Comprehensive software reviews to make better IT decisions
Cisco Briefs on Latest Security Features for Webex
On May 21, 2021, Cisco briefed on Webex’s security features. Cisco is a market leader in collaboration and communication technology, with several differentiated security advantages. The briefing included not only information on the intricate administration control for end users when using Webex from any device, but also Cisco’s certifications and compliances more broadly.
With Cisco’s Secure X platform, organizations can maintain device compliance remotely. Certain features of device security include forced logout and remote wipe, in-app PIN lock enforcement, and blocked notifications on the lock screen. Organizations can also set parameters for calling controls and data loss prevention (DLP). For the former, users can set voicemail PIN policies, disable voicemail forwarding to email, and call blocking. For the latter, a unified DLP policy can be set for real-time file-sharing through messaging and for meetings and messaging content.
Cisco reinforces these security features with market-leading security certifications. Alongside ISO, SOC2, HIPAA, and FedRAMP, Cisco is also HITRUST compliant, with a DoD IL-5 certification in progress. Organizations can also choose to leverage Cisco’s extended security pack, which includes Talos anti-malware and CASB/DLP; DUO MFA is currently under consideration.
After Zoom’s public relations incident over security concerns at the start of the COVID-19 pandemic, collaboration software vendors were quick to emphasize their (stronger) security features to attract Zoom customers. (Let's not forget Cisco’s own frustration with Zoom’s Webex Connector that had a security flaw in December 2019.) While Zoom has made significant improvements since then, Cisco continues to lead with a long history of certifications and compliances. Indeed, Webex was the first collaboration tool to achieve end-to-end encryption in 2008.
Of course, technology can only do so much when it comes to security. A fully encrypted device with MFA will count for nothing if a worker forgets to lock a virtual meeting room or accidentally shares a file with the wrong person. Organizations should of course ensure the technology is secure; but the technology can only be implemented if users know how to leverage it. Organizations should therefore be sure to engage their users with frequent security training to limit incidences that come from remote collaboration.
Source: SoftwareReviews Web Conferencing. Accessed 31 May 2021.
Want to Know More?
My Firewall Is Smarter Than Your Firewall
Next-generation firewalls were smarter than previous firewalls, able to deeply analyze traffic and integrate with complementary security solutions. Today our needs are more complex, however, with a 742% increase in software supply chain attacks over the past three years. Sonatype Nexus Firewall has been paying attention and claims its firewall product is smarter about these attacks.
Your Internet Secret Service, Otherwise Known as External Attack Surface Management (EASM)
Have you ever thought of what else you could do to take your security operations center (SOC) to the next level and focus on prevention? Look no further – external attack surface management (EASM) was a popular managed service and topic of discussion at Rivest–Shamir–Adleman (RSA) Conference 2023, named after a popular public-key cryptosystem.
Can Hillstone Networks Position Its StoneOS to Take Firewalls Beyond the Next Generation?
Hillstone Networks has positioned itself as a robust and feature-rich provider of not only hardware but also security solutions. With its ZTNA 3.0 release and support for centralized management of IoT assets and incident response, the company embodies a next-generation firewall.
Acronis Offers a Unique Endpoint Protection and Data Recovery Package Tailored for the Small to Medium-Sized Business
Acronis hopes to overtake many competitors in the data recovery and endpoint protection solution space by forging partnerships with many MSSPs and appealing to the SMB market. The company has doubled down by hiring the former CEO of GoDaddy, who is committed to reinvesting in its technology and increasing and improving its product line.
Zoho Announces Trident to Power Workplace’s UCaaS Capabilities
Zoho, a multinational software and web-based business tool provider, has announced the launch of Trident – a hub that brings Zoho’s pre-existing and new unified communications capabilities into a single pane of glass. How will Trident’s addition to Workplace impact customer migrations from Microsoft and Google.
Next-Gen EDR/MDR/XDR – Field Effect Covalence
Field Effect Covalence is an EDR/MDR/XDR offering that translates chaos into order.
Will Avaya’s Five-Step Transformation Strategy Generate a Stronger Outlook for 2023?
To revitalize and strengthen business transformation, Avaya has outlined a five-step plan for restructuring its product lines, go-to-market strategy, and balance sheet. This tech note evaluates these five steps, highlighting the main contingencies for each step’s successful rollout.
Informatica World 2022 Highlights
On May 24-25, Informatica held its annual conference in Las Vegas – the first time “in-person” since the beginning of the COVID-19 pandemic.
Are You In or Out? How to Source Application Development
Custom application development is a strategic differentiator in the digital economy. Organizations need to make good decisions on how to insource or outsource that development or they risk bad software … and worse results.