25 May 2018
Cisco Umbrella: First Line of Defense

Tyler Carlisle  – [Network Consultant] How do you protect your users when they are off your corporate network, outside the boundaries of your perimeter security solution? Do they use a VPN? Are you sure? A recent Gartner study predicted that as much as 25% of corporate data traffic will bypass perimeter security. How can you guarantee that...

Read more
23 Mar 2018
Baramundi Management Suite

Chance Webster – [Systems Engineer] There are often tasks in IT departments that tend to create a lot of legwork and require significant time and effort to complete.  Reconciling hardware and software inventories, patching servers and PCs, mitigating security risks or misconfigurations, and deploying software quickly to many PCs or servers in a short amount of time...

Read more
23 Mar 2018
Carbon Black Defense Endpoint Security

Paul Miller – [Senior Systems Engineer] The world of endpoint security is a very crowded market right now, making it difficult to discern what makes one solution better than another. We at Keller Schroeder found ourselves hunting for answers in this market space last summer, and underwent an evaluation of the top ten solutions on the market....

Read more
26 Jul 2016
Penetration Tests – Why does your organization need one?

Chris Fortune – [Security Consultant] Penetration testing helps businesses understand if their investment in security actually affords them the protection they want.  To help in your understanding, let’s start with defining some terms to make sure we are using the same vocabulary. Threat – agent or actor that can cause harm Vulnerability – a flaw someone...

Read more
19 May 2016
It’s OK to Ignore the CEO, When it is NOT the CEO!

Brad Mathis  – [Senior Consultant – Information Security] Imagine the following scenario. You are going through your daily routine and you receive an urgent email from the CEO.  The email is urgent, appears to be time sensitive, and is requiring you to act immediately.  You are aware the CEO is currently out on vacation or away on...

Read more
19 May 2016
ProofPoint Email Protection – Not Your Average Spam Filter

Chance Webster  – [Systems Engineer – Network Solutions Group] In today’s fast paced world, e-mail is the medium that drives business.  Not only do we use email to conduct day to day operations and communicate with employees, customers, and business partners, we also use email to advertise products and services, convey information to a large group,...

Read more
15 Mar 2016
Systems Team Proactive Performance Management (PPM) Services

Chris Haynes  – [Keller Schroeder Engineer]         An ounce of prevention is worth a pound of cure. – Benjamin Franklin Virtualization has become the norm in most data centers, but so is the expectation of zero downtime. Preventative maintenance is the best insurance against downtime and security threats in your storage/virtualization environment. Preventative...

Read more
19 Jan 2016
LogRhythm 7 – Next-Gen Security Threat Detection & Response

Brad Mathis – [Senior Consultant, Information Security]   LogRhythm, The Security Intelligence Company, recently unveiled LogRhythm 7, a major upgrade to their security intelligence and analytics platform.  With new and enhanced features and capabilities, LogRhythm continues to be a leader in the SIEM (Security Information & Event Management) space.   Chris Peterson, senior vice-president of products,...

Read more
23 Nov 2015
Spotlight On…

Employee Owners: Chris Fortune   Chris Fortune is a 20 year veteran in IT. His experience began as a co-op student on a helpdesk and quickly escalated into increasingly challenging roles in network engineering, system engineering, and telecom. Security has always been the common thread of Chris’ work with these other disciplines.  He has also had...

Read more
30 Jul 2015
Phish or Be Phished? The Choice is Yours

Brad Mathis, Senior Consultant, Information Security It is mid-2015.  By now, we have all seen incoming emails claiming we have been bequeathed a huge sum of money from a Nigerian Prince, or we have won a foreign lottery we never entered.  Most employees have seen these scam emails long enough to know they are not real....

Read more