Category: From our Leaders

Connect.Protect

Authentication Is What You Do As Much As Who You Are

We’re all entirely familiar with the idea of a password. We should, we have between 6-10 that we not only use but use multiple times a day, across 90 different sites that we navigate. And because our brain craves simplicity, we typically use the same password for all those sites. We make them easy to…
Read more

Will Artificial Intelligence improve security in 2020?

Artificial Intelligence (AI) and Machine Learning (ML) are two of the most hyped buzzwords in the last few years. Will they pass the peak of the Hype Cycle and deliver more true business value and improved security in 2020? AI at its best  The truth is that AI is a very diverse beast. It has…
Read more

Follow the breadcrumbs

Like the story of Hansel and Gretel, following the small bits of information is often the way to find your way home, or in this case to the attack perpetrator.  Security analytics is a vital part of managing your cybersecurity solution: without analytics there is no way to understand your true protection status. Vendors providing full stack solutions is a…
Read more

Empower users with more than MFA

Empower users with more than MFA

We all know that Two Factor Authentication (2FA) is the foundation of good perimeter security—but it’s often perceived as cumbersome to use. Users want a smooth way to login, it’s why they save passwords in the login dialogues when possible—or choose poor quality, easy to remember variations of passwords. Convenience is, in some ways, the…
Read more

Is MFA the MSSP enabler you have been waiting for?

Is MFA the MSSP enabler you have been waiting for?

Security is complex—customers need help and where do they get it? They  typically turn to their local trusted party, their IT partner. Those trusted parties are the competent resellers all over the world: the ones who advise, who install and configure the security solutions and serve as the trusted advisor for what to do next.…
Read more

Identity is the New Perimeter

Networks are not what they used to be. Since the introduction of the firewall as the #1 security product to protect your business the world’s ways of working have evolved, massively. Firstly, depending on culture and country, remote working has become very common and employees expect the same access to services outside the office as…
Read more

The Bjorn Borg Effect, Sweden and Tech Unicorns

How tech companies like Spotify, Skype, Clavister and others show why Sweden has the perfect conditions for tech incubation Sweden is amazing for many reasons, its healthy lifestyle and population, its incredible nature and open expanses and its open-minded Nordic attitudes. What might come as a surprise though is that it’s also a tech superpower,…
Read more

The Threat of the East

Once upon a time, state sponsored surveillance and privacy threats were the domain of the West. But as Chinese telecom infrastructure vendor Huawei shows, Asia is emerging as a formidable threat to our businesses.