Blog iconBlog

Carolina Advanced Digital, Inc. > security

Cisco

Cisco Systems portfolio delivers the reliable, scalable, and highly secure IT infrastructure that your business needs. From data centers to collaboration, from mobility to security, on premises or in the cloud, Cisco hardware and software-enabled solutions are based on proven industry leadership and experience.


Read More
email email email email email email
profile iconPosted by Jennifer Minella

Bradford Networks

Bradford Networks award-winning NAC solution lets you continuously assess network risks, and automatically remove vulnerable and compromised devices


Read More
email email email email email email
profile iconPosted by Jennifer Minella

Barracuda Networks

Barracuda Networks award-winning solutions for content security, networking and application delivery and data storage, protection and disaster recovery.


Read More
email email email email email email
profile iconPosted by Jennifer Minella

Security Solutions

Enterprise-class products and services for wired and wireless security needs and security awareness training, from a nationally-recognized security-focused integrator. Carolina Advanced Digital’s unique focus on security solutions is driven by its leadership team who began integrating security with infrastructure solutions more than a decade ago. Our approach to security takes in to consideration the client’s industry, current threats, existing enterprise architecture, and personnel skills for a tailored security program with a focus on wired and wireless security solutions. Working both through Carolina Advanced Digital’s Professional Services team and a team of strategically-selected partners, we’re able to offer a portfolio of security solutions that incorporate products and services as stand-along or integrated offerings. Security Technologies Security Products Security Services Security Technology Portfolio Gateway security: firewalls, NGFW, UTM, integrated security appliances Threat management: IDS, IPS and anomaly detection for wired and wireless Secure remote access: SSL-VPN, remote WiFi Wireless network security Profiling and monitoring: NAC and endpoint security Communication security: email , social media, and messaging protection Cryptography: encryption solutions and key management Disaster recovery: backup solutions for virtual environments, email, messaging and more Security awareness training, phishing platforms, and compliance reporting Security Product Portfolio Aruba Networks, an HPE company Barracuda Networks Bradford Networks Cisco Firemon Fortinet Infoblox KnowBe4 PhishMe SonicWALL Winmagic See Products Security Services Carolina Advanced Digital’s security services offerings extend well beyond the boundaries of the products solutions we offer. With services for security assessments and audits, configuration review and baselining, penetration testing including logical, physical and social engineering, web application security testing, forensics, and basic posture evaluation for people, processes, and technologies serving security functions. Read more...
Read More
email email email email email email
profile iconPosted by Jennifer Minella

Security: Top Twitter Influencers to Follow [Techopedia]

By Techopedia Staff, find VP of Engineering Jennifer Minella Takeaway: Stay on top of the latest news and views on cybersecurity by following these top influencers on Twitter. If there’s one area of the tech industry that’s undoubtly growing – and growing fast – it’s security. According to a recent report by Big Market Research, the Internet security market is set to grow at a rate of 8.1% per year between 2014 and 2020. As Internet-based technology spreads into nearly all areas of government, retail, IT and telecommunications, the threat of malware, spam and viruses has become an increasingly pressing concern. Fortunately, it’s also an area where new security technology and insights continue to emerge. Want to stay on top of new developments in this area? We’ve compiled a list of the most influential voices who are talking about it on Twitter. Why this list? Well, it’s based on Twitter data culled according to content, follower/following ratios, frequency of tweets, blog popularity, the opinions of other IT security experts and influencers, and our own subjective judgment. Read...
Read More
email email email email email email
profile iconPosted by Jennifer Minella