Read up on managed security services
Below you will find blog articles covering many different security issues, helping you stay up-to-date with the latest security information. Click the article links to start expanding your security intelligence…
Analyze your present security set up for vulnerabilities and identify necessary improvements, and fixes to problems.
Protect your network BEFORE you have an incident and use our security monitoring & management expertise to establish a watertight intrusion detection system (IDS).
Hackers are scanning your network — shouldn’t you be too? We can help you scan, clean up, and protect yourself against future attacks.
Do you need a penetration test or 'Pen Test'? Find out about Roka's penetration testing service, performed by a highly skilled team of ethical hackers.
Below you will find blog articles covering many different security issues, helping you stay up-to-date with the latest security information. Click the article links to start expanding your security intelligence…
By now you’ve heard experts tell you to install an IDS/IPS solution in your network. However, they never give you a good IDS vs IPS comparison. Implementing an IDS or IPS can dramatically increase your network’s security profile. The question is, which one is right for your organization? What’s the difference between IDS and IPS technologies? In today’s post, we’ll walk […]
Have you been told your business needs to NIST 800-171 compliance by a customer or the government? You’re not alone. Businesses all over the US are finding themselves with a new security requirement they know little about. The good news is, it’s probably not as bad as you think. Who Needs NIST 800-171 Compliance? Any […]
Earlier in 2017 DOD contractors learned about the new DFARS clause 252.204.7012. It required that existing contractors, and in many cases subcontractors, be NIST 800-171 compliant before December 31, 2017. Many have missed that deadline, or new contractors are searching for help with this new requirement. I wrote this article to give you the breakdown of what […]
It is important that websites are encrypted, but what about your other business tools? Should you encrypt email too? We say yes, but there’s a little more to it than that.