Web Security

Businesses and hackers are in a constant, ruthless arms race. To protect customer data, site availability, and your brand reputation, you must always be one step ahead of attackers with the most up-to-date solutions for each critical endpoint.

Explore our full library

slider item
Customer Identity & Access Management (CIAM) Identity & Access Management (IAM) Passwordless Authentication
Nesh (Steven Puddephatt), Senior Solutions Engineer @ GlobalDots 10.11.22

In addition to being outdated, passwords create frictions and hassles for workflows, teams, and users. We enable the complete elimination of passwords, securely and with an optimal user experience – by implementing the latest IAM & CIAM innovative solutions.  We are using a technology called FIDO2 (Fast ID Online) Authentication – new passwordless authentication method that relieves credentials […]

Read more
The recent OpenSSL patch release – risks & opportunities for GlobalDots’ partners
Infrastructure DDoS
Admin Globaldots 07.11.22

Simple SIEM Optimization Tips to Improve Your Cybersecurity Readiness.

Read more
Whitepaper: Why Workforce IAM Cannot Replace CIAM — Built for Customers
Customer Identity & Access Management (CIAM)
Admin Globaldots 03.11.22

IAM and CIAM are distinctly different. One fundamental difference between managing customer and employee account access? Control. Companies manage and limit the devices employees use. But customers expect the freedom to log in with any device they choose. So if you try to meet customer needs with IAM instead of CIAM, multi-device support becomes your […]

Read more
The New Ways Cyber Criminals are Attacking Travel Companies
Bot Mitigation & Anti-Fraud
Nesh (Steven Puddephatt), Senior Solutions Engineer @ GlobalDots 19.10.22

Cyber breaches seem to make headlines every day, with Uber, InterContinental Hotels Group and Marriott International among the major travel brands to have recently fallen victim to attackers. Whether it’s a multinational corporation or a small startup, no travel company is immune to the threat of cybercriminals and fraudsters. Travel and leisure is one of […]

Read more
A CISO’s Essential Guide to API Security
API Security
Admin Globaldots 15.09.22

Learn how to reduce the business risk of API attacks – and maximize the value of digital innovation.  APIs are the entry point to your organization’s most critical data and services. Their protection is crucial to reduce risks, maximize program value, and generate growth. In this guide, we take a close look at the special […]

Read more
SIEM Optimization tips to Improve Your Cybersecurity Readiness
SOC as a Service
From our Partners 28.07.22

Simple SIEM Optimization Tips to Improve Your Cybersecurity Readiness.

Read more
The Common Cybersecurity Mistakes that Devastate Businesses
SOC as a Service
From our Partners 27.07.22

Cybercrime investigation is an arduous process that experts should perform because the consequence of doing it incorrectly can be devastating.

Read more
How To Implement Passwordless Authentication: A Step by Step Guide
Customer Identity & Access Management (CIAM) Identity & Access Management (IAM) Passwordless Authentication
Miguel Fersen, Senior Cloud Consultant @ GlobalDots 27.07.22

Login details are criminals’ favorite type of data, as they allow complete impersonation of a legitimate user on your system. By successfully compromising an account, an attacker becomes a wolf in sheep’s clothing, appearing completely innocuous until they launch their attack.  One of the most common consequences of cracked credentials is a data breach, the […]

Read more
Why SMBs Are A Prime Cybersecurity Target
SOC as a Service
From our Partners 26.07.22

Data breaches and stolen information are a regular occurrence in the business world today, with SMBs at almost constant risk of attack. In fact, as mentioned in the 2021 SMB IT security report by Untangle, 43% of cyber-attacks target small businesses, with attacks continuing to increase year by year. This is causing huge issues for […]

Read more
Ransomware Protection: How to Resource it?
SOC as a Service
From our Partners 25.07.22

It was Ott Biederman, an accountant for American organized crime back at the turn of the 19th century that originally issued the famous immortal line, “Nothing personal, its just business.” That is what ransomware is today – just business. While there are occasional ransomware attacks initiated by state-sponsored groups to bring down the operations of key infrastructure, most […]

Read more
The Horrendous Impact of DDoS Attacks on Enterprise Organizations
Bot Mitigation & Anti-Fraud
Dr. Eduardo Rocha, Senior Solutions Engineer & Security Analyst @ GlobalDots 14.06.22

Distributed Denial of Service (DDoS) is usually performed by bombarding the targeted computer or resource with unnecessary requests to overload systems and prevent some or all legitimate requests from being completed. However, there is some good news: you can definitely mitigate the risk. Learn more here: Discover how a security innovation increased retailers’ sales by […]

Read more
2022: The Year End-User Accounts Go Passwordless
Identity & Access Management (IAM) Passwordless Authentication
Nesh (Steven Puddephatt), Senior Solutions Engineer @ GlobalDots 23.02.22

Why Passwordless, Why Now? Advances in technologies pose new dangers online as more people use devices to do their shopping and finances. The remote work era pedaled, further extending technology adoption, so growing concerns regarding security and new methods are more valid than ever. Progress comes with leaving behind obsolete methods to improve efficiency and […]

Read more
Technical Whitepaper: Biometric Passwordless Authentication (FIDO2 WebAuthN)
Identity & Access Management (IAM) Passwordless Authentication
Nesh (Steven Puddephatt), Senior Solutions Engineer @ GlobalDots 23.02.22

The booming cost of account takeover (ATO) attacks, from $4BN in 2020 to $16BN in 2021, makes passwordless authentication a truly pressing need for all businesses. Most current “passwordless” technologies still contain shared secrets and friction – deeming them irrelevant to the world’s most prominent workforce and buying power: Gen Y and Gen Z. Biometric […]

Read more
Unlock Your Cloud Potential
Schedule a call with our experts. Discover new technology and get recommendations to improve your performance.
Book a Demo