CrowdStrike Falcon Detects 100% of Attacks in New SE Labs EDR Test, Winning Highest RatingLiviu Arsene – Joe FaulhaberCrowdStrike BlogThe CrowdStrike Falcon® platform achieves 100% attacks detected in new Advanced Security Test (EDR) from SE LabsThis SE Labs test demonstrated that CrowdStrike’s Zero Trust module, Falcon Identity Threat Protection, is…
Category: Product
OEM Newsalert – Sun, Dec 5, 2021
* Palo Alto Networks Expands Technology Partner Program
* Microsoft adds AI-driven ransomware protection to Defender
* PagerDuty Automates Incident Response with Rundeck
* WatchGuard Cloud enhances security platform with new endpoint security modules
* Exabeam Appoints Technology Finance Veteran Holly Grey as Chief Financial Officer
* CyberSaint Security Appoints Jerry Layden as Chief Executive Officer
* authID.ai Announces New Hires and Appointments
* India Cybersecurity Market to Reach USD 3543.75 Million By FY2027 – TechSci Research
* One Of The World’s Largest Investment Management Firms Signs Major Contract With Darktrace
* TrueFort Named Best Application and Cloud Workload Protection Solution in 2021 AST Homeland Security Awards
* PRESS RELEASE: SSH Launches Secure e-communications Suite for confidential emails, secure data collection, and secure workspaces
OEM Security Newsalert – 17-Oct-2020
Table of Contents
- U.S. Department of Defense Selects Forescout to Protect Millions of Mission Critical Devices Across Global Networks
- EY Announces Adam Vincent of ThreatConnect, Inc. Entrepreneur Of The Year® 2020 Mid-Atlantic Award Finalist
- Gigamon and Cisco Partner to Accelerate Network Threat Detection and Response in Highly Dynamic Environments
- Cisco extends Meraki SD-WAN to Microsoft Azure
- How The Free Edinburgh Fringe Festival Brought Comedy Online Using Cisco And Twitch
- Boston-based software security company Snyk raises $200M
- U.S. Financial Services Cyber Security Market Share, Trend, Opportunity, Affect On Demand By COVID-19 Pandemic And Forecast 2020-2025
- CYBERSECURITY MARKET REVIEW | 1H 2020
- Zscaler Releases New Data Protection Innovations in Zscaler Zero Trust Exchange
- Cloud SIEM Security Provider Panther Labs Raises $15 Million
- Securonix SIEM Updates Global MSSP, MDR Program, Adds 30 Partners
- Bugcrowd adds two industry executives to advisory board
U.S. Department of Defense Selects Forescout to Protect Millions of Mission Critical Devices Across Global Networks
Globenewswire
Yahoo – Finance
SAN JOSE, Calif., Sept. 01, 2020 (GLOBE NEWSWIRE) — Forescout Technologies, Inc., the leader in Enterprise of Things security, today announced it was selected by the U.S.
Department of Defense (DoD) to expand cybersecurity across its global enterprise as the initial phase of a multi-million dollar contract award through 2020.
The Defense Information Systems Agency (DISA) chose Forescout’s technology as the foundation of the DoD’s “Comply to Connect” (C2C) initiative, a security framework to provide the highest level of assurance for authentication, authorization, compliance assessment and automated remediation of devices connecting to the DoD information network (DoDIN).
The multi-year C2C program will impact all branches of the U.S.
Armed Forces, as well as other DoD Agencies and Centers.
Forescout has supported the C2C program from its pilot and early adopter phases at DoD enterprises including DISA, the Marine Corps, the Navy’s Next Generation Enterprise Network (NGEN), and Army Medical Command (MEDCOM).
Link: https://finance.yahoo.com/news/u-department-defense-selects-forescout-130000754.html
EY Announces Adam Vincent of ThreatConnect, Inc. Entrepreneur Of The Year® 2020 Mid-Atlantic Award Finalist
Business Wire
Yahoo – Finance
Ernst & Young LLP (EY US) today announced that ThreatConnect, Inc.
CEO Adam Vincent was named an Entrepreneur Of The Year® 2020 Mid-Atlantic Award finalist.
Now in its 34th year, the Entrepreneur Of The Year program honors entrepreneurial business leaders whose ambitions deliver innovation, growth and prosperity as they build and sustain successful businesses that transform our world.
Link: https://finance.yahoo.com/news/ey-announces-adam-vincent-threatconnect-143000884.html
Gigamon and Cisco Partner to Accelerate Network Threat Detection and Response in Highly Dynamic Environments
Business Wire
Yahoo – Finance
Gigamon, the worldwide leader in network visibility and analytics, today announced the integration of Gigamon ThreatINSIGHT and Cisco SecureX to optimize network security through accelerated threat detection and response (NDR).
With an expanded attack surface and resources that are stretched thin, now more than ever, InfoSec teams need a platform of integrated, advanced security solutions to combat attackers and secure their organizations.
Link: https://news.yahoo.com/gigamon-cisco-partner-accelerate-network-125000733.html
Cisco extends Meraki SD-WAN to Microsoft Azure
Michael Cooney
Network World, from IDG
Cisco and Microsoft have teamed up on another joint effort, this time to make it easier for enterprise branch offices with Cisco Meraki SD-WAN gear to tap into the Azure Virtual WAN service.
Specifically, Cisco said it has integrated its SD-WAN Powered by Cisco Meraki offering with Microsoft’s Azure Virtual WAN service, which will let customers automate secure connectivity between Meraki MX appliances at branch locations directly with the Azure service, regardless of geographical location.
In this latest announcement, the companies say they have co-developed a toolkit that automates the process of securely connecting the branch MX appliances directly to the Azure service.
The automated workflow includes built-in security features and zero-touch configuration.
Link: https://www.networkworld.com/article/3574711/cisco-extends-meraki-sd-wan-to-microsoft-azure.html
How The Free Edinburgh Fringe Festival Brought Comedy Online Using Cisco And Twitch
Sooraj Shah
Forbes
The Free Edinburgh Fringe Festival has been going since 2004 as a platform for up and coming comedians to make a name for themselves without the higher costs associated with appearing at the main Edinburgh Festival Fringe.
The main festival, which is one of the biggest comedy festivals in the world, issued more than 850,000 tickets in 2019.
It is harder to get exact figures for attendances at the Free Edinburgh Fringe festival, but the organizers are confident that the shows get at least 375,000 attendances each year.
“A lot of the comedians were worried about how you interact with people who are potentially watching and also with each other.
WebEx allows us to get a group of people online – that myself who sits behind as a producer can make sure the correct people can be heard and we chose Twitch to stream it out, because it gives it a good way of being a broadcast while also getting the feedback from the audience.
While the audience are not immediately involved with the show, it gives us an element of feedback and an element of interactivity”.
Petty explained that the organization did not test out other popular video conferencing apps like Microsoft Teams and Zoom, because it was confident in Cisco’s technology.
Link: https://www.forbes.com/sites/soorajshah/2020/09/08/how-the-free-edinburgh-fringe-festival-brought-comedy-online-using-cisco-and-twitch/#811a5ef73337
Boston-based software security company Snyk raises $200M
Andy Rosen
Boston Globe
Snyk, a Boston-based technology company that helps developers identify security risks while they are building software, said Wednesday it has brought in $200 million in new private investment.
The money is a sign of growing investor confidence in the firm, which has about 325 employees, 100 of whom work for its Boston office.
Snyk said it has raised a total of $450 million and is now valued by its investors at $2.6 billion.
Early this year, when the company last raised money, its value was less than half of that.
Snyk CEO Peter McKay said in an interview that the company has grown rapidly this year, as the COVID-19 pandemic caused more companies to use software to handle functions that may have been done on paper or by hand in prior years.
Snyk, which also has offices in Israel, London, Canada, and Silicon Valley, plans to move its headquarters from the Back Bay to downtown at Boston’s 100 Summer Street early next year.
Link: https://www.bostonglobe.com/2020/09/09/business/boston-based-software-security-company-snyk-raises-200m/
U.S. Financial Services Cyber Security Market Share, Trend, Opportunity, Affect On Demand By COVID-19 Pandemic And Forecast 2020-2025
Market Watch
Sep 05, 2020 (AmericaNewsHour) — This cyber security market report focuses on the U.S. financial services demand side of cyber security products, systems & services.
It is based on hundreds of interviews with financial institutions’ cyber security customers, CEOs, CISOs and CIOs as well as cyber security industry executives and world-class experts.
According to the Cyber Security Market Report “U.S.
Financial Services: U.S.
Financial Services: Cybersecurity Systems & Services Market – 2016-2020” report, the U.S. financial institutions cyber security market is the largest and fastest growing private sector cyber security market.
Its cumulative 2016-2020 market size is forecasted to exceed $68 Billion.
We corroborated our findings by conducting a meta study which integrated the results of eight individual surveys performed by others (e.g., Verizon, IBM, SANS survey for: Blue Coat, FireEye, ForeScout, Raytheon, Sourcefire Tenable Network, N.Y.
State Department of Financial Services, Accenture, Zurich Insurance and more) with thousands of combined responders.
Link: https://www.marketwatch.com/press-release/us-financial-services-cyber-security-market-share-trend-opportunity-affect-on-demand-by-covid-19-pandemic-and-forecast-2020-2025-2020-09-05
CYBERSECURITY MARKET REVIEW | 1H 2020
Momentum Cyber
We are pleased to provide you with Momentum’s Cybersecurity Market Review for 1H 2020.
Strategic activity in the first half of 2020 included 293 transactions completed totaling $14.5B in deal value across M&A (93 transactions, $9.8B) and Financing (200 transactions, $4.7B)
• 93 M&A deals were announced with disclosed values of $9.8B, (median disclosed value of $125.0M)
• The acquisitions of RSA by STG for $2.1B, Forescout by Advent International for $1.6B, Checkmarx by Hellman & Friedman for $1.2B, & Armis by Insight Partners $1.1B highlighted M&A activity for the first half of 2020
• The most active sectors in the first half of 2020 included: Identity & Access Management (11), Risk & Compliance (10), Network & Infrastructure Security (10), & Cloud Security (8)
• 200 financing transactions completed with total capital raised of $4.7B (median amount raised of $8M)
• Netskope’s $350M Series G, Stackpath’s $216M Series B, OneTrust’s $210M Series B, & SentinelOne’s $200M Series E rounds led all financing activity for the first half of 2020
• 55% of total financing deals were Early Stage to Series A (median amount raised was $10.5M)
• The most active sectors in the first half of 2020 included: Risk & Compliance (36), Cloud Security (34), Identity & Access Management (18), & Network & Infrastructure Security (16)
Link: https://momentumcyber.com/cybersecurity-market-review-1h-2020/
Zscaler Releases New Data Protection Innovations in Zscaler Zero Trust Exchange
Zscalar
Zscaler, Inc., the leader in cloud security, today announced new data protection innovations in the ZscalerTM Zero Trust Exchange that protect organizations in the work-from-anywhere era by securely connecting users, devices, and applications.
The Zscaler Zero Trust Exchange, built on a Secure Access Services Edge (SASE) framework, expanded its data protection capabilities with a suite of services that are now generally available.
These services include Cloud Access Security Broker (CASB), Cloud Security Posture Management (CSPM) for SaaS applications, and Cloud Browser Isolation.
The Zscaler Zero Trust Exchange was built with a new approach that creates zero trust connections between the users and applications directly to solve this unique challenge.
As a scalable, cloud-native platform, it enables digital transformation by securely connecting users, devices, and applications anywhere, without relying on network-wide access.
This platform is delivered by five key architecture attributes, unique to the Zscaler Zero Trust Exchange, that together enable organizations to provide strong security and a great user experience to their employees and customers.
The attributes are:
Zero attack surface
Connect a user to an application, not a networ
Multi-tenant architecture
Proxy architecture, not pass-through
ecure access service edge (SASE) architecture
Link: https://www.zscaler.com/press/zscaler-releases-new-data-protection-innovations-zscaler-zero-trust-exchange
Cloud SIEM Security Provider Panther Labs Raises $15 Million
Dan Kobialka
MSSP Alert
Panther Labs, a cybersecurity startup and security information and event management (SIEM) platform provider, has added $15 million in Series A funding led by venture capital firm Lightspeed Venture Partners.
The company also has named Lightspeed Partner Gaurav Gupta to its board of directors.
The Series A funding will help Panther accelerate the development of its open-source SIEM platform, the company stated.
In addition, the funding brings Panther’s total financing to date to $20.5 million.
Link: https://www.msspalert.com/investments/cloud-siem-security-provider-panther-labs-raises-15-million/?utm_medium=email&utm_source=sendpress&utm_campaign
Securonix SIEM Updates Global MSSP, MDR Program, Adds 30 Partners
Dan Kobialka
MSSP Alert
Securonix, a security information and event management (SIEM) platform provider, has unveiled Securonix Fuel, an updated version of its global MSSP and managed detection and response (MDR) program.
With Securonix Fuel, MSSPs and MDR providers can access a partner portal and training and certification for sales and pre-sales via Securonix Academy, the company said.
They also can leverage Securonix SearchMore community-powered threat hunting to search for threats in real-time, streaming data across multiple tenants and deliver managed threat hunting services to their customers.
Other Securonix Fuel features include:
• Professional services
• Tiered pricing
• Onboarding and sales support
In addition, Securonix will increase partner support resources this year, said David Wagner, VP of the company’s MSSP business.
This will ensure that Securonix can help MSSPs and MDR providers meet the rising demand for SIEM services.
Link: https://www.msspalert.com/cybersecurity-companies/partner-programs/securonix-siem-updates-global-mssp-mdr-program/?utm_medium=email&utm_source=sendpress&utm_campaign
Bugcrowd adds two industry executives to advisory board
Help Net Security
Bugcrowd announced the addition of two board advisory members, Norma Lane, chief human resources officer and executive vice president of people and places at Infoblox, and Dave Gerry, chief revenue officer and head of global operations at WhiteHat Security, a wholly-owned, independent subsidiary of NTT.
Link: https://www.helpnetsecurity.com/2020/09/10/bugcrowd-adds-two-industry-executives-to-advisory-board/
OEM Security Newsalert – 27-Oct-2019
Check Point Revamps Small and Medium Businesses Security to Protect from the Most Advanced Cyber Attacks
Nasaq Globe Newswire
EIN News
/EIN News/ — SAN CARLOS, Calif., Oct. 17, 2019 (GLOBE NEWSWIRE) — Check Point® Software Technologies Ltd. (NASDAQ: CHKP), a leading provider of cyber security solutions globally, announced the release of the new 1500 series security gateways for SMBs.
The two new SMB appliances set new standards of protection against the most advanced fifth-generation cyberattacks, and offer unrivalled ease of deployment and management.
The 1550 and 1590 gateways are powered by Check Point’s R80 release.
R80 is the industry’s most advanced security management software, and includes multi-layered next-generation protection from both known threats and zero-day attacks using the award-winning SandBlast™ Zero-Day Protection, plus antivirus, anti-bot, IPS, app control, URL filtering and identity awareness.
ffective May 30th, 2020, Check Point will cease to sale the following security gateway models: 730, 750, 770, 790, 1430, 1450, 1470 and 1490 wired and wireless (excluding VDSL).
Link: https://software.einnews.com/pr_news/499529696/check-point-revamps-small-and-medium-businesses-security-to-protect-from-the-most-advanced-cyber-attacks?n=2&code=oFvCCJC2r-jYysMo&utm_source=NewsletterN
How BlackBerry Used Improv Comedy To Make Cybersecurity A More ‘Human’ Topic
Marty Swant
Forbes
BlackBerry wants to make data breaches a laughing matter.
To illustrate how even the smartest and most capable employees can make accidental mistakes that put sensitive information at risk, the Canadian company is taking a more “human” approach to the serious subject of cybersecurity.
It’s not that Mark Wilson–who’s been CMO of the brand since 2017–doesn’t take threats lightly.
Rather, he said an overwhelming majority of customers surveyed viewed their own staff as more of an accidental threat than an outside hacker.
According to research conducted by BlackBerry, 94% of chief security officers and other executives don’t trust their own employees with critical information.
In fact, 72% suspected their employees were working around existing security measures. (For example, BlackBerry found that a nurse at a hospital sent X-ray images to a doctor via Snapchat because she was locked out of the company’s software.)
To promote its own security software, BlackBerry—which has pivoted from its earlier smartphone-making days to enterprise tech made for the era of self-driving cars and the Internet of Things—decided to humanize accidental errors.
But instead of just passing a brief over to an creative agency to come up with a TV spot and some billboards or print ads, Blackerry worked with Oakland-based Funworks to hire improv comedians to create a campaign alongside BlackBerry teams ranging from marketing and tech to sales.
The goal: to translate the technical side of security to something more relatable.
“The key to this is how do you evoke emotion into something that can be at times a very dry topic,” Wilson says. “That’s kind of the fun of what we do.
How do you break through a sea of sameness with something that’s an evolutionary or provocative point of view and that’s a very human point of view?”
Link: https://www.forbes.com/sites/martyswant/2019/10/18/how-blackberry-used-improv-comedy-to-make-cybersecurity-a-more-human-topic/#4ec87b51cf5a
Zscaler: Time To Buy
Stefan Ong
Seeking Alpha
Summary
Zscaler has fallen roughly 46% since its 52-week high.
The stock has grown strongly with revenue growth rates above 50% for the past three years.
Moreover, Zscaler is undervalued by 9.5% based on my estimates.
Link: https://seekingalpha.com/article/4296361-zscaler-time-buy
Apollo Global in rumoured $5bn takeover bid for Tech Data
Doug Woodburn
Channel Partner Insight
Tech Data’s shares have spiked following a report that it is the subject of a near $5bn (€4.53bn) takeover approach.
According to a report today by Reuters, private equity firm Apollo Global Management is offering to pay about $130 a share for the global distribution giant.
It cited “people familiar with the matter”.
Tech Data’s shares have hiked 14 per cent in after-hours trading this evening.
Apollo was linked with a $7.5bn bid for Tech Data’s arch-rival Ingram late last year.
Link: https://www.channelpartnerinsight.com/channel-partner-insight/news/3082668/apollo-global-in-rumoured-usd5bn-takeover-bid-for-tech-data?utm_medium=email&utm_content=&utm_campaign=Channel%20Partner%20In
The software-defined rebirth of the load balancer
Frank J. Ohlhorst
Channel Partner Insight
Software-defined technologies have quickly transformed traditional WAN optimization solutions and load balancers into solutions now referred to as application delivery controllers (ADCs).
ZK Research revealed that software defined technologies, along with cloud native applications, are being deployed more frequently, with 50 percent of UK businesses and 29 percent of US businesses expecting to move over half of their applications into the cloud within the next 12 months.
It’s a transformation that ZK expects to have a profound impact on the ADC Market.
According to ZK Research, F5 and Citrix are the most commonly used ADCs by today’s businesses, yet ZK opines that cloud native ADCs are beginning to show strength as applications transform into cloud-based entities.
Forrester’s Application Experience (AX) for Asia Pacific Enterprises in Multi-cloud Environments report reveals that 84 percent of CIOs in APAC believe that a multi-cloud deployment will constitute up to half of their web and application hosting environment in the next three years.
Link: https://www.channelpartnerinsight.com/channel-partner-insight/analysis/3082956/the-death-of-the-load-balancer-is-the-adc-market-primed-for-a-revolution?utm_medium=email&utm_content=&utm_campaign=Chann
Nutanix and the ‘messy middle’ of the subscription software model
Ohn Leonard
Computing
Moving to a new licensing model always carries a degree of risk.
For hyperconvergence vendor Nutanix, the change to a subscription software vendor was more radical than for the many software vendors that have taken that route, in that Nutanix went public three years ago as a hardware vendor.
It is, perhaps, the only enterprise vendor to go directly from hardware to subscription software, according to VP investor relations Tonya Chin.
The company moved to the software subscription model two years ago and finally stopped selling hardware appliances altogether in 2018.
Speaking at a media briefing during the .NEXT event in Copenhagen this month, Chin put the dip down to a number of factors.
First, revenues for a three-year subscription contract will be realised three years later with than an equivalent up-front deal, so in the short-term income will inevitably decline.
Chin forecasts that company will get through its ‘messy middle’, becoming a fully-fledged subscription software company within the next two years.
Link: https://www.computing.co.uk/ctg/news/3083008/nutanix-and-the-messy-middle-of-the-subscription-software-model?utm_source=Adestra&utm_medium=email&utm_content=&utm_campaign=CTG.Daily_RL.EU.A.U&im_edp=14
French VAR looks to triple revenues to €1bn through M&A
Josh Budd
Channel Partner Insight
French VAR C’PRO is aiming to hit €1bn revenues by 2025 as part of an M&A strategy which will see it acquire 10 competitors every year.
Print provider C’PRO merged with IT services firm Quadria at the start of 2018 to create a €300m-revenue entity with 1,000 employees.
Through acquiring Quadria, C’PRO, which claims to be Canon’s and Toshiba’s number one print partner in Europe, has now moved beyond its print provider roots into new areas of IT, including reselling PCs and infrastructure, systems integration, managed services, cloud, security and telco services.
Link: https://www.channelpartnerinsight.com/channel-partner-insight/news/3082869/french-var-looks-to-triple-revenues-to-eur1bn-through-m-a?utm_medium=email&utm_content=&utm_campaign=Channel%20Partner%20Insi
Global Software-Defined Perimeter (SDP) Market key Insights Based on Product Type, End-use and Regional Demand Till 2025
Market Watch
Oct 21, 2019 (AmericaNewsHour) — The Global Software-Defined Perimeter (SDP) Market was valued at USD 998.26 million in 2016 and is projected to reach USD 15,077.28 million by 2025, growing at a CAGR of 35.21% from 2017 to 2025.
Competitive Landscape:The major players in the market are as follows:
1. Cisco Systems, Inc.
2. Catbird Networks, Inc.
3. Intel Corporation
4. Symantec Corporation
5. Check Point Software Technologies Ltd.
6. Certes Networks, Inc.
7. EMC RSA
8. Palo Alto Networks, Inc.
9. Fortinet, Inc.
10. Juniper Networks, Inc.
These major players have adopted various organic as well as inorganic growth strategies such as mergers & acquisitions, new product launches, expansions, agreements, joint ventures, partnerships, and others to strengthen their position in this market.
Link: https://www.marketwatch.com/press-release/global-software-defined-perimeter-sdp-market-key-insights-based-on-product-type-end-use-and-regional-demand-till-2025-2019-10-21
Avast says hackers breached internal network through compromised VPN profile
Catalin Cimpanu
ZD Net
Czech cyber-security software maker Avast disclosed today a security breach that impacted its internal network.
In a statement published today, the company said it believed the attack’s purpose was to insert malware into the CCleaner software, similar to the infamous CCleaner 2017 incident.
Avast said the breach occurred because the attacker compromised an employee’s VPN credentials, gaining access to an account that was not protected using a multi-factor authentication solution.
Baloo said Avast intentionally left the compromised VPN profile active, with the purpose of tracking the attacker and observing their actions.
This lasted until October 15, when the company finished auditing previous CCleaner releases, and pushed out a new clean update.
Link: https://www.zdnet.com/article/avast-says-hackers-breached-internal-network-through-compromised-vpn-profile/
Proofpoint Announces Third Quarter 2019 Financial Results
Nasdaq Globe Newswire
EIN News
Total revenue of $227.4 million, up 23% year-over-year
Billings of $277.8 million, up 26% year-over-year
GAAP EPS of $(0.79) per share, Non-GAAP EPS of $0.49 per share
Operating cash flow of $68.6 million and free cash flow of $58.6 million
Increasing FY19 revenue and profitability guidance
Link: https://software.einnews.com/pr_news/500248740/proofpoint-announces-third-quarter-2019-financial-results?n=2&code=oFvCCJC2r-jYysMo&utm_source=NewsletterNews&utm_medium=email&utm_campaign=Targeted+Thre
Trustwave Unveils Government, Enterprise Security Testing Services
Dan Kobialka
MSSP Alert
Trustwave, a Top 200 MSSP for 2019, has launched Trustwave Security Testing Services to help government agencies and enterprises leverage security scanning and testing capabilities across their IT environments.
Trustwave Security Testing Services provide access to a catalog of scanning and testing services and security personnel that can be scaled as required, according to the company.
They are built on the Trustwave Fusion cloud-based cybersecurity platform and offer a variety of security scanning and testing capabilities, including:
• Network and application scanning scheduling and execution.
• Security tests led by Trustwave SpiderLabs.
• Risk analysis.
Link: https://www.msspalert.com/cybersecurity-companies/mssps/trustwave-testing-services/?utm_medium=email&utm_source=sendpress&utm_campaign
Atos Acquires Identity Management
Dan Kobialka
MSSP Alert
Atos, a Top 200 MSSP for 2019, has finalized its acquisition of European digital identity infrastructure management provider IDnomic.
The news comes after Atos in July announced that it had entered into exclusive negotiations to acquire IDnomic.
More than 100 IDnomic digital identity specialists are joining Atos’s cybersecurity team as part of the acquisition, the companies said.
In addition, the IDnomic acquisition could help Atos extend its reach in the global identity and access management (IAM) and public key infrastructure (PKI) solutions markets.
Global IAM solutions market revenues are expected to increase at a compound annual growth rate (CAGR) of 13.1 percent between 2018 and 2025 and could be worth $24.1 billion by 2025, industry analyst Grand View Research stated.
Furthermore, the global PKI solutions market is projected to expand at a CAGR of 15.1 percent between 2019 and 2024 and could be worth $3.6 billion by 2024, industry analyst MarketsandMarkets indicated.
Link: https://www.msspalert.com/cybersecurity-companies/mssps/atos-buys-idnomic/?utm_medium=email&utm_source=sendpress&utm_campaign
Accenture Acquires Happen for Digital Transformation Services
Ty Trumbull
CHANNEL e2e
Accenture is pushing forward with its rampant acquisition plan.
This time, the global systems integrator purchased London, England-based innovation firm Happen for an undisclosed sum.
The deal bolsters Accenture’s front-end innovation and analytics capabilities to help customers generate new ideas, products, and services, the company asserts.
Happen, founded in 2007, works with companies primarily in the consumer goods, food & beverage, retail, and life sciences industries.
The firm’s key skills include consumer insights and product and service innovation.
Link: https://www.channele2e.com/investors/mergers-acquisitions/accenture-buys-happen/?utm_medium=email&utm_source=sendpress&utm_campaign
Trend Micro has acquired Cloud Conformity, a software platform that helps partners and customers to spot and mitigate cloud security misconfigurations across Amazon Web Services (AWS), Microsoft Azure and Google Cloud Platform (GCP).
Joe Panettieri
MSSP Alert
OpenText late on October 18 released a statement saying that it was not considering a potential acquisition of Micro Focus.
The statement surfaced after Bloomberg speculated a deal may be brewing.
Micro Focus shares rose nearly 7 percent today amid the takeover rumors on October 18.
The snuffed-out takeover rumors follow chatter in September 2019 that suggested private equity firms may want to acquire Micro Focus’s Arcsight and Fortify security software units, according to DealReporter sources.
At the time, interested parties apparently included Carlyle, Veritas and KKR.
All of Cloud Conformity’s employees — including 50 developers and engineers — will join Trend Micro.
Cloud Conformity, founded in 2016, has 100-plus customers and offices in Sydney, Australia; Dallas, Texas; London, United Kingdom; Montreal, Canada and Singapore.
Financial terms of the deal and specific revenue figures for Cloud Conformity were not disclosed.
Link: https://www.msspalert.com/investments/trend-micro-acquires-cloud-conformity/?utm_medium=email&utm_source=sendpress&utm_campaign
Radiflow and Asset Guardian Introduce Joint Solution to Enrich Industrial Asset Monitoring and Risk Assessment English T
Cision PR Newswire
MAHWAH, New Jersey and LIVINGSTON, Scotland, Oct. 21, 2019 /PRNewswire/ — Radiflow, a leading provider of cybersecurity solutions for industrial automation networks, and Asset Guardian, a dedicated provider of leading edge protection for process control and industrial software, today jointly announced that the two companies have launched a joint solution to expand industrial asset monitoring, change management and risk assessment capabilities for industrial enterprises.
In this new integrated solution, iSID’s asset inventory now incorporates the asset information stored in the Asset Guardian database, including the detailed asset information that is not available from traffic monitoring.
With this new detailed asset information from Asset Guardian, such as logic version, ownership, geo-location and more, the result is a far more granular risk score calculated by iSID for each asset.
Changes to assets, such as new firmware or PLC logic, are detected on the network in real-time by iSID and sent to Asset Guardian for verification, authorization and validation against the ‘golden image’ of the binary stored in the Asset Guardian database.
Link: https://www.prnewswire.com/news-releases/radiflow-and-asset-guardian-introduce-joint-solution-to-enrich-industrial-asset-monitoring-and-risk-assessment-300941791.html
Upstream Security raises $30 million to protect connected cars from cyberattacks
Paul Sawers
Venture Beat
Upstream Security, a cloud-based cybersecurity platform for connected cars, has raised $30 million in a series B round of funding led by Alliance Ventures, an automotive alliance constituting Renault, Mitsubishi, and Nissan.
Volvo Group, Hyundai, CRV, Glilot Capital, Maniv Mobility, and Nationwide also participated in the round.
The connected car market was pegged at $63 billion in 2017, a figure that could rise to more than $200 billion by 2025.
ounded in 2017, Upstream Security is adopting a “multi-layer” approach to protecting connected cars and the underlying network infrastructure.
Its C4 platform integrates with automotive data streams of vehicles and promises to detect incidents as they happen in real time, allocating a rating based on perceived impact and severity.
Link: https://venturebeat.com/2019/10/21/upstream-security-raises-30-million-to-protect-connected-cars-from-cyber-attacks/
Upstream Security raises $30 million to protect connected cars from cyberattacks
Paul Sawers
Venture Beat
Upstream Security, a cloud-based cybersecurity platform for connected cars, has raised $30 million in a series B round of funding led by Alliance Ventures, an automotive alliance constituting Renault, Mitsubishi, and Nissan.
Volvo Group, Hyundai, CRV, Glilot Capital, Maniv Mobility, and Nationwide also participated in the round.
The connected car market was pegged at $63 billion in 2017, a figure that could rise to more than $200 billion by 2025.
ounded in 2017, Upstream Security is adopting a “multi-layer” approach to protecting connected cars and the underlying network infrastructure.
Its C4 platform integrates with automotive data streams of vehicles and promises to detect incidents as they
OEM IT Security News – 28-Jul-2019
5 best practices to choose the right email security software
Karen Scarfone
Tech Target – Security
Examine the five best practices and most important criteria for evaluating email security software products and deploying them in your enterprise.
How advanced are basic security functions?
organization should look for more advanced antivirus, antispam and antiphishing technologies.
What other security features do email security gateways offer?
For many organizations, especially larger enterprises, these additional functions are irrelevant, because the organization already has enterprise DLP and email encryption capabilities.
But for organizations without these capabilities, adding DLP and email encryption options to an email security gateway — often for an additional fee — can be a cost-effective and streamlined way to add these capabilities to the enterprise.
How usable and customizable are the management features?
Although organizations may not want to spend significant time customizing their email security gateways, doing so can improve detection capabilities, as well as enhance the management process itself by customizing administrator dashboards, gateway reports and other aspects of the gateway.
What are the typical false positive and negative rates?
Since each email security gateway uses several detection techniques in parallel with each other, it's not generally helpful to report overall false positive and negative rates for the entire gateway.
Instead, vendors provide typical rates for each threat type — spam detection, malware detection and phishing detection, among others.
Are email messages or attachments processed or stored in an external system?
Transferring email to an external server for processing or storage may be an unacceptable risk for some organizations, particularly if gateways are analyzing internal email messages.
This could cause the email security gateway vendor to access sensitive data and inadvertently or intentionally expose it to breach.
Similarly, if the vendor's server is compromised, the sensitive data could be compromised as well.
Link: https://searchsecurity.techtarget.com/feature/Five-criteria-for-selecting-an-email-security-gateway-product
Proofpoint Drives People-centric Innovation with Two Industry-Firsts: Enhanced URL Isolation Based on User Risk Profiles and New Training Customization
Nasdaq Globe Newswire
EIN News
/EIN News/ — SUNNYVALE, Calif., July 22, 2019 (GLOBE NEWSWIRE) — Proofpoint, Inc., (NASDAQ: PFPT), a leading cybersecurity and compliance company, today announced two people-centric innovations that enhance how organizations protect their most attacked people from malicious URLs, while increasing the effectiveness of security awareness training content.
In an industry-first, Proofpoint’s newly announced adaptive security controls can dynamically isolate URL clicks in corporate email and cloud collaboration URLs based on the risk profile of the recipient, as well as the riskiness of the URL itself.
These security controls are integrated with Proofpoint’s award-winning Targeted Attack Protection (TAP) intelligence.
These people-centric innovations are featured in both Proofpoint Email Isolation, which isolates both links in corporate email and personal webmail, and Proofpoint Browser Isolation, which isolates risky browsing behavior on corporate devices for all websites.
Both products leverage Proofpoint Isolation technology, which fetches content and executes it within Proofpoint’s cloud, while allowing the user to view a safely mirrored image of the site, assuming zero trust of all content.
Each solution also enables isolated use of cloud collaboration tools such as Dropbox and Microsoft SharePoint to help dramatically lower an organization’s attack surface.
Both Proofpoint Browser Isolation and Email Isolation integrate critical Proofpoint Targeted Attack Protection intelligence to help security teams detect, mitigate, and block advanced threats that target users through email.
In addition to blocking attacks that leverage malicious attachments and URLs, TAP also detects threats and risks in cloud applications.
The Proofpoint Attack Index within TAP provides organizations with visibility into their most targeted users based on four factors: threat actor sophistication, spread and focus of attack targeting, type of attack, and overall attack volume.
Link: https://software.einnews.com/pr_news/491352371/proofpoint-drives-people-centric-innovation-with-two-industry-firsts-enhanced-url-isolation-based-on-user-risk-profiles-and-new-training?n=2&code=oFvCCJC
Frost & Sullivan Names Luminati the 2019 Global Market Leader in the Enterprise IP Proxy Networks Market
OA Online
Luminati, the Israeli company that allows businesses to experience the web through the eyes of individual consumers throughout the world, today announced it has received a Market Leadership Award in the first independent analysis of the sector.
Luminati’s enterprise IP proxy network (IPPN) services for global retailers, brand owners and advertising networks feature strongly in the report by analyst firm Frost & Sullivan.
The report outlines a relatively new, but rapidly growing market and recognizes Luminati’s leading position in the provision of solutions that are increasingly important for businesses to remain competitive and compliant in the digital landscape. [S1]
“ The market for enterprise IP proxy network solutions is in its early growth stages, basically being invented by Luminati only a few years ago.
With the more specialized targeting of customers by demographics and location, companies are finding it more difficult than ever to do competitive analysis and verify advertising, security, and website performance.
Companies not familiar with these website practices or Internet Protocol proxy network (IPPN) solutions are at risk of gathering incorrect data and left behind technology-wise,” noted Robert Cavin, Industry Analyst, Digital Media, Frost & Sullivan.
Frost & Sullivan’s report names Luminati the 2019 global market leader in the Enterprise IP Proxy Network market, and acknowledges how the company has revolutionized the technology through its residential peer-to-peer network.
What’s more, the analysis identifies Luminati’s technical leadership and strict adherence to compliance procedures as factors that will likely cement the company’s leadership position over the coming years.
The top five use cases for enterprise IPPN by revenue (2018) are:
▪ Price comparison
▪ Ad verification
▪ Fraud protection
▪ Data collection
▪ Brand protection
Link: https://www.oaoa.com/news/business/article_8cbd1f76-f158-503e-869d-c81573fa29f2.html
WatchGuard Speeds Zero Day Malware Breach Detection from Months to Minutes
Nasdaq Globe Newswire
EIN News
WatchGuard® Technologies, a global leader in network security and intelligence, secure Wi-Fi and multi-factor authentication, today announced a series of major updates to its threat correlation and response platform, ThreatSync, with latest release of Threat Detection and Response (TDR).
These enhancements include accelerated breach detection, network process correlation and AI-powered threat analysis, enabling managed service providers (MSPs) and the organizations they support to reduce breach detection and containment timeframes from months to minutes, automate the remediation of zero day malware and better defend against targeted, evasive threats both inside and outside the network perimeter.
According to the Ponemon Institute, the mean time to identification (MTTI) for a security breach is 197 days, while the mean time to containment (MTTC) is another 69 days after initial detection.
In Q1 2019 alone, zero day malware capable of escaping traditional antivirus (AV) solutions accounted for a massive 36% of threats, according to WatchGuard’s latest Internet Security Report.
With each passing day a security threat goes unnoticed, its potential to inflict both financial and reputational harm on an organization increases drastically.
Key ThreatSync features now available via TDR include:
Host Containment and Automated Response
Accelerated Breach Detection
Network Process Correlation
Artificial Intelligence Analysis
Link: https://software.einnews.com/pr_news/491429092/watchguard-speeds-zero-day-malware-breach-detection-from-months-to-minutes?n=2&code=1hzWYhpPFpH-t3yN&utm_source=NewsletterNews&utm_medium=email&utm_campa
Bitdefender upgrades to deal with malware, privacy and child safety
Sam Varghese
IT Wire
In a statement, the company said the Bitdefender 2020 series of products introduced browser anti-tracking for both Windows and macOS.
This would list all trackers behind any website visited and would allow an user to switch off the trackers and control the information that companies and third parties could compile obtain.
A second new feature, Microphone Monitor, reinforced Bitdefender’s existing Web cam protection, blocking unauthorised access to the user’s microphone.
Also due for launch is the first real-time protection for iOS, to block phishing scams.
No matter the browser, this feature will block transmission of any personal information such as credit card details or social security numbers.
Link: https://www.itwire.com/security/bitdefender-upgrades-to-deal-with-malware,-privacy-and-child-safety.html
SonicWall CEO on McAfee IPO rumours and Symantec's possible sale
Nima Green
CRN
Conner was speaking as rumours of a Broadcom's possible takeover of Symantec continue to swirl, while McAfee is reportedly eyeing up an IPO.
CrowdStrike, meanwhile, recently exceeded analyst expectations when its valuation soared after going public.
"I think security is hot," Conner said. "There's a lot of money at play.
And look at the data: the threat landscape is getting very, very real.
On McAfee, he added: "McAfee is the latest example of change in the market: they were private, they went public, they got bought up strategically, they went private, and now they're going to IPO.
"So, IPOs now are the whole way to monetise yourself if you've got a stable business.
"The question is whether it will consummate as a true IPO, or whether they'll get bought at the last minute by private equity.
That's a financial play that's playing out, because to maximise the value they get, a lot of PEs don't want to buy right now because security is becoming a premium in the market.
Since Dell divested SonicWall by selling up to PE firms Francisco Partners and Elliott Management in 2016, Conner says it has built its partner base from zero to 18,700.
He said that as the vendor is increasingly turning its eye to the public sector and enterprise customers, some of its partners are specialising to match that focus.
Link: https://www.channelweb.co.uk/crn-uk/news/3079499/sonicwall-ceo-on-mcafee-ipo-rumours-and-symantecs-possible-sale
Long-time LogRhythm CEO Grolnick out in favour of new blood
Marian Mchugh
CRN
LogRhythm has appointed Mark Logan as its new CEO, replacing Andy Grolnick.
In its announcement of the news, the security information and event management (SIEM) vendor made no mention of Grolnick or why he was leaving the 16-year-old company he has headed since 2005.
Logan (pictured) comes to LogRhythm from his role as president of data management solutions at vendor Attunity.
He has also served as CEO of WealthEngine, a data-driven consumer analytics business; and Rivermine, a business analytics company.
His appointment seems to be effective immediately as he is billed as CEO on the company's website, though Grolnick's own LinkedIn account still has him listed as chief exec.
The recent shuffle has seen Sue Buck appointed senior vice president of engineering and Barry Capoot installed as chief financial officer.
Link: https://www.channelweb.co.uk/crn-uk/news/3079562/long-time-logrhythm-ceo-grolnick-out-in-favour-of-new-blood?utm_medium=email&utm_content=&utm_campaign=CRN.SP_01.Daily_RL.EU.A.U&utm_source=CRN.DCM.Edi
Check Point Introduces Record Breaking Security Gateways
Nasdaq Globe Newswire
EIN News
/EIN News/ — SAN CARLOS, Calif., July 24, 2019 (GLOBE NEWSWIRE) — Check Point® Software Technologies Ltd. (NASDAQ: CHKP), a leading provider of cyber security solutions globally, today announced two new high-end appliances optimized for data center and Telco environments.
Check Point announces three new security gateway appliance models: 16000 Base, 16000 Plus and the record breaking 26000 Turbo are extensions of Check Point’s new gateway appliance series 16000 and 26000 which were introduced in June, presenting a complete line of high-end appliances with up to 64 networking interface, 16 100 GbE (Giga-bit-Ethernet) or 40 GbE.
Powered by the Check Point Infinity architecture, the 16000 and 26000 Security Gateways incorporate Check Point’s ThreatCloud and award-winning SandBlast™ Zero-Day Protection.
These modular gateways come in base, plus and turbo models, delivering up to 30 Gbps of Gen V Threat Prevention security throughput.
Link: https://software.einnews.com/pr_news/491573805/check-point-introduces-record-breaking-security-gateways?n=2&code=oFvCCJC2r-jYysMo&utm_source=NewsletterNews&utm_medium=email&utm_campaign=Targeted+Threa
Mimecast Is Likely To Break Out On The Upside
Seeking Alpha
Summary
The company's platform is increasingly sophisticated and sticky, opening new revenue streams, so we expect growth to continue to be brisk.
The figures are plagued by currency headwinds but underlying growth is good and operational leverage is kicking in.
The company generates considerable cash flows and the shares are not exorbitantly valued.
Link: https://seekingalpha.com/article/4276921-mimecast-likely-break-upside
Kaspersky launches its 2020 range with traffic encryption and scanning speed improvements
Chris Wiles
Beta News
Kaspersky has officially launched its 2020 edition, but only in certain territories.
Localized builds such as the English GB or German edition will follow in August (but there’s nothing stopping you installing the worldwide edition available in 'US English').
What’s new in 2020.
Expect to find 'enhanced security' (which we’d expect to find by default, to be fair) which now includes protection against the latest threats, including EternalBlue.
RATs support is now included.
This is protection against remote access tools which are used by support companies but often used by fraudsters to obtain access to your computer.
With the 2020 edition, RATs are now blocked by default and you can only choose whether to grant access by switching off the RATs module.
This could become rather confusing for a novice user who requires genuine remote access support.
If you’re a Mac user, Kaspersky for Mac 2020 now includes a dark theme (but we’re confused why the Windows version doesn’t include a dark mode), while Safe Money will check external drives once they are connected to your Mac.
Lastly, Kaspersky states the entire 2020 range sees significant performance enhancements, where users can expect to see a speed increase of 15 percent across platforms.
Mac application scanning has improved by 50 percent.
Link: https://betanews.com/2019/07/26/kaspersky-2020/
Barracuda Increases Requirements and Benefits for Top-Tier Partners
Rich Freeman
Channel Pro Network
Barracuda Networks has revamped its partner program to deliver more benefits to top-tier partners while simultaneously raising the requirements to qualify for those rewards.
The changes, which have been rolled out to Barracuda’s channel in recent days, come in response to rapid cloud computing adoption among businesses of all sizes.
Securing cloud-based systems calls for capabilities that many traditional resellers lack at present, according to Ezra Hookano, Barracuda’s vice president of channels.
Under the new tiering scheme, partners will have to clear a higher sales revenue bar to qualify for top-level status.
They will also have to earn a competency in email security, public cloud security, or data and network application security.
Partners who meet those heightened prerequisites will receive extra benefits in return.
Most top-tier partners will see margins rise 10 to 30%, predicts Hookano, who expects roughly 200 Barracuda partners to retain top-level status in the program, versus approximately 1,200 before.
The new rules and requirements do not apply to managed service providers who partner with Barracuda through its Barracuda MSP division. “Our current MSP program is working fine,” Hookano says. “MSPs are already providing the correct service levels, so that program will not change.”
Link: https://www.channelpronetwork.com/news/barracuda-increases-requirements-and-benefits-top-tier-partners
NSS Labs test exposes weaknesses in NGFW products
Help Net Security
NSS Labs announced the results of its 2019 NGFW Group Test.
Twelve of the industry’s NGFW products were tested to compare NGFW product capabilities across multiple use cases.
Products were assessed for security effectiveness, total cost of ownership (TCO), and performance.
Test results showed that block rates for simple clear-text attacks remain strong (over 96%) for nine out of twelve products.
However, while known/published exploits were frequently blocked, test engineers were able to bypass protection in all devices with minor modifications to known and blocked exploits.
Key takeaways
• Enterprises expect when they purchase products that they will remain viable over multiple years.
• While it is tempting to draw conclusions from one test, NSS Labs recommends enterprises favor vendors that consistently engage and improve over time.
• Scripting evasions are challenging for NGFWs since they require real-time code analysis in order to determine whether a function is legitimate or obfuscating an attack.
• Vendor claims to protect vulnerabilities (regardless of the exploit specifics) are largely dependent on the nature of the vulnerability and whether it lends itself to such protection.
Test results found all products had room for improvement when confronted with unknown variants of known exploits.
• Research indicates that over 70% of Internet traffic is encrypted using TLS/SSL.
NSS Labs recommends measuring the performance of devices both with and without TLS/SSL enabled.
Failure to do so could result in unexpected performance bottlenecks.
Link: https://www.helpnetsecurity.com/2019/07/19/nss-labs-2019-ngfw-group-test/
CyberArk enhances its portfolio of SaaS offerings for privileged access security
Help Net Security
CyberArk announced groundbreaking new services and enhancements to the industry’s most complete portfolio of Software-as-a-Service (SaaS) offerings for privileged access security.
CyberArk Alero is a dynamic solution for mitigating risks associated with remote vendors accessing critical systems through CyberArk.
CyberArk Alero also improves operational efficiencies and productivity by making it simple and easy for organizations to provision and manage remote vendor access.
This new SaaS-based offering provides Zero Trust access for remote vendors connecting to the CyberArk Privileged Access Security Solution for complete visibility and control of privileged activities.
Just-in-time elevation and access with CyberArk Endpoint Privilege Manager – CyberArk Endpoint Privilege Manager is an industry leading SaaS-based solution that reduces the risk of unmanaged administrative access on Windows and Mac endpoints.
With Endpoint Privilege Manager’s new just-in-time capabilities, organizations can mitigate risk and reduce operational friction by allowing admin-level access to Windows and Mac endpoints on-demand for a specific period of time with a full audit log and the ability to revoke access as necessary.
Link: https://www.helpnetsecurity.com/2019/07/19/cyberark-saas-portfolio/
Cisco in talks to acquire security startup Signal Sciences
Gina Narcisi
CRN
Five-year-old Signal Sciences is a web application security company that develops software to protect applications running in private data centres and in the cloud.
The startup has raised a total of US$61.7 million in funding over four rounds, according to Crunchbase.
In February, the company raised US$35 million in funding led by growth equity firm Lead Edge Capital with participation from previous investors including CRV, Index Ventures, Harrison Metal, and OATV.
Link: https://www.crn.com.au/news/cisco-in-talks-to-acquire-security-startup-signal-sciences-528525
Avnet appoints Max Chan as CIO
Help Net Security
Avnet, a leading global technology solutions provider, announced the promotion of Max Chan to Chief Information Officer (CIO), reporting to MaryAnn Miller, Chief Administrative Officer.
Chan has been serving as the head of global information solutions (GIS) within Avnet since November 2018.
Link: https://www.helpnetsecurity.com/2019/07/22/avnet-cio/
ESET unveils new version of File Security for Linux
Help Net Security
ESET File Security for Linux is powered by the latest ESET LiveGrid technology and eliminates all types of threats, including viruses, rootkits, worms and spyware.
Version 7.0 offers a host of advanced features, including real-time file system protection, tighter security and a real-time web graphical user interface (GUI).
Additionally, ESET File Security is fully compatible with the ESET Security Management Center and allows you to manage the software through a web interface, giving you the option to schedule on-demand scans, actions and security tasks.
Link: https://www.helpnetsecurity.com/2019/07/23/eset-file-security/
ThetaRay 4.0 With IntuitiveAI Gives Banks a Powerful New Weapon Against Financial Cybercrime
Cision PR Newswire
Yahoo – Finance
NEW YORK, July 23, 2019 /PRNewswire/ — ThetaRay, a leading provider of AI-based Big Data analytics, today announced Version 4.0 of the company's namesake advanced analytics platform.
The update includes major capability upgrades to help global banks detect and prevent financial cybercrime.
ThetaRay's IntuitiveAI solutions replicate the powerful decision-making capabilities of human intuition to detect "unknown unknowns" that cannot be identified by first-generation AI or legacy products.
Version 4.0 provides a new hybrid learning approach.
The hybrid supervised/unsupervised learning capability integrates the two learning styles and applies the most effective one based on use case.
This approach finds significantly more potential threats through a single process and delivers a holistic view of a bank's threat landscape.
The new release also provides an additional method for anomaly clustering, which is a critical enabler to accurately detect more true positives while dramatically decreasing the number of false positive alerts.
In version 4.0, customers can now cluster identified anomalies by pattern, in addition to a density-clustering approach.
This clustering method ensures that AML and fraud teams have the right approach to analyze anomalous events with the method most applicable to a particular use case.
The addition of pattern-based clustering also enhances the built-in transparency and explainability of ThetaRay's "white box" AI applications.
Link: https://finance.yahoo.com/news/thetaray-4-0-intuitiveai-gives-000000610.html
Global Cyber Security Market Analysis 2019-2026: Market is Expected to Reach $345.42 Billion
Nasdaq Globe Newswire
Dublin, July 24, 2019 (GLOBE NEWSWIRE) — The "Global Cyber Security Market Analysis 2019" report has been added to ResearchAndMarkets.com's offering.
The Global Cyber Security market is expected to reach $345.42 billion by 2026 growing at a CAGR of 12.3% during 2018 to 2026
Factors such as rise in malware and phishing threats, and growth in adoption of IoT and BYOD trend among organizations, are driving the cyber security industry growth.
However, the Limited security budget among SMEs is restraining the market.
Link: https://www.globenewswire.com/news-release/2019/07/24/1887360/0/en/Global-Cyber-Security-Market-Analysis-2019-2026-Market-is-Expected-to-Reach-345-42-Billion.html
Bitdefender Browser Isolation defeats attacks by monitoring memory for attack techniques
Help Net Security
The security employed by Bitdefender Browser Isolation leverages unique capabilities of Citrix Hypervisor.
Only Bitdefender takes advantage of this security approach, known as Bitdefender Hypervisor Introspection, to monitor the raw memory of running Citrix Virtual Apps servers, including web browsers hosted on the servers.
The security requires no footprint in protected Virtual Apps servers to identify attack techniques used to exploit both known and unknown vulnerabilities in web browsers and their associated plugins.
Link: https://www.helpnetsecurity.com/2019/07/24/bitdefender-browser-isolation/
Greenbone Security Feed detects and protects against more than 70,000 vulnerabilities
Help
OEM Security News – 22-Apr-2018
Table of Contents Teramind Prevents Insider Threats Combining New Data Loss Prevention Features with User Behavior Analytics & Forensic Insights Symantec Analytics Enables Customers to Uncover the Most Dangerous Cyber Attacks 1Cisco Fights Malware, Email Intrusions with New Services Cybersecurity Companies Demo Support for STIX and TAXII Standards for Automated…