Network security and insider threats

You may need to do a quick third-party registration to access certain ones.

  • Securing Endpoints the Right Way Securing your endpoints is not a one time deal but rather a part of a larger strategy for improving service, lowering costs, and minimizing business risks. View this videocast to learn the steps you must take secure your endpoints. Topics covered include real world endpoint vulnerabilities, misconceptions and oversights related to endpoint security, security dos and don'ts regarding technology and operations, and three pillars of endpoint security: Vulnerability management, data protection, and compliance
  • New technologies for IP protection - In an increasingly electronic world, employees can easily download sensitive corporate data onto a portal storage device, e-mail out confidential files or even post proprietary information in a discussion forum or blog. Network-layer security technologies typically don't scan for access control policy breaches on host servers and desktops. That's where a new breed of host-based content monitoring tools comes in. This technology monitors individual machines to ensure that employee behavior adheres to corporate security policy. In this webcast I explore how this host-based technology works.

Client Testimonials

"A business associate referred our company to Principle Logic when we were seeking a resource to perform vulnerability /penetration testing for our external and internal networks. We found Kevin Beaver to be professional, well informed, and easy to work with. His testing did not disrupt our networks, and his progress updates were timely.

His final report was very thorough and included security recommendations for our network environment. The executive leadership was so impressed with Kevin’s security expertise, they have extended their agreement to continue to perform periodic testing. We highly recommend Kevin Beaver and Principle Logic as a resource for network security testing.”

(IT managed services firm)