GSX Blog

How to: Measure the performance impact of Meltdown security patch

Posted by Gregoire Lecomte on Wed, Jan 10, 2018

Intel just exposed a major vulnerability in the x64 processor family. As a consequence, Microsoft will deliver a driver update in the next few days.

Today different forum experts forecast between 5 to 40% of degradation "depending on the task and processor model." Already patched Linux systems show more than 50% of degradation. The patch may have important consequences on environments and user experience.

Read More

Tags: Office 365, Office 365 monitoring, Security, office 365 security, SysAdmin Top Issues, office 365 health, office 365 performance, fixing office 365

How do you manage compliancy with mobile devices?

Posted by Juliette Ollagnier on Tue, Mar 21, 2017

Mobile devices can be a major security threat if they aren’t managed properly. Many company’s employees use email, Skype, and other Office 365 services on their mobile devices at the office, at home, and on the go, which can cause headaches for IT administrators.

Read More

Tags: Office 365, Security, Office 365 usage, Usage Diagnostics, office 365 reports

The new GSX 365 Security Audit helps administrators secure their cloud environments

Posted by Juliette Ollagnier on Tue, Jan 17, 2017

An organization’s employees perform millions of actions on Office 365 each day, so it’s important for administrators to have tools to investigate incidents that occur which could threaten the security of the network. Administrators need to be able to find out who is responsible for each incident, and what actions need to be taken to resolve vulnerabilities in your Office 365 environment.

Read More

Tags: Cloud, Office365, Audit, Security, office 365 audit, office 365 security, office 365 auditing

Mission critical Mobility demands advanced EMM monitoring

Posted by Meryll Moreau on Fri, Oct 23, 2015

BlackBerry recently teamed up with us and issued a whitepaper explaining the importance of delivering advanced proactive monitoring to their Enterprise Mobility Management (EMM) solutions. The main problem they identified was most common EMM solutions provide some monitoring capabilities, but these tools are not advanced enough to identify issues before they happen.

Read More

Tags: Enterprise Mobility Management, BES12, bes monitor, EMM, Security

Disclose & Respond to the Top 5 Security Breaches for Mobile Devices

Posted by Juliette Ollagnier on Wed, Sep 30, 2015

Most organizations understand that breach response and vulnerability disclosure are a huge part of the security process. However, despite the disclosed breaches, organizations continue to miscalculate or underestimate the risk caused by mobile.

Read More

Tags: MDM, Blackberry monitoring, BES12, EMM, Security

Beefing up device security with BES12

Posted by Juliette Ollagnier on Wed, Sep 16, 2015

Mobile devices are widely adopted in the world of business today. Moreover, they have taken on mission-critical status for most enterprises. 

According to John S Chen, CEO at BlackBerry, and based on result of a survey of 800 CIOs and risk and compliance leaders*, “the number of data breaches caused by mobile devices had significantly increased in the past years. Mobile device is already the weakest link in the security framework“.

Read More

Tags: MDM, Blackberry monitoring, BES12, EMM, Security