Enterprise Applications

Enterprise Applications | News, how-tos, features, reviews, and videos

26uppk5

Meet the app that’s helping causes streamline their outreach

The key to productivity is structure, but many organizations use fragmented systems to reach people. Their donor list may be in one database while their volunteer list is on a separate Google Doc. This wastes too much time that...

truebill

Truebill can help you manage your finances—and it’s free to download

Truebill makes it easy to track your monthly budget and lower unnecessary payments.

2xl0v2b

1Password is changing the way enterprises secure their data

1Password Advanced Protection provides extensive monitoring tools, giving you control of your security.

CSO  >  danger / security threat / malware / biohazard symbol in data center / servers

Review: Morphisec scrambles memory to thwart advanced attacks

With Morphisec, you get a full spectrum of protection that is more complete than any antivirus program alone.

yyenio9

Learn how to invest & save for your future with GoBankingRates.com

The average consumer constantly thinks about money, and yet, many misconceptions and unknowns plague our minds when our own personal finances are brought up. Financial literacy is an often neglected topic despite it making a major...

k61frs3

Anyone Can Invest in Real Estate with DiversyFund

Investing in Real Estate Isn’t Just for the 1 Percent

mobile connection endpoint protection laptop shield

Review: How Nyotron Paranoid puts endpoint security worries to rest

Adding an extra layer of endpoint protection isn't just for the overly cautious.

CSO  >  Searching for vulnerabilities  >  Magnifying lens in a virtual interface idnetifies weakness

Review: XM Cyber HaXM makes automated penetration testing more accessible, reliable

HaXM is the next logical evolution of automated pentesting programs. Not only does it offer continuous scanning that is easy to configure, it also provides advice to help fix problems.

detection radar computer bug threats identify breach  by the lightwriter kao studio getty

Review: LogRhythm takes SIEM to the next level

LogRhythm Enterprise offers a lot of protection and assistance for finding and remediating threats … and sometimes even pre-threat actions.

Mousetrap and cheese, seen floor-level from the perspective of the mouse.

Review: Fidelis Deception breathes life into fake assets

Today's skilled hackers know, or at least suspect, that deception is in place and won't blindly follow breadcrumbs to fake assets. To combat this, Fidelis Deception creates realistic, living deception assets.

Artificial Intelligence robotic in wheat field

11 questions to ask before buying AI-enabled security software

Infosec is complicated enough. Add AI/ML into your security software mix, and you may be asking for trouble. Or, choose the right vendor, and you could wind up with the best toys on the block. Here's what you need to know to wind up...

graduate school college certification mortar board valedictorian cole keister via unsplash

What can we learn about infosec from the Varsity Blues college admissions scandal?

The Varsity Blues scandal – where rich parents paid an intermediary to get their kids into top colleges by paying off coaches to pass them off as athletic recruits (among other things) – exposed multiple operational security failures...

security automation robot protects defends from attack intrusion breach

Review: JASK ASOC isn't just another overloaded SIEM

The JASK Autonomous Security Operations Center coordinates various alerts and events into a picture of an ongoing threat or attack — the kinds of techniques that human threat hunters employ, only much faster.

Facebook / privacy / security / breach / wide-eyed fear

Facebook secretly paid users $20 a month to use VPN spying app

After it was revealed that Facebook secretly paid people to use the Facebook Research VPN app, the social media site pulled the iOS version. But the Android version will continue.

finger on keyboard with email icons floating out of monitor

Review: GreatHorn offers a better way to secure enterprise email

GreatHorn takes a modern and highly effective approach to protecting enterprise email that goes well beyond the capabilities of legacy mail scanners.

image2 1

Hook Up Your Business with Award-Winning Video Conferencing For As Little As $19.99/mo

RingCentral offers comprehensive, affordable packages for any size organization, and you can set it up in minutes for as low as $19.99 per month.

binoculars forecast spy privacy hacker watching

Review: AttackIQ FireDrill watches the watchers

This penetration testing tool is configured to operate from the inside, with the primary goal of identifying flaws, misconfigurations and outright shortcomings in all other cybersecurity defenses.

login password - user permissions - administrative control

Using a password manager: 7 pros and cons

This veteran security pro feels more secure now that he's using a password manager, but there are still risks.

detective with magnifying glass

5 open source intrusion detection tools that are too good to ignore

Everyone should employ an intrusion detection system (IDS) to monitor their network and flag any suspicious activity or automatically shut down potentially malicious traffic. We look at five of the best open source options.

me and others flow 1

5 reasons eSignatures are the must-have tool you don't think about

Many companies boast about going entirely digital, but continue to work with mountains of documents. Don't be that company.

Load More
You Might Also Like