Security

/Tag:Security
­

The Complete 2018 IBM Z Webinar Series: Sirius Experts Shed Light on Industry Trends

Sirius has a dedicated team of experts that are leaders in the industry, as well as integration of Z hardware, software and storage to suit our client’s needs. The team has hosted a webinar series over the last couple months that showcases this expertise and featuring the latest industry topics that relate to IBM Z®. [...]

By |September 10th, 2018|Blog|Comments Off on The Complete 2018 IBM Z Webinar Series: Sirius Experts Shed Light on Industry Trends

Sirius Wins Tufin Partner of the Year Award

Network Security Policy Orchestration solutions provider Tufin® has recognized Sirius as its 2017 Partner of the Year for the West region. The award recognizes the Tufin channel partner that has delivered the most value to the region—and to clients—during the past year. “When we evaluate potential partners, the first thing we look for is how [...]

By |August 7th, 2018|Blog|Comments Off on Sirius Wins Tufin Partner of the Year Award

Security Is the Foundation for Achieving Digital Dominance

Where are you on the path to digital transformation? Perhaps you’re just starting to build a transformation plan, or maybe you already have a grip on what you want to accomplish but don’t know where to start. The foundation of any successful enterprise is to become and remain a trusted organization or brand. And a [...]

By |July 27th, 2018|Blog|Comments Off on Security Is the Foundation for Achieving Digital Dominance

Ensuring Effective IoT Security

According to Gartner by 2020, one-third of successful attacks experienced by enterprises will be on data located in shadow IT resources, including shadow Internet of Things (IoT). The reality is that IT is not in control of IoT adoption. IT was outpaced by BYOD, and IoT is growing even faster. With the number of connected devices [...]

By |July 20th, 2018|Blog|Comments Off on Ensuring Effective IoT Security

How IoT Innovators Solve Real World Problems

From delivering pizzas faster, to saving money on energy bills, to improving healthcare systems, the Internet of Things (IoT) affects the convenience and the quality of our daily lives. As IoT technology continues to rapidly evolve, the true innovators are the ones incorporating a human touch. We spoke with E.G. Nadhan, chief technology strategist for [...]

By |June 19th, 2018|Blog|Comments Off on How IoT Innovators Solve Real World Problems

IBM Z® Series: Outsmarting Enhanced Mainframe Security & Compliance Threats

Built on over four decades of continually enhanced virtualization technology, IBM® Z offers an advanced combination of security, resiliency, flexibility and availability. Companies investing in their futures are realizing the benefits of IBM Z, and analysts are reporting lower total cost of ownership for companies moving more applications to these systems. Sirius has a dedicated [...]

By |May 25th, 2018|Blog|Comments Off on IBM Z® Series: Outsmarting Enhanced Mainframe Security & Compliance Threats

GDPR – Why Should You Care?

The General Data Protection Regulation (GDPR) is the new EU data privacy regulation that comes into force on May 25, 2018. GDPR requires organizations to manage customer data more securely, and to provide some fundamental data rights to EU citizens regarding access to data about them, as well as portability of their data. Some of [...]

By |April 2nd, 2018|Blog|Comments Off on GDPR – Why Should You Care?

7 Steps to Effective Data Classification

In today’s security landscape data protection is not just a legal necessity, it’s critical to organizational survival and profitability. Storage is cheap, and organizations have become data hoarders. One day — they think — they’ll get around to mining all of that data for something useful. But data hoarding can cause serious issues. Much of [...]

By |March 19th, 2018|Blog|Comments Off on 7 Steps to Effective Data Classification

10 Tips to Improve Your IT Security Strategy

Is your organization reevaluating its security strategy for 2018? Start the year off right by assessing your security posture, and formulating a plan. Here are 10 tips to help you advance your cybersecurity strategy: 1. Know what you need to protect The first step in any IT security strategy: know what you need to protect. [...]

By |February 2nd, 2018|Blog|Comments Off on 10 Tips to Improve Your IT Security Strategy

Put Up Your Dukes Before the Next Cyberattack

Cybercrime is one of the greatest threats to organizations. According to CSO, global ransomware damages costs are predicted to exceed $5 billion in 2017, and the human attack surface will reach four billion people by 2020. However, insider breaches can also wreak havoc on organizations. So, what can you do to protect your enterprise from [...]

By |December 11th, 2017|Blog|Comments Off on Put Up Your Dukes Before the Next Cyberattack