PROACTIVE RISK
  • About
    • 800 lb Gorilla
    • Our Manifesto
    • Simple Agreements >
      • Mutual Confidentiality and Non Disclosure Agreement
      • Master Agreement | Work Order
    • BLOG
    • Capabilities Summary
    • Request Support
    • Contact Us
  • SOLUTIONS
    • Fractional CIO/CISO
    • Cyber Recruiter
    • Threat Modeling
    • Policies and Plans
    • MonitorIT®
    • Software Development
    • Domains | DNS
    • PhishIT®
    • MeasureRISK®
    • Vendor Risk
    • CATSCAN®
    • Physical Security
    • Backup Resiliency
    • ProtectIT®
    • ManageIT®
    • FINDIT® >
      • RAPTOR eDiscovery
  • RESOURCES
    • Tech News
    • Videos
    • Store
    • Guides | Tools
    • STAFF

GRAY BEARD BLOG

SHARING RANDOM THOUGHTS ON TECH

One Hundred sixty nine questions about your security program - By Tom brennan

4/10/2022

 
Commerically Reasonable Cyber Security in 169 Questions - By Tom Brennan

Mature organizations want to manage to "best practice" so that they can be proactive about the technical risks they face.  Below are 169 questions to start that discussion and just like eating a elephant, you have to start one bite at a time.
Picture
Question
  1. Do you remove sensitive data or systems not regularly accessed by your organization from the network?
  2. Are these systems only used as stand-alone systems (disconnected from the network) by the business unit for occasionally use?
  3. Can thes systems be completely virtualized and powered off until needed?
  4. Do you utilize approved whole disk encryption software to encrypt the hard drive of all mobile devices?
  5. Do you establish and maintain an overall data classification scheme for the enterprise?
  6. Do you document data flows? Does your data flow documentation include service provider data flows, and is it based on your data management process?
  7. Do you use enterprise software that can configure systems to allow the use of specific devices if USB storage devices are required? Do you maintain an inventory of such devices?
  8. Do you encrypt all sensitive information in transit?
  9. Do you encrypt all sensitive information at rest using a tool that requires a secondary authentication mechanism not integrated into your operating system, in order to access the information?
  10. Do you segment the network based on the label or classification level of the information stored on the servers and locate all sensitive information on separated Virtual Local Area Networks (VLANs)?
  11. Do you use an automated tool, such as host-based Data Loss Prevention, to enforce access controls to data even when data is copied off a system?
  12. Do you enforce detailed audit logging for access to sensitive data or changes to sensitive data (utilizing tools such as File Integrity Monitoring or Security Information and Event Monitoring)?
  13. Do you maintain documented, standard security configuration standards for all authorized operating systems and software?
  14. Do you maintain a standard, documented security configuration standard for all authorized network devices?
  15. Do you automatically lock workstation sessions after a standard period of inactivity?
  16. Do you ensure that only network ports, protocols, and services listening on a system with validated business needs are running on each system?
  17. Do you apply host-based firewalls or port filtering tools on end systems with a default-deny rule that drops all traffic except those services and ports that are explicitly allowed?
  18. Do you securely manage enterprise assets and software?
  19. Do you change all default passwords before deploying any new asset to have values consistent with administrative level accounts?
  20. Do you uninstall or disable unnecessary services on enterprise assets and software, such as an unused file sharing service, web application module, or service function?
  21. Do you configure trusted DNS servers on enterprise assets?
  22. Do you enforce automatic device lockout following a predetermined threshold of local failed authentication attempts on portable end-user devices? For laptops, do allow no more than 20 failed authentication attempts? For tablets and smartphones, do you allow no more than ten failed authentication attempts?
  23. Do you remotely wipe enterprise data from enterprise-owned portable end-user devices when deemed appropriate?
  24. Do you ensure separate enterprise workspaces are used on mobile end-user devices, where supported?
  25. Do you maintain an inventory of all accounts organized by the authentication system?
  26. Do you use passwords to accounts that are unique to the system where multi-factor authentication is not supported (such as local administrator, root, or service accounts)?
  27. Do you automatically disable dormant accounts after a set period of inactivity?
  28. Do you ensure that all users with administrative account access use a dedicated or secondary account for elevated activities?
  29. Do you only use this account for administrative operations and not internet browsing, email, or similar events?
  30. Do you establish and maintain an inventory of service accounts? Does your inventory, at a minimum, contain the department owner, review date, and purpose? Do you perform service account reviews to validate all active accounts are authorized, on a recurring schedule at a minimum quarterly, or more frequently?
  31. Do you configure access for all accounts through as few centralized points of authentication as possible, including network, security, and cloud systems?
  32. Do you establish and follow a process for granting access to enterprise assets upon new hire, rights grant, or user role change?
  33. Do you establish and follow an automated process for revoking system access by disabling accounts immediately upon termination or change of responsibilities of an employee or contractor?
  34. Do you Disable these accounts, instead of deleting accounts in order to preserve audit trails?
  35. Do you require all externally-exposed enterprise or third-party applications to enforce MFA, where supported?
  36. Do you require all remote login access to your organization's network to encrypt data in transit and use multi-factor authentication?
  37. Do you use multi-factor authentication and encrypted channels for all administrative account access?
  38. Do you maintain an inventory of each of your organization's authentication systems, including those located onsite or at a remote service provider?
  39. Do you centralize access control for all enterprise assets through a directory service or SSO provider?
  40. Do you define and maintain role-based access control by determining and documenting the access rights necessary for each role within the enterprise to carry out its assigned duties successfully?
  41. Do you establish and maintain a documented vulnerability management process for enterprise assets?
  42. Do you utilize a risk-rating process to prioritize the remediation of discovered vulnerabilities?
  43. Do you deploy automated software update tools to ensure that the operating systems are running the most recent security updates provided by the software vendor?
  44. Do you deploy automated software update tools to ensure that third-party software on all systems are running the most recent security updates provided by the software vendor?
  45. Do you perform authenticated vulnerability scanning with agents running locally on each system or with remote scanners that are configured with elevated rights on the system being tested?
  46. Do you utilize an up to date SCAP-compliant vulnerability scanning tool to automatically scan all systems on your network on a weekly or more frequent basis to identify all potential vulnerabilities on your organization's systems?
  47. Based on your remediation process, do you remediate any detected vulnerabilities in software through processes and tooling on a monthly or more frequent basis?
  48. Do you establish and maintain an audit log management process that defines the enterprise's logging requirements? At a minimum, do you address the collection, review, and retention of audit logs for enterprise assets?
  49. Do you ensure that local logging has been enabled on all systems and networking devices?
  50. Do you ensure that all systems that store logs have adequate storage space for the logs generated?
  51. Do you use at least three synchronized time sources from which all servers and network devices retrieve time information regularly so that timestamps in logs are consistent?
  52. Do you enable system logging to include detailed information such as an event source, date, user, timestamp, source addresses, destination addresses, and other useful elements?
  53. Do you enable Domain Name System (DNS) query logging to detect hostname lookups for known malicious domains?
  54. Do you log all URL requests from each of your organization's systems, whether onsite or on a mobile device, to identify potentially malicious activity and assist incident handlers with identifying potentially compromised systems?
  55. Do you enable command-line audit logging for command shells, such as Microsoft Powershell and Bash?
  56. Do you ensure that appropriate logs are being aggregated to a central log management system for analysis and review?
  57. Do you retain audit logs across enterprise assets for a minimum of 90 days?
  58. Do you review the logs to identify anomalies or abnormal events on a regular basis?
  59. Do you collect service provider logs where supported?
  60. Do you ensure that only fully supported web browsers and email clients are allowed to execute in your organization, ideally only using the latest version of the browsers and email clients provided by the vendor?
  61. Do you use DNS filtering services to help block access to known malicious domains?
  62. Do you have enforced network-based URL filters that limit a system's ability to connect to websites not approved by the organization?
  63. Do you have enforced filtering for each of the organization's systems, whether they are physically at an organization's facilities or not?
  64. Do you uninstall or disable any unauthorized browser or email client plugins or add-on applications?
  65. Do you implement a Domain-based Message Authentication, Reporting, and Conformance (DMARC) policy and verification to lower the chance of spoofed or modified emails from valid domains?
  66. Do you start by implementing the Sender Policy Framework (SPF) and the Domain Keys Identified Mail (DKIM) standards?
  67. Do you block all e-mail attachments entering your organization's e-mail gateway if the file types are unnecessary for your business?
  68. Do you deploy and maintain email server anti-malware protections, such as attachment scanning or sandboxing?
  69. Do you deploy and maintain anti-malware software on all enterprise assets?
  70. Do you ensure that your organization's anti-malware software updates its scanning engine and signature database on a regular basis?
  71. Do you configure devices to not auto-run content from removable media?
  72. Do you configure devices so that they automatically conduct an anti-malware scan of removable media when inserted or connected?
  73. Do you enable anti-exploitation features such as Data Execution Prevention (DEP) or Address Space Layout Randomization (ASLR) that are available in an operating system, or do you deploy appropriate toolkits that can be configured to apply protection to a broader set of applications and executables?
  74. Do you utilize centrally managed anti-malware software to continuously monitor and defend each of your organization's workstations and servers?
  75. Do you use behavior-based anti-malware software?
  76. Do you establish and maintain a data recovery process? Do you address the scope of data recovery activities, recovery prioritization, and the security of backup data?
  77. Do you ensure that all system data is automatically backed up on a regular basis?
  78. Do you ensure that backups are properly protected via physical security or encryption when they are stored, as well as when they are moved across the network?
  79. Does this include remote backups and cloud services?
  80. Do you ensure that all backups have at least one backup destination that is not continuously addressable through operating system calls?
  81. Do you test data integrity on backup media on a regular basis by performing a data restoration process to ensure that the backup is properly working?
  82. Do you install the latest stable version of any security-related updates on all network devices?
  83. Do you maintain an inventory of authorized wireless access points connected to the wired network?
  84. Do you manage all network devices using multi-factor authentication and encrypted sessions?
  85. Do you maintain an up-to-date inventory of all your organization's network boundaries?
  86. Do you centralize network AAA?
  87. Do you ensure that wireless networks use authentication protocols, such as Extensible Authentication Protocol-Transport Layer Security (EAP/TLS), that require mutual, multi-factor authentication?
  88. Do you require users to authenticate to enterprise-managed VPN and authentication services before accessing enterprise resources on end-user devices?
  89. Do your administrators use a dedicated machine for all administrative tasks or tasks requiring administrative access?
  90. Do you segment the device from your primary network which is not allowed Internet access and not use the device for reading e-mail, composing documents, or browsing the Internet?
  91. Do you deploy Security Information and Event Management (SIEM) or log analytic tool for log correlation and analysis?
  92. Do you deploy a host-based intrusion detection solution on enterprise assets, where appropriate and supported?
  93. Do you deploy network-based Intrusion Detection Systems (IDS) sensors to look for unusual attack mechanisms and detect compromise of these systems at each of your organization's network boundaries?
  94. Do you enable firewall filtering betDo youen VLANs to ensure only authorized systems are able to communicate with other systems necessary to fulfill their specific responsibilities?
  95. Do you scan all enterprise devices remotely logging into your organization's network prior to accessing the network to ensure that each of your organization's security policies has been enforced in the same manner as local network devices?
  96. Do you enable the collection of NetFlow and logging data on all network boundary devices?
  97. Do you deploy a host-based intrusion prevention solution on enterprise assets, where appropriate and supported?
  98. Do you deploy network-based Intrusion Prevention Systems (IPS) to block malicious network traffic at each of your organization's network boundaries?
  99. Do you utilize the port level access control, following 802.1x standards, to control which devices can authenticate to your network?
  100. Do you tie the authentication system into the hardware asset inventory data to ensure only authorized devices can connect to your network?
  101. Do you ensure that all network traffic to or from the Internet passes through an authenticated application layer proxy that is configured to filter unauthorized connections?
  102. Do you tune your SIEM system to better identify actionable events and decrease event noise on a regular basis?
  103. Do you create a security awareness program for all workforce members to complete on a regular basis to ensure they understand and exhibit the necessary behaviors and skills to help ensure the security of your organization?
  104. Is your organization's security awareness program communicated in a continuous and engaging manner?
  105. Do you train the workforce on how to identify different forms of social engineering attacks, such as phishing, phone scams, and impersonation calls?
  106. Do you train workforce members on the importance of enabling and utilizing secure authentication?
  107. Do you train workforce on how to identify and properly store, transfer, archive, and destroy information?
  108. Do you train workforce members to be aware of causes for unintentional data exposures, such as losing their mobile devices or emailing the wrong person due to autocomplete in email?
  109. Do you train employees to be able to identify the most common indicators of an incident and be able to report such an incident?
  110. Do you train the workforce to verify and report out-of-date software patches or any failures in automated processes and tools? Does the training include notifying IT personnel of any failures in automated processes and tools?
  111. Do you train workforce members on the dangers of connecting to and transmitting data over insecure networks for enterprise activities? Does the training include guidance for remote workers to ensure that they securely configure their home network infrastructure?
  112. Do you deliver training to address the skills gap? It is identified to impact workforce members' security behavior positively?
  113. Do you establish and maintain an inventory of service providers? Does the inventory list all known service providers, include classification(s), and designate an enterprise contact for each service provider?
  114. Do you establish and maintain a service provider management policy? Do you ensure the policy addresses service providers' classification, inventory, assessment, monitoring, and decommissioning?
  115. Do you classify service providers?
  116. Do you ensure service provider contracts include security requirements consistent with our service provider management policy?
  117. Do you assess service providers consistent with the enterprise's service provider management policy?
  118. Do you monitor service providers consistent with the enterprise's service provider management policy?
  119. Do you securely decommission service providers?
  120. Do you establish secure coding practices appropriate to the programming language and development environment being used?
  121. Do you establish a process to accept and address reports of software vulnerabilities, including providing a means for external entities to contact your security group?
  122. Do you perform root cause analysis on security vulnerabilities?
  123. Do you verify that the version of all software acquired from outside your organization is supported by the developer or appropriately hardened based on developer security recommendations?
  124. Do you only use up-to-date and trusted third-party components for the software developed by your organization?
  125. Do you establish and maintain a severity rating system and process for application vulnerabilities that facilitate the prioritization order to fix discovered vulnerabilities? Do you set a minimum level of security acceptability for releasing code or applications?
  126. Do you use standard hardening configuration templates for applications that rely on a database? Do you test all systems that are part of critical business processes?
  127. Do you maintain separate environments for production and nonproduction systems? Developers do not have unmonitored access to production environments?
  128. Do you ensure that all software development personnel receive training in writing secure code for their specific development environment and responsibilities?
  129. Do you ensure that explicit error checking for in-house developed software is performed and documented for all input, including for size, data type, and acceptable ranges or formats?
  130. Do you only use standardized and extensively reviewed encryption algorithms?
  131. Do you apply static and dynamic analysis tools to verify that secure coding practices are being adhered to for internally developed software?
  132. Do you conduct application penetration testing?
  133. Do you conduct threat modeling?
  134. Do you designate management personnel, as well as backups, who support the incident handling process by acting in key decision-making roles?
  135. Do you assemble and maintain information on third-party contact information to be used to report a security incident, such as Law Enforcement, relevant government departments, vendors, and ISAC partners?
  136. Do you devise organization-wide standards for the time required for system administrators and other workforce members to report anomalous events to the incident handling team, the mechanisms for such reporting, and do you include this kind of information in the incident notification?
  137. Do you ensure that there are written incident response plans that define the roles of personnel as well as phases of incident handling/management?
  138. Do you assign job titles and duties for handling computer and network incidents to specific individuals and ensure tracking and documentation throughout the incident and to resolution?
  139. Do you determine which primary and secondary mechanisms will be used to communicate and report during a security incident?
  140. Do you have plan and conduct routine incident response exercises and scenarios for the workforce involved in the incident response to maintain awareness and comfort in responding to real-world threats?
  141. Do you test the exercises' communication channels, decision making, and incident responders technical capabilities using tools and data available to them?
  142. Do you conduct post-incident reviews?
  143. Do you create incident scoring and prioritization schema based on the known or potential impact on your organization?
  144. Do you utilize incident scoring to define the frequency of status updates and escalation procedures?
  145. Do you establish a program for penetration tests that include a full scope of blended attacks, such as wireless, client-based, and web application attacks?
  146. Do you perform periodic external penetration tests based on program requirements, no less than annually?
  147. Do you remediate penetration test findings based on the enterprise's policy for remediation scope and prioritization?
  148. Do you validate security measures after each penetration test? If deemed necessary, do you modify rulesets and capabilities to detect the techniques used during testing?
  149. Do you perform periodic internal penetration tests based on program requirements, no less than annually?
  150. Do you maintain an accurate and up-to-date inventory of all technology assets with the potential to store or process information?
  151. Do you ensure that the hardware asset inventory records the network address, hardware address, machine name, data asset owner, and department for each asset and whether the hardware asset has been approved to connect to your network?
  152. Do you ensure that unauthorized assets are either removed from your network or quarantined, or the inventory is updated in a timely manner?
  153. Do you utilize an active discovery tool to identify devices connected to your organization's network and update the hardware asset inventory?
  154. Do you use the Dynamic Host Configuration Protocol (DHCP) logging on all DHCP servers or IP address management tools to update your organization's hardware asset inventory?
  155. Do you utilize a passive discovery tool to identify devices connected to your organization's network and automatically update the organization's hardware asset inventory?
  156. Do you maintain an up-to-date list of all authorized software that is required in the enterprise for any business purpose on any business system?
  157. Do you ensure that only software applications or operating systems currently supported by the software's vendor are added to your organization's authorized software inventory?
  158. Do you ensure that unauthorized software is either removed, or the inventory is updated in a timely manner?
  159. Do you utilize software inventory tools throughout your organization to automate the documentation of all software on business systems?
  160. Do you utilize application whitelisting technology on all assets to ensure that only authorized software executes, and all unauthorized software is blocked from executing on assets?
  161. Do you ensure that only authorized software libraries (such as *?dll, *?ocx, *?so, etc?) of the organization's application whitelisting software are allowed to load into a system process?
  162. Do you ensure that only authorized, digitally signed scripts (such as *?ps1, *?py, macros, etc?) of your organization's application whitelisting software are allowed to run on a system?
  163. Do you establish and maintain a data management process? In the process, do you address data sensitivity, data owner, data handling, data retention limits, and disposal requirements based on sensitivity and retention standards for the enterprise?
  164. Do you maintain an inventory of all sensitive information stored, processed, or transmitted by your organization's technology systems, including those located onsite or at a remote service provider?
  165. Do you protect all information stored on systems with file system, network share, claims, application, or database-specific access control lists?
  166. Do these control lists enforce the principle that only authorized individuals should have access to the information based on their need to access the data as a part of their responsibilities?
  167. Do you retain data according to the enterprise's data management process? Does your data retention include both minimum and maximum timelines?
  168. These are are just some of the things that need to be considered for your business to demostrate commicatelly reasonable security contrtols.  Second we have to look at the maturity of those controls ultimatly arriving with a score.  For more information, talk to a member of our team.  Call 973-298-1160 today and become proactive about the risks you face.

17 TECHNICAL CONTROLS FOR EFFECTIVE M&A DUE DILIGENCE - BY TOM BRENNAN

4/10/2022

 
Picture
Published in CPO Magazine  April 6th 2022
​

Post-COVID, a growing number of mid-sized businesses are merging with and acquiring other companies to adapt, grow and expand. This process takes a tremendous amount of preparation and research. From business financials and intellectual property to contracts and tax issues, there is much to be done to help ensure a successful M&A transaction.


Among top considerations during the M&A process should be your technical controls. In specific, you need to pay close attention to the software bill of materials (SBOM), and several other vital areas of your technology-enabled business. If the target organization cannot demonstrate technical maturity, it will be score lowered and may ultimately see a reduced acquiring offer or be a deal-breaker altogether.
During the due diligence process, be prepared to present and describe your software-based technology product with documentation. What is expected during a technical due diligence review is architectural diagrams, scalability, and performance metrics. Technology choices made, including programming languages, databases, and infrastructure choices, will be reviewed. Your key staff must also be able to describe any software development practices and provide details on continuous deployment environments..

In particular, a review of the OWASP Top 10 2021 List is recommended. Be certain that you are able to answer questions about how you ensure code quality in a hostile internet-connected environment and perform an independent third party code audit



Picture
Depending on the reason for the merger or acquisition, it could be equally important to have technical controls in place for the operations side of the business. Here it’s important to evaluate how data is processed in 17 key areas:
  1. Access Controls focus on identifying and limiting the people and other entities allowed to access your systems. These controls also involve limiting the types of functions and transactions that those authorized users can perform.
  2. Asset Management includes requirements for managing services and devices that store or interact with your data, whether on your network or hosted in the cloud.
  3. Awareness and Training helps to demonstrate that the business has a training program for their staff, contractors, and vendors so that they are equipped to report and overcome threats they may encounter.
  4. Audit and Accountability for all actions is necessary. Your business should have controls in place to track individual users’ activities, as well as various system activities.
  5. Security Assessments.  Most organizations do not have an annual program to assess testing to make sure your system security plans are working. CREST can share lists and resources regarding International accredited service providers. For more information check out the Service Selection Platform.
  6. Configuration Management lists the requirements for creating baseline configurations and inventories, as well as making actual changes to those systems. It also requires that your organization monitors for any unapproved changes that might occur.
  7. Identification and Authentication is similar to Domain Access Controls in that they are focused on user access. However, in this case, the emphasis is on ensuring the person using an account is indeed the correct user.
  8. Incident Response demonstrates that the organization has controls over, and has plans in place to anticipate security incidents. This also specifies what their response will be if any incidents occur.
  9. Maintenance is based on the premise that all computer systems are vulnerable to failure at some point. That means your business should protect critical systems and data against vulnerabilities in the instance of a system failure. There should be a regular process of monitoring and re-evaluating how your security and backups are doing.
  10. Media Protection covers the use of removable media to store data, including both electronic storage devices and paper. Storing information on removable media can be dangerous and leave you vulnerable, so it must be carefully controlled, and encrypted.
  11. Physical Protections should be considered along with technological protections. Ask yourself, “How difficult would it be for someone to walk into my business and steal the hardware with its data?” This should be a good base for what is needed to secure your property.
  12. Personnel Security asks if your business screens employees before allowing them to gain access to systems containing controlled unclassified information (CUI). It should also be considered that when an employee is transferred or terminated, and is no longer authorized to access data, how does your business plan to protect that data For example, what is your off-boarding process like? Are you organized with logs of who does and does not have access to your systems?
  13. Recovery means regularly backing up your data. This is absolutely critical for preventing unnecessary data losses.
  14. Risk Management demonstrates the maturity of the business. Have risk assessments of your data and systems taken place? What were the findings and corrective actions?
  15. Situational Awareness. Organizations need to take intelligence regarding cyber threats from external sources seriously and respond to them appropriately. You should always have some level of awareness regarding your business and its security.
  16. Systems and Communications Protection includes an extensive list of controls focused on securing the transmission of information within a system. It also prohibits the sharing of CUI on public forums. This might show itself in the encryption of emails and data loss prevention.
  17. System and Information Integrity is the proactive monitoring for issues and then the  prompt application of security patches as needed. Demonstration of this process is defined as a policy, a procedure, and staff task assignments.
Remember – confidentiality, integrity and availability are important items of consideration for your technology choices from day one. Be certain to use company that has been accredited to perform valuable third-party assessments with proven policies, processes and procedures to validate your technology and environment. With a credible third-party validation of your technical maturity, you can ensure that the technical elements of your due diligence will enhance acquisition offers and simplify the integration process. 

For more information, contact us on how we can help you be proactive.
MeasureRISK Services

    Tom Brennan

    This is my blog, there are many like it but this one is mine. Enjoy.

    View my profile on LinkedIn

    BLOG Archives

    March 2023
    February 2023
    January 2023
    December 2022
    November 2022
    August 2022
    April 2022
    August 2021
    March 2021
    January 2021
    August 2020

    Categories

    All
    CMMC
    COMMUNITY
    TECHTIP

    RSS Feed

Contact Info

Proactive Risk Inc.
Tel: +1 (973) 298-1160
Web: www.proactiverisk.com
eMail: sales(at)proactiverisk.com

CONTACT US
Picture
© COPYRIGHT 2023. ALL RIGHTS RESERVED.
  • About
    • 800 lb Gorilla
    • Our Manifesto
    • Simple Agreements >
      • Mutual Confidentiality and Non Disclosure Agreement
      • Master Agreement | Work Order
    • BLOG
    • Capabilities Summary
    • Request Support
    • Contact Us
  • SOLUTIONS
    • Fractional CIO/CISO
    • Cyber Recruiter
    • Threat Modeling
    • Policies and Plans
    • MonitorIT®
    • Software Development
    • Domains | DNS
    • PhishIT®
    • MeasureRISK®
    • Vendor Risk
    • CATSCAN®
    • Physical Security
    • Backup Resiliency
    • ProtectIT®
    • ManageIT®
    • FINDIT® >
      • RAPTOR eDiscovery
  • RESOURCES
    • Tech News
    • Videos
    • Store
    • Guides | Tools
    • STAFF