Skip to main content

Are your Apps secure?

By News No Comments
Preparation may be expensive but being surprised costs a lot more. There’s an app for anything. Modern companies in all industries have joined the app economy as consumers increasingly rely on apps to manage their lives during lockdown – and will continue to into the future.   Producing apps at speed calls for agility and continual improvement processes. The quality...
Read More

Integrate MITRE ATT&CK into investigation flows

By News No Comments
Integrate MITRE ATT&CK into investigation flows Security operations teams are constantly looking to adopt more structured and proactive approaches to improving threat detection. What do you do when faced with a shopping aisle of threat detection tools? You turn to frameworks like MITRE ATT&CK to evaluate possible solutions against a real-world array of adversary tactics, techniques, and procedures (TTPs). The...
Read More

Blue Label Technology Solutions teams up with Corr-Serve

By News No Comments
Blue Label Technology Solutions (BLTS) has signed up with Corr-Serve as a reseller of the distributor’s choice IT operations and security portfolio. Blue Label Technology Solutions  implements and manages select ICT solutions for some of South Africa’s leading businesses. Ricky Correia, General Manager at BLTS commented: “We’re delighted to add the Corr-Serve security and operations management portfolio to our offering,...
Read More

Using artificial intelligence to speed up protection

By News No Comments
Staying ahead of the latest cybersecurity risks and challenges is daunting for any organisation. The rising number and sophistication of attacks, threat actors and vulnerabilities are cause for alarm. Speed is of the essence – to detect, protect, identify, quarantine, and remediate against threats today. Seceon Open Threat Management (OTM) is an advanced threat management platform that visualises, detects, and...
Read More

Are you managing the security threat of remove devices?

By News No Comments
The new normal has substantially increased home device usage amongst the remote workforce, unintentionally introducing many security implications to business. As effective as security policies may be, home devices can expose organisations to cyber risks and need to be brought to light. Studies warn of the security complexity and risks posed by connected devices—both those used by employees at home,...
Read More

Identify unknown malware and keep your organisation safe online

By News No Comments
Flexible, remote working is the new normal and by now your IT teams have set up your employees to be productive and implemented work-from-home security policies. Now your real concern is closing the gaps created by unsafe Wi-Fi networks, employees using personal devices for work and end-users accidentally clicking on malicious links or downloading infected files. You may be confident...
Read More

Network traffic analytics accelerates threat detection

By News No Comments

South African IT solutions provider Blue Label Technology Solutions is strengthening South African companies’ ability to save time and rapidly detect late-stage and insider cyber threats by leveraging network traffic analytics. By using network communications as the foundational data source, BLTS, which has been a solution provider in the South African market for over 20 years, believes network traffic analytics…

Read More

SaaS offering in print management sees exceptional growth

By News No Comments

US market-leader, PrinterLogic, looking to South African market expansion. There are a few swearwords you don’t mention to your favourite IT guy, like print server, drivers and network paths. But, cloud technology is changing that, along with new products in the software as a service (SaaS) space. US-based PrinterLogic, known for its innovation in enterprise print management software solutions, released…

Read More

BLTS offers next release of ExtraHop Reveal(x)

By News No Comments

South African IT solutions provider Blue Label Technology Solutions has announced the availability of ExtraHop Reveal(x) Summer 2018 in South Africa, a new release which highlights late stage cyber attack activities and significantly reduces ‘dwell’ time. Between 2017 and 2018, threat dwell time in the enterprise increased to 101 days, according to FireEye’s M-Trends 2018 Report. The Verizon Data Breach…

Read More