<iframe src="//www.googletagmanager.com/ns.html?id=GTM-MRFNVD" height="0" width="0" style="display:none;visibility:hidden">

Something Powerful

Tell The Reader More

The headline and subheader tells us what you're offering, and the form header closes the deal. Over here you can explain why your offer is so great it's worth filling out a form for.

Remember:

  • Bullets are great
  • For spelling out benefits and
  • Turning visitors into leads.

Soha Blog

Soha is Honored to be Named Gartner Cool Vendor 2016

[fa icon="calendar'] May 5, 2016 8:34:02 AM / by rob.quiros posted in Blog

[fa icon="comment"] 0 Comments

This week Gartner released its Cool Vendor report for Cloud and Emerging Technology Security – and there we were: Soha Systems named Cool Vendor by Gartner. Boom. Holy Popcorn Batman! What a great honor it is to see the impact Soha is having on the market recognized by one of the world’s premier analyst firms in this way.

Read More [fa icon="long-arrow-right"]

Hybrid Enterprise Requires Hybrid Security

[fa icon="calendar'] Mar 11, 2016 6:36:54 AM / by Avishai Ziv posted in Blog

[fa icon="comment"] 0 Comments

We, at Soha Systems, attended IBM InterConnect conference, late February. Amidst the multitude of announcements made during that week, the one that resonated most with us was IBM's partnership with VMware around hybrid enterprise (IBM Wants VMware Shops On its Cloud, How IBM Stole Google's Thunder).

Read More [fa icon="long-arrow-right"]

Soha Systems Showcases Secure, Easy Third Party Remote Access Solution at RSA

[fa icon="calendar'] Feb 28, 2016 2:00:41 AM / by admin posted in News, Press Releases, Blog

[fa icon="comment"] 0 Comments

CEO Haseeb Budhani and Vice President of Security Mark Carrizosa to Demonstrate Soha Cloud for Supplier and Contractor Access to Enterprise Applications

Read More [fa icon="long-arrow-right"]

Round Hole, Square Peg: Legacy Remote Access in Today’s Environment

[fa icon="calendar'] Jan 27, 2016 6:03:43 AM / by mark@soha.io posted in Blog

[fa icon="comment"] 0 Comments

As security professionals, it's our responsibility to maintain awareness about the goings on within the security space. It might include doing our research and reading all the publications, or emails from friends, colleagues and even family. For those who fancy a bit more organization, maybe just crawling LinkedIn, Reddit, or Google Alert feeds on a daily basis. In any case, you're bound to come across a litany of articles about security vulnerabilities, strategies, and threats. The most recent collection of interesting tidbits are those relating to the backdoors identified in some of the top firewall technologies (Juniper, Fortinet, and possibly others). I found myself scrolling through my own LinkedIn feed while waiting on the tarmac returning from a recent trip, when I received another email about the latest backdoor issue. Since I had nowhere else to be for the next few hours, I decided this was a good time to try and wrap my head around it all and maybe discern more than just a little ammunition for the obligatory security small talk at the next industry event. So with the hum of jet engines and the faint glow of the overhead cabin lights, I went to work.

Read More [fa icon="long-arrow-right"]

Sample - How To Post

[fa icon="calendar'] Jan 15, 2016 1:26:53 PM / by Sample HubSpot User posted in Insider

[fa icon="comment"] 0 Comments


INTRODUCTION:

Your “how to” blog post should teach the reader how to do something by breaking it down into a series of steps.

Begin your blog post by explaining what problem you are going to solve through your explanation and be sure to include any relevant keywords. Add in a personal story to establish your credibility on this topic. And make sure to end your blog post with a summary of what your reader will gain by following your lead.

Need some inspiration? Check out these "How-To" examples from the HubSpot blog:

Read More [fa icon="long-arrow-right"]

Cloud Perimeter: Old habits die hard

[fa icon="calendar'] Jan 5, 2016 12:14:20 PM / by Avishai Ziv posted in Blog

[fa icon="comment"] 0 Comments

The cloud disrupts IT and compute paradigms, and allows us to rethink everything about them. But more often than not, the move to the cloud means merely transfer of on-premise IT to cloud environment, almost unchanged.

Read More [fa icon="long-arrow-right"]

The Outside-In Enterprise: Five Security Problems We Need to Fix

[fa icon="calendar'] Nov 2, 2015 10:05:19 AM / by rob.quiros posted in Blog

[fa icon="comment"] 0 Comments

In my last post, I wrote how the move to the cloud, popularity of mobility and the sharing economy has created a new normal - the Outside-In Enterprise – and how this new reality has broken the enterprise security model. In the Outside-In enterprise, the majority of users are coming in from the outside of the corporate network. Increasingly badged employees, contractors and third parties gain access to on-premise, corporate network and cloud computing resources from the Internet.

Read More [fa icon="long-arrow-right"]

Cloud Lock-In, Secular Shift and the Bright Star of Soha

[fa icon="calendar'] Oct 30, 2015 12:00:43 PM / by Avishai Ziv posted in Blog

[fa icon="comment"] 0 Comments

Every now and then, when a publicly traded company's quarterly earnings whiff, you hear the "secular shift" song. It's a lament about how the "Hotel California Syndrome" doesn't work anymore. In other words, "vendor lock-in" is loosing its grip on the customers.

Read More [fa icon="long-arrow-right"]

The Vulnerable End User

[fa icon="calendar'] Oct 29, 2015 10:46:30 AM / by mark@soha.io posted in Blog

[fa icon="comment"] 0 Comments

Throughout enterprises large and small, a very real (although often overlooked) threat to the security of an organization lies within the confines of their 4 walls…the end-user. This is not to say that end-users are the root of all-evil, far from it. They are the heart and soul of your company, they make sure your business runs smoothly and effectively; however, these same end-users are also a prime target. With a wide array of cybercrime opportunities such as phishing, watering hole attacks and other social engineering tactics which do not necessarily rely on sophisticated malware or technical vulnerabilities, but rather the prey on the mindset and behavior of people, an uneducated or careless employee or an overcomplicated procedure can result in sensitive information leaking and potentially falling into the hands of an attacker.

As cloud adoption and mobility efforts are rapidly rising, methods in which to access corporate resources and data (and the devices used to access them) have increased at an exponential rate. Left unchecked, this ubiquitous style of access can soon evolve to an unmanageable state and introduce far more risk due to the inherent complexity. When factoring in the Human Element, it is becoming more and more evident that people matter just as much as technology. If organizations are to successfully (and consistently) mitigate these risks across multiple planes, it is imperative that Security teams move beyond only focusing on the technological controls and begin to develop a culture of security-aware employees who can effectively act as an extension of your security program, rather than a threat to the organization.

Read More [fa icon="long-arrow-right"]

Why I joined Soha, or Goodbye Old Perimeter

[fa icon="calendar'] Oct 24, 2015 5:21:49 AM / by Avishai Ziv posted in Blog

[fa icon="comment"] 0 Comments

It doesn't come often that you see a company and tell yourself "I've gotta join this company". Especially not after 25-odd years in the industry. Well, it so happens there is one such company – Soha Systems.

Read More [fa icon="long-arrow-right"]