Find me on:

Dan Lowe

Dan Lowe is the OEM Senior Marketing Manager. He has worked at multiple security companies in the last 10 years and manages the OEM marketing team. He has a unique perspective on the industry as he has worked with different security technologies, such as: Antimalware, Firewalls, VPNs, DLP, and E-DRM.

Recent Posts

Am I Safe from Car Hackers Using Malware?

Published on 09/20/16 11:10PM

Threats, Technology, automobile

After purchasing my car, I wondered if I was going to regret my decision. At the car dealer, as I sat in the driver’s seat, the aviator style dashboard, array of digital displays, and innovative auto-sensing enhancements beckoned me to investigate further. As I was driving the car, I marveled at the plush leather seats and quick moving digital numbers of the speedometer jumping as I depressed the accelerator – my senses came alive. For 16-years, I have been driving a basic car with a plain dashboard, simple needle style speedometer, and creature comforts such as a AM/FM radio with a tape cassette. In my old car, I used to change my oil, replace my spark plugs, or fiddle around with the engine. Now, new automobiles have gone way beyond my capabilities as a do-it-yourself car mechanic. I have to take my car to the shop every time a fix it code appears on the dashboard display. I feel poorer after every visit to the mechanic because the new car requires a technician with a computer to diagnose my vehicle’s warning notifications. 

Read More

Is There a False Sense of Security with Pin and Chip POS Technology

Published on 08/29/16 07:33PM

Threats, Technology, POS


Read More

The Growing Threat of Malware within Medical Devices

Published on 06/24/16 06:22PM


Malware Threats Are Rising Within Health Care Organizations.

Read More

Common Myths about Antimalware Applications

Published on 05/06/16 08:44PM

Threats, Technology


Read More

Opinion: RSA 2016 - Looking For the Next Big Thing!

Published on 03/07/16 11:56PM


Here is a recap of the RSA event from a vendor perspective while offering practical advice for future conferences.

Read More

Mobile Security: Mobile Devices Are The Next Big Opportunity for Hackers

Published on 10/29/15 03:30PM

Mobile Security, Endpoint Security

With malware losses costing upwards to $500 Billion dollars, rest assured that malware writers will want to set new records for 2015[i]. As the world becomes more interconnected, the speed to deliver future technologies has become an important factor to get ahead of the competition. Competitive pressures continue to force companies to deliver the next big thing, but they are creating security loop holes, vulnerabilities, and security lapses that facilitate malicious attacks. 

Read More

Are Endpoint Security Clients Still Relevant?

Published on 09/18/15 02:30PM

Endpoint Security

Though there are many different articles pointing to security hacks by proficient online criminals, does that mean you should stop protecting your endpoint devices? Well known attacks against Target, Home Depot, Sony, and others show us that business computer systems can be compromised. There is no shortage of attack vectors as mobile devices will emerge as the next criminal growth opportunity. IT people, security administrators, and business owners are very busy, as it’s hard to keep up with the multiple operating systems, heterogeneous IT environment, and latest online threats. But creating malware is a profit-making industry that will continue to flourish.

Read More

Ways to Accelerate Your Business with Endpoint Security Solutions

Published on 03/25/15 04:00PM

OEM Business, Endpoint Security

Whether you sell a product or service to companies with more than a 1000 employees or less than 10 employees, you can offer endpoint security solutions without creating an endpoint security application from scratch, hiring a lot of domain experts, or providing a full staff of R&D experts for each security feature. Endpoint security companies are providing full featured client security applications that don’t require you to develop these applications on your own. Driving more revenue, keeping up with the competition, retaining customers, strengthening customer loyalty, and expanding market opportunities are often the reasons companies choose to add endpoint security to their product line.

Read More

6 Criteria Used to Evaluate an Endpoint Security Product

Published on 02/24/15 04:03PM

OEM Business, Endpoint Security

Whether you are an industry veteran or a new company that is looking to foster repeat business and loyal customers, delivering a managed endpoint security product can be a good revenue opportunity for you.

Preventing corporate devices from being compromised is a daily struggle. A staggering 220,000 new malware samples are stealing corporate information, taking financial data, blackmailing companies, ransoming corporate data, and creating malicious behavior. You may be a managed service provider (MSP, MSSP), a web security gateway company, IT managed services, or a company that provides products and services to the SMB and enterprises. Businesses that offer endpoint security solutions to their clients want strong products and services to grow revenue, increase profit, and expand into new markets. This article examines different criteria that these businesses should consider before selecting an endpoint security product.

Read More

8 Criteria for Choosing the Right Antimalware SDK

Published on 12/11/14 11:31AM

OEM Business, Technology

Selecting the right antimalware Software Development Kit is an important task for business decision makers looking to grow revenue, increase profit, and expand into new markets. There is no perfect strategy for selecting the right antimalware engine, but here are a few suggestions that will help you determine the right criteria. 

Read More