Pearl Software Releases NIST Guide for its Cybersecurity Products

Pearl Software adds support for administrators who are responsible for aligning cybersecurity policy with product capabilities.

Philadelphia, PA – December 8, 2016.  Pearl Software’s new NIST Guide provides organization policymakers with a road-map for satisfying portions of the Protect, Detect and Respond Functions of the NIST Framework for Improving Critical Infrastructure Cybersecurity. The Pearl Software NIST Guide fully supports an administrator’s efforts in documenting their cyber security policy. The NIST Framework helps organizations align their cybersecurity activities with their business requirements, risk tolerances and resources. The Pearl Software NIST Guide provides a tool to match Pearl Software’s cyber security product capabilities to NIST Framework categories. Continue reading

Top Cybersecurity Blogs You Should Add to Your Feed

In the following article, we will discuss a few different blogs that everyone should know about. The world of cybersecurity is constantly evolving and changing, and with that being said, blogs offer a great way for outsiders to stay connected with everything happening on the inside.

Graham Cluley

Graham Cluley had primarily worked as a programmer in the computer security industry beginning in the early 90s. He then began his personal blog in 2009. He has been able to rack up awards on an annual basis. This blog even earned him a spot in the Infosecurity Europe Hall of Fame, and it has been featured and quoted in numerous computer security publications. Continue reading

The Cost of Malware and Spyware

As businesses of all sizes increasingly use cloud storage and services and incorporate the Bring Your Own Device (BYOD) approach to employee management, malware and spyware are growing threats that can financially cripple or destroy a business. While it is important to understand the true costs of these attacks on a business, it is best to start with an explanation of the difference between malware and spyware and approaches to removing them.

What are Malware & Spyware?

Malware, which is short for “malicious software”, is designed to infiltrate and damage a computer without your consent. Malware includes computer viruses, worms, Trojan horses, scareware and more. It can be present on websites and emails or hidden in downloadable files, photos, videos, freeware or shareware.

Spyware focuses on surreptitiously collecting information about your usage through approaches like key logging to record your keystrokes. Spyware usually doesn’t self-replicate like other forms of malware. However, like other forms of malware, spyware can cause just as much harm to a computer, a network and a business. This can have dire financial implications for a business if the spyware is able to access the business’s or its customers’ financial data.

Prevention & Removal Continue reading

Pearl Software Releases Pearl Echo 12 R2 Web Filter

Echo Cybersecurity Extends Encryption Monitoring to Remote Desktop Services

Exton, PA (PRWEB) February 27, 2017

Pearl Software released Pearl Echo Version 12 R2, its flagship Internet monitoring and web filtering product. This latest release extends Pearl Echo’s Crypto.View™ technology to work in a multi-user and server-centric environment like Microsoft’s Remote Desktop Services (RDS) and Citrix’s XenServer. Echo Crypto.View provides administrators with full insight into encrypted communications including secure web (HTTPS) as well as secure email (SSL/TLS). Pearl’s patented real-time cyber threat suite includes the ability to monitor and control Internet communications that have been protected with encryption without jeopardizing the integrity of communication security. Continue reading