Build an Enterprise-grade Hybrid Cloud with Pure on AWS
Pure and AWS got together to help provide enterprises with a consistent data layer across their on-premises and cloud environments. This consistent data layer with consistent data services and APIs is now possible with Pure Storage Cloud Data Services.
SOC Efficiency Improving Thanks to SOAR
SOAR solutions help security analysts with the complete visibility of the cyber campaign delivered as a unified dashboard. Responding from a single screen and centralizing multiple tools into one screen reduces your team’s learning curve.
Long-known Vulnerabilities in High-Profile Android Applications
The following tables summarize our results, as of June 2019, for three vulnerabilities of critical severity (Arbitrary Code Execution) from 2014, 2015 and 2016. The list includes hundreds of popular Android apps, including Yahoo Browser, Facebook, Instagram and WeChat.
Need Backup for Cloud Databases, Cloud VMs, and Files? We’ve got you covered!
As cloud becomes more popular, further reducing storage costs when backing up or archiving to the cloud is becoming a high priority. Here’s how Cohesity is addressing these challenges.
Secure Cloud Architecture: Avoiding Technical Debt
F5 takes advantage of creating patterns—patterns that every app in any environment can utilize, regardless of where that app lives or which vendors are used.
FireEye Expands Cloud Security Capabilities on Amazon Web Services
FireEye Detection On Demand is a scalable security layer that makes it easy for organizations to analyze untrusted content. Using insights gained from FireEye Threat Intelligence experts, the cloud-native service is designed to provide detailed information as to why content has been flagged as malicious.
Authorities take down 'Imminent Monitor' RAT malware operation
Law enforcement agencies from all over the world announced today they took down the infrastructure of the Imminent Monitor remote access trojan (IM-RAT), a hacking tool that has been on sale online for the past six years.
CyberArk Achieves AWS Security Competency Status
This designation recognizes the CyberArk Privileged Access Security Solution for demonstrated proven technology and deep expertise to enable customers to reduce security risk across their cloud initiatives.
Upgrade your ADC from 10.5 to 11.x/12.x – Lessons from the field
Citrix ADC 10.5 has themes, features, and capabilities that differentiate it from newer versions, so upgrading requires some care when transitioning.
Chris Carter from FireEye Honored as Security Channel Chief of the Year
Under his leadership, Carter’s team executes partnering strategies with leading security Value Added Resellers and Integrators, while working with distribution partners to increase market reach.
Buer, a new loader emerges in the underground marketplace
Since late August 2019, Proofpoint researchers have been tracking the development and sale of a new modular loader named Buer by its authors. Buer has features that are highly competitive with Smoke Loader, is being actively sold in prominent underground marketplaces, and is intended for use actors seeking a turn-key, off-the-shelf solution.
The security of Citrix Web App Firewall – now on the AWS Marketplace
Citrix Web App Firewall is an enterprise-grade WAF solution that mitigates threats against customers’ public-facing and internal web assets, including websites, applications, and APIs.
Nutanix Once Again (and Again) Named a Leader in Gartner Magic Quadrant for Hyperconverged Infrastructure
“Our goal is to make IT and cloud infrastructure so simple that it fuels innovation and business growth. Nutanix provides flexibility, not only via our products and solutions, but also from the freedom to choose the best HCI consumption model for the business,” said Dheeraj Pandey, Chairman, Founder and CEO at Nutanix.
IGEL Expands Endpoint Security Capabilities to Enable a Complete “Chain of Trust”
The latest version of IGEL OS Workspace Edition offers advanced security features including signed OS partitions for expanded system-wide authentication.
SIEM vs. MSSP vs. MDR: An Essential Guide
Of the three security models, which one is the most viable for your organization? How do you choose the option that best meets your business needs? Here’s our take on the pros and cons of the three security models and how to identify the right solution for your organization.
Amazon VPC Ingress Routing – Reducing Deployment Complexity for Network Security Customers
With Amazon VPC Ingress Routing, customers can define routing rules at the Internet Gateway (IGW) and Virtual Private Gateway (VGW) to redirect ingress traffic to third-party appliances, before it reaches the final destination.
Accelerate Security Operations Leveraging Fortinet’s Security Fabric + SOAR
Before digital transformation, securing networks was pretty straightforward. However, competing successfully in today’s digital marketplace requires one of the most rapid and comprehensive transformations of business networks in history, and security must keep up.
Unleash a better way to work with Citrix Workspace
Citrix Workspace can streamline the workday for employees by organizing, guiding, and automating work in an intelligent and personal way, transforming the employee experience.
The CISO Perspective on IT Asset Management: Why Security and ITAM Go Hand-In-Hand
In a recent CISO panel hosted by Ivanti, experts agreed that IT asset management (ITAM) is a piece of the security puzzle that must be solved.