Messaging security

You may need to do a quick third-party registration to access certain ones.

Articles
Podcasts
  • The Challenges and Solutions of Realtime Communications – Real-time communications like instant messaging are widely used throughout most enterprises today, but their use remains largely unmanaged. This puts organizations at risk for loss of intellectual property and crucial data, rising costs around e-discovery, fines for noncompliance, legal exposure from inappropriate use, and network vulnerabilities resulting from unauthorized access. Listen to this podcast to learn how to protect your organization from external attacks, prevent intentional or inadvertent leaks of sensitive data, and enable IT to demonstrate compliance concerning the use of real-time communications.
Webcasts
  • The Challenges and Solutions of Realtime Communications – Real-time communications like instant messaging are widely used throughout most enterprises today, but their use remains largely unmanaged. This puts organizations at risk for loss of intellectual property and crucial data, rising costs around e-discovery, fines for noncompliance, legal exposure from inappropriate use, and network vulnerabilities resulting from unauthorized access. Attend this webcast to learn how to protect your organization from external attacks, prevent intentional or inadvertent leaks of sensitive data, and enable IT to demonstrate compliance concerning the use of real-time communications.
  • Network analyzer tricks for monitoring and troubleshooting e-mail traffic – Do you think you have bandwidth, spam or security issues, but can’t find a way to quantify them for management? In this webcast, I outline how you use a network analyzer to look at e-mail traffic and find out what’s really going on.
  • Top Messaging Vulnerabilities: Implementing Technical Solutions – This webcast covers how admins can implement technical solutions that will help them fight messaging attacks and actually make them stick. I discuss the process issues that are often the root of all messaging security problems.
  • Top Messaging Security Vulnerabilities – Technical Issues – This webcast covers critical technical vulnerabilities within messaging systems that are often exploited by malware and malicious users. Topics such as e-mail protocol weaknesses, common e-mail and instant messaging software vulnerabilities, spam, storage issues, DoS attacks and malware are discussed. I also offer advice on the practical and realistic ways to deal with them.

Client Testimonials

“A business associate referred our company to Principle Logic when we were seeking a resource to perform vulnerability /penetration testing for our external and internal networks. We found Kevin Beaver to be professional, well informed, and easy to work with. His testing did not disrupt our networks, and his progress updates were timely.

His final report was very thorough and included security recommendations for our network environment. The executive leadership was so impressed with Kevin’s security expertise, they have extended their agreement to continue to perform periodic testing. We highly recommend Kevin Beaver and Principle Logic as a resource for network security testing.”

(IT managed services firm)

 

I’ve written/co-written 12 books on information security including: