Category: Technologies


ITB Welcomes Hoxhunt: : Enhancing Cybersecurity Through Innovative Human Risk Management

  At ITB, we\'re committed to staying ahead of the curve in the evolving world of cybersecurity. In our quest to provide the best solutions to our clients, we\'re excited to announce our new partnership with Hoxhunt, a leader in Human Risk Management and cybersecurity training. This colla ...Read More →

#cyber-education #cybersecurity #risk-management #uncategorised #vendors Read More

Analysing the Latest Mitre Engenuity EDR/MDR Evaluations: MDR Vendors Compared

The latest Mitre Engenuity ATT&CK® Evaluations for EDR (Endpoint Detection and Response) and MDR (Managed Detection and Response) services have provided critical insights into how well various vendors security offerings compare including the softwares prevention and detection capability, but mo ...Read More →

#cybersecurity #endpoint-security #managed-services #vendors Read More

Navigating the Cybersecurity Maze: A Guide to Choosing the Right Solutions for Your Business

There are over 90+ different cyber solution types and counting... from simple \'commodity\' tooling (AV, Email, Web) to advanced and integrated solutions (SASE, CTEM, XDR); the number vendors in the space has skyrocketed to well over 2500+ all providing different innovations and a variety of visibil ...Read More →

#cybersecurity #technologies Read More

Feeling Isolated? What about the benefits...

The last thing we want to talk about after years of lockdowns is more isolation right? Well what if there was a good kind, that reduced user risk, assisted with compliance requirements and blocked internet borne threats? I\'n not talking about locking your employees in a room or banning them from ...Read More →

#cybersecurity #edge-security #shadow-it Read More

Cybersecurity Essentials for Small to Medium-sized Businesses

In an era where digital transformation is key to business success, small to medium-sized businesses (SMBs) find themselves both empowered by technology and vulnerable to cyber threats. Cybersecurity is not just a concern for large corporations; it is equally crucial for SMBs. In this blog, we\'l ...Read More →

#data-security #endpoint-security #managed-services #network-security #services #uncategorised Read More

Stopping threats through the prolific world of access management.

Restricting access to anything in this world is a solid way of controlling its security, but, as the number of user profiles and platforms increases in the IT security field, is there any real guarantee of safety?  Certainly, by controlling who and what can access your systems and data we can elim ...Read More →

#access-management #general Read More

ITB strengthen their Managed Service offering with Bitdefender

At ITB, we utilise our security engineers expertise to provide various levels of managed services for our customers, including basic support contracts through to our MDR Lite service. We can now extend this out to a full MDR service with 24/7x365 coverage, threat hunting and incident response from o ...Read More →

#endpoint-security #security-operations #services #vendors Read More

ITB Awarded Silver partner level with Rapid7

We are pleased to announce that we have been awarded \'Silver Status\' with our brand partner, Rapid7. This partnership brings advanced cyber security specialities to our customers and is a demonstration of how our team of technical experts have been recognised as advocates of Rapid7 solutions. ...Read More →

#general #risk-management #security-operations #vendors Read More

The Backup Plan

As we look towards 2023, and we start to think about how best to plan our new cyber strategies for the New Year, it is always great to start looking at trends in the market. Understanding the cybersecurity industry and the many, many trends isn\'t always straightforward, as cyber criminals are ever ...Read More →

#data-security #general Read More

How Cyber Savvy Are Your Users?

The purpose of Cyber Security is to mitigate the abuse of, or indeed the destruction of your network, your applications, devices, data, or even physical assets. Standard practice taken by organisations is to deploy several types of security technologies across their networks including hardware, sof ...Read More →

#risk-management #services Read More