The search found 4155 results.
Partner
Depuis plus de 35 ans, CFI accompagne les moyennes et grandes entreprises dans l'évolution de leur système d'information et propose un large éventail d'offres de matériels et de services associés.
Face au rythme des changements technologiques, le positionnement de CFI évolue rapidement vers un rôle d'intégrateur de solutions métiers, permettant de proposer au travers d’écosystèmes de partenaires, la mise en œuvre de ces solutions et leur paiement à l'usage.
News
Cyberattacks target every industry all the time, and healthcare is no exception. According to a recent IBM study, the average cost per healthcare cyberattack is a hefty $7 million. Despite numbers like this, cybersecurity often isn’t the C-suite’s top priority. How can CISOs in hospitals and other healthcare organizations demonstrate the value of strong cybersecurity while a host of other issues vie for leadership’s attention?
Blog
If a hacker gets access to your privileged accounts they can move around your network, applications and equipment. Malicious actors can steal your data, as well as delete it, modify it and change your settings or create persistent backdoors into your network. For any company (just ask Marriott/Starwood), the risk is significant – stolen user information, loss of intellectual property and damage to your brand. Not to mention possible regulatory fines, lawsuits, etc.
Blog
Networks in the cloudIt is easy to start a virtual computer these days in a cloud datacenter managed by Amazon AWS or Microsoft Azure. It is also easy to start a second and a third one and then plan to build a virtual network. This network can grow and shrink, get updated and upgraded following the needs of the organization even outgrowing old good on-premises datacenter.
Blog
Recently, I wrote about the importance of combining multifactor authentication (MFA) and privileged access management. According to 2018 Global Password Security Report, 45% of organizations are already using two-factor authentication (2FA) and the 451 Group reports that 53% of businesses have adopted MFA. As these numbers continue to grow, new challenges are emerging relating to authentication, shared privileged accounts and creating a virtual MFA.
Blog
Thinking about implementing a privileged access management solution? With security threats on the rise and more people working remotely, it’s critical that companies lock down and monitor privileged accounts. This makes it harder for hackers to access your most sensitive data and systems.
Blog
RDP or VNC AccessA friend recently asked me to explain the difference between RDP and VNC protocol to remotely access a computer.RDP stands for Remote Desktop Protocol. It is a proprietary protocol built by Microsoft to let users graphically control a remote computer.