July 3rd, 2012
InterGuard Wins BEST NEW PRODUCT OF THE YEAR AWARD at the ASCII Success Summit 2012 in Washington, DC Read more here

July 3rd, 2012
InterGuard Sonar in PCWorld article "How to Monitor Your Employees' PCs Without Going Too Far"
According to PCWorld, "...gone are the days when PC monitoring was an optional, draconian security measure practiced only by especially vigilant organizations. Today, more than three-quarters of U.S. companies monitor employee Internet use. If your business is in the remaining quarter that doesn't do so, you're probably overdue for a policy change"

PC Magazine cites Sonar, identifying its unique value proposition: "Packages such as Interguard Sonar can monitor all e-mail and IM sessions, track and filter Web usage, log users' keystrokes and program use, and capture screenshots on command for as little as $87 per user." Read more here



Employees Cause Many Data Breaches
According to Baseline maagazine, The top three root causes of data breaches are employees' loss of laptops or other mobile data-bearing devices, third-party mishaps or errors, and system glitches. "Only 8 percent of breaches are caused by external cyber-attacks...[the rest are] employee negligence or maliciousness." Read more here



March 6, 2012
"InterGuard Software cited as Major Vendor for Mobile Data Loss Prevention provider in InfoWorld, Digital Issue on 'Consumerization' of IT"
Download InfoWorld's Report Here (InterGuard mentioned page 21)



November 1st, 2011
Awareness Technologies mentioned on Forbes.com
"Miller is a very clever CEO and I give him good odds for tripling ATI (revenue)." - Peter Cohan, Forbes.
Read More



May 2, 2011
Cloud Computing Security: Emerging Vendor Round-up
Awareness Technologies was included in Datamations’ cloud security up-and-comers.
Read More



April 26, 2011
Awareness Technologies Offers Employee Monitoring Tips
With the escalating use of mobile devices and tablets, along with the growing number of telecommuters, it's critical for small businesses to stay on top of employee activity. According to the Ponemon Institute, the costs associated with data breaches caused by careless or malicious employees can be detrimental to an SMB—insider breach incidents cost businesses an average of $3.4 million per business per year.

Furthermore, Ponemon's survey found that 60 percent of exiting employees walked out with company information. That added to the productivity loss caused by unmonitored employees—the average unmonitored employee wastes approximately 30 percent of their workday on nonwork-related Web browsing—is costing small businesses more than they realize.
Read More



March 4, 2011
Top Best Internet Management Software list for CEOs and Entrepreneurs to monitor employees - Review
by Amarendra Bhushan
Read More



December 28, 2010 10:00 AM
Why SMBs Aren't Buying DLP
By Brad Miller
Cost, complexity, and a dearth of complete solutions limit adoption rates for small and midsize businesses; revamping the architecture and packaging of DLP solutions is key to winning the SMB market.
Read More

November 2010
Avoid Data Breaches PC Today
What you need to know to protect your business: By Rod Scher
Read More

3 August 2010
Smartphone Security Faces Looming Battle - eWeek Europe
As the power, storage and data demands on smartphones continue to grow, the greater the security threat to these devices will become, says Larry Walsh
Read More

27 July 2010
Redefining Endpoint Security
The point at which a device becomes "valuable" to criminals is typically when it combines both the device and the user credentials. As a result, an endpoint should not just be looked at as a device, system, computer, server or laptop. The definition of an endpoint should also include the notion of employees, contractors, third parties, telecommuters, travelers, and other insiders who use
Read More

23 June 2010
DLP for Smartphones via the Cloud
LegiTime Technology is probably a company you've never heard of. This isn't because it doesn't make good products -- applications for authenticating and managing smartphone messages -- but rather it's a small Yankee startup. What makes LegiTime significant is its acquisition by Awareness Technologies (ATI), which plans to leverage LegiTime's technology to extend data security to smartphones.
Read More

16 June 2010
Putting a Private Detective in Your Laptop "NY TIMES"
"The 2009 Computer Security Institute Computer Crime and Security Survey found that 42 percent of respondents had lost a laptop or other portable device to a thief in the last year." See how Interguard Laptop Cop stands out from the rest in the article from the NY Times.
Read More

7 June 2010
The Insider Threat - How Real Is It
Written by Ron Penna
There always seems to be some debate between if insiders or hackers are really the greatest cause of information security breaches. What are the facts?
Read More

4 June 2010
Endpoints and Clouds
Written by Ron Penna
The vast majority of solutions on the market today fall squarely into one of two categories; end-point security or cloud/network based security solutions. Vendors of each tout the benefits that can they have over the other as a result of choosing this architecture.
Read More

1 June 2010
Preventable Data Breaches
Written by Ron Penna
Read More

10 May 2010
Redefining Endpoint Security
Written by Ron Penna
Most security professionals believe that Endpoint security is a strategy in which security software is distributed to end-user devices but centrally managed.
Read More