Ericom Software Inc.

@Ericom_Software

Be Connected, Be Secure. Protect your organization with Zero Trust security controls from Ericom Software!

USA
Joined September 2009

Tweets

You blocked @Ericom_Software

Are you sure you want to view these Tweets? Viewing Tweets won't unblock @Ericom_Software

  1. May 11

    Is it time to retire the ? A recent attack on T-Mobile highlights the danger of relying on VPNs to protect sensitive corporate data. , CMO, explains why is the more secure alternative.

    Undo
  2. May 10

    The race toward -driven is on for the U.S. federal government. explains that while the powers that be did a good job folding industry best practices into the federal strategy, there are a couple of key omissions.

    Undo
  3. May 9

    Steganographic attacks conceal within innocent content. Check out Mendy Newman's article on where he discusses how Web Isolation uses RBI to defend against steganographic threats in ways that antivirus and firewalls can't.

    Undo
  4. May 5

    The move to the cloud is in high gear. In this article, President and CEO, discusses how the network needs to catch up and that is what the Cloud Area Network(TM) is ready for such a strategic move.

    Undo
  5. May 5

    Jeremy Smith, CTO, shares how Web Isolation offers a straightforward way of meeting the stringent MPA TPN guidelines on internet and email access that they need to adhere to. Watch the interview:

    Undo
  6. May 4

    Steganographic attacks conceal within a file that appears innocent. Mendy Newman explains how Web Isolation uses remote browser isolation to protect against steganographic threats in ways that and can't detect.

    Undo
  7. May 3

    The race toward -driven is on for the U.S. federal government. explains that while the powers that be did a good job folding industry best practices into the federal strategy, there are a couple of key omissions.

    Undo
  8. May 3

    The extended its recommendations on securing web browsers to protect against to businesses and non-profits. Nick Kael, CTO, explains why the agency is recommending .

    Undo
  9. May 2

    In this article, explains how , who are growing more sophisticated, are using to distribute . is the only company to develop and deliver a scalable solution

    Undo
  10. Apr 27

    Mortgage lenders are a particularly attractive target for cyberattacks due to the value of transactions. According to cyber safety on the consumer level is "woefully inept." Read the article here:

    Undo
  11. Apr 25

    is essential for advancing . There are still many questions surrounding it, especially within federal agencies, driven by the White House's executive order. This article answers the most common questions that you may be asking:

    Undo
  12. Apr 21

    We know is delivering results. That's why we are offering to buy out your support contract so you can begin your journey. delivers ZTNA that is easy to implement. Learn more here.

    Undo
  13. Apr 20

    While won't protect your organization from , it can soften the bottom-line blow. CFO Stewart Edelman covers security capabilities insurers look for when issuing a cyberattack policy.

    Undo
  14. Apr 19

    Basing networks on trust alone creates too many exploitable gaps by cyberattackers who are more adept at exploiting them. shares the ten areas that CISOs can focus on to make progress in tech with in this article:

    Undo
  15. Apr 19

    Given the current landscape, there’s no better time than right now to jumpstart your organization’s journey. CTO Nick Kael explores the relationship between Zero Trust and in this article:

    Undo
  16. Apr 18

    Given the current cyberthreat landscape, there’s no better time than right now to jumpstart your organization’s journey. CTO Nick Kael explores the relationship between Zero Trust and in this article:

    Undo
  17. Apr 14

    Companies have moved to MFA as a way to enhance their . However, MFA can be defeated by determined hackers. Cybersecurity policies combined with the comprehensive security is the best way to avoid falling victim to a cyberattack.

    Undo
  18. Apr 12

    Companies have moved to MFA as a way to enhance their . However, MFA can be defeated by determined hackers. Cybersecurity policies combined with the comprehensive security is the best way to avoid falling victim to a cyberattack.

    Undo
  19. Apr 6

    A big "thank you" to our customers! ’s 2021 Net Promoter Score (NPS) of 53 is very strong (up from 40 in 2019 and 50 in 2020). Further, this score puts us in the 90th percentile in the software industry.

    Undo
  20. Apr 5

    Nick Kael, CTO, highlights key findings in IBM's 2022 Threat Intelligence Index and explains why protecting today’s complex, hybrid IT environment calls for a shift to a comprehensive approach.

    Undo

Loading seems to be taking a while.

Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.

    You may also like

    ·