Profile cover photo
Profile photo
BorderLAN
29 followers -
Providing clients with innovative yet simple solutions to solve problems
Providing clients with innovative yet simple solutions to solve problems

29 followers
About
Posts

Post has attachment
Virtualizing in a network requires you find a dedicated computer or server to stay on and be the “Main” server for virtual connections and create a static IP for the device (192.168.xx.xx).   Firewall settings can be made to forward certain ports that contain the encrypted usage packets to the correct machine via a PORT FORWARD rule.  If you don’t want to enable outside connections, simply do not create a firewall rule (one to one NAT or forward), and enjoy the connect from anywhere within a LAN convenience from any device via a direct 192.168.xx.xx path.... Read More
Add a comment...

Post has attachment
New BorderLAN's MDM for Schools Video - Enjoy!
Add a comment...

Post has attachment

Post has attachment
“Bring Your Own Device” Challenges and Solution for Schools - See more at: http://borderlan.com/byod-for-schools/ 
#byod   #school   #borderlan  
Add a comment...

Post has attachment
West Des Moines Schools and its innovative approach to finding the right Anti-Virus solution - BorderLAN was more than happy to help. http://borderlan.com/2013/05/borderlan-provides-anti-virus-solution-for-west-des-moines-schools/
Add a comment...

Post has attachment
ZixMail offers unrivaled email encryption services with a track record of consistent 99.999% availability. http://myzixmail.com/
Add a comment...

Post has attachment
Slow deployment will not replicate itself and send off warning signals. Instead it sits quietly in its random form listing, learning, keying every website and keystroke. Eventually the most complex can initiate simple web sessions and “post” the data in the background using open web ports to the hackers servers. From there data is sourced and filtered, used and sold depending on the quality.
Add a comment...

Post has attachment
Convenience has driven faster than our security policies. Internal threats now represent more than 60% of the risk to company data, 40% coming from hackers. We must remember internal threats are dangerous for three main reason...
Add a comment...

Post has attachment
Personal devices are not usually monitored, whether personal or company owned. This opens up huge risks to your secure data just from typical user behavior, which includes personal web surfing, pornography (viruses), torrents, movies, personal email, apps, software / malware and more. End users believe connections to the corporate are protected, but what is not clear is what else is watching and logging that activity. With no protection on the end-point it’s impossible to know how extensive the threat.
Add a comment...

Post has attachment
What’s Driving Your Desktop Security Strategy?
Add a comment...
Wait while more posts are being loaded