• Home
    • Solutions
      • NC Protect – Context-Aware Data Protection & Access Control
      • Bluedog – Cloud-Based Network Threat Detection & SOC-as-a-Service
      • BlackFog – Anti Data Exfiltration
      • Data Identification
      • Data Classification
      • Security Automation
    • Industries
      • Government Page
      • Finance & Banking
      • Healthcare
      • Enterprise
      • Education
    • Resources
      • Blogs
      • Whitepapers
      • Case Studies
      • Events
    • About Us
      • Partners
    • Contact Us
Softlanding Ltd.
Softlanding Ltd.
Get Started
  • Home
  • Solutions
    • NC Protect – Context-Aware Data Protection & Access Control
    • Bluedog – Cloud-Based Network Threat Detection & SOC-as-a-Service
    • BlackFog – Anti Data Exfiltration
    • Data Identification
    • Data Classification
    • Security Automation
  • Industries
    • Government Page
    • Finance & Banking
    • Healthcare
    • Enterprise
    • Education
  • Resources
    • Blogs
    • Whitepapers
    • Case Studies
    • Events
  • About Us
    • Partners
  • Contact Us

Strategy

Why vpns fail to protect industrial controls

  • December 1, 2020
  • admin
  • Consulting, Creative, Datasecurity, Development, Management, Strategy, Uncategorized
Building management maintenance is important for data center operators. This can be done using VPN access but it has inherent limitations that make the use of VPNs risky for...
Continue Reading

Why Get Serious About Zero Trust Security

  • December 1, 2020
  • admin
  • Consulting, Creative, Datasecurity, Development, Management, Strategy, Uncategorized
Zero Trust is one of the latest buzzwords in cybersecurity. However, it is one of the efficient tools to deal with today’s sophisticated threats. Zero trust is a security...
Continue Reading

What is Pass-The-Hash Attack? How to Prevent It?

  • December 1, 2020
  • admin
  • Consulting, Creative, Datasecurity, Development, Management, Strategy, Uncategorized
In a Pass-the-Hash or PtH attack, a threat actor steals a password and without decoding it, reuses it to manipulate an authentication system into creating a new authenticated session...
Continue Reading

What is a Global Catalog Server?

  • December 1, 2020
  • admin
  • Consulting, Datasecurity, Management, Strategy, Uncategorized
A feature of Active Directory (AD) domain controllers, the global catalog allows a domain controller to provide detailed information on all the objects in the forest, independent of whether...
Continue Reading

How Email Can Pose a Cybersecurity Threat?

  • December 1, 2020
  • admin
  • Consulting, Datasecurity, Management, Strategy, Uncategorized
Due to ever increasing need for online communication, email has been a major security issue or vulnerability. In fact, antivirus software is not efficient in blocking the social engineering...
Continue Reading

What is Insider Threat?

  • November 16, 2020
  • admin
  • Consulting, Datasecurity, Management, Strategy, Uncategorized
Through a joint venture between the National Counterintelligence and Security Center (NSC) and the National Insider Threat Task Force (NITTF), September has been declared National Insider Threat Awareness Month...
Continue Reading

Top Data Breaches of 2020

  • November 16, 2020
  • admin
  • Consulting, Datasecurity, Management, Strategy, Uncategorized
This year has been a year like no other, with a never-ending series of events. We have seen the evolution of the Coronavirus pandemic at a glance, the continuing...
Continue Reading

What is Digital Transformation?

  • November 16, 2020
  • admin
  • Consulting, Datasecurity, Management, Strategy, Uncategorized
Digital Transformation—what is it? The description of the Wiki is very straight forward: “Digital Transformation is the adoption of digital technology to transform services or businesses, through replacing non-digital...
Continue Reading

Fix the Top 5 Missing Microsoft Teams Collaboration Features that Impact Data Security

  • November 7, 2020
  • admin
  • Consulting, Datasecurity, Management, Strategy, Uncategorized
Microsoft Teams is everywhere in 2020. Adoption was growing before the pandemic, and the surge of remote workers sent usage into overdrive. However, a by-product of accelerated growth is...
Continue Reading

Nucleus Cyber is Now Microsoft IP Co-sell Ready!

  • November 7, 2020
  • admin
  • Consulting, Datasecurity, Management, Strategy, Uncategorized
Valued customers and partners, I am pleased to announce Nucleus Cyber has achieved Microsoft IP Co-sell Ready status. As an IP Co-sell Ready Microsoft partner, our NC Protect solution...
Continue Reading

Posts pagination

Previous 1 2 3 Next

Recent Posts

  • Cybersecurity Failures and the Cost of Negligence – The Case of Marks & Spencer
  • Ransomware Report 2024
  • How a Virtual CISO Can Fortify Your Business Against Modern Cyber Threats
  • Revolutionizing Cybersecurity for MSPs
  • Why Data Sovereignty is Crucial for EU Businesses in Microsoft 365

Recent Comments

  • user-705254 on What is a Global Catalog Server?
  • Buy SMTP on ENCRYPTION KEY MANAGEMENT IN MICROSOFT 365
  • Buy Unlimited SMTP on ENCRYPTION KEY MANAGEMENT IN MICROSOFT 365
  • Jo Koger on Unlocking GDPR Compliance: Enhancing Data Sovereignty with BYOK in Microsoft Azure and M365
  • Jaime Aultman on What is a Global Catalog Server?

Archives

  • May 2025
  • April 2025
  • March 2025
  • February 2025
  • January 2025
  • February 2024
  • January 2024
  • December 2023
  • November 2023
  • August 2023
  • July 2023
  • June 2021
  • April 2021
  • February 2021
  • January 2021
  • December 2020
  • November 2020
  • September 2019

Categories

  • Consulting
  • Creative
  • Datasecurity
  • Development
  • Management
  • Strategy
  • Uncategorized

Meta

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

About

We are your strong and reliable partner for data identification and classification working worldwide in different fields like military, government or health care. Our first priority is to make and keep our customers satisfied with our easy-to-handle protection solutions.

Contact Info

  • 3 Burrow Road, Cush Cottage, Dublin,Ireland
  • +353 830589743
  • support@www.softlanding.ie
  • +353 830589743
  • 10:00 - 19:00

Services

  • Blackfog
  • Bluedog
  • Archtis

Fill out my online form

© 2020 Softlanding. All Rights Reserved.