News & Events

SPHEREboard 4.2 Release Notes: Collection Creation, Audits Tables and More

SPHEREboard Release Notes is an ongoing highlights reel of recent product improvements we’ve made. WHAT’S NEW Collection Creation for unstructured data. Administrators can now create folder collections either manually or via a rule with collection creation. Campaign Audits across the Asset Review Module (ARM), from start to finish. The ARM Results page now allows you to see a full audit …
Read More

You’ve Found Open Access, Now What?

Consider this: only 17% of firms have a mature approach to access management. For the 80%+ of firms who aren’t properly managing access, that means two times more breaches and $5 million more in costs, on average. You understand the risks of open access — through your own home-grown or purchased security reporting tool, you find that there are hundreds …
Read More

Solving for Your Most Important PAM Issues

Let’s say an IT server is built on an Operating System that is managed and maintained by administrators with varying degrees of access, whether the root for UNIX, local administrator for Windows or other sub-systems that have their own privileged service accounts. The same server may require middleware and other installed applications that in turn require a database and web …
Read More

Account Roles to Know Within Your Organization

Access issues run the gamut. Privileged access to assets may be open, or groups providing elevated rights may house hidden users or open access groups. Proper account deprovisioning may be overlooked. Regular user login accounts may even provide administrative access to hosts, databases or applications and you might not even know it. Do you know what kind of account roles …
Read More

6 Stats to Know About Privileged Access Management (PAM)

When’s the last time you really thought about privileged access? Maybe you’ve done the legwork with password vaulting. Or have built your own in-house system. But overly complex IT infrastructure, regulatory requirements and technology sprawl further complicate the already costly and time-consuming management of privileged access. Data is truth. Before you can close the loop on longer-term PAM governance, you …
Read More

SPHEREboard 4.0 is Here, with a Newly Designed Asset Review Module (ARM)

SPHERE Technology Solutions, a global, woman-owned cybersecurity business focused on improving security and enhancing compliance, releases the latest version of its flagship SPHEREboard product with a redesigned Asset Review Module (ARM), improving the way technologists can interact with business users to extract the entitlement information necessary to implement a Least Privileged Access model. “We’ve reconfigured SPHEREboard with a fully integrated ARM that delivers both robust reporting capabilities …
Read More

ILTA Roadshow Recap

We’ve kicked off our ILTA Roadshow in two cities, NYC and Boston! In partnership with ILTA we’re talking legal security, specifically what to know when implementing data governance across matter data and document management systems (DMS), with global law firms across the country. We’ve got three more cities to go — here’s what you need to know: Challenge Matter product doesn’t always …
Read More

Data Duo: Document Management Systems (DMS) and Legal Data Security

Legal data systems are complex and document-intensive, involving both digital and paper-based information that is often improperly managed, displaced, and even housed on flawed or unsecured networks. Law firms face a dual conflict: the need for confidential files and sensitive information to be readily accessible and searchable, as well as a proper security apparatus to keep their managed data secure …
Read More

5 Questions to Answer About Law Firm Security

Law firms can’t seem to get away from cyberattacks. Data breaches have led to millions of leaked attorney-client privileged documents alongside sizable, long-term losses related to data recovery and reactive security measures. The threat level is high and the ensuing reputational damage following a breach is immeasurable. It’s clear that among all the landscape shifts across the legal industry, effective …
Read More

SPHERE Technology Solutions Releases PIE – SPHEREboard 3.14

SPHERE Technology Solutions, a woman-owned cybersecurity company, introduces the latest version of its flagship product, SPHEREboard. SPHEREboard 3.14 further enhances the ability to help small to large complex organizations understand and secure their data and manage risk. “This is one of our most robust releases” said Rosario Mastrogiacomo, Director of Product at SPHERE Technology Solutions. “It’s indicative of how we …
Read More

Loading...