Xylos brands

Security 11 blogposts

How secure is your company’s IT infrastructure? Whether your data centre is located on-premises, in the cloud or both, and whether your employees work on the internal network, on the road or at home: cyberattacks involving threats like ransomware and zero-day exploits always lurk around the corner. Want to know how you can prevent these viruses from harming your business and how you can adequately secure your network, mobile devices and servers? Read our bloggers’ tips and tricks.

The anatomy of a privileged hack – 3 questions and answers

Peter Beyls

Are you worried about data breaches or credential theft? Do you fear that hackers might misuse this information for financial gain?  As an organisation, you can protect yourself against these types of hacks by deploying solutions that protect your data and your identities. 

How do you protect your cloud applications with Check Point CloudGuard SaaS?

Philip Wagemans

In this evolving corporate world, it’s important to make sure your end users can work in a secure cloud network. We’d like to tell you more about Check Point CloudGuard SaaS, a Software-as-a-Service solution that protects your cloud applications.

Implement a secure Azure environment with Check Point CloudGuard

Philip Wagemans

It’s crucial to secure cloud environments properly, but all too often, the security of these publicly available resources in the architecture remains just an afterthought. How do we remedy this?

The 6 Azure security facts you should know

Michel Van Hoof

“How does Microsoft provide the security of my Azure infrastructure, data and applications?” In this blog, we’ll dive into 6 security insights concerning the Azure Cloud.

Identity and Access Management: discover our solutions

Geert Gijsels

Our IAM team believes a strong and secure identity policy is needed in today's digital world. Ready to discover our solutions? 

Cloud Security is… getting a grip on your data outside of your organisation

Johan Celis

The public cloud is used everywhere. In almost all businesses, employees share files through cloud services, teams use apps to keep track of lists and browser plugins regulate traffic to the world outside of the company. The downside is that the IT department can’t really manage this traffic. With these tips, we’ll help you keep your data under control – locally as well as in the cloud.

Connected Factory: added value, uses and how to start?

Today smart products and digitization can be found all around us in the market. June is a good example of this. This service makes decisions based on external data such as energy prices and real-time information from your meter readings. This gives you, as a private individual, more insight into your energy consumption, and the lowest rates and the cheapest supplier are automatically selected for …

Being attacked by supervillain Peyta? Xylos to the rescue!

Johan Celis
Enter Peyta (aka Petya or Petrwrap), the new ransomware variant that is spreading. She has many similarities to Wannacry. They both use an NSA exploit known as EternalBlue that targets a SMB vulnerability (CVE-2017-0144), for which Microsoft released a patch in March. Unfortunately, Petya has a few more tricks up her sleeve. What makes Peyta more malicious? Cyber-criminals have learned from the …

What impact will the GDPR have on your cloud endeavours?

Karim Vaes
Introduction The General Data Protection Regulations or GDPR came into force in April 2016. Some people think they are a thorn in the side of cloud providers, but I beg to differ. I regard these regulations as an aid rather than a threat to investment in the cloud. What are the "GDPR" about? In essence, the GDPR define the rules that apply to using and processing personal data of EU residents. …

WannaCry? We’ll get you smiling again

Johan Celis
On Friday 12 May, a new version of ransomware WannaCry hit many countries worldwide. And the attack is still not over. As long as we continue to unthinkingly open and left-click email files, this sort of problem will never go away. Anti-malware companies will grab the chance to promote their products. But, what lessons can we learn from this attack? What is ransomware? Ransomware is a form of …