|[October 09, 2017]
GEM Office Technologies Launches Cyber Threat Detection Platform to Enable Companies to Detect, Contain and Eliminate Today's Cyber Threats
Office Technologies, a leading office technology provider, announces
a new service and cloud based software designed to evaluate possible
cyber threats. The system is capable of detecting & containing infected
files and preventing malware from infecting endpoints.
This press release features multimedia. View the full release here:
GEM's (News - Alert) latest Quick Response Mobile Service Vehicle, The Threat Detection Lab, in front of the GEM HQ. (Photo: Business Wire)
attackers are now targeting small- to medium-sized businesses. When
an attacker gains access to any endpoint, they gain an entry into your
network. Once an endpoint is compromised, a hacker can obtain sensitive
information, leaving your business vulnerable to identity theft and data
breaches. The intruder could even encrypt files and hold it for digital
DOG Cyber Endpoint Platform continuously monitors and protects
potential threats on laptops, smartphone, tablets, networked
printers, or any device that is connected to a company's network.
Ransomware has become a critical concern for businesses around the
world. Data breaches are costing companies millions and conventional
antivirus software is not able to keep companies safe any longer.
"When I found out how simple it was to hack into a company's network and
obtain things such as passwords and bank account numbers, I immediately
started working on Guard Dog," says Kevin Dalessandro, President and CEO
of GEM Office Technologies. "No longer is this threat only a concern for
large corporations. Businesses of all sizes are being targeted and with
Guard Dog it is simple to protect your endpoints from these attacks."
Most conventional antivirus programs run on a "default allow"
philosophy. This means that "unknown" files that aren't recognized
as known malware can pass through the firewall and can possibly
infect endpoints. This method works to prevent already known malware.
Due to the sheer number of new malware infections being released on a
daily basis by hackers, this method is no longer effective.
Guard Dog's threat containment approach and "default deny"
strategy solve this issue and prevent any "unknown" files from taking
over individual systems. "Unknown" files can operate in a secure
container until the true nature of the program can be determined.
Therefore, the files never have a chance to take over and can be safely
deleted by Guard Dog, if determined to be corrupt, intrusive or from an
unknown source. This methodology is a game-changer in data security
To complement this growing threat, GEM has released its "Threat
Detection Lab", adding to their fleet of Innovative Quick Response
Mobile Service Vehicles. The mobile "Virus Containment Lab" will be
dispatched to provide a free forensic analysis, and to determine a
company's vulnerability to cyber threats.
Protecting your business is simple and easy. Call Gem Office
Technologies to schedule your analysis today.
About Gem Office Technologies, LLC.
Office Technologies, LLC has been a leader in the office equipment
industry for over 30 years. GEM has evolved over that time to become a
complete source for all office technology needs, including internal
security, data & document management, VoIP phone systems, IT & cloud
services. They specialize and have expertise in financial, legal,
healthcare, educational, & non- profit verticals. Follow us on Facebook,
YouTube, Twitter, LinkedIn and Instagram.
View source version on businesswire.com: http://www.businesswire.com/news/home/20171009005315/en/
[ Back To Conferencing Zone's Homepage ]