3 Challenges of Securing a Dynamic Enterprise Solved by 1 Solution

Your old perimeter was static—bounded by network devices and a determined physical location. Your new perimeter is elastic and defined by devices. And they are moving faster and farther than ever before. Keeping pace with this digital transformation is necessary to reduce risk to your organization. As the volume and diversity of endpoints increase, identifying, [...]

2 Ways Technology Can Help Employees Transition Back to the Office

As organizations across the globe are getting back to the office, one thing is certain: employees need workspaces that can adapt to changing demands. That’s why creating flexible approaches for your employees is critical to their productivity and well-being. But how do you enhance the employee experience while navigating uncertain times? Migrating technology from one [...]

How to Eat the CMMC Certification Elephant and Close Security Gaps

If your business serves the Defense Industrial Base (DIB), the Cybersecurity Maturity Model Certification (CMMC) is unlike any other framework for your organization. Certification—or lack of it—has a near-100% probability of affecting your bottom line. Your organization will not be awarded any Department of Defense (DoD) third-party bids without certification. What is the CMMC? The [...]

Sirius Achieves Okta Growth Partner of the Year Recognition

Sirius is honored to be recognized by Okta as their 2020 Growth Partner of the Year. The award was presented recently during Okta’s recent FY22 Sales Kickoff event. Sirius delivers identity and access management (IAM) solutions that improve our clients’ security posture, and this recognition is a testament to that dedication. “We are thrilled to [...]

Sirius Named by Check Point for Overall Booking Contribution

Sirius is honored to be recognized by Check Point Software Technologies as the Overall Booking Contribution leader for 2020. This award was presented during the recent Check Point Sales Kickoff 2021 virtual event and was accepted by Kevin Casson, Sirius vice president, Security. “Check Point is a long-standing Sirius partner and they continue to play [...]

The Route to Zero Trust Travels Through Identity

There is no such thing as a trusted network anymore. Because applications and users aren’t inside a physical network perimeter like they used to be, securing your network alone is no longer enough to protect your data, brand and reputation. Instead, trust must move to users and systems. But trust should never be automatic—regardless of [...]

Sirius Joins Forces with Former Intermountain Healthcare CISO

Sirius makes a big gain in their Healthcare Security team with the onboarding of former Intermountain Healthcare CISO, Karl West. Based in Salt Lake City, Utah, Intermountain Healthcare is a not-for-profit healthcare system with more than 41,000 caregivers and an integrated delivery network of 23 hospitals and 300 clinics. Under West’s guidance, the healthcare system [...]

The FireEye Attack and 4 Security Moves to Make Right Now

We have all been witnessing the global impact of the health and economic events of 2020. As the year draws to a close, we are also now witnessing the unfolding discovery and investigation of a cyberattack the scope of which continues to grow. The full extent of this attack and its repercussions may never be [...]

SASE Brings Security to the Edge

The increasing use of and reliance on mobile access, cloud processing and cloud-based services has led to a growing need for cloud-based security. Nearly half of all user requests are now going to a cloud destination, and many of these requests are on unmanaged devices with limited security. As a result, securing an effective perimeter [...]

Top Concerns Around Enabling DaaS

Today’s workforce is rapidly changing, and with the development of virtual workspaces it has become increasingly convenient and relatively easy for people to work from anywhere. If your organization has not yet transitioned to using digital workspaces and is considering making the switch to a Desktop as a Service (DaaS) model, you are probably trying [...]