article thumbnail

Red Hat Acquires StackRox, Key To Containers and Kubernetes-Native Security

Perficient

As containers and Kubernetes adoption continue to grow, security, monitoring, data management, and networking are becoming top concerns for enterprises. This week, Red Hat announced its acquisition of StackRox , a leader and innovator in container and Kubernetes-native security. StackRox’s security capabilities include: Visibility.

Security 433
article thumbnail

Securing Teams with built-in apps in Microsoft Endpoint Manager

Perficient

Securing the app (conditional access with MFA). Since my blogs typically cover all things Microsoft Teams, we’ll discuss how you can use Microsoft Endpoint Manager to secure Microsoft Teams! With that said, let’s select the Add option so we can create a new app policy for Microsoft Teams. Securing the App.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How to control sensitive data on unmanaged devices with MCAS

Perficient

In today’s blog, I’ll show you how you can block downloading of files with sensitive data to unmanaged devices with the use of session policies in Microsoft Cloud App Security (MCAS). Megan is working on a file that has several different Social Security Numbers of different employees at her organization.

Data 520
article thumbnail

How to control sensitive data on unmanaged devices with MCAS (Part 2 of 2)

Perficient

Last time we talked about controlling file downloads of sensitive content by using a session policy in MCAS. However, once we implemented the proper session policy in MCAS, we were able to look for files that contained sensitive information (in our case SSNs) and block anyone on an unmanaged device from downloading the file.

How To 520
article thumbnail

Expand your search using AWS native services to identify, comprehend and securely store documents.

Perficient

In the below solution architecture, we will cover data being securely migrated from an on-premise data center to the AWS Cloud. Networking components such as AWS Direct Connect are used to ensure data securely traverses the networking fabric to its destination. Data is sent within the VPC (privately) to the Amazon S3 bucket.

Security 421
article thumbnail

New Microsoft Security and Compliance Certifications (Feb 2021)

Perficient

This morning I was sipping on my cup of coffee and browsing through Microsoft’s Learn page when I stumbled upon a few new certifications and exams around Microsoft Security and Compliance ! Certification – Microsoft Certified: Security Operations Analyst Associate. Exam: Microsoft Security Operations Analyst SC-200 (beta).

article thumbnail

TikTok?s Data Privacy Policies Draw Eyes Of EU Authorities

PYMNTS

TikTok , the popular Chinese short-form mobile video app, is facing more scrutiny over its privacy policies, Bloomberg reported. Last month, the data-protection commission in the Netherlands opened an investigation into TikTok’s policies to protect children’s data, noting the app is popular with Dutch youth, Bloomberg reported.

Policies 253