When I began my career in the tech industry, one of the first things I noticed was the unique linguistics. IPv6, Big Data, Cloud Computing and a laundry list of nebulous concepts (pun intended) that mean very little to “normal” […]

16. November 2015Read More

There’s No Such Thing As Free WiFi

The principle, “There’s no such thing as a free lunch” was popularized by economist Milton Friedman to describe the opportunity cost that must be relinquished for the “free goods/services” a person receives in exchange. Thus, it isn’t free, obvious enough. But […]

10. November 2015Read More

Hospitality Relies on Hotspot

What is the true cost of offering a quality wireless guest Internet access? More importantly, what is the cost of not offering it?  In this doc, we dive deeper into how expectation of Internet access plays a key role in […]

5. November 2015Read More
5 Safety Rules for Halloween

5 Safety Rules for Halloween (Related to Network Security of course)

Halloween seems to turn even the most intelligent of individuals into, well let’s call it more “emotionally driven” beings, and I’m not just talking about choice of costume. Safety is critical to having an enjoyable experience, so here’s 5 rules to […]

30. October 2015Read More

Zombie Training for Halloween

It’s Halloween time and I run into the same problem every year, I can’t predict how much candy to buy! Either I run out before the street lights turn on, or I have a bucket-full left over (which I then […]

26. October 2015Read More

Think Like A Hacker

When you really think about it, the amount of sensitive data that organizations are responsible for protecting is enormous. Not just company trade secrets, but client data, employee data and now even vendor data! PCI compliance aims to drag businesses […]

19. October 2015Read More

Why You’ll Re-evaluate Your Network Access Immediately After Reading This

Imagine you’re in Medieval times, looking up at a castle you’re charged to protect . Your goal as the Right Hand of the King and Head of Security, is to make recommendations regarding potential vulnerabilities of the kingdom and assess where to apply […]

15. October 2015Read More
Good Fast & Cheap

Good, Fast & Cheap (“Pick Any 2″): The Iron Triangle of Product Development

Learning about the The Iron Triangle (also referred to as Triple Constraint) was a bit of an eye-opener for me. It’s derivative of a design principle that you can prioritize any (and only) 2 of the following 3 results at the expense of the […]

9. October 2015Read More
NERC CIP Compliance (Whitepaper)

There’s No Such Thing as “NERC-CIP Compliant” Products

For many organizations that fall under North American Electric Reliability Corporation (Critical Infrastructure Protection) guidelines, compliance has largely been an afterthought. Here at Endian, we rarely encounter SCADA projects that aim first to, “Meet all NERC-CIP cyber security standards for the […]

1. October 2015Read More
Endian VPN portal

Migrate to Endian UTM from Microsoft Forefront TMG 2010

Microsoft recently announced that the Forefront TMG 2010 product is being discontinued and support will be suspended April 14, 2015 In order to continue providing superior firewall, secure web proxy, VPN and other advanced networking and security capabilities you should […]

14. April 2015Read More