by Ken Tola | Aug 26, 2016 | Security
The True Evil of Malware There is a massive effort to prevent the intrusion of malware on devices and, while that may or may not pan out, at Bear, we wonder if that is the root issue. It used to be the case that malware attacks would infect a network and rapidly...
by Ken Tola | Aug 25, 2016 | Market Research
Spending On What You Want We have spent considerable time discussing how our product works from a technology perspective. That is useful for those trying to copy our product (grin…right?) but we have yet to really focus in on what is important from a market...
by Ken Tola | Aug 23, 2016 | Our Technology
The Bear Flow Bear provides a unified client agent that works across operating systems and numerous types of devices from bare metal to the cloud. Within this general paradigm, Bear enables Active Directory-like authentication, authorization, and auditing/accounting....
by Ken Tola | Aug 19, 2016 | Security
Physical Health “You’ve Got Me…Who’s Got You?” Lois Lane, Superman Very often in the context of enterprise systems, the focus is on the applications running. Behavioral security, data visualization and even endpoint management and...
by Ken Tola | Aug 16, 2016 | Our Technology, Security
Securing Smart Devices To protect the rapidly growing edges of large networks like those found in the IoT, it is important to work with a new paradigm. This blog post will first cover the basic tenants of that model and then show how Bear secures the edge. New...
Recent Comments