By Andrew Peters Today, thousands of Cisco customers are using the Identity Services Engine for guest and BYOD access. Naturally they want their users to have a great experience with great looking portals that’s consistent with their company brand. Custom portal creation typically requires technical and design expertise that’s scarcer than you would think. That can put IT […]

Source:: Cisco Security Notice

By Andrew Peters Today, thousands of Cisco customers are using the Identity Services Engine for guest and BYOD access. Naturally they want their users to have a great experience with great looking portals that’s consistent with their company brand. Custom portal creation typically requires technical and design expertise that’s scarcer than you would think. That can put IT […]

Source:: Cisco Security Notice

Government of Canada Selects Fortinet to Secure Its Information Technology Infrastructure

Source:: Fortinet

Government of Canada Selects Fortinet to Secure Its Information Technology Infrastructure

Source:: Fortinet

By Andrew Wild The Cisco 2016 Midyear Cybersecurity Report has been released, and just like the Cisco Annual Security Report and many other security reports the news isn’t encouraging. The very first sentence in the midyear report explains that as defenders, we simply aren’t getting the job done: “Attackers currently enjoy unconstrained time to operate.”[1] Attackers understand that […]

Source:: Cisco Security Notice

By Andrew Wild The Cisco 2016 Midyear Cybersecurity Report has been released, and just like the Cisco Annual Security Report and many other security reports the news isn’t encouraging. The very first sentence in the midyear report explains that as defenders, we simply aren’t getting the job done: “Attackers currently enjoy unconstrained time to operate.”[1] Attackers understand that […]

Source:: Cisco Security Notice

Eines der wichtigsten Themen für Unternehmen jeder Größe sind Backups. Was wäre, wenn Ihre Daten einem Verschlüsselungstrojaner zum Opfer fallen? Idealerweise gibt es ein ziemlich aktuelles Backup, so dass nach kurzer Zeit eine Fortführung des Betriebes möglich ist. Damit Sie genügend Speicher für Backups zur Verfügung haben, gibt es auch im August die Aktionsmodelle unseres Technologiepartners FUJITSU.

Alles zu Servern und Storage-Systemen, die preislich attraktiv kalkuliert sind, finden Sie in diesem Flyer.

Die passende Beratung und individuelle Konfigurationen für Server und Storage bekommen Sie von diesen freundlichen Kollegen:

DSC_2012 klein
Frank Erlinghagen
02261 9155055
erlinghagen@oberberg.net
DSC_2022 klein
Jörg Wegner
02261 9155052
wegner@oberberg.net
Daniel Wenzlau
02261 9155054
wenzlau@oberberg.net

By Omar Santos On August 15th, 2016, Cisco was alerted to information posted online by the “Shadow Brokers”, which claimed to possess disclosures from the Equation Group. The files included exploit code that can be used against multi-vendor devices, including the Cisco ASA and legacy Cisco PIX firewalls. The Cisco Product Security Incident Response Team (PSIRT) has published […]

Source:: Cisco Security Notice

By Omar Santos On August 15th, 2016, Cisco was alerted to information posted online by the “Shadow Brokers”, which claimed to possess disclosures from the Equation Group. The files included exploit code that can be used against multi-vendor devices, including the Cisco ASA and legacy Cisco PIX firewalls. The Cisco Product Security Incident Response Team (PSIRT) has published […]

Source:: Cisco Security Notice

By Josh Reynolds 0.0 Introduction: In our previous post we discussed the AMP ThreatGrid Research and Efficacy Team’s continuous support for Ransomware attack vectors, generic behavior detection of un-discovered variants, and the creation of behavioral indicators once new variants are identified. In this post we’ll be discussing one of the more prevalent variants to surface in the wake […]

Source:: Cisco Security Notice