When most people consider cybersecurity, they think about protecting the information that resides on their computers—sensitive emails, folders or files.
                    
			            - By Mauricio  Chacon
- May 01, 2014
 
            
                
	                
                    
                                        
		            
                    While an alarm system can’t protect your customers from everything, it is a proven measure of deterrence. Homes with alarm systems are three times less likely to get burglarized than homes without them. 
                    
			            - By Rob  Phillips
- May 01, 2014
 
            
                
	                 
                    
                                        
		            
                    Datacenter traffic is predicted to triple by 2017 with the cloud as the biggest traffic source, according to a recent Cisco Global Cloud Index study.
                    
			            - By Charles P.  Williams
- May 01, 2014
 
            
                
	                 
                    
                                        
		            
                    There is no telling what an appetite for success and a passion for technology will produce. One thing for certain, the desire to give the customer the best security solution possible will likely bear a long-term, winning combination. 
                    
			            - By Ralph  C. Jensen
- May 01, 2014
 
            
                
	                 
                    
                                        
		            
                    Paris has the Eiffel Tower; New York has the Empire State building; Sydney has its Opera House; Rome has the Coliseum; and London has the London Eye, a well-known symbol for an extraordinary city.
                    
			            - By Chris  Maras
- May 01, 2014
 
            
                
	                
                    
                                        
		            
                    While most organizations have developed highly sophisticated, comprehensive emergency plans, they are often lacking the communication vehicle to meaningfully convey them and make them accessible to a wide audience before, during and after an event. Mobile devices provide a simple, efficient and secure channel to proactively get the most up-to-date plans and best practices into the right hands and mitigate overall risk.  
                    
			            - By Christopher   Britton
- Apr 30, 2014
 
            
                
	                
                    
                                        
		            
                    Developer and manufacturer of long-range industrial wireless Ethernet radios embraces 10 years of business success. 
                    
		            
                
                    
                    
                    
                 
            
                
	                 
                    
                                        
		            
                    Shocking results of a two-year security study of a healthcare network revealed via weak passwords, lack of authentication and embedded web servers. 
                    
			            - By Ginger  Hill
- Apr 29, 2014
 
            
    
                
	                
                    
                                        
		            
                    Identity management company innovates with a REST API for directories - now available for download.
                    
		            
                
                    
                    
                    
                 
            
                
	                 
                    
                                        
		            
                    Heartbleed scanner identifies over 1,700 vulnerable mobile apps.