24x7 Support: 844.679.7651

Cerdant Blog

Aerohive for Secure, Reliable Wireless
Mike Johnson, President - Cerdant, October 26, 2018

It’s rare that we add a new product or service to our offerings.  The reason has been simple; whatever it is we choose to do, we make sure we do it better than anyone else.  Focusing on a few key products and services has allowed us to become experts at those things.  It means that … Continue reading “Aerohive for Secure, Reliable Wireless”

SonicWall Single Sign On: End the “Who is that IP” Guessing Game!
Kevin Roberts, CISSP, Sr. Network Security Engineer, August 17, 2018

Have you ever been looking over your SonicWall logs and reports and thought, “I wonder who was at IP 192.168.1.56 streaming YouTube all day?” Or maybe you have wondered what user at IP 10.10.10.152 tripped the Gateway Anti-Virus signature AdvancedKeyLogger.M (Trojan). Had you been using the built in SonicWall feature, Single Sign On (SSO), you … Continue reading “SonicWall Single Sign On: End the “Who is that IP” Guessing Game!”

Bridging the Gap Between PCI Compliance and Security
Joshua Skeens, CISSP, Director of Engineering, June 20, 2018

The fact that being PCI DSS (Payment Card Industry Data Security Standards) compliant does not also make your network fully secure is not a new revelation.  These standards of compliance were developed by and are enforced by the PCI Data Security Standards Council, which was founded by Discover Financial Services, American Express, JCB International, MasterCard … Continue reading “Bridging the Gap Between PCI Compliance and Security”

CylancePROTECT Webinar: Demo and Deep Dive
Jason Palm, SR. Network Security Engineer, May 2, 2018

Have you wanted to take a look under the Cylance hood, but just haven’t been able to schedule a demo?  Take some time and view this recent webinar for a through overview of CylancePROTECT and watch a deep dive live demo of the product in action. This webinar demonstrates the power of machine learning and … Continue reading “CylancePROTECT Webinar: Demo and Deep Dive”

Password Creation & Management – Security Best Practice Series – Part 3
Joshua Skeens, CISSP, Director of Engineering, February 19, 2018

It is 2018 and “Yes!” we are still dealing with passwords!! In Part 3 of our Security Best Practice series, we are going to dive into Password Creation and Management. You arrived in the office nice and early to start this week off, right? You are getting ready to enjoy your first cup of coffee … Continue reading “Password Creation & Management – Security Best Practice Series – Part 3”

Cerdant IDS Enhancements – Sentry 2.0!
Cerdant, January 29, 2018

Cerdant was extremely busy in 2017.  Not only with day to day business operations, but also with increasing our product portfolio and enhancing our current service offerings. At Cerdant, we strive to provide the best Customer Support experience possible. We also strive to enhance our technology, provide better features, and increased value for our customers. … Continue reading “Cerdant IDS Enhancements – Sentry 2.0!”

Network Segmentation: Security Best Practice Series – Part 2
Joshua Skeens, CISSP, Director of Engineering, November 20, 2017

It is time to get some more valuable information into your hands. In Part 2 of our Security Best Practice series, we are discussing steps that you can take as a Network Administrator to help secure your network. Lets dive into Network Segmentation. Taking the proper steps to segment your business network(s) is one of … Continue reading “Network Segmentation: Security Best Practice Series – Part 2”

Security Alert: Equifax Data Breach
Joshua Skeens, CISSP, Director of Engineering, September 8, 2017

Unfortunately, news broke yesterday that Equifax (one of the top three companies in the US that calculates credit scores) was breached. This data breach might have allowed up to 143 million customer’s information to have been stolen. This information contains names, addresses, birth dates, Social Security Numbers, plus more. The data breach that was discovered in … Continue reading “Security Alert: Equifax Data Breach”

Local Administrator Rights and Privileges: Security Best Practice Series – Part 1
Joshua Skeens, CISSP, Director of Engineering, September 7, 2017

By controlling and or limiting administrative access on your devices you are going to be able to help limit the scope of security concerns.

Diablo6 Locky Ransomware In The Wild: Unable to Evade Next-Generation Security
Jason Palm, SR. Network Security Engineer, August 10, 2017

A Cerdant engineer discovered a new variant of Locky Ransomware, Diablo6, and then tested it against Cylance and SonicWall Capture ATP.

Interested in our services?

Contact us to see what Cerdant can do for you.