Roka Security

Roka Security Roka Security is a computer security company offering products and services to secure your organization's infrastructure.
(11)

The word secure means different things to different people.  There's so many secure calling apps out now that it can be ...
02/01/2018
Secure Calling App : What You Need to Know | Rokacom

The word secure means different things to different people. There's so many secure calling apps out now that it can be hard to understand the differences. Many only encrypt to the server, leaving your voice and information vulnerable.

You want to secure your calls and messages, but there's no end to the claims of various vendors. This article walks you through what you need to know to evaluate each secure calling app and pick which ones right for you.

Article from RokaCom that answers your questions about text messages and mobile provider security.
01/28/2018
Are Text Messages Encrypted? | Rokacom

Article from RokaCom that answers your questions about text messages and mobile provider security.

The simple answer is NO. Even if your provider says it's using encryption you're not safe. If you're asking "Are Text Messages Encrypted", you're not alone. We explain how to secure your text messages, recommend some apps and answer common questions about encrypting your text messages.

Text Messages and Messaging apps work differently. If you want to secure them, you should understand the differences.
01/26/2018
Secure Texting App or Secure Messaging App: Which should you use? | Rokacom

Text Messages and Messaging apps work differently. If you want to secure them, you should understand the differences.

You need to protect your messages on your mobile phone, and you get that you need an app. Now you hear there is a difference between a Secure Texting App and a Secure Messaging App? We explain the difference and tell you what you need to know to choose and be protected.

"We don't need a Vulnerability Assessment, we just had a Penetration Test". We hear that alot, so much that I wrote an a...
01/23/2018
Vulnerability Assessment : What You Need To Know - Roka Security

"We don't need a Vulnerability Assessment, we just had a Penetration Test". We hear that alot, so much that I wrote an article about what you need to know about Vulnerability Assessments and getting one done.

You've been told you need a Vulnerability Assessment of your network, but what does that mean? The term has been used in cyber security so much it's hard to understand how it relates to you. This article focuses on what you need to know about Vulnerability Assessments for your company.

In the Movies they always say "Is this line secure?", well now we can help them answer that question.
01/16/2018
5 Things You Need to Make a Secure Call | Rokacom

In the Movies they always say "Is this line secure?", well now we can help them answer that question.

Need to make a secure call, but don't know how or where to start? The wrong app can leave you vulnerable, but we'll tell you what you need to know.

Hard-Coded Backdoor in My Cloud Devices Offers Attackers Access to Personal Photos, Videos https://buff.ly/2DbYhks
01/12/2018

Hard-Coded Backdoor in My Cloud Devices Offers Attackers Access to Personal Photos, Videos https://buff.ly/2DbYhks

Are you protecting your messages? I compare 4 Secure Messaging apps and talk about which is the best for you!
01/11/2018
Best Secure Messaging App: What's the right choice for you? | Rokacom

Are you protecting your messages? I compare 4 Secure Messaging apps and talk about which is the best for you!

What is the best secure messaging app for you? That depends on if security is your primary goal, if it's for personal or business use, and where you want to use it. We compare WhatsApp, iMessage, Signal and RokaCom and show how they compare for your needs.

NSA Denies Prior Knowledge Of Meltdown, Spectre Exploits; Claims It Would 'Never' Harm Companies By Withholding Vulns ht...
01/09/2018

NSA Denies Prior Knowledge Of Meltdown, Spectre Exploits; Claims It Would 'Never' Harm Companies By Withholding Vulns https://buff.ly/2DesVJK

Are you protecting your text messages?  You may want to start.
01/04/2018
Why you need Encrypted Text Messaging | Rokacom

Are you protecting your text messages? You may want to start.

Think your mobile is secure? Encrypted Text Messaging protects your txts and pictures from mobile providers, hackers, governments and competitors.

You've thought about building your own SNORT box, but what is the TCO on an open source IDS.  This article walks through...
06/25/2017
Intrusion Detection System : Open Source, Appliance, or Managed Service

You've thought about building your own SNORT box, but what is the TCO on an open source IDS. This article walks through the time commitment and cost of Open Source, Appliance or managed service.

You know you need an Intrusion Detection System (IDS) for your network, but should you build, buy or outsource. These five questions help make a decision.

Do you have IDS in your budget this year?  You should be aware of how much each option costs.  Our article dives into th...
06/25/2017
Intrusion Detection System : Open Source, Appliance, or Managed Service

Do you have IDS in your budget this year? You should be aware of how much each option costs. Our article dives into the true cost of an IDS.

You know you need an Intrusion Detection System (IDS) for your network, but should you build, buy or outsource. These five questions help make a decision.

An IDS is a necessary part of any good cyber security plan, however should you build your own, buy an appliance or just ...
06/24/2017
Intrusion Detection System : Open Source, Appliance, or Managed Service

An IDS is a necessary part of any good cyber security plan, however should you build your own, buy an appliance or just outsource everything? This is a good article to walk you through your choices.

You know you need an Intrusion Detection System (IDS) for your network, but should you build, buy or outsource. These five questions help make a decision.

When implementing an Intrusion Detection system, should you build your own with Open Source,  buy and Appliance, or just...
06/24/2017
Intrusion Detection System : Open Source, Appliance, or Managed Service

When implementing an Intrusion Detection system, should you build your own with Open Source, buy and Appliance, or just outsource the entire thing? This walks you through what is best for you.

You know you need an Intrusion Detection System (IDS) for your network, but should you build, buy or outsource. These five questions help make a decision.

Ready for FINRA's Cyber security Checklist?Finra slaps 12 firms with $14.4 million fine for cybersecurity issues http://...
06/22/2017

Ready for FINRA's Cyber security Checklist?
Finra slaps 12 firms with $14.4 million fine for cybersecurity issues http://buff.ly/2sfFUFM

Cyber Insurance is such a hot topic now.  Many of our customers are asking us what we think.
06/20/2017
Cyber Insurance: Read the Fine Print! - Dark Reading

Cyber Insurance is such a hot topic now. Many of our customers are asking us what we think.

Applying for insurance is a grueling process involving detailed questionnaires and lengthy technical interviews that can still leave you without an adequate safety net.

Address

13650 Dulles Technology Dr, Ste 100
Herndon, VA
20171

Alerts

Be the first to know and let us send you an email when Roka Security posts news and promotions. Your email address will not be used for any other purpose, and you can unsubscribe at any time.

Contact The Business

Send a message to Roka Security:

Nearby home improvement businesses


Other Home Security Companies in Herndon

Show All