Competitive Marketing Intelligence | Crayon

Bedroc, Inc.

Bedroc, Inc.
Bedroc, Inc.
Blog Article

New blog articles detected.

  • Going Mobile: Improving the Customer Experience with Cisco CMX
    I recently spent some time getting to know the Cisco CMX solution. You might ask, what is the Cisco CMX solution? I’m glad you asked, because over the next series of posts we’ll look at CMX and its components. The Cisco Connected Mobile Experience or CMX as we’ll refer to it from here on is […]
Bedroc, Inc.
Bedroc, Inc.
Blog Article

New blog articles detected.

  • We’re Hiring! – Solutions Architect – Security
    WHAT YOU’LL BE DOING: This job description describes the general nature and level of work performed by individuals assigned to this position. It is not an exhaustive list of all responsibilities, duties, knowledge, skills, and abilities required of these individuals. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential duties […]
Bedroc, Inc.
Bedroc, Inc.
Blog Article

New blog articles detected.

  • Are You Making This Endpoint Security Mistake?
    Detecting threats isn’t enough. You must also remediate vulnerable endpoints and employ continuous monitoring to reduce exposure. To be successful in fortifying your endpoints, you must take steps that complete the security picture by not just detecting threats on the endpoint but also by remediating vulnerabilities, identifying weaknesses, finding unprotected hosts, and continuously monitoring fo...
  • Tenable i.o: Offering Complete Vulnerability Visibility In the Cloud
      Tenable launches cloud-based vulnerability management platform Tenable Network Security is hoping to make vulnerability management great again. The security vendor, based in Columbia, Md., unveiled a new cloud-based vulnerability management platform, dubbed Tenable.io, this week at RSA Conference 2017. Tenable.io, which is delivered as a software-as-a-service offering, includes an API and softwa...
Bedroc, Inc.
Bedroc, Inc.
Blog Article

New blog articles detected.

  • 5 lessons IT can learn from ‘Rogue One: A Star Wars Story’
    Rogue One isn’t just a Star Wars story. It’s an information security story. “Rogue One: A Star Wars Story” isn’t just a tale of scrappy rebels fighting against an evil Empire. With the issues it raises, including device authentication, asset management, and privilege control, it’s also a story about information security. Well, more like a […]
Bedroc, Inc.
Bedroc, Inc.
Blog Article

New blog articles detected.

  • Sparking Our Collaboration
    On December 29, 2016, Bedroc lit up (brace yourself, the puns will be many) Cisco’s latest collaboration solution, called Spark.  As an experienced Cisco voice engineer, I was shocked to have the smoothest voice cutover of my career while using such a relatively new product…and one that lives entirely in “the cloud”. When we began […]
  • It’s like Alexa, but with a little less HAL 9000
    Shocker, I’m a Nerd I grew up LOVING Star Trek: The Next Generation.  One of the key elements of this show was the ship’s computer, LCARS, which could control and interact with various other systems and sensors of the ship on behalf of the crew.  If I had to pinpoint anything in my life that […]
  • The Times, They are a Automatin’
    In Remembrance of the “Good Old Days” Do you remember how much less complicated IT used to be?  Don’t get me wrong, being in IT has always been challenging.  There’s always been enormous pressure on IT from the business, mostly because there has been this pervasive struggle to leverage IT to create an advantage against […]
  • Here’s One Strategy for Thwarting Denial of Service Cyberattacks
    Companies can reduce the risk from the type of cyberattack that took out major websites on Friday by using multiple vendors for the critical Internet service known as a domain name service, or DNS, companies and security experts said on Sunday. “We have advocated for years for redundancy in your infrastructure,” said Kyle York, chief […]
  • How Your Baby Monitor, Smart Thermostat and Tablet Helped Hackers Bring Down the Internet.
    On Friday, October 21, a massive cyberattack affected many users of popular websites like Twitter, Netflix, Etsy, Spotify and Airbnb, among others. Dyn, a company that manages website domains and routes internet traffic, experienced two distributed denial of service (DDoS) attacks on its DNS servers, beginning at 7am on Friday. A DDoS attack is an […]
  • Could Mr. Robot Hack Your Vote?
    There are only 18 days left until (hopefully) everyone heads to their neighborhood polling locations to vote for the next U.S. President, a few Senators, their U.S. Representatives and a slew of state and local offices. A large majority of us will vote the old-fashioned way, with some version of a paper ballot, either with […]
  • Don’t Jump! How to Handle a Ransomware Attack!
    Ryan Francis, CSO, 3.15.16   STEP #1 – CALL BEDROC STEP #2 – Read on…Ransomware is obviously analogous to kidnapping, and dealing with the perpetrators can feel much like negotiating with a jumper standing on the edge of high-rise roof. The Institute for Critical Infrastructure Technology recently released a report that in part describes how […]
  • We’re Hiring! – Solutions Engineer – Network Architecture
    WHAT YOU’LL BE DOING: This position is a part of Bedroc’s professional services practice for network technology consulting. As a network practice engineer, you will provide technical consulting services to customers by: * Serving as a billable customer consultant, supporting infrastructure projects for design, testing, implementation, and support of technology * Utilizing Bedroc toolsets to analyz...
  • Job Posting – Solutions Engineer – Network Architecture
    WHAT YOU’LL BE DOING: This position is a part of Bedroc’s professional services practice for network technology consulting. As a network practice engineer, you will provide technical consulting services to customers by: * Serving as a billable customer consultant, supporting infrastructure projects for design, testing, implementation, and support of technology * Utilizing Bedroc toolsets to analyz...
Bedroc, Inc.
Bedroc, Inc.
Blog Article

Out-Market Your Competitors?

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account Log in

Out-Market Your Competitors

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account

Already a user?  Log in