Play
Joe Hedegaard Ganly

The State of Email Security 2020

I’m sure no one will dispute the world has changed and so has the way we work and collaborate. Covid has presented challenges for most companies and firms as we adapted to a largely remote workforce, without the comforts and security we have relied on.  
Play
Claire Harratt

Saepio’s Best Practice Guide to Secure Remote Working

It’s inevitable the recent effort put in by most organisations to enable widespread remote working will satisfy more than a tactical response to the COVID-19 lockdown. We expect remote working to become a new normal, so it’s wise to get your set up robust and secure.  
Play
Claire Harratt

Working Safely from Home during the Covid-19 Outbreak

Saepio have long promoted the importance of security awareness and training your staff to recognise the ways in which cybercriminals will target them. Unfortunately, the bad guys have wasted no time in exploiting our fears around Coronavirus and we’ve seen an unprecedented increase in opportunistic criminal activity on the internet. As many of us make the move to working from home to socially distance and protect our frontline services, we also want to help keep you keep safe from a cyber perspective during these strange times.
Play
Play
Nick Moss

How does Cloud based Data Protection reduce Total Cost of Ownership?

In 2020, almost every organisation will go through some degree of cloud transformation & adoption.  Having data, systems and processes in the cloud does not mean you need to stop thinking about how that data is backed-up, and how easy it is to restore.

Chances are, you now have a legacy on-prem estate, a cloud estate, and a bunch of SaaS applications, that all contain sensitive and mission critical data, and they all need to be backed up. You’re not alone! According to Forrester 79% of organisations use three or more data backup and recovery solutions.

How much

Play
Play
Rob Pooley

Too many users, too many applications, too many logins, too much risk? Automate IAM

For many organisations, trusted access is one of 2020’s biggest challenges. Ensuring that the right people have the right access to the right resources is becoming increasingly difficult, especially as companies grow and move services to the cloud. Compromised user credentials often serve as an entry point into an organisation’s network and its information assets. As such, identity access management has now become a frequent component of our customers security improvement plans to protect both internal (IAM) and customer (CIAM) systems and data.