Satisnet Ltd, Basepoint Innovation Centre, 110 Butterfield Great Marlings, Luton, Bedfordshire, LU2 8DL enquiry@satisnet.co.uk
+44 (0) 1582 434320
Filter posts by solution, product or vendor

Top 4 Password Blunders and How Thycotic Can Help

The fact is that however bad a solution they are, we are all stuck using passwords, and, with few exceptions, they will be for the foreseeable future. These are the typical bad password practices I see when I’ve visited enterprises over recent times.

Read More

LANDESK and HEAT Software Merge to Form Ivanti

Clearlake Capital Group, L.P. (together with its affiliates, “Clearlake”) today announced it has completed the acquisition of LANDESK. In conjunction with the transaction close, LANDESK and HEAT Software announced the two organizations have united under a new corporate name: Ivanti.

Read More

Trend Micro TippingPoint® Named a Leader in 2017 Gartner Magic Quadrant for Intrusion Detection and Prevention Systems (IDPS)

Trend Micro TippingPoint has been named a Leader in the Gartner 2017 Magic Quadrant for Intrusion Detection and Prevention Systems (IDPS). With improvements in both Completeness of Vision and Ability to Execute from previous years, we believe that placement in the Leaders’ quadrant illustrates the positive progress we’ve made since the acquisition of TippingPoint in March 2016 from Hewlett Packard Enterprise.

Read More

Want to break a DDoS record? It’s as easy as 62 user/passwords

On the 22nd of September 2016, Krebsonsecurity.com was taken offline for 4 days after being hit with a Distributed Denial of Service (referred to as ‘DDoS’ herein) attack. This was merely 6 days after being hit with a record 620Gbps – a new record attack.

Read More

QRadar Technical Blog: Adding Custom eMail formats

With the release of 7.2.6 the ability to create multiple eMail formats was implemented as an extension of the existing method for providing user-written versions.

Read More

New Year, New SPORA

A new form of ransomware has been detected on the security radar. It is known as SPORA, and as devastating as it is, it has some notable developed features that are quite impressive.

Read More

Containerisation: Why Traditional Security will End in Tears

Containerisation, which was once considered to be the ‘geek’s’ topic’, has now become a major focal point for the IT enterprise security team. It has also emerged as a preferred foundation of DevOps and an answer to many deep-rooted operational issues.

Read More

Why Do Businesses Need to Patch?

Patching. Why? A lot of IT administrators have the chore of patching both workstations and servers within their organisation. Then the IT administrators have to deal with machines rebooting and end users complaining that the machines are running slow, whilst the patch cycle runs. So, the real question is why do businesses need to even patch?

Read More

What is IBM Security App Exchange & A Look At Carbon Black's Response App

This series of blogs has been created with the intention of shedding some light on a still rather underused area of the IBM X-Force Exchange, and that is the Security App Exchange. The Security App Exchange has a whole host of applications that add a significant amount of helpful functions and content into three of IBMs most prevalent security solutions, QRadar, BigFix and X-Force Exchange.

Read More

New Manoeuvres to Deliver Ransomware and Avoid Anti-Virus Detections

In the modern age, groups of anonymous hackers are utilising new tactics to deliver and compromise remote target systems. The traditional system of using email attachments as a way to distribute these tactics is still being widely used, and considered to be the main way of targeting victims.

Read More

Pages