News & Events

Account Roles to Know Within Your Organization

Access issues run the gamut. Privileged access to assets may be open, or groups providing elevated rights may house hidden users or open access groups. Proper account deprovisioning may be overlooked. Regular user login accounts may even provide administrative access to hosts, databases or applications and you might not even know it. Do you know what kind of account roles …
Read More

6 Stats to Know About Privileged Access Management (PAM)

When’s the last time you really thought about privileged access? Maybe you’ve done the legwork with password vaulting. Or have built your own in-house system. But overly complex IT infrastructure, regulatory requirements and technology sprawl further complicate the already costly and time-consuming management of privileged access. Data is truth. Before you can close the loop on longer-term PAM governance, you …
Read More

SPHEREboard 4.0 is Here, with a Newly Designed Asset Review Module (ARM)

SPHERE Technology Solutions, a global, woman-owned cybersecurity business focused on improving security and enhancing compliance, releases the latest version of its flagship SPHEREboard product with a redesigned Asset Review Module (ARM), improving the way technologists can interact with business users to extract the entitlement information necessary to implement a Least Privileged Access model. “We’ve reconfigured SPHEREboard with a fully integrated ARM that delivers both robust reporting capabilities …
Read More

ILTA Roadshow Recap

We’ve kicked off our ILTA Roadshow in two cities, NYC and Boston! In partnership with ILTA we’re talking legal security, specifically what to know when implementing data governance across matter data and document management systems (DMS), with global law firms across the country. We’ve got three more cities to go — here’s what you need to know: Challenge Matter product doesn’t always …
Read More

Data Duo: Document Management Systems (DMS) and Legal Data Security

Legal data systems are complex and document-intensive, involving both digital and paper-based information that is often improperly managed, displaced, and even housed on flawed or unsecured networks. Law firms face a dual conflict: the need for confidential files and sensitive information to be readily accessible and searchable, as well as a proper security apparatus to keep their managed data secure …
Read More

5 Questions to Answer About Law Firm Security

Law firms can’t seem to get away from cyberattacks. Data breaches have led to millions of leaked attorney-client privileged documents alongside sizable, long-term losses related to data recovery and reactive security measures. The threat level is high and the ensuing reputational damage following a breach is immeasurable. It’s clear that among all the landscape shifts across the legal industry, effective …
Read More

SPHERE Technology Solutions Releases PIE – SPHEREboard 3.14

SPHERE Technology Solutions, a woman-owned cybersecurity company, introduces the latest version of its flagship product, SPHEREboard. SPHEREboard 3.14 further enhances the ability to help small to large complex organizations understand and secure their data and manage risk. “This is one of our most robust releases” said Rosario Mastrogiacomo, Director of Product at SPHERE Technology Solutions. “It’s indicative of how we …
Read More

Who Wants a Slice of SPHEREboard?

There’s something special about eating at a dive diner. The kind of place where you can see the grill. The burgers are greasy and the fries crisp. The coffee tastes so good you wonder why Starbucks or Dunkin don’t have a “dive diner” flavor. It’s comfort food. You throw out the diet for that one meal and you just sit …
Read More

Check Out My Assets!

Do you ever find yourself going through your desk and finding something, like a USB drive or old Blackberry device and think “huh, I didn’t know I still had this.” The same is true for data. You may own something that you had no idea you had. As security people who are responsible for ensuring unstructured data is properly protected, …
Read More

RSA | Check us out at our Booth!

Visit our SPHERE Booth First Name*Last Name*E-mail:*Preferred Date and Time*SubmitResetWill you be at RSA? Meet us at RSA! Visit our booth #2366 and you’ll get a chance to chat with our SPHERE team about your security needs! Feel free to stop by or schedule some time with us below where you can have a one-on-one chat with a SPHERE team member.  We hope to …
Read More

Loading...