<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=233366977071653&amp;ev=PageView&amp;noscript=1">

Explore new topics and find answers in our extensive resource center

OBT Cloud

OBT Wins Trusted Systems Impact Award

Cloud solutions. Security innovation. Global telecommunications. All things IoT were trending at the Pipeline Conference...

Continue reading
Posted On 05/23/2018 by OBT

What is advanced threat protection for web?

Advanced Threat Protection (ATP) for Web is a subscription-based anti-malware solution. It is the first line of defense ...

Continue reading
Posted On 05/16/2018 by OBT

Facebook continues foray into AI with improved image recognition algorithms

Facebook has never been a stranger to the public eye or the news headlines. Between being the vehicle of choice for the ...

Continue reading
Posted On 05/09/2018 by OBT

What is employee monitoring?

Employee monitoring is a cybersecurity method that monitors and records employee activity online to safeguard sensitive ...

Continue reading
Posted On 05/02/2018 by OBT

Ransomware gives way to new malware

 Ransomware is on the decline. The telltale notes that once demanded payment from victims in hope that they’d comply are...

Continue reading
Posted On 04/25/2018 by OBT

What is application lock-down and intelligence?

Application lock-down and intelligence is a security measure that protects a system against internal threats within a ne...

Continue reading
Posted On 04/19/2018 by OBT

Cybersecurity costs are on the rise. Here’s what you need to know to secure your infrastructure.

Cybercrime has become a top concern for enterprises and small business around the globe. A number of massive attacks las...

Continue reading
Posted On 04/11/2018 by OBT

What is Advanced Threat Protection for Email?

 Advanced threat protection (ATP) for email is a cloud-based security service that protects organizations from incoming ...

Continue reading
Posted On 04/04/2018 by OBT

What is basic perimeter and internal vulnerability testing?

Basic perimeter and internal vulnerability testing looks for loopholes or vulnerabilities in a computer system, applicat...

Continue reading
Posted On 03/28/2018 by OBT

Antivirus solutions are on the decline. Do you still need one?

Cyberattacks are increasing around the globe. Last year’s attacks were a disastrous reminder of the need for greater sec...

Continue reading
Posted On 03/28/2018 by OBT

Why Fileless attacks need to be on your radar

Last year was rife with cybersecurity horror stories, from major global attacks like the WannaCry ransomware to the Equi...

Continue reading
Posted On 03/14/2018 by OBT

What is Managed Two-Factor (2FA) Authentication?

Managed Two-Factor (2FA) Authentication is a security measure that requires an individual to verify their identity by pr...

Continue reading
Posted On 03/07/2018 by OBT

The rise and crackdown on crypto crime

Bitcoin has raised a lot of questions since its inception. Governments, nations and institutions have begun considering ...

Continue reading
Posted On 02/28/2018 by OBT

What is Comprehensive Anti-Virus and Malware Protection?

Comprehensive anti-virus and malware software monitors, analyzes and tests potential security threats in order to minimi...

Continue reading
Posted On 02/21/2018 by OBT

The next generation of wireless is nearly upon us—and it’s fast

Blockchain. AI. VR. Automation. IoT. The tech world has been going strong in the direction of the next great thing. And ...

Continue reading
Posted On 02/14/2018 by OBT

What Is Mobile Device Management (MDM)?

Mobile Device Management (MDM) enables businesses to manage company devices and personal mobile devices from a central l...

Continue reading
Posted On 02/07/2018 by OBT

How the blockchain is shaping the legal industry

The blockchain has been revolutionizing industries around the globe. From cross-border payments and health and education...

Continue reading
Posted On 01/31/2018 by OBT

What Is Disaster Recovery?

  Disaster recovery is a set of plans and strategies designed to help a business recover after natural disasters, cybera...

Continue reading
Posted On 01/24/2018 by OBT

How Cryptocurrencies and Blockchain Will Shape the Professional Services Industry

Behind the rise of cryptocurrencies like Bitcoin and Ethereum lies a technology that is revolutionizing more than just t...

Continue reading
Posted On 01/17/2018 by OBT

What is Business Continuity?

Business continuity allows companies to get back on their feet after internal failures, cyber attacks, natural disasters...

Continue reading
Posted On 01/10/2018 by OBT

Subscribe to our newsletter