’s 2019 Mobile Threat Landscape Report

Posted on: August 21, 2019 | 2 minutes read

It’s undeniable that data security threats are on the rise. Attackers infiltrate even the most guarded organisations through their email (check out the stats on Mimecast’s 2019 State of Email Security Report), their end-points and even directly through their front door by hacking users’ passwords. And maybe you’ve got most of these bases covered. (If you haven’t, do come and talk to us about our Zero Trust Security Framework).  But have you considered mobile security?

Read more

2019 State of Email Security

Posted on: July 25, 2019 | 2 minutes read

Email impersonation attacks, or email fraud, continues to grow, with Mimecast’s 2019 State of Email Security Report showing a 67% increase in attacks compared to 2018. The report finds that 73% of those organisations impacted by impersonation attacks having experienced a direct loss, specifically loss of customers (28%), financial loss (29%) and data loss (40%). Phishing attacks were the most prominent type of cyber attack, with 94% of respondents having experienced phishing and spear phishing attacks in the previous 12 months, and 55% cited seeing an increase in phishing attacks over the same time period.

Read more

Top 8 Identity & Access Management Challenges with Your Saas Application

Posted on: June 11, 2019 | 6 minutes read

The enterprise cloud revolution is here. IT organisations everywhere, from small and mid-sized businesses to Fortune 500 companies, are moving from on-premises software to on-demand, cloud-based services. As enterprise IT makes this transition to a new hybrid on-demand/on-premises configuration, controlling who is granted access to which applications becomes increasingly important. This presents CIOs and their teams with a whole new set of identity management challenges. In addition, users must keep track of multiple URLs, user names, and passwords to get access to their applications.

Read more

  • Categories