2019 Gartner Magic Quadrant für IT Service Management Tools

Ivanti ist der einzige Hersteller, der im diesjährigen Gartner Magic Quadrant for ITSM Tools eine positive Entwicklung zeigt und im Challenger Quadrant aufsteigt.

Lesen Sie die Analyse von Gartner zu den Herstellern auf dem Marktplatz für IT-Service-Management, einschließlich....:

  • Ivanti's Anerkennung im Gartner Magic Quadrant
  • Beratung bei der Suche nach einer ITSM-Lösung
  • Gartner's Vision der ITSM-Landschaft
  • Stärken und Vorsichtsmaßnahmen für jeden Hersteller

Eine Kopie des Berichts können Sie HIER herunterladen

 

All apps on Google Play are safe: Fact or fiction?

Kaspersky LogoWe always recommend downloading Android apps from official stores and nowhere else. But that doesn’t mean there are no viruses in the Google Play. It is true, however, that you’ll find fewer of them in the official store than on third-party sites, and they get removed on a regular basis. 

How Google monitors the security of Android apps
It is no mean feat for malware to get into Google Play. Before they publish an app, moderators check it for compliance with an extensive list of requirements. If they find a violation, they ban the program from the store.

Weiterlesen

CyberSecurity Skill Development

ectacom RGB mediumCyberSecurity ist vielmehr eine unternehmensweite Sicherheitskultur, ein Zusammenwirken von Technologien, Maßnahmen, Aktionen und Menschen, gesteuert von einem ganzheitlichen Konzept, angepasst an die individuellen Kommunikationsprozesse eines Unternehmens und an ihre Schwachstellen. CyberSecurity ist nicht allein Sache der IT-Abteilung, sondern der kompletten Organisation und aller Mitarbeiter.

Das Ziel dieses eintägigen Workshops / Seminars ist, einen grundlegenden Überblick über aktuelle Gefahren sowie technische Schutz- und Verteidigungseinrichtungen zur Bewältigung von Cyberrisiken zu vermitteln.

Weiterlesen

When and where should sensitive data be encrypted? The revealing answers might surprise you!

WinMagicLogo

After having run WinMagic with the main focus as a data encryption company for more than 20 years, I asked our team for the first time last week the very basic question: When – and where – should sensitive data be encrypted?

The answers are eye opening for me.

Ideally, sensitive data should always be encrypted except when it is being processed*, e.g. used by an application, which requires plaintext data.

With expertise in disk encryption we determined that data should be only decrypted in RAM memory for the CPU to work on; our disk encryption encrypts the data before it is written to the disk. But with advancements in memory encryption, the RAM can actually be always encrypted, with data being decrypted only within the CPU. That’s perfect! Well, almost.

Weiterlesen

Vulnerability Scanning, Pentesting, Red Teaming … What’s Next?

PicusThis blog post will take a deeper look and comment on the paper 'Red Team: Adversarial Attack Simulation Exercises (AASE) – Guidelines for the Financial Industry in Singapore'. It was released in November 2018 by the Association of Banks in Singapore and – although targeting the financial industry in Singapore specifically – it also contains useful guidance on how to leverage various offensive security methods for security validation.

The AASE guidelines explain how and when to use methods such as vulnerability scanning, penetration testing, and red teaming. This blog post discusses where Breach and Attack Simulation (BAS) tools fit into this continuum.

Weiterlesen

What is Passwordless Authentication?

Okta Logo BrightBlue Medium

Passwordless authentication is an emerging authentication method that has been gaining traction as of late. In this post, we’ll explore what passwordless authentication is, the usability and security challenges that passwords present, and the benefits of passwordless authentication.

What is passwordless authentication?
At a basic level, passwordless authentication is any method of verifying a user without requiring the user to provide a password. Proving the user’s identity can instead be done using an alternative factor like a proof of possession factor (mobile authenticator apps, hardware token, one-time OTP), biometrics, or—in less than ideal cases—a knowledge factor (PIN, passphrase, etc).

Weiterlesen

Automate Away Service Desk Anxiety to Drive Digital Transformation Success

ResolveLogo

 Digital transformation may offer huge rewards, but it can create unparalleled complexity, especially for an IT service desk stuck in the middle. Matthew Walker of Resolve explains why automation is the key.


The answer is automation: when done right, it can break down IT siloes, reduce mean time to repair (MTTR) and costs, and free up teams to be more innovative. In doing so, it helps drive agility and speed, but also the security and compliance that are crucial to successful digital transformation.

Weiterlesen

How orgs should apprach Shadow-IT & how Network Detection & Response can help!

ExtraHop

Non-IT department sanctioned tech solutions can pose security and compliance challenges for organizations, but it turns out, the outlook isn't all bad.

Have you ever found yourself in a pinch at work needing to print out a personal file on your lunch break? The bank, mortgage company, or student loan lender needs signed paperwork, and they need it now! So you transfer the file from a thumb drive or your personal cloud storage app account onto a work machine. Alternatively, maybe you need to get a project done fast, but you don't have the right tools. So you install non-IT department sanctioned software to help you get your work done more efficiently.

Weiterlesen

Focus on Use Cases to Improve Security Operations

threatquotient

There was a time when the term “use case” was confined to product development meetings where software and systems engineers worked through defining why and how a product would be used in order to create requirements. Use cases remain a critical tool to ensure teams are building products their customers need and can use.

Fast forward ten years and it seems that everyone in the security industry is talking about use cases. Industry analysts advise clients to select products based on use cases. Vendors market and sell solutions based on use cases. And security professionals are evaluating and purchasing products based on use cases, with good reason.

Weiterlesen

8 Empfehlungen, wie Sie Ihre Mitarbeiter für Phishing-Angriffe sensibilisieren

 Vor nicht allzu langer Zeit richtete sich Phishing hauptsächlich an den Verbrauchermarkt, und Malware galt als größte Bedrohung für Unternehmen. Heute ist Phishing der häufigste Angriff auf Unternehmen und für mehr als 90 Prozent der Sicherheitsverletzungen verantwortlich. Da keine Cybersicherheitslösung 100 Prozent der Angriffe blockieren kann, müssen Ihre Mitarbeiter geschult werden, um herauszufinden, worauf sie achten müssen, um sich vor Phishing-Angriffen zu schützen.

Weiterlesen

ectacom HQ München

ectacom GmbH
+49 8102 8952-0
Friedrich-Bergius-Str. 12
D-85662 Hohenbrunn

ectacom Wien

ectacom GmbH
Am Europlatz 2
A-1120 Wien

ectacom Linz

ectacom GmbH
Ennser Straße 83
A-4407 Steyr-Dietach

ectacom Poland

ectacom Polska sp.z.o.o:
+48 501 295 580
ul. Dominikańska 21 B
02-738 Warszawa