Let's Talk
Welcome to the EiQ Networks Blog

3 Topics of Discussion from the 2014 RSA Conference

Posted by Vijay Basani on Mar 5, 2014


This week, those of us in the security industry were busy attending the RSA conference, which was held February 24-28th in San Francisco, CA. Every year, the RSA conference brings together the industry’s best to discuss a wide variety of topics in the information security field. Attendees of the conference are there to learn more about IT securities most important current issues. As this industry continues to grow and grow, the RSA conference is a great way in which security experts across the globe can come together to connect and gain more insight into the issues facing the information security industry.

New Security Intelligence Tools Help SMBs

Posted by Security Steve on Feb 12, 2014

With the increasing number of high-profile security breaches, companies of all sizes need to take active steps to fortify their security infrastructure to protect against cyber attacks and ensure network continuity.  EiQ has introduced three new security intelligence tools available at a freemium, to help companies monitor access to sensitive data to reduce costly data breaches and optimize network performance. 

Read More

Tags: RSA, SME

From Delivering Software to Delivering SaaS

Posted by Vijay Basani on Feb 5, 2014


The big annual RSA Security conference is coming up in a few weeks and thousands of vendors, independent researchers, analysts and journalists will be there to confer, showcase, cut deals, investigate and prognosticate on information security, business risk, privacy, cyber crime and more.   Every threat type, software solution, data breach and regulatory effort that has and will impact the industry will be scrutinized.  The conversation becomes highly more complex and competitive with each vendor trying to stay one step ahead.  Not only large corporations but small enterprises are now entering the marketplace looking for intelligence and solutions to improve security posture, thwart attacks and comply with rigorous mandates that do not necessarily offer true protections.  According to the 2013 Verizon Breach report almost no organization including small business are immune to today’s sophisticated threats to information.

Subscribe to Email Updates

How Prepared Are You to Battle Cyber Attacks?

Find out with EiQ's free cyber security readiness assessment!

Find Out Now!

Posts by Topic

See All