Clearpath’s Blog on IT Infrastructure, Hybrid Clouds and IT Security

Security in Concert: Cisco Pioneers a Truly Integrated Security Portfolio

Posted by Clearpath Solutions Group on Tue, Jul 16, 2019 @ 10:30 AM

There are literally thousands of enterprise security solutions on the market. Yet, 82% of enterprises want an integrated security solution and 62% are considering consolidating their security vendors (ESG Research Report). There are many benefits to this approach, but only one company is building it: Cisco. 

According to Enterprise Strategy Group, Cisco leads the pack in enterprise-class security across network, cloud, internet, email, and endpoints. But more than relying on a single anchor product surrounded by rudimentary products, Cisco is expanding and upgrading its leading products across the board and applying automation, machine learning, and threat intelligence to stop threats at the edge, protect users wherever they are, and stop threats faster.

Read More

Topics: Security, Cisco

Cisco + Duo: Zero Trust Identity Verification On-Premises and In the Cloud

Posted by Clearpath Solutions Group on Mon, Apr 01, 2019 @ 10:00 AM

As part of Cisco’s commitment to securing access for the network perimeter, late last year it added Duo Security to the Cisco family. Duo is a leading provider of unified access security and multi-factor authentication delivered through the cloud.

Read More

Topics: Security, Cisco, Cisco Umbrella, Cisco ASA VPN, Duo

Is Your Data Ecosystem Fully Protected? Dell EMC Integrated Data Protection Appliance can help!

Posted by Clearpath Solutions Group on Wed, Dec 20, 2017 @ 01:30 PM

 Today’s businesses simply will not survive without protecting the endless amounts of data generated from a growing ecosystem of applications. Finding a comprehensive, powerful and scalable solution can seem daunting, time-consuming, costly and complex. 

Contact Clearpath's Dell EMC Professional Services Team

Complete data protection typically requires building a piecemeal solution. Companies need multiple point products, such as backup storage, backup software, backup servers and search servers from a variety of vendors. Will these multi-vendor products handle data management across private, public and hybrid cloud? Will they meet the strict, always-changing government/and or compliance standards?

Read More

Topics: Security, Data Protection, Dell EMC, Backup Servers, Backup Solution

Enabling Secure IT Operations for your Organization

Posted by Clearpath Solutions Group on Tue, Jan 17, 2017 @ 11:29 AM

Over the past several weeks we have examined ways to protect your organization from malware and other malicious code throughout the corporate environment. If it is not evident at this point - we are examining data from a multitude of devices scattered throughout the corporate IT infrastructure. We find that the devices and software used for this task are both diverse and disjointed. These devices include Firewalls, laptops, desktops, multifunction devices, A/V software, basically anything that is connected to the network. These devices and software provide valuable information in the form of logs that can be used to trigger alerts based on multiple inputs.

Read More

Topics: Security, SIEM

Complete Endpoint Solutions

Posted by Clearpath Solutions Group on Thu, Jan 05, 2017 @ 11:39 AM

The battle at the endpoint - phones, tablets and mobile computing - faces an endless onslaught of malware delivered from websites, bots, and pretty much any other malicious code that can be thrown at endpoints. Why are the endpoints always under attack? Simple, when they are off corporate networks there are no firewalls, no IPS, none of the enterprise grade protection that exists in a corporate environment. You and I know this, unfortunately so do the bad guys. Understanding this helps us understand why these devices are frequently targeted by malicious individuals and organizations.  It is good to think of the endpoints as the new perimeter.

Read More

Topics: Security, Cisco, Endpoint Security, Carbon Black

Hunting Hidden Malware in your Datacenter

Posted by Clearpath Solutions Group on Thu, Dec 22, 2016 @ 02:13 PM

All malware does not immediately trigger a security alert as some new variants are quite stealthy and designed to lay in wait until such time as they are activated. In this section we describe malware and in particular ransomware.

Northeastern University published an interesting piece, “Cutting the Gordian Knot: A Look Under the Hood of Ransomware Attacks” Between 2006 and 2014, this research team analyzed 1,359 ransomware samples and found that a “close examination on the file system activities of multiple ransomware samples suggests that by… protecting Master File Table (MFT) in the NTFS file system, it is possible to detect and prevent a significant number of zero-day ransomware attacks.”

Read More

Topics: Security, Ransomeware, Alert Logic

Educating the User and Social Engineering

Posted by Clearpath Solutions Group on Thu, Dec 15, 2016 @ 10:08 AM

For the second part of the series we would like to dive into educating the user as well as social engineering. The user continues to be the weakest link in many organizations; while it is not that a user has bad intentions, they just frequently represent the easiest target. This can be easily depicted by using a house analogy, the organization can put locks on the doors and
windows as well as installing a state of the art alarm system. This does not prevent the attacker from simply knocking on the door and being invited in by the homeowner. As a matter of fact, this is what makes phishing campaigns so successful. The user is actually tricked into unknowingly granting attackers access to corporate resources.

Read More

Topics: Security, PhishMe

Detecting and Blocking Malware at the Gateway

Posted by Clearpath Solutions Group on Thu, Dec 08, 2016 @ 02:13 PM

Modern malware is evolving at an extremely rapid pace. In fact, a new malware is created nearly every second. Due to the dynamic landscape of ever-growing malware variants, traditional antivirus solutions are becoming less effective - unable to detect and block the unknown malware before it can infiltrate and compromise an organization’s network and systems, driving the need for a more comprehensive solution. In the past two years this has become an increasing busy space among OEM solutions providers. Cisco Systems, Checkpoint software, and Fortinet have invested in providing cost effective solutions that are easily managed resulting in low effort required to provide critical protection of your organizations devices.

Read More

Topics: Security, Cisco, cisco ASA

Malware Blog Series Introduction

Posted by Clearpath Solutions Group on Tue, Nov 29, 2016 @ 09:53 AM

Clearpath, in conjunction with IT Security thought leaders, is excited to announce a five part series to increase awareness regarding the proliferation of malware in the enterprise. We have partnered with many vendors to bring best of breed solutions to our clients. Splunk, Cisco Systems, Checkpoint software, Trend Micro, and Carbon Black are a few of our partners that we have joined forces with to assist in making your mission successful. We understand that one size does not fit all, and strive to provide tailored solutions to meet your requirements and budget. Many organizations install anti-malware software on their users PC’s and “check the box”, indicating the users are now protected, when in fact, an informed end user is often the first wall of defense against malware. Clearpath’s goal is to educate and promote awareness on the new and innovative ways to protect the overall enterprise. Topics in our new series include neutralizing malware at the gateway, social engineering, finding hidden malware in your data center, and how to tie everything together into a solid layered defense.

Read More

Topics: Security

Fortinet Security Vulnerability

Posted by Eric Stuhl on Wed, Jan 27, 2016 @ 01:19 PM

It’s been a rough time for security hardware recently. In the past several months, there have been major issues with a number of different vendor's products. Juniper had a backdoor in its products due to the use of a known compromised RNG, which allowed attackers to decrypt VPN and other encrypted traffic. This is fairly serious but required access to both the traffic and the original firewall to be at risk.

Read More

Topics: Security

Subscribe to Email Updates

Recent Posts

Posts by Topic

see all
Live Chat Support Software