White Papers

451 Research “Entrust snags assets from CensorNet to build out its ‘continuous authentication’ vision”

451 Research “Entrust snags assets from CensorNet to build out its ‘continuous authentication’ vision”

Identity management vendor Entrust Datacard has inked its second acquisition less than a year, picking up the SMS PASSCODE adaptive authentication assets from UK-based cloud access security broker (CASB) CensorNet. As part of the transaction, Entrust will also make a strategic investment in Censor-Net’s Unified Security Service (USS) platform.
Beyond Cloud Visibility – Because discovery is no longer enough

Beyond Cloud Visibility – Because discovery is no longer enough

According to the Ponemon Institute, cloud applications are a significant security concern for organisations, with 71% of global IT professionals believing the challenge is harder to face using existing, conventional security tools.
Securing Remote Access in  Financial Services

Securing Remote Access in Financial Services

Cyber-attacks are getting more and more common and in hacking circles, financial services (FS) organizations are a prime target, as the rewards can be substantial.
Selecting A Multi Factor Authentication Solution

Selecting A Multi Factor Authentication Solution

Modern threats require a modern authentication approach, specifically one that can deliver a session and location-specific code to a user’s mobile device in real-time.
It’s a Matter of Context

It’s a Matter of Context

Looking to implement multi-factor authentication for the first time? With the rise in cyber crime, it’s no surprise. The growing use of remote access to conduct business has increased the threat of identity theft – an increase that is astonishing in both speed and complexity.
The CIO's Strategy Guide to Securing the Cloud

The CIO's Strategy Guide to Securing the Cloud

The last few years have presented hackers with an even bigger opportunity. The cloud. The move from server-based to service-based thinking is changing the way traditional IT departments design and deliver the technology that supports their businesses. In this guide we explore the risks envolved with taking to the cloud and give comprehensive answers on how to mitigate the top security risks that o...
Why Cloud Application Security Brokers will rule the world

Why Cloud Application Security Brokers will rule the world

If we’re being entirely honest, ‘Cloud’ and ‘Security’ are far from a natural marriage, in fact, on the surface, it’s a partnership that shouldn’t work. Cloud is seen as creative, open, progressive and inherently sociable. It’s attractive to many and has a promising future to offer to any potential suitor. Its personal ad is therefore unlikely ever to read ‘Seeks overly possessive, naturally paran...
Cloud Application Control: Redefining the Secure Web Gateway

Cloud Application Control: Redefining the Secure Web Gateway

If you take a long, hard look at the web security and content filtering market, it quickly becomes clear that many of the products designed to protect us over a decade ago haven’t changed to address the rise of the Cloud Application; thus rendering their role borderline redundant. There has been a void in the market for some time that bridges that gap between traditional web security and content f...
CensorNet Email Security: Here phishy, phishy.

CensorNet Email Security: Here phishy, phishy.

The thing about well known phishing scams is they’ve essentially become industry-comedy punch lines which also puts them in danger of being diluted as a meaningful and growing threat. So why, if we are all so attuned to the risks, is phishing still by far and wide, one of the biggest reasons for security breaches and data loss?
BYOD, is the Big Bad Wolf dead?

BYOD, is the Big Bad Wolf dead?

There can be no argument that the digital world is rapidly changing at an unprecedented speed. For many CIOs it really is a question of adapt or be left behind. An IT department is increasingly being perceived as an organization that introduces unnecessary delay. Obstacles previously regarded as barriers to technology adoption, are either being brushed aside or aggressively challenged by an ever-s...
Unified Security Service (USS) - Securing the human condition?

Unified Security Service (USS) - Securing the human condition?

Any law-enforcement advisor will tell you, criminals succeed mainly because they understand the human psyche. Knowing how to manipulate somebody into leaving a backdoor open is still the ultimate weapon in any criminal’s arsenal. Cyber-crime is no exception.
Change is Coming - How MSPs can get ahead of the curve with Cloud Security

Change is Coming - How MSPs can get ahead of the curve with Cloud Security

As an MSP, we understand the need for you to bring value to your customers and resellers. We also know that you need to make margin to grow your business. “By 2016, 25% of enterprises will secure access to cloud-based services using a CASB platform, up from less than 1% in 2012, reducing the cost of securing access by 30%”
BYOD and e-Safety Law in Education

BYOD and e-Safety Law in Education

In this whitepaper Dr. Bandey examines the methods that a School is legally obliged to implement when assessing the legal risk in pupil BYOD for the first time or reassessing the law-based environment in which current BYOD use is taking place.
London calling - CensorNet rocks its CASB with two-factor authentication

London calling - CensorNet rocks its CASB with two-factor authentication

With the addition of context-based, granular access controls, the company now boasts one of the broader collections of SaaS security offerings and a flexible architecture that can help enterprises connect the dots across their SaaS, Web and email applications under a single umbrella.