{"id":1587,"date":"2009-12-14T00:00:00","date_gmt":"2009-12-14T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2009\/12\/14\/breach-security-releases-webdefend-global-event-manager\/"},"modified":"2021-12-30T11:39:39","modified_gmt":"2021-12-30T11:39:39","slug":"breach-security-releases-webdefend-global-event-manager","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2009\/12\/14\/breach-security-releases-webdefend-global-event-manager\/","title":{"rendered":"Breach Security releases WebDefend Global Event Manager"},"content":{"rendered":"<p>Breach Security has released WebDefend Global Event Manager that works in conjunction with the new web application firewall service offered by Akamai Technologies.  When deployed with Akamai&#8217;s web application firewall service, the WebDefend Global Event Manager defends against global application security threats by enabling customers to make distributed cloud and data centre defense-in-depth architectures operational, the company said.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The new offering is designed to work in concert with Akamai&#8217;s offering across joint customers&#8217; web environments in real-time to detect and block attacks, prevent unauthorised data leakage, improve performance and identify and remediate web application coding errors, Breach Security said.<\/p>\n<p>According to Breach Security, the distributed cloud and data centre offering provides enterprises and web properties with the capabilitie to visualise and monitor security, compliance and health of their entire web application development environment from the cloud to the customer data centre.<\/p>\n<p>http:\/\/security.cbronline.com\/news\/breach_security_releases_webdefend_global_event_manager_091214<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-1587","post","type-post","status-publish","format-standard","hentry","category-product"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1587","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1587"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1587\/revisions"}],"predecessor-version":[{"id":4074,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1587\/revisions\/4074"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1587"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1587"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1587"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}