Orange Cubes

“I would recommend MegaCryption because it does what it says, handles our current needs and future needs that will arise, has more functions than other products, and the cost of the product was great. I would rate the technical support as a 10.”
- Major Northeast University

Encryption is worth doing the right way. Here are some things to think about for your company’s encryption strategy. It’s common knowledge among security professionals today that one of the most important components of any data security strategy involves encryption. Encryption is an incredibly powerful tool in protecting the security and privacy of data. But […]

Businesses run on data, and customers trust them or abandon them based on how well they take care of that data — but many organizations are ill prepared to prevent or deal with a data breach. Robert Westervelt wrote for CRN that one of the biggest issues in data security is a lack of incident […]

Sometimes the threats we face aren’t in the Cloud — they’re in the office with us. Many of the security issues we have discussed in this blog have revolved around protecting an organization’s data against external threats. Hackers and other cyber criminals pose a risk to organizations, but so do employees, especially since they have […]

McAfee recognizes self-service password reset and synchronization as a key technology area — and ASPG as a leading player in the field. The Security Innovation Alliance (SIA) is the premier technology partnership body in the security industry, formed under the aegis of McAfee. The primary mission of the SIA is to provide vendors with increased […]

Distributed computing came with the promise of many opportunities for cost savings. Companies expected to save money when they move their applications from a centralized mainframe to a distributed environment or cloud solution. However, it’s not all sunshine and roses. Many hidden costs inflate the Total Cost of Ownership (TCO) of distributed computing. Businesses need […]

If your organization has a BYOD (Bring Your Own Device) policy, there’s a couple more things you’ll need: Education for your employees and security on the software side. We’ve spoken before about some of the technological and policy issues of BYOD for enterprises running mainframes. Much of the concerns around BYOD in the enterprise revolves […]

No one knows how the power of the mainframe will be used in the future. But with 90% of Fortune 500 companies still using it to power their mission critical operations, and it being responsible for nearly all credit card transactions, one thing is for certain: The mainframe has a long life ahead of it. […]

Mobile and cloud computing will continue to increase the importance of a secure access management system. This means access control will have to become an even larger part of any organization’s data security strategy. Companies with deep technical talent may be tempted to develop and implement their own integrated access management system, but a comprehensive […]

Companies put encryption in place to protect their most valuable data. Properly implemented encryption adds a crucial layer of security to a database. In addition to strong access controls and multi-factor authentication, encryption can protect data from misuse, even if someone steals the hardware. In case of stolen hardware (which would be pretty challenging to […]

There are plenty of reasons for a business to make sure its data is secure. Not least of these is avoiding the embarrassment of landing in a conspicuous spot on one of the many “Top Ten Worst Data Breaches of 2013” lists. Some breaches come about through a mistake or negligence on the part of […]