BR +55 11 3069.3910 | USA +1 469 620 7643
Blog2020-12-17T14:24:33-03:00

Understanding Microsoft Exchange Server vulnerabilities

April 13th, 2021|

Anyone who works with technology has certainly heard of or uses Microsoft Exchange, Microsoft's server solution for email and calendar. Exchange is used worldwide by companies of all sizes, being preferred for its versatility [...]

How to Protect Remote Access with PAM

March 24th, 2021|

The Covid-19 pandemic has caused massive adoption of remote working models in organizations of all sizes. Besides, security leaders have also accelerated the migration of their infrastructure to cloud environments. According to a study conducted [...]

How PAM can help against insider threats

March 17th, 2021|

Insider threats take many forms. Some are malicious agents looking for financial gain. Others are simply careless or unaware employees who click on suspicious links. An insider threat can be defined as someone close to [...]

Go to Top