Sales +1-855-261-3391 Chat Blog Partner Support Status  |  Download

Posted October 09, 2015
Comments 0 Comments

Third-Party Access Vulnerabilties—Security's Weakest Link

blog-image

High-profile security breaches caused by third-party access vulnerabilities have led to increased scrutinizing of internal access controls by IT leadership and executives. The risks associated with data leakage can extend far beyond the value of the compromised data to include financial penalties and even long-term damage to a brand. Businesses need to take a comprehensive approach to third-party access and management.

Read more

Posted September 10, 2015
Comments 0 Comments

Maintaining Visibility And Control in a Partly Cloudy World With Microsoft DirectAccess and Pertino

With the rise of SaaS and cloud services, users are spending more time connecting over the Internet and less time on office LANs. That means IT has less visibility and control of remote users and their endpoint devices. Microsoft DirectAccess and Pertino enable Sys Admins to maintain visibility and control in a partly cloud world.

Read more

Posted July 20, 2015
Comments 0 Comments

Why Cloud-based DaaS Is Blowing New Life Into VDI

Over the last five years, the merits of VDI (virtual desktop infrastructure) have been widely debated. Today, service providers are leveraging the cloud to provide distributed, scalable and resilient Desktop-as-a-Service (DaaS) offerings that deliver on the promise of VDI for a broader set of SMB and enterprise customers. This shift is blowing new life into the VDI market.

Read more

Posted June 22, 2015
Comments 0 Comments

Analyst Perspective: Healthcare Compliance And Active Directory

Pertino's Josh Grose talked with Tod Ferran, IT Security Auditor, CISSP and QSA at SecurityMetrics, about the state of HIPAA and PCI and the role Active Directory can play in achieving compliance.

Read more

Posted June 11, 2015
Comments 0 Comments

Extend AD to remote sites and users

For many system and network administrators, Active Directory (AD) provides a critical tool for maintaining security and control of servers, desktops and users within an office and across the campus. However, it can be challenging to extend AD domains to smaller remote sites, mobile users and newly acquired organizations. While a number of options are available, most are costly and difficult to implement and maintain.

Read more

Chat now Click to Chat