Tag Archives: Frank Kenney

Correlation & Visibility

Let’s start to examine the impact of end-to-end visibility and ways it can be put to work for your organization.  For starters, let’s dig into correlation. Correlation involves identifying related actions and events as a file moves through a series of business processes (including what happens after a file is […]

Posted in Auditing, Enforcement, Managed File Transfer, Management, Visibility | Also tagged , , , , , , , | Leave a comment

The challenge of visibility

Information flows into, within and out of organizations faster and in greater volumes than ever before.  Complicating matters is the growing number of vendor systems, applications and platforms that make up your company’s business infrastructure and touch even your most sensitive and mission-critical information. If you don’t have visibility into […]

Posted in Auditing, Enforcement, Managed File Transfer, Management, Visibility | Also tagged , , , , , , | Leave a comment

The importance of visibility

You’re going to be hearing more and more about “VISIBILITY” from Ipswitch, so I’d like to quickly start this blog post with our definition of visibility in the context of files and data flowing into, within and out of your company: Visibility:  “Unobstructed vision into all data interactions, including files, […]

Posted in Auditing, Enforcement, Managed File Transfer, Management, Visibility | Also tagged , , , , , | Leave a comment

Data Breach Primer – What Does it all Mean?

Hey SEC, it’s Frank Kenney at Ipswitch. I don’t mean to rock the boat but I had a few quick questions regarding your recent announcement that you are requiring companies to notify their customers of a breach or risk of breach. What’s a “breach”? Does it mean the bad guys […]

Posted in Data Breach, File Security, Security, Visibility | Also tagged , , , , , | Leave a comment

Reinforcing Lessons Learned from a Former Hacker

Recently, Cisco published a blog post on an interview with a former Anonymous hacker who offered his top security tips for the enterprise. Some of the suggestions were fairly obvious, while others were intuitive and absolutely on point. For example: #5: Teach your staff about information security Take note, he […]

Posted in File Security | Also tagged , , , | 1 Response

Caution: Web-searchable servers and databases

August 2011:  Yale University announced that 43,000 social security numbers posted to an insecure FTP server have been available to Google search engine users for the past 10-months. May 2011:  Southern California Medical-Legal Consultants (SCMLC) disclosed that the medical records of 300,000 injured workers were available online to the public […]

Posted in Auditing, Compliance, Data Breach, Enforcement, File Security, Security, Visibility | Also tagged , , , , , , , | Leave a comment

SaaS Doesn’t Equal IaaS: How Integration and Infrastructure Become Table Stakes

Over the last few weeks, we’ve been putting the final touches on our next generation of services that will be delivered via the cloud. As with any product or service release, there comes a fair amount of planning including ensuring that one has the best site into competitors, forecast and […]

Posted in Cloud Computing, IaaS, Ipswitch, Managed File Transfer, SaaS | Also tagged , , , , , | Leave a comment