Thycotic Secret Server Feedback
We are looking at a few enterprise password vault products, and the timeline on the project has just been moved up by about 30 - 45 days. Does anyone in the Spiceworks community have any feedback from...
View ArticleAccess control with Video monitoring
I have a semi remote location that currently has a manned guard shack. when an 18 wheeler, or standard pick up come up the guard verifies that the vehicle is authorized to enter and will open the...
View ArticleData Breach Investigations Report 2013
Verizon released the 2013 version of their Data Breach Investigations Report yesterday. The contributing agencies have grown from 4 in 2012 to 18 in 2013. There is a lot of good information in this...
View ArticleRemote Reboot in Safe Mode with Networking
Hello, I need a way to reboot a remote computer into Safe Mode with Networking without having to remote the computer. The specific situation is a computer with an FBI virus which won't allow me to...
View ArticlePorn.exe Sexy.exe outbreak Globally in my Organisation. Need urgent help!!
Hi All, Need urgent help regarding Porn.exe, Sexy.exe viruses infected globally (Billerica, Uxbridge, Berlin etc..) in our storage devivces including SAN and File servers. All the files have gone to...
View ArticleRemote Users - How do you get their hardware back securely?
Here is the situation: We have remote workers throughout the U.S. with company hardware (Laptops, MiFi's, etc.). My boss has tasked me with figuring out how we would securely send or receive hardware...
View ArticleI've been tasked to set up video surveillance. Anybody well-versed in this?
We want to bump up our building security with video. Based on my initial requirements analysis we've come up with some basic requirements. 1) Decent low-light (greater than 20 feet is likely). 2) At...
View ArticleEnterprise security across provisioned SaaS?
How do you monitor/configure/enforce sane security policy across enterprise provisioned SaaS applications (like Salesforce, Box, Github, etc.) ? I don't necessarily care about encryption but am more...
View ArticlePeople Counting System
We are in the market for a people counting system. Specifically, how many people enter and exit sections of our building. What would you recommend? What has been your experience with these types of...
View ArticleWatchGuard or Cyberoam or what ?
Hi Every One We have 5 Different Locations, Main Office + other 4 Branches, 2 of the branches are connected to the main office through A data only Leased Line, and they have DSL for Internet Browsing,...
View ArticleEmail and Export Compliance?
How do you handle export compliance where you're sending people to certain countries where simply having them open an email and have it stored on their computer might constitute an export? Terminal...
View ArticleSecurity - Can anyone speak to your comfort of spiceworks dr plan and security
I am interested if anyone can speak to spiceworks disaster recovery plan and security, how it applies to the user community and the security of an organizations data? Would love to hear your feed back...
View Articlesecurity options for private webserver
moving forward since event of DoS (Click here to see it) on Wednesday we have decided to reconfigure our virtual network of dedicated servers. we have a set of three dedicated servers in a virtual...
View ArticleTroubleshooting Kaspersky Endpoint Security 10
As is typical with any program that touches everything in a system, sometimes (all the time!) the finger gets pointed at the AV subsystem. Since migrating to Kaspersky, our detection rate has been...
View ArticleBest way to block Hotspot Shield and other unwanted proxy/vpn style software?
I have a Cymphonix Network Composer and up until now it's been great. But the other day I found out there is new style VPN software that basically let's you browse the world from anywhere, behind any...
View ArticleLaws concerning the installation of surveillance cameras in Texas
The company I work for is located just outside of Houston, Texas. I was wondering if you guys knew anything about what kinds of laws apply for installing surveillance cameras. One vendor I spoke with...
View ArticleIP Surveillance/PoE question
How do you deal with undetected loops and traffic flow disruptions? Would love to hear your thoughts. We just conducted some research and produced a paper on this topic (among other issues). Your...
View ArticleFull Disk Encryption with Keyfile... For Free
So i have a toughie for you guys. I've been tasked with finding a full disk encryption solution that is both secure and easy on users, oh, and i can't spend any money on it -_-. So, my thought is to...
View Articlecamera surveilance for warehouse
we are getting a request to look at purchasing a camera system with DVR for our warehouse. allow managers to view the production lines, certain doors in the plant, the time clocks, so on. I was...
View Article$1Million Cyberheist From Leavenworth Hospital
Kevin Mitnick sent me an article that illustrates why it is needed to train all employees not to fall for hacker tricks: "Friday, April 26, 2013 - WENATCHEE — Hackers stole more than $1 million from...
View Article