In each SecureNews newsletter we will share helpful tips on how to use the Alertsec service and this month we are focusing on using profiles for enforcing your organization’s security policy.
Many of our customers use one profile configuration for all users. This is a great way to deploy the Alertsec service quickly across the organization, but where more granular control is required, Alertsec can accommodate different role-based profiles for different users. It is easy to do. Find out more in the article below.
Also in this month’s industry news section, Gartner reports that adoption of cloud-based security services is increasing as awareness of security vulnerabilities grows. And businesses are urged to implement security best practice as the number of computer thefts rises.
And finally, time is running out to take advantage of our ...
For customers using the Alertsec service it is easy to change user profiles at any time to support your security policies. (Customers using the Alertsec Xpress service should contact our helpdesk for advice.)
Alertsec provides two different services, Endpoint Encrypt (EE) and Total Endpoint Security (TES). A set of pre-configured profiles is provided for each service to save customers’ time. This covers the needs for the majority of users, but if you have specific security policies and processes, it is easy to create different profiles for different roles using the Special Configuration feature. Access the Special Configuration page from the control panel under “services” / EE or TES.
Even after a service has been deployed and installed for a user, you can change the service OR the profile they are using by accessing your online account and the “services” tab.
For more information, please read the Coordinators Guide available at your Alertsec account.
Take advantage of our summer discount offer before time runs out! Upgrade to Total Endpoint Security for only $1 per user per month and you will also get anti-malware and firewall protection. All existing customers using Alertsec Xpress or Endpoint Encrypt have the possibility to upgrade to Total Endpoint Security.
This offer has been extended until 31 October 2014 and the additional $1 per user per month is added to the existing price plan.
As organizations are becoming more threat-aware, they are increasingly turning to cloud based security services, according to a recent report by Gartner. Organizations are switching from deploying on-premises products to cloud-based security services or cloud-managed products, driven in part by the competitive pricing of cloud-based services. By 2015, Gartner expects 10% of all enterprise IT security products, and more than 30% of security controls deployed to the small or midsize business (SMB) segment, will be cloud-based ...
Computer theft accounted for nearly a third of robberies in London last year, according to data from police forces, underlining the need for businesses to deploy and enforce security policies such as disk encryption.
The report into computer thefts emphasized how businesses need to assess the vulnerability of customer data at every point, and implement security best practice. For example, personal information provided by clients to financial advisors should be entered directly into the central database or onto an encrypted computer.