Product
Game Protection
Anti-Cheat & Anti-Hack
Online Protection
Solutions
FPS Game Solution
SLG Game Solution
Casual Game Solution
MMO Game Solution
Card Game Solution
Help Center
Android
User Manual
Tool Download
FAQ
iOS
User Manual
Tool Download
FAQ
Windows
User Manual
Tool Download
FAQ
Blog
Price
Android
iOS
Windows
Company
About us
Why JikGuard
Contact us
Log in
Free Trial
News
Securing Employee Device Freedom
As a business or technical leader, you know you need to protect your company in a rapidly evolving mobile ecosystem. However, threats are not always
July 10, 2014
Threat Spotlight: A String of ‘Paerls’, Part One
This post was co-authored by Jaeson Schultz, Joel Esler, and Richard Harman. Update 7-8-14: Part 2 can be found here This is part one in a two-part
June 30, 2014
A Holistic Approach to Secure Enterprise Mobility
"It's not secure enough… so we are not going to allow it to happen." Does this phrase seem all too familiar? Today, IT and business leaders are faced with
June 27, 2014
Cisco Web Security and the Health Insurance Portability and Accountability Act (HIPAA)
Spurred by the Health Insurance Portability and Accountability Act (HIPAA), which outlined a set of standards and guidelines for the protection and
June 26, 2014
Steganographic Key Leakage Through Payload Metadata
Steganography is the ancient art of invisible communication, where the goal is to hide the very fact that you are trying to hide something. It adds another layer of protection...
June 24, 2014
Energy Networking Convergence Part 2: Cyber & Physical Security
This is the second of a four part series on the convergence of IT and OT (Operational Technologies) by Rick Geiger Physical Security has evolved from
June 16, 2014
RIG Exploit Kit Strikes Oil
This post was co-authored by Levi Gundert with contributions from Emmanuel Tacheau and Joel Esler. In the last month we have observed high levels of
June 5, 2014
Dimension Data Series #4- The Opportunities and Risk of Secure Mobility from the Top Down
Mobile security is a top concern for IT and business leaders. This blog series with Dimension Data explores how organizational leaders can work together
June 3, 2014
Trends in Data Center Security: Part 1 – Traffic Trends
Organizations are quickly discovering that a “one size fits all” approach to security across the network falls short of addressing the unique trends in
May 21, 2014
Cupcakes and Cyber Espionage
This blog will suggest a change of strategy in how we address the threat of cyber espionage. One which leverages traditional tactics of
May 20, 2014
Windows Server DNS Cache: How to Use the Command Line Inspection of Microsoft Windows DNS Cache
This post explains how to inspect the contents of windows DNS cache. Inspection can be used to check DNS entries, revealing if any malicious websites are
May 15, 2014
Dimension Data Series #3: Closing the Gap Between the Secure Mobility Vision and Real-World Implementation
Mobile security is a top concern for IT and business leaders. This blog series with Dimension Data explores how organizational leaders can work together
May 13, 2014
Prev
1
...
61
62
63
64
65
66
67
68
69
Next