Clouds Dubai
  • Home
  • About Us
  • Products
  • Services
  • Resellers
  • Contacts
  • News
Clouds Dubai
  • Home
  • About Us
  • Products
  • Services
  • Resellers
  • Contacts
  • News
Homenews
  • Managing access to personal data for GDPR compliance

    • April 4, 2018
    • Posted by: admin
    • Category: IT Security
    No Comments

    The European Union is touting the General Data Protection Regulation (GDPR) as the most important change in data privacy regulation in 20 years. From the 25th May 2018, all businesses that process and control personal data within the EU will need to comply with the GDPR or face massive fines. Non-compliance will either result in

    read more
  • Identity Access Management with Ekran

    • March 25, 2018
    • Posted by: admin
    • Category: IT Security
    No Comments

    Identity Access Management (IAM) is the necessary element of any reliable security control, allowing companies to know who exactly accessed their sensitive data and when, as well as secure access to information preventing unauthorized sessions. In addition to user activity monitoring, Ekran System features several in-built identity and access management software capabilities in order to

    read more
  • Empower your Organization with Mobile workforce Management

    • March 14, 2018
    • Posted by: admin
    • Category: IT Security
    No Comments

    Companies worldwide deal with huge volumes of information including customer data, customer billing information and information related to the business of the company itself. Business critical data is generated at almost every organizational endpoint lies with the mobile workforce which continues to stay unprotected against malicious activities such as theft, unauthorized share, copy and transfer

    read more
  • Affordable Privileged User Monitoring

    • March 4, 2018
    • Posted by: admin
    • Category: IT Security
    No Comments

    Privileged users are an essential part of any IT and business system. Accounts with escalated privileges have access to system configuration, user management and permission management. Typically they have extended access to critical applications, sensitive systems and data. This makes privileged user monitoring very important. Comprehensive privileged user monitoring and audit are critical components of

    read more
  • What is Cryptojacking & ways to avoid this attack

    • February 24, 2018
    • Posted by: admin
    • Categories: IT Security, Ramsomware
    No Comments

    Monero, Coinhive, cryptojacking, website script injections to mine cryptocurrency. What’s all the fuss? It’s time someone posted a simple, easy to follow explanation of why everyone is talking about this and why you should also upgrade your security. The short story: online thieves can now steal your money and your information, while also driving up your

    read more
  • Overcoming Security Risk in Active Directory SSO

    • February 20, 2018
    • Posted by: admin
    • Category: IT Security
    No Comments

    Working in IT is a constant battle to find the perfect balance of security and productivity. This is no better personified than in the need for Active Directory (AD) users to access multiple systems through the use of Single Sign-On (SSO) platforms. SSO solutions eliminate the need for users to remember a unique, complex password

    read more
  • Coinhive Injections Are a Real Threat

    • February 15, 2018
    • Posted by: admin
    • Category: IT Security
    No Comments

    Coinhive Injections attack can often bypass antivirus detection. Heimdal Security team has been monitoring the Coinhive malware for the past months. The recent information about Coinhive website injections is just the tip of the iceberg. Users are extremely exposed to the threat hitting their computer directly. Thousands of government websites, including the NHS, have been

    read more
  • Active Directory logon control: 8 ways AD fails IT

    • January 27, 2018
    • Posted by: admin
    • Category: IT Security
    No Comments

    Active Directory (AD) is more than just a repository of IDs and passwords; it’s the center of just about every bit of security in your network. Going beyond the rudimentary managing of permissions, AD establishes policies and controls over what privileges accounts have, and how those accounts can be used. But when it comes to

    read more
  • Increase Employee Productivity with User Activity Monitoring

    • January 11, 2018
    • Posted by: admin
    • Categories: Employee Monitoring, IT Security
    No Comments

    High employee productivity is vital for any business’s success, but productivity tends to decrease over time, and employees tend to require constant support to stay productive. According to a survey carried out by Webtorials, companies could be losing out on as much as $11,000 in potential annual revenue per employee because of low productivity. Though

    read more
  • Key Indicators of Compromise

    • January 5, 2018
    • Posted by: admin
    • Category: IT Security
    No Comments

    Organizations today live in a world where the threat of compromise is ever-present, ever-changing, and ever-growing. Never before in the history of IT has there been so much focus on the need for security and indicators of compromise – so much so, that it’s become an integral criteria when vetting, discussing, or choosing new solutions,

    read more
  • 1
  • …
  • 6
  • 7
  • 8
  • 9
  • 10
Clouds Dubai

Clouds Dubai is a leading cybersecurity distributor, delivering cutting-edge products and expert services including Penetration Testing, SOC-as-a-Service, ISO 27001 Managed Services, and vCISO solutions. Our portfolio features top brands like ITsMine, WALLIX, Libraesva, Labyrinth, CloudSEK, miniOrange, Veriato, TrustBuilder, inDefend, uSecure, Vembu, ParaBlu, Prophaze, ScanEngine, and BackupAssist.

Copyright © 2025 Clouds Dubai, Powered by Quinconx