Endpoint Privilege Management White Paper
Brett Wyer's series of posts (here, here, and here) on Endpoint Privilege Management struck a nerve with some of our customers and partners. We received a lot of comments on the series, mostly about how users with administrative access on their desktop or laptop is still a prevalent problem in many ...
Continue ReadingIntroduction to Endpoint Privilege Management (EPM)–Part III
Hello and welcome back to my blog series on Endpoint Privilege Management. This is the third and final installment covering common requirements and the features they map to, what’s involved in deploying and maintaining a solution, and how to work with a vendor to do a POC ...
Continue ReadingIntroduction to Endpoint Privilege Management (EPM)–Part II
Hello and welcome to the second of a three-part blog post series covering Endpoint Privilege Management (EPM). If you’ve stumbled across this and are unfamiliar with the topic, you may want to check out Part I for a high-level overview; otherwise, let’s go ahead and jump right in. How does ...
Continue ReadingFixing the Cybersecurity Defenses Built on Sand: Network Security Foundations for Digital Transformation
It’s a bit of a mess. Over the years you've bought a bunch of security tools and platforms to address the threat du jour. You have your AV, your Intrusion Detection System (IDS), your next gen firewall (NGFW), your NAC system, and on and on. But somehow you are still vulnerable, and you know it. ...
Continue ReadingEndpoint Privilege Management – Starting a Blog Series
Hello and welcome to a new blog post series covering Endpoint Privilege Management (EPM) and the challenges (and benefits) related to managing user privileges. Over the next several weeks, I’ll be covering various aspects of what we at Set Solutions have learned evaluating and deploying EPM ...
Continue ReadingSplunk is a “Daily Driven” Hypercar – Make Sure You Maintain it!
In the world of automobiles, hypercars are reserved for only the top one percent of cars and are specifically designed to push the boundaries of performance and technology. But the effectiveness of those characteristics can’t be preserved without the performance of regular maintenance and ...
Continue ReadingPulling at the Loose Thread of Open Source Code
Have you ever seen one of those old cartoons where the character starts pulling at a loose thread on a blanket or a shirt? It usually ends up with them pulling apart the whole thing, and they are ultimately left with a big mess of string. That big mess is what many businesses are afraid of when ...
Continue ReadingOrganic is Great for Food, but not for IT Security
Almost none of us have ever truly built an IT Security architecture from scratch. We usually just inherit what the company has in place when we walk in the door. When we try to find out about the reasoning behind why things were designed and built, we often hear the same old refrain: "Oh, it's ...
Continue ReadingWelcome to the Set Solutions Blog!
Set Solutions has been in business for almost 25 years. In that time, we have managed to bring quite a few extremely smart people on board. And while many of you out there have directly interacted with our smart folks, we thought it would be a good idea to create an indirect channel for our ...
Continue Reading