CRN Honors Our VP of Managed Security Sales as a Channel Chief

We’re excited to announce that our Vice President of Managed Security Sales, Brian Herman, has been named one of UBM Tech Channel’s CRN 2013 Channel Chiefs. This prestigious list of the most influential leaders in the IT channel recognizes those executives directly responsible for driving channel sales and growth within their organization, while evangelizing and [...]

Introducing Our Newest Partner: HealthGuard

We are excited to announce our new partnerships with HealthGuard, a health security and risk management services company. We are providing them with a full suite of Managed Security Services for their customers and partners, including HIPAA Essential, PCI Complete, managed firewall, intrusion detection and prevention, log management, and web application firewall (WAF). Additionally, HealthGuard [...]

A Look Back at StillSecure’s Achievements in 2012

2013 is finally here!  We have already hit the ground running in the New Year, but wanted to take the time to recap some of our company’s highlights from 2012. We are grateful for the relationships we have continued to cultivate in 2012 with our valued clients, partners, analysts and media professionals. As you may [...]

Healthcare-record compliance is a SaaS problem too

Among companies handling patient records, the Health Information Technology for Economic and Clinical Health (HITECH) Act is old news. Going into effect in February 2009, this legislation sought to advance health information technology use standards to eventually make certain functions and safeguards mandatory, increasing the requirements for compliance with the Health Insurance Portability and Accountability [...]

“Cleaner Pipes” means increased bandwidth for your Internet and your staff. Why cloud/network security makes sense.

Guest Post by Fran Leyland White, Hosted Security Product Manager, XO Communications Your company has many assets: employee information, intellectual property, strategies, patents & pending patents, nondisclosure agreements, financial information, and its reputation. You need to keep these safe. Cloud-based security has many benefits over the traditional premise-based model. It is less expensive, more efficient, more [...]

Managed VPN: Safe remote access – full productivity

James D. Brown, CTO, StillSecure Welcome to part 2 of my multi-part series on security technologies. This time I’ll talk about virtual private networks (VPNs), what they are, why you need them, and how they work.As I stated in my last post on managed firewalls, this is aimed at an audience with basic knowledge of [...]

Managed Firewall: What’s in it for me?

James D. Brown, CTO, StillSecure This is the first part in a multi-part series discussing various security technologies, where they fit, why they’re valuable, and why no single security tool is sufficient to protect your environment. My goal is to educate in terms understandable to those with a basic knowledge of information technology and networking, [...]

Got a HIPAA headache?

By James D. Brown, CTO, StillSecure If you deal with Electronic Protected Health Information (EPHI), you’re only too aware of the Health Insurance Portability and Accountability Act of 1996, and its more recent cousin, Health Information Technology for Economic and Clinical Health Act (HITECH), enacted in 2009. You’re probably also aware that together, both of [...]

There is a Roadmap to the Internet, and Having the Right One Counts!

The tale of DNSCHANGER ( 2+ yrs. in the making) has come to an end, criminal malware re-routing browser traffic in a profitable clickthru scam had its last vestiges die on July 9th. International law enforcement action, media sensationalism, good folks working behind the scenes; and an impacted global audience; offers multiple lessons to us [...]

How To Ruin A Cyber-Attacker’s Day

Since the earliest days of humankind, there has been an ongoing race between those trying to protect what they have (the havers), and those trying to take from others (the takers). In physical terms, this has meant the use of safes, locks, walls, gates, fences, guards, cameras, radar and other technologies. Any one of those [...]