Giving potential customers that light bulb moment

When you have a solution like Local Management, that can impact a variety of IT groups and reach across network management and security processes, the sales process can be a long and winding road. One stop along that journey is the proof of concept (POC). Thomas Edison said, "Anything that won't sell, I don't want [...]

Permission to come aboard?

Most experts agree that human error or ignorance is responsible for more security breaches than technology flaws. The challenge is to use technology to try to overcome these human weaknesses. An article in CSO magazine promotes the use of Least Privilege Management (LPM) as one method to cut down on security issues. The methodology works like [...]