Generalize double authentication by simplifying the user experience!

Generalize double authentication by simplifying the user experience!

Too much security kills security The subject of multi-factor authentication is a good illustration of the adage “Too much security kills security”. Security often tends to make the use of IT more complex for users. They then bypass or reduce security mechanisms in order to be more efficient in their work. This is the case, for example, with strong authentication to Windows Logon. Indeed, despite the awareness of users to use always...

Read More

Aruba Introspect wins SC Award 2019

Aruba Introspect wins SC Award 2019

Introspect has won the SC Award 2019 price for “Best Behaviour Analytics/Enterprise Threat Detection”, and this for the second consecutive year. More Information here SC Award is organized by the SC Media, the most famous publication they have is SC Magazine. The price is given by a jury consisting of CISOs and experts from different large corporations and it is an award that has a strong technical weight. Other competitors are mostly focusing...

Read More

IT Security Breakfast – Wednesday 8th of May 2019

IT Security Breakfast – Wednesday 8th of May 2019

Simply protect your on-premise or cloud data with transparent encryption More details Compliance with data privacy and security requirements is one of the main drivers for the intensive use of encryption in companies. The benefits of Thales Vormetric and how these technologies can be reflected in an enterprise-wide encryption strategy. Kyos will present you with different use cases, especially for GDPR compliance. Topics covered Advantages of...

Read More

Terranova Security named Consumer Choice for Security Awareness – see Gartner Magic Quadrant

Terranova Security named Consumer Choice for Security Awareness – see Gartner Magic Quadrant

Security awareness and learning (IS/IT) is at the heart of Terranova’s activity with a high level of expertise. Terranova’s solutions and Kyos’ services can – deliver a complete action plan – to raise awareness among your employees over time. Full program: Evaluation questionnaire, e-learning, standard/personalized phishing, standard/personalized social engineering, plenary session & workshop session using...

Read More

Cyber threat protection targeting industrial networks – Kaspersky ICS (KICS)

Industrial networks are very often the most forgotten aspects of IT security, even though they are a vital part of our modern life. There are many reasons for this, but the main ones are: Business and approaches are historically separated from standard IT, Often mistaken idea that industrial networks are completely isolated from the rest of the world, Software that has been running for a very long time on obsolete operating systems that are...

Read More

How to protect, backup, audit and synchronize your private encryption keys stored in an Azure Key Vault (Software or HSM)

How to protect, backup, audit and synchronize your private encryption keys stored in an Azure Key Vault (Software or HSM)

Thanks to the Thales CipherTrust Cloud Key Manager (CCKM) solution, we can now have control over the private encryption keys used in Azure and Office 365 stored in Azure Key Vault. The CCKM solution allows you to manage the life cycle of private keys. Private keys are stored in a Vormetric DSM (On-premises Hardware, Cloud and On-premises Software) digital safe The Thales CCKM appliance is deployed either on site or as a cloud service. Here is...

Read More

Good practice in using Azure Information Protection to protect your data

Good practice in using Azure Information Protection to protect your data

At the end of 2016 Microsoft officialized the release of the Azure Information Protection solution. This cloud-driven solution is a kind of evolution of the RMS (Rights Management System) suite. It will allow you to create a document classification policy and then apply protection profiles to encrypt sensitive documents. At Kyos we started evaluating the tool in July 2017. We quickly realized that this solution would provide even better...

Read More