sales@ishantech.net +603-79319471


 2016 – IshanTech (M) Sdn Bhd awarded as
Outstanding PPS Achievements – Commercial Category by HP

 

2016 – IshanTech (M) Sdn Bhd awarded as
New Business Champion of 2016 from ESET Malaysia

2016 – IshanTech (M) Sdn Bhd recognized as
TOP 25 CYBER SECURITY Technologies Companies 2017
APAC CIO Outlook – IshanTech

 




WeLiveSecurity News, views, and insight from the ESET security community


  • 4053440 - Securely opening Microsoft Office documents that contain Dynamic Data Exchange (DDE) fields - Version: 3.0
    on January 9, 2018 at 6:00 pm

    Revision Note: V3.0 (January 9, 2018): Microsoft has released an update for all supported editions of Microsoft Excel that allows users to set the functionality of the DDE protocol based on their environment. For more information and to download the update, see ADV170021.Summary: Microsoft is releasing this security advisory to provide information regarding security settings for Microsoft Office applications. This advisory provides guidance on what users can do to ensure that these applications are properly secured when processing Dynamic Data Exchange (DDE) fields. […]

  • 4056318 - Guidance for securing AD DS account used by Azure AD Connect for directory synchronization - Version: 1.0
    on December 12, 2017 at 6:00 pm

    Revision Note: V1.0 (December 12, 2017): Advisory published.Summary: Microsoft is releasing this security advisory to provide information regarding security settings for the AD DS (Active Directory Domain Services) account used by Azure AD Connect for directory synchronization. This advisory also provides guidance on what on-premises AD administrators can do to ensure that the account is properly secured. […]

  • 4038556 - Guidance for securing applications that host the WebBrowser Control - Version: 1.0
    on August 8, 2017 at 5:00 pm

    Revision Note: V1.0 (August 8, 2017): Advisory published.Summary: Microsoft is releasing this security advisory to provide information regarding security settings for applications developed with the Microsoft Internet Explorer layout engine, also known as the Trident layout engine. This advisory also provides guidance on what developers and individuals can do to ensure that their applications hosting the WebBrowser Control are properly secured. […]

  • 4033453 - Vulnerability in Azure AD Connect Could Allow Elevation of Privilege - Version: 1.0
    on June 27, 2017 at 5:00 pm

    Revision Note: V1.0 (June 27, 2017): Advisory published.Summary: Microsoft is releasing this security advisory to inform customers that a new version of Azure Active Directory (AD) Connect is available that addresses an Important security vulnerability. […]

  • 4025685 - Guidance related to June 2017 security update release - Version: 1.0
    on June 13, 2017 at 5:00 pm

    Revision Note: V1.0 (June 13, 2017): Advisory publishedSummary: Microsoft is announcing the availability of additional guidance for critical security updates, that are at heightened risk of exploitation due to past and threatened nation-state attacks and disclosures. Some of the releases are new, and some are for older platforms that we are making publicly available today. […]


  • Great Product Development Begins with a Solid Foundation of Corporate Excellence
    by Zia Babar on April 3, 2019 at 6:04 pm

    Enterprises are increasingly concerned about data security and data protection.  They need to have access to the rights tools to ensure that users and systems administrators are able to properly protect and secure company and customer data.  As a member of WinMagic’s technical team, I believe that WinMagic’s unique engineering environment is a source of... The post Great Product Development Begins with a Solid Foundation of Corporate Excellence appeared first on SecureSpeak | WinMagic Data Security Blog. […]

  • “Extracting BitLocker keys from a TPM”
    by Thi Nguyen-Huu on March 18, 2019 at 11:50 pm

    (Pre-Boot Authentication: Wisdom in Security – Part 3) In my September 2018 blog “Pre-Boot Authentication. Wisdom in Security Part 2”  I concluded that: “Bottom Line: ‘No PBA’ is not a wise choice for enterprises Microsoft’s reasoning that you don’t need PBA because the known memory attacks are difficult to pull off on most modern hardware... The post “Extracting BitLocker keys from a TPM” appeared first on SecureSpeak | WinMagic Data Security Blog. […]

  • Five Observations from RSAC 2019
    by WinMagic on March 15, 2019 at 4:38 pm

    Last week I had the privilege of attending the 2019 RSA Security Conference in San Francisco. As in past years, the keynotes, technical sessions and sidebar conversations were a great opportunity to learn what is top-of-mind in the security industry.  Here are five observations that I came away with: GDPR is Alive and Kicking –... The post Five Observations from RSAC 2019 appeared first on SecureSpeak | WinMagic Data Security Blog. […]

  • Working Hand-in-Hand with Microsoft Provides Customers Confidence in SecureDoc Windows 10 Compatibility
    by Aaron McIntosh on February 22, 2019 at 4:39 pm

    Customer confidence in your solution is critical to success.  That’s why WinMagic works diligently to ensure that our solutions support the environments that our customers use.  And for most of them, that’s Microsoft Windows. For years, WinMagic has participated in Microsoft’s various vendor programs.  We’ve been a Microsoft Partner, working alongside Microsoft to provide integrated,... The post Working Hand-in-Hand with Microsoft Provides Customers Confidence in SecureDoc Windows 10 Compatibility appeared first on SecureSpeak | WinMagic Data Security Blog. […]

  • Linux Servers and Encryption – the Need and the Solution
    by Garry McCracken on January 24, 2019 at 9:43 pm

    In the past, I have tried to make the case for encrypting physical servers on premises.  The argument for not needing to encrypt them is that these servers usually run for weeks, months, or even years without being brought down. And, that they are physically protected within a well-fortified data center.  The protection that Full... The post Linux Servers and Encryption – the Need and the Solution appeared first on SecureSpeak | WinMagic Data Security Blog. […]