Bye Bye CLI, Hello ‘Intent’
Gartner Group predicts that the use of Ethernet fabrics, SDN, SD-WAN and cloud-managed networks, will replace more than 50% of the installed Internet access base by 2020. Due to higher access speeds and to the growing use of network management systems (Juniper’s...
Yubikey and Other U2F Two-factor Authentication Tokens
This prompted me to re-review Yubikey and U2F authentication. The key (sorry) advantages of a U2F key, like Yubikey, are that it saves you typing and does not require your phone, it is a bit easier to carry, and it can’t be fooled by bogus websites. There are a few...
Even the Court Says Password Sharing Bad
The U.S. Court of Appeals for the Ninth Circuit has ruled that a former employee of a company, whose computer access credentials were revoked, had acted “without authorization” in violation of the Computer Fraud and Abuse Act (CFAA), when he and other former employees...
Our Customers – By The Numbers
%
Amount of Lost Sleep for Our Clients
%
Average Sales Growth for 100% of Our Clients
%
Cost Savings Versus Your In-House IT
%
Average Annual Increase In UpTime Sciences Client Base
Deliver Unified Threat Management Solutions To Your Users
Expert IT That Saves You Expensive Business Interruption
Integrate Lines Of Communication For Bottom Line Impact
Stay Informed. Sign Up for our Newsletter
Keep in touch with security updates, promotions and opportunities.