White paper

Selecting A Multi Factor Authentication Solution

Selecting A Multi Factor Authentication Solution

Modern threats require a modern authentication approach, specifically one that can deliver a session and location-specific code to a user’s mobile device in real-time.
It’s a Matter of Context

It’s a Matter of Context

Looking to implement multi-factor authentication for the first time? With the rise in cyber crime, it’s no surprise. The growing use of remote access to conduct business has increased the threat of identity theft – an increase that is astonishing in both speed and complexity.
The CIO's Strategy Guide to Securing the Cloud

The CIO's Strategy Guide to Securing the Cloud

The last few years have presented hackers with an even bigger opportunity. The cloud. The move from server-based to service-based thinking is changing the way traditional IT departments design and deliver the technology that supports their businesses. In this guide we explore the risks envolved with taking to the cloud and give comprehensive answers on how to mitigate the top security risks that o...
BYOD, is the Big Bad Wolf dead?

BYOD, is the Big Bad Wolf dead?

Bring your own device (BYOD) is far from a cutting-edge term, in fact, it’s been on the table for a while now and it all started with the boss when they bought their nice new shiny toy into work that they got for Christmas and announced this is what they will use from this day forward.
Cloud Application Control: Redefining the Secure Web Gateway

Cloud Application Control: Redefining the Secure Web Gateway

Porn; love it or pretend it’s something you once saw by accident at a friend’s house, was at one stage both the undisputed king and at the same time, utter scourge of the Internet. On the one hand, it reigned through sheer size and dominance (no pun intended) and on the other, it vicariously gave birth to a whole security software industry, designed entirely to keep you, your children, work collea...
Why Cloud Application Controllers will rule the world

Why Cloud Application Controllers will rule the world

If we’re being entirely honest, ‘Cloud’ and ‘Security’ are far from a natural marriage, in fact, on the surface, it’s a partnership that shouldn’t work. Cloud is seen as creative, open, progressive and inherently sociable. It’s attractive to many and has a promising future to offer to any potential suitor. Its personal ad is therefore unlikely ever to read ‘Seeks overly possessive, naturally paran...
BYOD and e-Safety Law in Education

BYOD and e-Safety Law in Education

In this whitepaper Dr. Bandey examines the methods that a School is legally obliged to implement when assessing the legal risk in pupil BYOD for the first time or reassessing the law-based environment in which current BYOD use is taking place.
Change is Coming - How MSPs can get ahead of the curve with Cloud Security

Change is Coming - How MSPs can get ahead of the curve with Cloud Security

As an MSP, we understand the need for you to bring value to your customers and resellers. We also know that you need to make margin to grow your business. “By 2016, 25% of enterprises will secure access to cloud-based services using a CASB platform, up from less than 1% in 2012, reducing the cost of securing access by 30%”
CensorNet Email Security: Here phishy, phishy.

CensorNet Email Security: Here phishy, phishy.

The thing about well known phishing scams is they’ve essentially become industry-comedy punch lines which also puts them in danger of being diluted as a meaningful and growing threat.
Unified Security Service (USS) - Securing the human condition?

Unified Security Service (USS) - Securing the human condition?

Any law-enforcement advisor will tell you, criminals succeed mainly because they understand the human psyche. Knowing how to manipulate somebody into leaving a backdoor open is still the ultimate weapon in any criminal’s arsenal. Cyber-crime is no exception.
Securing Remote Access in Financial Services

Securing Remote Access in Financial Services

Your guide to securing remote access to networks and applications in a highly regulated, highly targeted industry. As remote working increases, so does the security risk for banks, insurers and other financial institutions. The fact that many employees now work from home, when they are commuting or when they are traveling, means the organization’s boundaries are much less defined than they were in...
London calling - CensorNet rocks its CASB with two-factor authentication

London calling - CensorNet rocks its CASB with two-factor authentication

With the addition of context-based, granular access controls, the company now boasts one of the broader collections of SaaS security offerings and a flexible architecture that can help enterprises connect the dots across their SaaS, Web and email applications under a single umbrella.