Sun Management - Rising Technologies


Created for the lay person, these videos take sometimes complicated IT and cyber issues and explain them in a clear and concise manner. Feel free to share with colleagues and friends who are always asking: “What do you do?”


  • SSLi

    March 7, 2017

    As the cat and mouse game between network intruders and defenders continues to play out and Moore’s Law continues to apply to increases in computing power, the use of encryption is becoming a tool more commonly used by intruders to bypass traditional network defenses and avoid having their nefarious activities detected and thwarted. The deployment of decryption technology levels out that playing field removing the effectiveness of that tactic and providing much greater visibility into the true traffic traversing your network. You can’t control what you can’t see.

  • Endpoint Protection

    February 19, 2017

    The same signature dependent architectures that we’ve depended upon over the past decades have simply become overwhelmed by the advancements made in malware authoring techniques. In fact, the effort to maintain them now overshadow the tangible benefits they provide. It’s time to end the infinite game of “whack-a-mole” we’ve been playing and rethink our collective approach to end point security. It’s time to reclaim the momentum and put attackers where they belong…on the defensive. Today’s next generation end point solutions accomplish just that.