2 ways next-generation firewalls outperform UTMs

Posted by Nathan Bradbury on Aug 17, 2016 11:23:57 AM

Since we introduced Barracuda NextGen Firewall – Intronis MSP Edition earlier this summer I’ve talked with a number of MSPs that have asked about the difference between a next-generation firewall (NGFW) like ours and other more traditional unified threat management (UTM) products they’re seeing on the market.

To me, the answer is clear. Next-generation firewalls got their name for a reason. They offer the next generation of protection for your end users’ environments. Let me highlight a couple of the most important differences between NGFWs and UTMs.

Register for the webinar

Read More

Topics: IT Security

It's time to run political campaigns in the cloud

Posted by Ron Miller on Aug 2, 2016 1:58:15 PM

When the DNC got hacked in June, it got added to the list of high-profile hacks nobody wants to be on, joining the likes of Sony, OPM, JP Morgan and Target (among others) in hacking infamy.

Read More

Topics: IT Security, Cloud Trends

Changes in attack patterns create demand for managed security services

Posted by Mike Vizard on Jul 19, 2016 10:03:41 AM

While managed security services providers (MSSPs) have been remotely managing firewalls and anti-virus software deployments for years, it’s become clear over the past 12 months that new classes of threats are doing an end run around those core security technologies. For example, ransomware, which is usually downloaded by an end user who has been tricked into thinking a particular email is a legitimate message, is not something a traditional firewall alone can defend against.

Because of the rapidly evolving threat landscape, a new survey of 591 IT and security professionals conducted by the Ponemon Institute recommends that IT organizations begin to employ cyber threat monitoring tools that keep track of, among other things, social engineering attacks that are starting to proliferate across various social media networks.

Read More

Topics: IT Security

Discover what true Total Data Protection really is

Posted by Neal Bradbury on Jun 21, 2016 4:42:18 PM

As an MSP, you get it. Bad things happen. Whether it’s a system failure, natural disaster, malware infection, or a good old-fashioned data breach, there are so many ways for businesses to suffer data loss. That’s why you want to offer your customers “Total Data Protection” so you can help them recover their data when one of those bad things happens.

But what about preventing that data loss from happening in the first place? Data protection alone isn’t enough to proactively safeguard your SMB customers from the changing landscape of threats and vulnerabilities targeting businesses of all sizes. Don’t be conned into thinking otherwise.

Read More

Topics: IT Security

The growing importance of security breach incident management

Posted by Mike Vizard on Jun 14, 2016 12:00:57 PM

How an IT organization handles a breach is now arguably more important to the business affected than all the time and effort they put into preventing one from happening.

In this day and age, some kind of breach is now almost inevitable. In fact, a new survey of 2,400 end users in the U.S., United Kingdom, and Germany conducted by Centrify, a provider of identity access management software, finds that roughly three quarters of them have come to expect that a business is going to be hacked. Despite having that expectation, however, well over half say it is somewhat likely or very likely that they will stop doing business with an organization that’s been hacked.

Read More

Topics: IT Security

Navigating the nuances of the IT security services paradox

Posted by Mike Vizard on Jun 7, 2016 10:00:00 AM

One of more maddening aspects of being an IT security services provider is the approach organizations take to IT security. In theory, a raft of revelations concerning security breaches should have organizations begging for additional IT security expertise. But a new survey of 500 IT security professionals conducted by CompTIA finds that half of them think the security technologies and processes they have in place today are good enough to protect them.

Yet, the survey also finds that satisfaction with existing security products remains below 50 percent. When the two numbers are considered together, it shows that there is a surprising amount of inertia that providers of IT security services need to overcome. The simple fact of the matter is that there is still a lot of complacency when it comes to IT security despite the near daily revelations concerning one breach or another.

Read More

Topics: IT Security

Who's really responsible for IT security in the cloud?

Posted by Mike Vizard on May 26, 2016 9:33:53 AM

The typical public cloud service provider employs a bifurcated approach to IT security in the cloud. They'll take responsibility for securing the infrastructure services they provide, but any software running on top of those infrastructure services is the responsibility of the developer or the IT organization that put it there.

A new survey of 100 IT decision makers conducted by the market research firm Enterprise Management Associates (EMA) on behalf of iland, a provider of cloud hosting services, finds that when it comes to securing application workloads nearly half (48 percent) of IT organizations are spending more on security technologies than they ever did when they only ran application workloads on premise.

Read More

Topics: IT Security

Cloud security concerns drive IT organizations into the arms of MSPs

Posted by Mike Vizard on May 19, 2016 9:52:28 AM

Given the rate of growth of public cloud services, it’s hard to argue that security concerns are an impediment to adoption. Nevertheless, it’s also clear that cloud security is still a major issue inside most IT organizations.

A new survey of 2,200 IT security professionals, which was conducted by CloudPassage and LinkedIn and released this week, drives this point home. A full 53 percent cite security as a barrier to cloud adoption, followed by compliance (42 percent) and data loss and leakage (40 percent).

Those results might not come as a surprise to most IT service providers, but the way that those organizations intend to solve those problems just might. 

Read More

Topics: IT Security

Class action lawsuit against Wendy's to fuel point-of-sale upgrades

Posted by Mike Vizard on May 5, 2016 12:00:00 PM

With mixed success, the Smart Card Alliance—a consortium of credit card issuers—has been badgering retailers into upgrading their point-of-sale (PoS) systems in order to support smart cards, which incorporate a processor designed to cut down on the number of fraudulent transactions being generated using older credit cards that relied on magnetic strips.

Many retailers, however, balked at adding support for these chip-enabled cards because of the cost of upgrading the PoS systems. The Smart Card Alliance warned retailers that banks would hold them liable for any fraudulent transactions that occurred after the October deadline. Now that shoe has finally dropped in the form of a class action lawsuit being opened against the fast-food chain Wendy’s by First Choice Credit Union.

Read More

Topics: IT Security

Tapping into managed security services remains a challenge

Posted by Mike Vizard on Apr 26, 2016 9:02:40 AM

Managed_Security_Services.jpgThanks to a rash of high-profile security breaches, awareness of IT security issues has never been higher. However, securing an IT environment gets more complex with each passing day.  Given those two factors, demand for managed security services should be escalating.

But a new survey from CompTIA suggests that solution providers across the channel are not tapping into that opportunity. In fact, the survey finds that only one in 10 of those surveyed are leading with their own security services brand rather than the brand of the security vendor. That doesn’t mean that channel partners are not offering security services. For example, a full 67 percent report offering risk management services, and another 61 percent say they have a mobile security service.

Read More

Topics: IT Security

MSP Marketing Assessment
MSP Phishing Quiz
MSP State of the Industry Survey
Intronis Local Lunches