Linda Musthaler

Linda Musthaler is a Principal Analyst with Essential Solutions Corp. which researches the practical value of information technology and how it can make individual workers and entire organizations more productive. Essential Solutions offers consulting services to computer industry and corporate clients to help define and fulfill the potential of IT.

Secdo automates alert investigation with preemptive incident response  

Small businesses are prime targets for cyber attacks: SIEM-as-a-service can help

Netsurion’s SIEM-at-the-Edge puts enterprise-level detection and response capabilities in the hands of SMBs

Wandera helps manage the risks a mobile fleet poses to corporate data  

The company offers a secure mobile gateway in the cloud that customers route data through, and a corresponding app that gets installed on end user devices

Corero says its always-on DDoS defense system automatically safeguards service providers  

Legacy approaches and mitigation techniques don’t seem to be capable of fighting off DDoS attacks. Corero claims it can stop them instantaneously

Skyhigh Networks adds threat protection and data loss prevention capabilities to the cloud  

As more corporate data is stored in the cloud, security incidents are no longer isolated to PCs and applications on the network

TopSpin Security deploys realistic deceptions to lure and trap attackers

Deception technology can be effective in detecting an attacker as soon as they begin making moves on the network.

Comodo Certificate Manager relieves the burden of managing security certificates manually  

Some companies have 10,000 or more certificates, and managing them manually is time consuming and error-prone. A management platform can automate certificate discovery and renewal

25% to 30% of users struggle with identifying phishing threats, study says

25% to 30% of users struggle with identifying phishing threats, study says

Some 8 million phishing email messages are opened every day

The FIDO Alliance provides strong authentication for online services  

Passwords are too often stolen, shared or simply too weak to be a solo means of authentication. The FIDO Alliance has developed new protocols that enable strong authentication for online and mobile services.

Loggly aims to reveal what matters in log data  

Log files are a common thread across a company's entire technology stack, but the trick is being able to quickly mind that data for insights

ManagedMethods brings shadow IT and shadow data into the light

As use of SaaS accelerates, organizations need to regain visibility and control. This cloud access security broker sheds light on what's going on

LILEE Systems' new fog computing platform is well suited to distributed enterprises  

Can help meet the unique challenges of analyzing data close to its points of origin

Load More