2 Major Headaches for Enterprise IT Security Pros

Today’s enterprise IT manager faces two major headaches: unplanned network growth and increased mobile device use. These all-too-common pain points complicate the lives of already-overwhelmed IT managers who know that a security attack can bring a lot of misery to themselves and their companies.

Successful security attacks occur at a rate of 1.8 weekly*, making the job of securing enterprise IT a daunting task. Doing the job right hardly gets you noticed by top brass, but when something goes wrong, IT managers are put under scrutiny as they drop everything to fix the problem. Of course, a security breach is when you least want to be noticed.

Continue Reading…

The Kaseya Platform: Born to Be Secure

Today’s enterprise network requires multiple layers to defend against zero-day attacks, advanced persistent threats, targeted attacks, phishing, worms, and a never-ending stream of viruses. Security, therefore, has to be a core function of any IT systems management platform, and that is precisely what enterprises get with The Kaseya© platform.

Continue Reading…

Inspector General Questions Army’s Readiness to Securely Deploy Mobile Devices

BYOD in the Army

In the private and public sectors, enterprise IT managers have had various degrees of success in managing the security risks of off-the-shelf mobile devices on their networks. For the CIO of the United States Army, the problem of maintaining network security in an environment that includes commercial mobile devices (CMDs) is of special importance.

After testing Apple iOs and Android-powered CMDs in the field and administrative offices, the Army Vice-Chief of Staff directed the Army CIO to begin to procure them in 2009 to replace some more costly dedicated hardware and software devices. Recently, the Inspector General’s Office examined how well the Army has been doing at tracking, configuring and maintaining the security of mobile devices on its networks.

The auditors limited themselves to devices running Apple iOs, Android and Windows Mobile OS and visited sites at United States Military Academy, Army Corps of Engineers and the Army Engineer Research and Development Center.

They found that the Army’s CIO “did not implement an effective cybersecurity program for CMDs” and that the CIO did not “appropriately track CMDs and was unaware of more than 14,000 CMDs used throughout the Army.”

Army Mobile Device Management Audits

The auditors concluded that the sites they visited were not using mobile device management to consistently configure devices to protect stored information and that none of them had the capacity to wipe data stores on CMDs that were lost or stolen. Further the auditors concluded that CIOs at USMA and the Army Corps of Engineers Research Center were “allowed to store sensitive data on CMDs that acted as removable storage devices.” The CIOs at these facilities did not offer any training on securing the devices or have users sign any agreements.

The auditors concluded that the deficiencies occurred because the Army CIO “did not develop a clear and comprehensive policy for mobile device management” and “inappropriately concluded that CMDs were not connecting to Army networks and storing sensitive information.” Read the Inspector General’s full report here.

In other words, no integrated system was in place to help CIOs of the various commands to discover, audit and proactively, consistently manage and secure mobile devices. A tool like Kaseya’s Mobile Device Management is a great place to start.

Network Discovery – If You Can’t See It, You Can’t Manage It

Network discovery is the process of identifying devices attached to a network. It establishes the current state and health of your IT infrastructure. It’s essential… without visibility into your entire environment you can’t successfully accomplish even the basics of asset management or network management.  Network discovery should not be a snapshot in time, but a continuous ongoing process in real-time. Every IT management process depends on the reliability of the network discovery procedure.

Continue Reading…

How to follow Kaseya Connect 2013 from anywhere!

UC_13

Kaseya Connect 2013 is here and no matter where you are we have a way for you to learn, connect, and explore the largest Kaseya user conference ever!

Watch the LIVE stream so you don’t miss any of the latest insights from Kaseya executives, product and industry experts.

Throughout the conference there will be opportunities to discuss and network both in person and online with the very best MSPs and IT professionals in the world so don’t be shy. You don’t want to miss out.

There’s lots of way to follow the latest:

No matter where you post/share during the show be sure to use #KaseyaUC so that we can all learn and experience Kaseya Connect 2013 together!

Executive Perspective: Mark Sutherland, President.

2013 is shaping up to be a strong year here at Kaseya. Version 6.3 brings IT automation to a whole new level. The new Discover module, included with every 6.3 system, takes LanWatch to the next level by consolidating all discovery techniques into a single, easy to use automatic tool.

  • Scans multiple subnets
  • Pass 1 quickly discovers all devices
  • Pass 2 deep scans each discovered device and automatically classifies them
  • Automatically deploys agents
  • Automatically maintains and monitors based on classification via policy

The notification bar, at the top of every screen, tracks open tickets, alerts, system issues, messages, and much more. Get quick status and calls to action without interrupting your current working screen.

NotificationBar
As you work, imagine a phone call comes in from one of your users. Quick Search, in the upper right hand corner of the notification bar, finds that user’s machine instantly by typing in any piece of information about the user including: name, phone number, company, etc. Quick Search checks over 30 fields allowing you to find that machine before the user can even describe the problem. And of course both Quick View and Live Connect are directly accessible from the search results.

quicksearch

Don’t forget to sign up for this year’s Kaseya Connect conference in Las Vegas from April 29th through May 1st. As always, the event is packed with information and loads of fun. The conference includes:

  • Pre-conference in-depth Kaseya training
  • Best practice sessions
  • Industry Expert labs
  • Sneak peek at what’s coming
  • As a special treat this year we have Sugar Ray Leonard as a guest speaker.

In addition, take advantage of great networking opportunities with the Kaseya team and your peers. This event always sells out so register today!

Kaseya Industry Experts in full force at Kaseya Connect

Last year Kaseya developed the Industry Experts Program to help our customers build stronger businesses. Kaseya knows that it takes more than award winning IT Systems Management software to grow your business and that not all businesses need the same thing at the same time. With that in mind, we created an ecosystem of subject matter experts to help you prosper and grow at any stage.

Continue Reading…

That complex password you can’t remember, is easy to guess for a computer…

We all have to deal with passwords.  It would be a safe bet to say that while that an average worker today has at least 7 different passwords just to complete their daily tasks, the average IT pro has at least 4x that many.  We enjoyed this little cartoon on passwords….have a great weekend!

Kaseya has a great feature to help you manage all those credentials, securely.

Its a powerful feature that allows for secure credentials to be stored and access to those credentials to be tailored for the roles and scopes of your users inside Kaseya.  No more techs keeping their own little lists of passwords for everything from the core internet router to the CEO’s screensaver.

Check out more cartoons from http://xkcd.com

CTO Jonathan Nelson Shares His Best Practices for IT Network Management and Discovery

In an earlier post, we talked a little about the importance of IT network discovery, the process of cataloguing and bringing assets on your network under management. Discovery gives you a picture of your network at a particular point in time and is the crucial first step toward proactive IT network management.

Continue Reading…

Automation, Disaster Recovery, Charlie Brown and Driving the Zamboni

automated disaster recovery

I’m glad the National Hockey League strike is over.  Like many other pro hockey fans, I have an unnatural fascination with Zambonis. Charlie Brown once observed: “There are three things in life that people like to stare at: a flowing stream, a crackling fire, and a Zamboni clearing the ice.”

Before the Zamboni, an ice-shaving job on the rink was done by hand. Frank Zamboni invented the Zamboni 60 years ago because he was tired of closing his skating rink twice a day for a few hours so a half-dozen workers could scrape the ice by hand. Closing cost him money in skate rentals, concessions and other lost business. My back hurts just thinking about scraping a rink by hand. Not me, no way! Turning that job over to a machine was a godsend to rink workers everywhere. As a comparison, two generations later, automated disaster recovery is as much a godsend to IT professionals.

Continue Reading…

Page 5 of 39« First...«34567»102030...Last »