About Us | Contact Us
View Cart
Archive for 'Services' Category

infotex SIEM Data Flow Movie

By Vigilize - Last updated: Wednesday, July 29, 2020

In this short video, Mike, our “Envoy from the SIEM”, walks us through how data flows through the current infotex SIEM.


Our Blog Policy

By Vigilize - Last updated: Thursday, June 25, 2020

While we’re not a news service, we often use current events to comment on trends and our services. This blog is intended to get people thinking about topics and trends in Technology Risk Management, through our article reviews, as well as through original blog articles about current events and our MSSP services (such as our […]


Incident Response Testing – What to Expect

By Vigilize - Last updated: Monday, June 22, 2020

A short. This presentation is intended for those who are planning to participate in an infotex incident response test. Please let us know what questions you have, when we have our Plan Walkthrough and Test Plan Approval meeting!  


Our Blog Policy

By Vigilize - Last updated: Monday, January 27, 2020

While we’re not a news service, we often use current events to comment on trends and our services. This blog is intended to get people thinking about topics and trends in Technology Risk Management, through our article reviews, as well as through original blog articles about current events and our MSSP services (such as our […]


Can We Trust Our Technology?

By Vigilize - Last updated: Monday, February 4, 2019

A new exploit involving Apple’s FaceTime is a reminder that our gadgets can be turned against us… An article review. Our regular readers know that we usually try to avoid reporting on current events, but this latest exploit really caught our attention! In short, it is possible to activate the microphone or camera on an […]


Object Access Limitations

By Matt Jolley - Last updated: Monday, March 5, 2018

Object Access Limitations. . . While offering some visibility, there are limitations to object access monitoring. If your organization has to comply with industry regulations such as GLBA, HIPAA, or Sarbanes Oxley, you know that maintaining data security and privacy are important, and one of the ways you can accomplish that is with object access […]


When is a Firewall Not Enough?

By Jolley | Hadaway - Last updated: Wednesday, May 31, 2017

Many new firewalls come with Intrusion Prevention Systems, but can’t replace the services of a MSSP. A Jolley | Hadaway Article Many Clients ask a great question related to network monitoring.  The question goes like this:  Firewalls now come with various services including Intrusion Prevention Systems, (IPS). Why pay a firm like infotex to provide […]


By The Way

By Dan Hadaway - Last updated: Saturday, February 21, 2015

We’ve got a birthday coming up . . . and part of the Wave is Gratitude! Another one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governance . . . . BY THE WAY It is occurring to us that coming up on July 24th, 2015, we will be celebrating our 15th […]


Malware Alerts Cost Companies Big

By Vigilize - Last updated: Sunday, January 25, 2015

An article review. Not If You Use Us… A newly released study highlights the rising costs associated with preventing and responding to malware threats. The study was based on a survey of “630 IT and IT security practitioners in the U.S. who are familiar with their organization’s practices for containing malware infections.” The study is […]


VendorBlog

By Dan Hadaway - Last updated: Sunday, August 31, 2014

And now let’s pause to reflect upon vendor risk . . . . “20% of our vendors have malware infections” A recent study reminds us to recognize that even if anti-malware is the least of our worries, that doesn’t mean our partners or customers are controlling it.  With almost 20% of your customers’ computers infected with malware, according […]