Linda Musthaler

Linda Musthaler is a Principal Analyst with Essential Solutions Corp. which researches the practical value of information technology and how it can make individual workers and entire organizations more productive. Essential Solutions offers consulting services to computer industry and corporate clients to help define and fulfill the potential of IT.

NuData Security adds 'unspoofable' dimensions to the identity process  

User credentials alone are no longer trustworthy. NuData builds profiles by looking at personal traits like typing speed

Distil Networks uses device fingerprints to detect malicious web bots

Web applications are increasingly being subjected to automated threats such as click fraud, comment spam, content scraping, and more. Bot detection and mitigation can close these vulnerabilities.

Illusive Networks uses deception to detect an attacker in your network

Sophisticated attackers can be a challenge to detect. Illusive Networks puts deceptions everywhere to catch them when they move around your network

The Cradlepoint NetCloud platform enables Network-as-a-Service  

Cradlepoint is the latest WAN vendor to bring Network-as-a-Service to market to connect people, places and things, especially over wireless WAN infrastructure

There are mobile and IoT companion documents for the CIS (Top 20) Critical Security Controls

Security practitioners are familiar with the Center for Internet Security (CIS) Critical Security Controls. Did you know there are versions of these controls tailored to mobile and Internet of Things?

Sift Security helps SecOps teams analyze and visualize patterns of threats and speed up investigations  

Sift Security helps SecOps teams analyze and visualize patterns of threats and speed up investigations  

Sift Security is a new entry in the market of tools that quicken and simplify the hunt for security threats. The graphical interface helps security analysts see threat patterns at a glance

How to prepare for a data breach  

The impact of a breach can be lessened if an organization is well prepared to respond quickly. The head of Experian's Data Breach Resolution group advises how

Cato Networks offers a new model for network security as a service  

With the traditional network perimeter all but gone, Cato Networks has built a new perimeter in the cloud, offering network security as a service across all entities

Demisto accelerates security investigations through automation and collaboration  

Security operations centers often suffer from alert fatigue and a chronic shortage of security experts. Demisto accelerates many of the processes of a SOC through automation and collaboration

VeloCloud's SD-WAN solution facilitates quick expansion for The Bay Club Company

When The Bay Club Company acquires a new club, it can't wait 90 days to bring the new club online. VeloCloud does the job in less than an hour.

Intralinks adds security layers for high value content collaboration using SharePoint and other systems  

The company’s cloud-based service enables collaboration among internal and external parties, even if the documents are in a SharePoint repository behind a firewall

Load More