Solutions that Enable Security, Resilience, and Operational Efficiency
Between complex supply chain parameters and shrinking natural resources-not to mention intense regulation-companies in the oil, gas and energy industries have always experienced a great deal of challenge. This is only compounded by the fact that these businesses are often also saddled down by aging infrastructure and legacy technologies. Add to this the need to guard against cyber threats through network segmentation and data protection. Cerium Networks works with utilities to develop IT solutions that meet business requirements and further regulatory compliance.
Improve Risk M
Improve Risk management with best of breed cyber risk management technologies to protect your network infrastructure at multiple points of vulnerability.
Enhance Innovation via Cloud-Based Technology
Whether you are looking to take advantage of a cloud-based voice, video, mobility or presence solution, our engineers can design a cloud solution that drives innovation so that your business can stay competitive.
With your workers likely scattered across the globe, leverage our collaboration and visualization technologies to bring remote resources together across time zones for
See how Cerium has helped our customers succeed.
Access to the resources you need to make the most of your hardware and software solutions.
On Monday, ConnectWise issued a security alert regarding their popular ScreenConnect RMM tool. Two vulnerabilities were privately reported to the ConnectWise Trust Center the week before. The vulnerabilities consist of an authentication bypass and a path traversal;...
Summary On January 24, Cisco released a security bulletin and disclosed CVE-2024-20253 to the public. This new vulnerability affects the Cisco Unified Communications Suite. Although there is no public news of exploits in the wild, Cisco has released a patch and...
On Wednesday, January 10, Ivanti released an advisory on their Pulse Secure Client and Gateway products. Ivanti claims that according to security researchers at Volexity, malicious actors could use two 0-day vulnerabilities to create a remote code execution and take...