Mainstream Technologies

Latest News

Mainstream Technologies Hosts Forum on Cyber Security Tools

Focus is on Identify, Protect & Detect

(Little Rock, AR) – (February 28, 2019) – Mainstream Technologies recently hosted a panel discussion on the security tools used in various industries. Discussions were based on a recognized cyber security framework that is divided into five categories: (1) identify (2) protect (3) detect (4) respond and (5) recover. The panel’s discussion focused on the first three categories.

On the subject of identify, “Asset discovery is the key. You have to know what you’re going to protect. You also have to know what data you have and how they are classified…and what device that data lives on,” according to Daniel Weatherly, Director of Security at Mainstream.

In the protect category, Garland Beasley of First Financial Bank (El Dorado, AR) contends, “It’s a multi-layer approach…because no one tool is going to block or catch everything. You have to automate this to be able to keep up.”

In the detect category, Jason Lafayette of Wilson & Associates, PLLC (Little Rock) recommends that “When you’re doing detection, it’s also important to know who’s doing what inside your (own) borders.” Weatherly adds that detection is also about compliance as well as intrusive actions, and reminded the audience that intruders “only have to be right once, but you have to be right 100% of the time.”

The framework used by the panel is a voluntary guide for managing and reducing cyber security risk that was developed by the National Institute of Standards and Technology (see


Since 1996, Mainstream ( has evolved into one of the most established IT services companies in the Mid-South, serving clients from its Arkansas locations including headquarters in Little Rock, a second operations facility in Conway, as well as a sales office in Bentonville.  Their staff of information technology professionals serves business and government customers across the nation with Managed IT Services, Custom Software Development Services, Cyber Security Services, and Hosting.

# # #

Completely Custom
Software Solutions

Custom Software

Peace of Mind,
Proactive IT Services

Managed Services

Compliance Centric
Hosting and Colocation

Hosting Solutions