The modern-proof alternative to MAC address filtering

Category: IT Security / Date: 19 March 2020

When you’re an IT manager, you’ve probably heard of MAC address filtering. Today, many organisations still use it to manage IT access, by letting in all whitelisted MAC addresses while keeping out…

Read the article

Digital certificates- the most important NAC feature explained

Category: network access control / Date: 20 February 2020

When talking about Network Access Control, we often mention digital certificates. When entering a company network, they’re like the passport that proofs you’re a trusted user using a trusted device.…

Read the article

The fall of Mobile Device Management and the rise of the app container

Category: IT Security / Date: 16 January 2020

When I talk to IT managers, we often discuss the grip they lack. Co-workers run around with privately owned laptops and phones, that differ in operating system, update pace and settings. IT managers…

Read the article

Don’t trust the fort! The zero-trust model explained

Category: IT Security / Date: 19 December 2019

As a rule, remote workers and their devices can’t be trusted. You simply can’t know who’s on the other side or what network they’re on. This is why we always recommend to not use VPN, as this creates…

Read the article

What is Remote Access Control? (No, it’s not a stupid question)

Category: IT Security / Date: 14 November 2019

Many people understand the concept of remote access. It’s working without being physically present at the office, right? Well yeah, sort of. But if you’re responsible for securing this remote access,…

Read the article

This is how you make remote access work [5 focus points]

Category: IT Security / Date: 17 October 2019

So your employees want to work from home. Great! Remote workers have the potential to deliver great work in less time, without occupying all of your company computers and eating all the granola bars…

Read the article

5 Scenarios You Don't Need to Worry About when using MailZen with Office 365

Category: IT Security / Date: 26 September 2019

Imagine one of your colleagues wants to access Office 365 when they’re out and about, using their own mobile? It’s not that hard to picture, right? But as an IT manager, you know this seemingly…

Read the article

How to stay friends with remote workers & still rule IT security

Category: IT Security / Date: 22 August 2019

“Put that down”. “Careful with that, it’s fragile.” “What did I tell you about talking to strangers on your company smartphone?” IT managers sound suspiciously like mothers. And whether you have kids…

Read the article

Remote workers- drop your VPN or we’ll shoot!

Category: network access control, VPN / Date: 11 July 2019

Now that so many employees work from home or another location that isn’t the office, the call for safe remote connections increases. Often, companies choose the well-known VPN to fulfil this need.…

Read the article

“Don’t look at me” - Who’s responsible for IT security?

Category: IT Security / Date: 4 July 2019

To date, the question from the title remains unanswered. Because who is responsible for IT security in this modern age? Network users make a lot of unintentional mistakes, as they’re often unaware of…

Read the article
Page 1 of 2
1 2