Automating Firewall Management - Microsoft Office 365 Cloud Access BackBox Use Case Over the last few years, more and more organizations are migrating to cloud services replacing on premise solutions. CRM, Storage, Messaging and Collaboration are just a few examples for services that are popular in the public cloud. One of the largest service
BackBox is a customer centric technology company that prides itself on developing and nurturing sustainable relationships beneficial to all within the BackBox ecosystem. CV Magazine profiled the company, which has named Rafi Zvi as CV’s Most Influential CEO of the Year in Software and Security in the 2018 Corporate Excellence Awards. We are beyond excited
LAS VEGAS, Nevada – Accelerate 18 - Feb 28, 2018 Fortinet Expands its Ecosystem of Fabric-Ready Partners to Advance Security Visibility and Automated Response for Digital Business New Fabric-Ready Program partners extend Security Fabric automation, visibility and management into IT and security workflows, multi-cloud and virtualized networks. John Maddison, senior vice president of products
Lenexa, KS – BackBox today announced that The Silicon Review Magazine has named it among the ‘50 Leading Companies of the Year 2017’ “The Silicon Review 50 Leading Companies of the Year 2017 program identifies companies which are successful bringing more innovations to the IT and Business world than others, and winning a spot
Mitigate the KRACK Attack with BackBox A recent discovery found serious weaknesses in WPA2. Luckily, there is a way that BackBox can help. Background: WPA2 is used everywhere from PC’s, mobile phones, wireless home and corporate networks; making WPA2 the most popular Wi-Fi protection protocol used today and making this vaulnerbility a concern for everyone.
The Need for Backup Data Protection In today’s world, by relying on various third party providers and applications, many organizations have the misconception that their corporate data is protected. As we know too well, this could not be further from the truth. As the attack surface expands and networks become more complex, new threats are