Today’s uncertain global environment has made it an imperative for companies to enable remote access to business-critical applications. In particular, the fluidity...
Vendors. Supply chain partners. Third parties. Contractors. All are different names for entities that might need access to your corporate networks and...
Listen to this articleOne of our clients, the Belarus Republican Scientific and Technical Library recently posted an article on how they support innovation.They...
Moving into the fourth quarter of 2019, it’s a great time to reflect on the current cybersecurity landscape and the major events and trends which have happened this year. Almost everybody understands what cybersecurity means in the most basic sense, as the majority at least have some experience with anti-virus software. But as we increasingly […]
Reading Time: 9 minutesHere’s an A to Z glossary of terms related to Endpoint Protection-
A
Advanced Persistent Threat (APT) – An unauthorized person gaining...
Reading Time: 6 minutesTakeover remote endpoints using ITSM
ITSM’s ‘Takeover’ feature allows administrators to remotely access and control Windows devices to solve issues, install...
Reading Time: 3 minutesUpdate: check the latest version of Comodo’s free mobile security app
When it comes to securing a digital device, antivirus is...
Reading Time: 2 minutesUpdate: check the latest version of Comodo’s free mobile security app
Developers of Replicant, an open source variant of Android, claim...