Blog

All Cloud Security for Business, All the Time...

[Report] 77% of SMB IT Pros Cite Employees as Weakest Link in Cloud Security
Posted by Macey Morrison on November 13, 2014

CloudEntr is pleased to share our 2015 State of SMB Cybersecurity report. We surveyed 430+ IT pros to find what SMBs were really thinking about the cloud, the impact they felt from security breaches—and most importantly what they plan to do in 2015. The results? Our study revealed as cloud usage has risen within businesses, the IT pros that work for them have felt the impact of more frequent security breaches. The cause and solution according to the survey? Employees.

4 reasons why your client's data is your data
Posted by Christopher Bartik on October 17, 2014

As the number of data breaches continues to rise, service organizations and others who deal in high volumes of privileged information may find themselves yearning for the days when all client information was locked in a file cabinet, in a vault, in a secret underground lair.

Don't become a breached whale: Password tips to keep you afloat
Posted by Christopher Bartik on August 26, 2014

Despite weak company passwords more or less presenting a welcome mat for cybercriminals, many organizations still don’t seem to get the memo, falling back on authentication platforms that are shockingly easy to breach.

Cloud Sprawl: A Business's Guide to Secure Cloud Data for Employees and Customers
Posted by Macey Morrison on August 21, 2014

Cloud sprawl is a headache we all experience in business today. Employees have too many cloud tools from CRM to accounting to file sharing to efficiently collaborate with co-workers and customers. Not to mention keep track of their own tools. The data islands these tools create from your business’s sensitive data put your company and customer’s data at risk. To further complicate the issue, shadow IT could be hiding up to 90% of your company’s cloud footprint. So how can IT keep up if you don't have the full picture? Learn how to secure your company and customer’s sensitive information from shadow IT while maintaining an efficient workforce.  

Deconstructing big time data breaches: Where the big boys failed and what your business can learn
Posted by Christopher Bartik on August 12, 2014

These days, it seems not a day goes by without a data breach story appearing in the news. As these security incidents become more prevalent - not to mention more costly - one of the best things that small businesses can do to prevent them is to learn from others' mistakes.

Gemalto Bundles Secure File Sharing and Access Management to Offer All-in-One Identity Cloud Solution
Posted by Macey Morrison on July 30, 2014

This week, the CloudEntr Team is excited to announce that we have listened to our customers when it comes to data risk in the cloud, taking on the other piece of the cloud security puzzle: file sharing and collaboration.

CloudEntr now offers an all-in-one solution for secure application access and file sharing in the cloud. 

And Then There was One: Secure File Sharing & Access in the Cloud from CloudEntr
Posted by Ella Segura on July 28, 2014

The cloud has provided high-powered, convenient, mobile, and low-cost tools that businesses can’t pass up. So, how do you control and secure all of your business data without losing the convenience of the cloud?

I am proud to announce our July Release today, transforming CloudEntr into that one place companies secure their applications and files in the cloud.

What can J-Lo Teach us About SAML, and Why Should your Business Care?
Posted by Christopher Bartik on July 27, 2014

If you’re using cloud-based applications in your business (and that covers most businesses), there are good reasons to care – deeply – about SAML. But really, what the heck is SAML and why should you and your business care? 

CloudEntr Brings Big Business Identity and Access Management to the Small Enterprise: A Review
Posted by Macey Morrison on July 22, 2014

AVISIAN Publishing reviews CloudEntr's password manager and identity and access management features in the Summer 2014 edition of their identity technology publication Regarding ID. Naming CloudEntr the solution that brings "...big business identity management to the small enterprise".

An Enlightened Approach to Password Security: Getting Beyond 8 Characters
Posted by Macey Morrison on July 09, 2014

Security pros know that a user name and password pair isn’t the most secure method of logging into your businesses sites and apps – just wait a news cycle and you’re sure to hear about another breach where a company’s passwords have been exposed. But for the time being passwords are still the defacto way that businesses access cloud and web resources daily. 

Check out what universities Stanford and Emerson College are doing to get their employees and students on the straight and arrow of secure password policies... and they're going willingly.

New Feature Release: More from Two-factor Authentication
Posted by Ella Segura on May 23, 2014

Businesses want assurance that their data and resources are safe, and it’s no secret that passwords are not cutting it anymore. Let’s be honest, they are the weakest link in the security chain. And why is that? Well, it’s mostly attributed to the “something you know” piece of the authentication equation AKA the human element. So how do you solve this problem? Implement that second gate of security, two-factor authentication. 
CloudEntr's May feature release delivers more options and more convenience for businesses and employees to use two-factor authentication.

[Report] SaaS Apps Accelerating an Identity & Access Management Evolution to the Cloud
Posted by Macey Morrison on May 05, 2014

It's no secret that cloud-based applications have revolutionized the way we work, but according to new our survey report with The 451 Group, they’re also changing how enterprises use Identity and Access Management (IAM) solutions and are creating a realized need for SMBs to invest in cloud security.

Learn why IAM solutions are a top priority for companies in 2014: we share key industry trends, IT planning priorities, criteria for selecting the right solution, and security tips direct from over 200 business management, IT, and security professional from our 2014 report, The Growing Cloud Identity Crisis.

 

New Feature Release: One-Click Usability
Posted by Ella Segura on April 21, 2014

Today, the team and I are thrilled to build upon our February new UI release with new features to increase customer productivity and provide a seamless web experience when it comes to securing access to their cloud apps on the web. 

96 Hours Later, What Does Heartbleed Mean for Your Business?
Posted by Macey Morrison on April 11, 2014

The dust is settling on what has been an explosive week in digital security. Just 96 hours ago, Codenomican and researchers at Google announced they had uncovered a major security threat affecting more than 66% of the web. Making the Heartbleed Bug, one of the largest security threats the World Wide Web has ever seen.

So what does this means for your business and what are the actions you can take to secure it?

CloudEntr Accounts Secure in Light of Heartbleed Bug
Posted by Macey Morrison on April 09, 2014

You’ve most likely heard by now the buzz surrounding Monday’s announcement by security firm Codenomican and Google researcher Neal Mehta – the Heartbleed Bug has been unearthed. CloudEntr customers can rest assured their accounts and credentials are safe. 

And here's why.

Save Your Employees from Themselves with an Online Password Manager
Posted by Macey Morrison on March 27, 2014

Your company’s employees are full of good intentions when it comes to network security — they really are. But they’re also busy and distracted, and they have a nasty habit of choosing passwords like “123456” out of expedience. So you have to save them from themselves.

To do that, you need to implement a technology safety net that simplifies their worklife and follows them anywhere...

MSPAlliance Launches Incentive Program for Certified MSPs Using Gemalto’s Secure Cloud Access Solution
Posted by Macey Morrison on March 27, 2014

We are proud to announce our support of MSPAlliance's We Support the Standard initiative by offering an incentive program centered around the CloudEntr secure cloud access solution to United Certification Standard (UCS) certified cloud and managed service providers. 

Interested? Read MSPAlliance's announcement released at their annual MSPWorld event in Orlando, FL for more details on the program and how to enroll.

Why Even Small Businesses Need Enterprise Password Management
Posted by Macey Morrison on March 20, 2014

SMBs are fortunate to avoid many of the hassles and bureaucracy that are inevitable for big enterprises. But they often lack the budget and personnel that their larger brethren can throw at business issues — especially IT.

These days, cloud-based technologies are leveling the IT playing field, lowering costs while ensuring rapid deployment and high performance. This means that SMBs can now benefit from enterprise-grade technology for the issues that matter most, password management definitely being one of them...

Who's Afraid of Identity Access Management?
Posted by Macey Morrison on March 13, 2014

IT managers, do you ever feel like you’re the Big Bad Wolf? When you try to rein in your users, even just to enforce good password policies, they sometimes act like you’re trying to blow their house down. When in fact you’re the one trying to convince them to move into a house made out of bricks.

You don’t have to be the bad guy... 

What is Two Factor Authentication?
Posted by Macey Morrison on March 06, 2014

And why should you care?

You should care about two factor authentication because it keeps you much safer as you use online applications to do your work. If you’re in IT, you should be thrilled about it, because it can keep all of your users safer -- without creating any inconvenience for them.