We all struggle with sorting through the compliance alphabet soup chaos (HIPAA, PCI, NIST, FISMA, FERPA, CFPB, etc.). Much of the work effort spent in managing multiple compliance obligations is time intensive, painstaking and potentially inaccurate. And it requires investments better spent elsewhere. We help many of our customers organize to manage the overlaps, contradictions, competing requirements and limited budgets that come from their needs to be both secure and compliant. But that work doesn’t take away the manual nature of the effort. We have a solution in our new partner TraceSecurity that removes much of the pain from governing and measuring risk & compliance manually. Please join Jacadis and TraceSecurity on Friday, February 7, from 11:45am to 1:00pm, for a discussion on strategies to manage the alphabet soup of governance, risk and compliance. You’ll also enjoy a great Smith & Wollensky meal while you network with other information security and information technology professionals. Seating is limited so please click on the link below to register. Register Now! I can’t make it If you have questions about the steak & learn please contact us. We hope to see you there!
New Partnership enables organizations to prioritize their remediation by identifying the most critical vulnerabilities in their environment Columbus, OH November 26, 2013 – Risk I/O, a software-as-a-service platform that correlates external Internet breach and exploit data with vulnerability data to monitor, measure, and prioritize vulnerability remediation, has partnered with Strategic IT Security Solution company Jacadis to promote its vulnerability correlation, analysis, and prioritization application. Jacadis will be introducing to their clients the range of risk and vulnerability intelligence solutions in Risk I/O’s portfolio, including real-time analysis of global attack and breach data, alongside security vulnerabilities, to help businesses identify where they are most likely to be attacked. The platform prioritizes vulnerabilities and provides customizable Risk Meters, allowing organizations to easily measure risk across their IT environments. “We are very excited to be partnering with a trusted reseller such as Jacadis,” Ed Bellis, President and Cofounder of Risk I/O commented, “Jacadis will be able to now offer a way for their client network to identify where attacks are most likely to occur through a prioritized list of vulnerabilities to fix.” Risk I/O strives to ensure that the automated vulnerability scanning solutions from web application, host, network, and database vulnerability assessment tools that it […]
New partnership enables organizations to create comprehensive IT GRC programs leveraging TraceCSO, a single cloud-based software solution Columbus, OH – November 12, 2013 – Jacadis, a strategic information security solution company, today announced a partnership with TraceSecurity, the pioneer in cloud-based IT governance, risk and compliance (GRC) solutions, to promote its flagship software solution, TraceCSO. Under terms of the agreement, Jacadis customers can now implement and manage on-going, risk-based information security programs that allow them to automate their audit and compliance management and reporting. Jacadis will introduce its clients to a range of GRC management solutions from TraceSecurity, including TraceCSO. TraceCSO allows organizations of any size, industry or security skill level to evaluate, create, implement and manage a holistic, risk-based IT security strategy. The innovative solution provides comprehensive visibility and accountability, improving risk profiles across all areas of an organization and protecting sensitive data from today’s top security risks. ”TraceCSO continues to deliver exceptional results for organizations looking to quickly and cost-effectively manage growing risk and compliance requirements,” said Peter Stewart, president and CEO of TraceSecurity. “We are excited to have Jacadis as one of our Partners, as we share mutual goals of both solving client security challenges and providing outstanding customer service. Their […]
New Partnership offers Enterprises Real-time Security Management and Risk Analysis Solutions to Automate Network Security and Reduce Operations Costs Columbus, OH- October 11, 2013 – FireMon, the leading provider of security management and risk analysis solutions, has appointed Strategic IT Security Solution company Jacadis to promote its risk analysis and policy and configuration management solutions. The appointment forms part of the security vendor’s channel strategy of establishing a network of resellers and Managed Service Providers with the requisite level of skills and expertise to add value and offer complementary focus in terms of different vertical markets and geographies. Jacadis will be introducing to their clients the range of security solutions in FireMon’s network security portfolio, including the recently released FireMon Security Manager 7.0, that greatly improves an IT security team’s ability to identify, understand and manage changes in security posture – in real-time. The new capabilities apply best practice models from FireMon’s deep knowledge base in security infrastructure management, with increased automation, customization and analytical capabilities. As a result, customers can more rapidly and effectively identify, assess and prioritize configuration and compliance issues – and understand and address higher-level business risk. Todd DeBell, VP Channels for FireMon commented, “Trusted resellers like […]
If you’ve ever worked in an operational role, especially on the network team or on the security team, then you know how painful it can be to answer that question. When I was managing an infosec team back in my retail days, there was nothing I “loved” more than that 3:00 AM phone call from the folks in the command center (one of the most underappreciated teams in IT), who needed me to assist in resolving a production-impacting incident. Over time, I learned that there were a few things I could do reduce the number of 3:00 AM calls while increasing the amount of sleep I was able to get AND improving the availability of our network. Fully document your environment. How many systems are connected to your network? What apps run on those systems? Who are the business owners? Developing a complete understanding of your environment is critical if you intend to stabilize those systems (i.e., ensure their availability) through patch management and secure configuration management processes. Reduce the complexity of your environment. As organizations grow, their IT infrastructure grows along with them. Over time, your firewall(s) might become littered with rules that no longer needed, creating inadvertent paths from […]
How to Find – and Fix First – Network Vulnerabilities Most Likely to Get Attacked If you run a large network, figuring out what to fix first when vulnerabilities arise is crucial to minimizing your security and compliance risks. This never-ending, high-pressure task determines whether your IT resources are closing the right holes, or getting side-tracked by threats that could be handled later or mitigated in other ways. Join Jacadis and FireMon to learn how vulnerability scans and network security configuration information can be combined automatically to identify which problems you should tackle first. This risk-centric approach to finding and fixing vulnerabilities delivers greater security and compliance with less effort and expense. Jacadis and FireMon experts will be on hand to answer questions and discuss your specific security environment. Click here to RSVP. Register Now Tuesday, October 24, 2013 11:30 AM – 1:00 PM Smith and Wollensky 4145 The Strand West Easton Town Center Columbus, OH 43219 FireMon and Qualys Integration Brief Click here to learn about real-time, risk-centric vulnerability discovery and remediation with Qualys and FireMon. FireMon recognized as “Rising 10 of 2013″ for Continuous Monitoring. Learn more FOLLOW FIREMON ON FACEBOOK FOLLOW FIREMON ON TWITTER FOLLOW FIREMON ON […]
The Distributed Denial of Service (DDoS) attack against Spamhaus, an anti-spam group, has been dubbed the largest DDoS attack to date. According to The New York Times, the impact of the attack extends beyond Spamhaus, affecting other sites and services that rely on the same infrastructure (like Netflix). But did you know about the DDoS attack on Wells Fargo? Key Bank? TD Bank? PNC? JPMC? Capital One? SendGrid? Free Malaysia Radio? Krebs on Security? All of these sites have recently been victims of DDoS attacks, a list that unfortunately continues to grow. Simply put, a Denial of Service (DoS) attack overwhelms a system or application by throwing more data at the target than the target can handle. A Distributed of Denial of Service (DDoS) attack accomplishes the same result, the key difference being that a DDoS attack is launched simultaneously from multiple sources (attackers). Although the most widely publicized DDoS attacks are launched by Internet activists/hacktivists, these types of attacks are also launched by criminal organizations in an effort to extort money from business owners, as well as by unscrupulous business owners trying to gain the upper hand on their competition. Don’t take my word for it, though. Ask your local FBI field office. […]