Archive for

Author

Endpoint Privilege Management White Paper

Posted: July 23, 2019

Brett Wyer's series of posts (here, here, and here) on Endpoint Privilege Management struck a nerve with some of our customers and partners. We received a lot of comments on the series, mostly about how users with administrative access on their desktop or laptop is still a prevalent problem in many ...

Continue Reading

Introduction to Endpoint Privilege Management (EPM)–Part III

Posted: June 26, 2019
Category: IAM

Hello and welcome back to my blog series on Endpoint Privilege Management.  This is the third and final installment covering common requirements and the features they map to, what’s involved in deploying and maintaining a solution, and how to work with a vendor to do a POC ...

Continue Reading

Introduction to Endpoint Privilege Management (EPM)–Part II

Posted: June 10, 2019
Category: IAM

Hello and welcome to the second of a three-part blog post series covering Endpoint Privilege Management (EPM).  If you’ve stumbled across this and are unfamiliar with the topic, you may want to check out Part I for a high-level overview; otherwise, let’s go ahead and jump right in. How does ...

Continue Reading

Fixing the Cybersecurity Defenses Built on Sand: Network Security Foundations for Digital Transformation

Posted: June 4, 2019
Category: DNS/DHCP

It’s a bit of a mess. Over the years you've bought a bunch of security tools and platforms to address the threat du jour. You have your AV, your Intrusion Detection System (IDS), your next gen firewall (NGFW), your NAC system, and on and on. But somehow you are still vulnerable, and you know it. ...

Continue Reading

Endpoint Privilege Management – Starting a Blog Series

Posted: May 20, 2019
Category: IAM

Hello and welcome to a new blog post series covering Endpoint Privilege Management (EPM) and the challenges (and benefits) related to managing user privileges.  Over the next several weeks, I’ll be covering various aspects of what we at Set Solutions have learned evaluating and deploying EPM ...

Continue Reading

Splunk is a “Daily Driven” Hypercar – Make Sure You Maintain it!

Posted: May 20, 2019
Category: Splunk

In the world of automobiles, hypercars are reserved for only the top one percent of cars and are specifically designed to push the boundaries of performance and technology. But the effectiveness of those characteristics can’t be preserved without the performance of regular maintenance and ...

Continue Reading

Pulling at the Loose Thread of Open Source Code

Posted: May 20, 2019

Have you ever seen one of those old cartoons where the character starts pulling at a loose thread on a blanket or a shirt? It usually ends up with them pulling apart the whole thing, and they are ultimately left with a big mess of string. That big mess is what many businesses are afraid of when ...

Continue Reading

Organic is Great for Food, but not for IT Security

Posted: May 20, 2019

Almost none of us have ever truly built an IT Security architecture from scratch.  We usually just inherit what the company has in place when we walk in the door. When we try to find out about the reasoning behind why things were designed and built, we often hear the same old refrain: "Oh, it's ...

Continue Reading

Welcome to the Set Solutions Blog!

Posted: May 20, 2019
Category: Set Solutions

Set Solutions has been in business for almost 25 years. In that time, we have managed to bring quite a few extremely smart people on board. And while many of you out there have directly interacted with our smart folks, we thought it would be a good idea to create an indirect channel for our ...

Continue Reading