Corona Outbreak: Optimization of Remote Workspaces

Corona Outbreak: Optimization of Remote Workspaces

The corona virus pandemic has not only completely changed the day-to-day lives of Germans, but also the working world. Those who can and whose employer allows it are working from home. Since lockdown was put into place, companies have gone through three different...
What Ever Happened to Shadow IT?

What Ever Happened to Shadow IT?

Shadow IT — at one point — kept CIOs and CISOs up at night. But today, it has become less of a looming threat and something that IT teams have come to terms with as a result of larger, unstoppable changes happening in the industry long before the disruption of...
Government Organizations Must Rein in Privileged Users

Government Organizations Must Rein in Privileged Users

Just last week, the Department of Veterans Affairs announced a data breach had exposed the personal information of up to 46,000 veterans. While data breaches have many causes, privileged credential abuse is a common one. A recent survey from Forcepoint and the Ponemon...
How Endpoint Protector Keeps Data Secure on DaaS Platforms

How Endpoint Protector Keeps Data Secure on DaaS Platforms

The COVID-19 pandemic took many organizations by surprise. Faced with the need to quickly scale-up their remote work capabilities in a cost-effective way without compromising security and performance, many companies turned to Desktop-as-a-Service (DaaS) as a viable...