{"id":2506,"date":"2018-04-22T00:00:00","date_gmt":"2018-04-22T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2018\/04\/22\/oem-security-news-22-apr-2018\/"},"modified":"2022-01-13T23:29:42","modified_gmt":"2022-01-13T23:29:42","slug":"oem-security-news-22-apr-2018","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2018\/04\/22\/oem-security-news-22-apr-2018\/","title":{"rendered":"OEM Security News &#8211; 22-Apr-2018"},"content":{"rendered":"<h2><a id=\"a_toc\"><\/a>Table of Contents<\/h2>\n<ul>\n<li>Teramind Prevents Insider Threats Combining New Data Loss Prevention Features with User Behavior Analytics &amp; Forensic Insights<\/li>\n<\/ul>\n<ul>\n<li>Symantec Analytics Enables Customers to Uncover the Most Dangerous Cyber Attacks<\/li>\n<\/ul>\n<ul>\n<li>1Cisco Fights Malware, Email Intrusions with New Services<\/li>\n<\/ul>\n<ul>\n<li>Cybersecurity Companies Demo Support for STIX and TAXII Standards for Automated Threat Intelligence Sharing at RSA 2018<\/li>\n<\/ul>\n<ul>\n<li>Could FireEye Be a Millionaire Maker Stock?<\/li>\n<\/ul>\n<ul>\n<li>Intel is offloading virus scanning to its GPUs to improve performance and battery life<\/li>\n<\/ul>\n<ul>\n<li>Microsoft unveils new security tools for Internet of Things, edge devices<\/li>\n<\/ul>\n<ul>\n<li>CrowdStrike Falcon X takes aim at incident response<\/li>\n<\/ul>\n<ul>\n<li>Latest Release of Unisys Stealth\u00ae Security Software Extends Microsegmentation Protection for Data Centers, Clouds and Mobile Devices to Include Medical and Internet of Things Devices<\/li>\n<\/ul>\n<ul>\n<li>Gemalto to protect 5G networks from cyber-attacks with Intel Software Guard Extensions<\/li>\n<\/ul>\n<ul>\n<li>Mimecast Offers Cyber Resilience for Email with New Detection, Remediation and Threat Intelligence Capabilities<\/li>\n<\/ul>\n<ul>\n<li>Fortinet Receives Recommended Rating in NSS Labs Latest Advanced Endpoint Protection Test Report<\/li>\n<\/ul>\n<ul>\n<li>The cloud has caused &#8216;pretty negative byproducts&#8217; &#8211; Cisco<\/li>\n<\/ul>\n<ul>\n<li>&#8216;Local option&#8217; ESET on hunt for 700 partners<\/li>\n<\/ul>\n<ul>\n<li>Centrify Offers Free Security Software, Services to Election Boards<\/li>\n<\/ul>\n<ul>\n<li>ZeroFOX Names Industry Thought Leader Dr. Sam Small as Chief Security Officer<\/li>\n<\/ul>\n<ul>\n<li>Microsoft brings its antivirus protection to Google\u2019s Chrome browser<\/li>\n<\/ul>\n<ul>\n<li>CounterSnipe Systems releases its most powerful Version of IDS\/IPS Software<\/li>\n<\/ul>\n<ul>\n<li>Cisco nudges partners towards intellectual property with $100,000 prize<\/li>\n<\/ul>\n<ul>\n<li>8 Security Products That Made News at RSA Conference 2018<\/li>\n<\/ul>\n<ul>\n<li>Keeper Security forms vulnerability disclosure program with Bugcrowd<\/li>\n<\/ul>\n<ul>\n<li>Cybersecurity Market Advancement In Technology 2018 to 2025<\/li>\n<\/ul>\n<ul>\n<li>ForeScout Stock: Chart Pointing to a Big Breakout 1<\/li>\n<\/ul>\n<ul>\n<li>Microsoft Floods RSA Conference with Security Announcements<\/li>\n<\/ul>\n<ul>\n<li>Cofense moves to a 100% channel sales model<\/li>\n<\/ul>\n<ul>\n<li>Securonix Unveils Strategic Alliance to Combat Cyberattacks in the Cloud<\/li>\n<\/ul>\n<ul>\n<li>In preparation for the GDPR, CoSoSys launches Endpoint Protector 5.1<\/li>\n<\/ul>\n<ul>\n<li>Infrastructure-agnostic web app protection with virtual patching option<\/li>\n<\/ul>\n<ul>\n<li>Intel announced the new Threat Detection Technology and Security Essentials<\/li>\n<\/ul>\n<ul>\n<li>Grant Thornton and Anomali Partner for Threat Intelligence Solutions<\/li>\n<\/ul>\n<ul>\n<li>Anomali partners with Visa to offer global payment breach intelligence<\/li>\n<\/ul>\n<ul>\n<li>BluVector and SS8 Deliver the First Product Suite for Advanced Threat Detection and Network Visibility Across the Entire Kill Chain<\/li>\n<\/ul>\n<ul>\n<li>Citrix Analytics Service Proactively Addresses Security Threats<\/li>\n<\/ul>\n<ul>\n<li>Saviynt Announces $40 Million Series A Funding Round with Carrick Capital Partners<\/li>\n<\/ul>\n<ul>\n<li>Cyber Security Specialist emt Distribution Takes on ThreatConnect Threat Intelligence Platform in Australia and New Zealand<\/li>\n<\/ul>\n<ul>\n<li>BigID is this year\u2019s most innovative startup at RSA Conference<\/li>\n<\/ul>\n<ul>\n<li>RedLock Enhances Visibility, Compliance Assurance, and Threat Detection Capabilities With Microsoft Azure<\/li>\n<\/ul>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.sfgate.com\/favicon.ico\" width=\"16\" height=\"16\" \/> <b>Teramind Prevents Insider Threats Combining New Data Loss Prevention Features with User Behavior Analytics &amp; Forensic Insights<\/b><\/p>\n<p>Teramind Inc. (RSA booth #5110), a provider of insider threat solutions, today announced a new approach to data loss prevention that will continue to help organizations from healthcare to banking, legal, energy and customer service teams and more address their internal cyber security and data breach vulnerabilities.<br \/>\nTeramind brings organizations the latest in preventional security software after another year of global data breaches.<br \/>\nThe new software features a comprehensive platform that combines technology supporting traditional data loss prevention (DLP) software capabilities coupled with behavioral data analytics.<br \/>\nThis unique approach brings forth the next generation of forensic insight to keep companies\u2019 data safe.<br \/>\nTeramind provides a user-centric security approach to monitor employee behavior, with software that streamlines employee data collection in order to identify suspicious activity, detect possible threats, monitor employee efficiency, and ensure industry compliance.<br \/>\nTeramind\u2019s new file anti-exfiltration analysis combined with the software\u2019s traditional DLP software capabilities and behavioral data analytics brings forth a stronger layer of protection against data breaches.<br \/>\nFile anti-exfiltration analysis targets and tags sensitive file repositories as well as sensitive content.<br \/>\n<span style=\"color: blue;\"><b>Link:<\/b><\/span> <a href=\"https:\/\/www.sfgate.com\/business\/press-releases\/article\/Teramind-Prevents-Insider-Threats-Combining-New-12836775.php\">https:\/\/www.sfgate.com\/business\/press-releases\/article\/Teramind-Prevents-Insider-Threats-Combining-New-12836775.php<\/a><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.albawaba.com\/favicon.ico\" width=\"16\" height=\"16\" \/> <b>Symantec Analytics Enables Customers to Uncover the Most Dangerous Cyber Attacks<\/b><\/p>\n<p>Symantec (Nasdaq: SYMC), the world&#8217;s leading cyber security company, announced today that the powerful threat detection technology used by its own world-class research teams to uncover some of the most notable cyber-attacks in history are now available to its Advanced Threat Protection (ATP) customers.<br \/>\nThe Symantec Targeted Attack Analytics (TAA) technology enables ATP customers to leverage advanced machine learning to automate the discovery of targeted attacks \u2013 the most dangerous intrusions in corporate networks.<\/p>\n<p>TAA is the result of an internal joint-effort between Symantec\u2019s Attack Investigation Team, responsible for uncovering\u00a0Stuxnet,\u00a0Regin,\u00a0Lazarus as well as links to SWIFT and WannaCry attacks among others, and a team of Symantec\u2019s top security data scientists on the leading edge of machine learning research.<br \/>\nUnlike traditional solutions, TAA takes the process, knowledge and capabilities of the world\u2019s leading security experts and turns it into artificial intelligence, providing companies with elite \u201cvirtual analysts,\u201d to allow security experts to devote their limited time and resources to the most critical attacks, instead of spending time sifting through false positives.<br \/>\nThe TAA technology implements machine learning to analyze a broad range of data, including system and network telemetry from Symantec\u2019s global customer base which forms one of the largest threat data lakes in the world.<br \/>\nSymantec\u2019s cloud-based approach to this technology also enables the frequent re-training and updating of analytics to adapt to new attack methods without the need for product updates.<br \/>\nThis new approach provides ATP customers with automated targeted threat detection, identifying sophisticated attacks where other solutions may fail.<br \/>\nTAA\u00a0is now available as part of Symantec\u2019s\u00a0Integrated Cyber Defense Platform\u00a0for Symantec Advanced Threat Protection (ATP) customers.<br \/>\n<span style=\"color: blue;\"><b>Link:<\/b><\/span> <a href=\"https:\/\/www.albawaba.com\/business\/pr\/symantec-targeted-attack-analytics-enables-customers-uncover-most-sophisticated-and-dang\">https:\/\/www.albawaba.com\/business\/pr\/symantec-targeted-attack-analytics-enables-customers-uncover-most-sophisticated-and-dang<\/a><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.channelpartnersonline.com\/favicon.ico\" width=\"16\" height=\"16\" \/> <b>1Cisco Fights Malware, Email Intrusions with New Services<\/b><\/p>\n<p><i>Lynn Haber<\/i><\/p>\n<p>Cisco on Monday announced upgrades to its Advanced Malware Protection (AMP) for Endpoints, new investments in email security, and an expanded security partnership with ConnectWise.<br \/>\nThe enhancements to AMP for Endpoints security, called Cisco Visibility, are designed to stop malware, eliminate blind spots and discover unknown threats.<br \/>\nThe new Cisco Visibility shows the extent of a compromise that spans the endpoint, the network and the cloud.<br \/>\nCisco also made new investments in two email security services: Cisco Domain Protection and Cisco Advanced Phishing Protection.<br \/>\nCisco Domain Protection automates the manual process of analyzing, updating and taking action against senders misusing their domain to send malicious email.<br \/>\nCisco Advanced Phishing Protection adds machine-learning capabilities to Cisco Email Security to evaluate the risk associated with inbound email by assessing its threat posture.<br \/>\nThe Cisco cloud-based service, which provides multi-tenant management, monitoring and billing, is in pilot but expected to be generally available soon.<br \/>\nBuilding on its initial ConnectWise partnership, the networking giant announced new enhancements to ConnectWise Unite with Cisco, including several new Cisco security integrations and the ConnectWise Advanced Security Dashboard for MSPs.<br \/>\nThe new Cisco security integrations with ConnectWise include Advanced Malware Protection for Endpoints, Adaptive Security Appliance and Next Generation Firewall.<br \/>\nThe ConnectWise Advanced Security Dashboard for MSPs integrates with the ConnectWise Manage business management solution.<br \/>\nIt features global policy management, security event correlation, and security reporting\u00a0\u2014 or what Cisco calls the building blocks to monitor advanced managed security services around Cisco\u2019s portfolio of Meraki MX firewalls, Umbrella, Stealthwatch Cloud, Adaptive Security Appliances, Next Generation Firewall and AMP for Endpoints.<br \/>\nIt\u2019s being introduced as a pilot with select partners in May.<br \/>\n<span style=\"color: blue;\"><b>Link:<\/b><\/span> <a href=\"https:\/\/www.channelpartnersonline.com\/2018\/04\/16\/cisco-fights-malware-email-intrusions-with-new-services\/\">https:\/\/www.channelpartnersonline.com\/2018\/04\/16\/cisco-fights-malware-email-intrusions-with-new-services\/<\/a><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/software.einnews.com\/favicon.ico\" width=\"16\" height=\"16\" \/> <b>Cybersecurity Companies Demo Support for STIX and TAXII Standards for Automated Threat Intelligence Sharing at RSA 2018<\/b><\/p>\n<p>Products from Anomali, EclecticIQ, Fujitsu, Hitachi, IBM Security, New Context, NC4, ThreatQuotient, and TruSTAR are demonstrating how STIX and TAXII are being used to prevent and defend against cyberattack by enabling threat intelligence to be analyzed and shared among trusted partners and communities.<br \/>\nIn addition to seeing the demos, RSA attendees are learning more about how the major new version of STIX and TAXII making it much easier to automate cyber threat intelligence sharing.<br \/>\n<span style=\"color: blue;\"><b>Link:<\/b><\/span> <a href=\"https:\/\/software.einnews.com\/pr_news\/441548758\/cybersecurity-companies-demo-support-for-stix-and-taxii-standards-for-automated-threat-intelligence-sharing-at-rsa-2018?n=2&amp;code=UK5CzDEXUdFuR8be\">https:\/\/software.einnews.com\/pr_news\/441548758\/cybersecurity-companies-demo-support-for-stix-and-taxii-standards-for-automated-threat-intelligence-sharing-at-rsa-2018?n=2&amp;code=UK5CzDEXUdFuR8be<\/a><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.fool.com\/favicon.ico\" width=\"16\" height=\"16\" \/> <b>Could FireEye Be a Millionaire Maker Stock?<\/b><\/p>\n<p><i>Nicholas Rossolillo<\/i><\/p>\n<p>Shares of cybersecurity company FireEye (NASDAQ:FEYE) have struggled since going public back in 2013.<br \/>\nThe stock has been cut in half from its debut price in spite of the fact that its revenue has doubled several times during that same period.<br \/>\nIt looks like a great growth story waiting to happen, but there are a few factors cautious investors should weigh first.<br \/>\nThe cybersecurity industry is growing, but FireEye&#8217;s product is viewed as more of an add-on to a company&#8217;s existing threat-detection system rather than a comprehensive plan.<br \/>\nAs a result, some of its larger peers like Palo Alto Networks (NYSE:PANW), Juniper Networks (NYSE:JNPR), and tech giant Cisco (NASDAQ:CSCO) have fared much better the last few years.<br \/>\nIn response to its slowdown, FireEye has begun offering\u00a0additional services and features to create a more well-rounded menu for its customers.<br \/>\nThe good news is that revenue growth accelerated to 10% year over year in the last reported quarter.<br \/>\nManagement thinks that 2018 sales will be $815 million to $825 million, at least a 10% annual increase.<br \/>\nThat pales in comparison to growth a few years back, but it&#8217;s nevertheless an improvement over the last 12 months, if those numbers transpire as forecast.<br \/>\nExpenses on R&amp;D and marketing are being trimmed, too, bringing profitability a little closer.<br \/>\nLosses in 2017 were $1.71 per share compared with $2.94 the year prior.<br \/>\nManagement again struck an upbeat tone for 2018 as it expects losses to continue decreasing.<br \/>\nThough cybersecurity is in high demand and likely to stay that way for some time, FireEye&#8217;s current growth trajectory is underwhelming and lagging behind the competition.<br \/>\n<span style=\"color: blue;\"><b>Link:<\/b><\/span> <a href=\"https:\/\/www.fool.com\/investing\/2018\/04\/16\/could-fireeye-be-a-millionaire-maker-stock.aspx?source=iedfolrf0000001\">https:\/\/www.fool.com\/investing\/2018\/04\/16\/could-fireeye-be-a-millionaire-maker-stock.aspx?source=iedfolrf0000001<\/a><\/p>\n<p><b>Intel is offloading virus scanning to its GPUs to improve performance and battery life <\/b><\/p>\n<p><i>Tom Warren<\/i><\/p>\n<p>Intel is planning to allow virus scanners to use its integrated graphics chipsets to scan for malicious attacks.<br \/>\nThe change could see performance and battery life improve on some systems. \u201cWith Accelerated Memory Scanning, the scanning is handled by Intel\u2019s integrated graphics processor, enabling more scanning, while reducing the impact on performance and power consumption,\u201d explains Rick Echevarria, Intel\u2019s platform security division VP. \u201cEarly benchmarking on Intel test systems show CPU utilization dropped from 20 percent to as little as 2 percent.\u201d<br \/>\nIntel\u2019s Threat Detection Technology will be available on 6th, 7th, and 8th generation Intel processors, allowing a variety of machines to take advantage of moving some virus scanning activity to the GPU instead of the CPU.<br \/>\nVirus scanners currently use the CPU to detect against memory-based attacks, but a machine takes a performance hit as a result.<br \/>\nIntel hopes by moving this way from the CPU that performance and power consumption will improve, as typical machines do not fully utilize onboard graphics cards most of the time.<br \/>\n\u201c\u201d<br \/>\nIntel is partnering with Microsoft to support this initially, with the change coming to Windows Defender Advanced Threat Protection (ATP) this month.<br \/>\nIntel is also working with other antivirus vendors so others can take advantage of this silicon-level change.<br \/>\n<span style=\"color: blue;\"><b>Link:<\/b><\/span> <a href=\"https:\/\/www.theverge.com\/2018\/4\/16\/17244996\/intel-virus-scanning-integrated-gpus-memory\">https:\/\/www.theverge.com\/2018\/4\/16\/17244996\/intel-virus-scanning-integrated-gpus-memory<\/a><\/p>\n<p><b>Microsoft unveils new security tools for Internet of Things, edge devices <\/b><\/p>\n<p>The company introduced \u201cAzure Sphere\u201d, the industry\u2019s first holistic platform to create secured, connected microcontroller unit (MCU) devices on the \u201cintelligent edge\u201d.<br \/>\nThe company also unveiled several new intelligent security features for its Microsoft 365 commercial Cloud offering \u2014 designed to help IT and security professionals simplify how they manage security across their enterprises.<br \/>\n<span style=\"color: blue;\"><b>Link:<\/b><\/span> <a href=\"https:\/\/www.financialexpress.com\/industry\/technology\/microsoft-unveils-new-security-tools-for-internet-of-things-edge-devices\/1135678\/\">https:\/\/www.financialexpress.com\/industry\/technology\/microsoft-unveils-new-security-tools-for-internet-of-things-edge-devices\/1135678\/<\/a><\/p>\n<p><b>CrowdStrike Falcon X takes aim at incident response <\/b><\/p>\n<p><i>Rob Wright<\/i><\/p>\n<p>At RSA Conference 2018 on Monday, the cybersecurity vendor launched CrowdStrike Falcon X, a new offering that automates threat analysis in order to quicken enterprise responses to cyberattacks.<br \/>\nCrowdStrike &#8212; which is appearing in several sessions at RSA Conference on new exploits, adversaries and response techniques this week &#8212; has become one of the more visible cybersecurity vendors in the industry following its investigative work on the Democratic National Committee&#8217;s 2016 data breach.<br \/>\nNow, the company is broadening its reach with new initiatives around incident response.<br \/>\nWith Falcon X, Alperovitch said the process takes about three minutes.<br \/>\nWhen malware is detected on an endpoint, CrowdStrike Falcon X automatically &#8220;detonates&#8221; the sample and then runs it through CrowdStrike&#8217;s malware search engine to compare it against other samples.<br \/>\nIn addition to CrowdStrike Falcon X, the company also introduced a new product geared toward small and medium-sized businesses.<br \/>\nDubbed CrowdStrike Falcon Endpoint Protection Complete, the product includes the endpoint security module of the Falcon platform, as well as dedicated security professionals to assist customers with incident response.<br \/>\n<span style=\"color: blue;\"><b>Link:<\/b><\/span> <a href=\"https:\/\/searchsecurity.techtarget.com\/news\/252439123\/CrowdStrike-Falcon-X-takes-aim-at-incident-response\">https:\/\/searchsecurity.techtarget.com\/news\/252439123\/CrowdStrike-Falcon-X-takes-aim-at-incident-response<\/a><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.pharmiweb.com\/favicon.ico\" width=\"16\" height=\"16\" \/> <b>Latest Release of Unisys Stealth\u00ae Security Software Extends Microsegmentation Protection for Data Centers, Clouds and Mobile Devices to Include Medical and Internet of Things Devices<\/b><\/p>\n<p>BLUE BELL, Pa., April 17, 2018 \/PRNewswire\/ &#8212;\u00a0Unisys Corporation (NYSE: UIS) today announced a new version of its award-winning Unisys Stealth\u00ae security software suite, including upgrades to extend protection to purpose-built Internet of Things (IoT) devices and other connected equipment such as medical monitoring machines, baggage scanners, industrial control systems and surveillance cameras.<br \/>\nThe new release of Stealth\u2122 microsegmentation software now protects IoT devices, isolating them from untrusted network segments within a Stealth-protected network to help prevent intrusion and remote tampering on the devices while protecting the corporate network from potential compromises initiated from unsecured devices.<br \/>\nBy joining a Stealth-defined secure Community of Interest, high-value devices are shielded from unauthorized access, reducing the attack surface.<br \/>\nThis new capability can be delivered as a virtual or physical gateway to protect devices where Stealth cannot be installed and with no hardware or software changes required to the purpose-built devices.<br \/>\n<span style=\"color: blue;\"><b>Link:<\/b><\/span> <a href=\"https:\/\/www.pharmiweb.com\/pressreleases\/pressrel.asp?ROW_ID=273792\">https:\/\/www.pharmiweb.com\/pressreleases\/pressrel.asp?ROW_ID=273792<\/a><\/p>\n<p><b>Gemalto to protect 5G networks from cyber-attacks with Intel Software Guard Extensions <\/b><\/p>\n<p>Gemalto launched a platform that stops cyber-attacks from affecting cloud-based virtualised networks being planned and deployed with Intel technology.<br \/>\nThis new initiative combines the Intel Software Guard Extensions (Intel SGX) trusted &#8216;enclave&#8217;, deployed in the company&#8217;s cloud server CPUs, with Gemalto&#8217;s advanced SafeNet Data Protection On Demand security software services to create a processor-level security platform for virtualised networks.<br \/>\n<span style=\"color: blue;\"><b>Link:<\/b><\/span> <a href=\"https:\/\/www.telecompaper.com\/news\/gemalto-to-protect-5g-networks-from-cyber-attacks-with-intel-software-guard-extensions--1240500\">https:\/\/www.telecompaper.com\/news\/gemalto-to-protect-5g-networks-from-cyber-attacks-with-intel-software-guard-extensions&#8211;1240500<\/a><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/software.einnews.com\/favicon.ico\" width=\"16\" height=\"16\" \/> <b>Mimecast Offers Cyber Resilience for Email with New Detection, Remediation and Threat Intelligence Capabilities<\/b><\/p>\n<p><i>Nasdaq Global Newswire<\/i><\/p>\n<p>SAN FRANCISCO, April 17, 2018 (GLOBE NEWSWIRE) &#8212; Mimecast Limited (NASDAQ:MIME), a leading email and data security company, today announced enhancements to its Targeted Threat Protection services &#8211; Impersonation Protect, URL Protect, and Internal Email Protect \u2013 engineered to combat and remediate the evolving threat landscape.<br \/>\nNew features include supply chain impersonation protection, similar domain detection, the integration of new automated intelligence feeds, as well as the introduction of automated threat remediation capabilities.<br \/>\nNew research from Mimecast and Vanson Bourne revealed that organizations are not only facing a variety of different threats, but the volume and frequency of these attacks continue their upward trajectory.<br \/>\nIn fact, 53 percent expect a negative business impact from these email-borne threats in 2018.<br \/>\nImpersonation attacks commonly use social engineering, and are designed to trick users such as finance managers, executive assistants, and HR representatives into making wire transfers or providing information which can be monetized by cybercriminals.<br \/>\nLookalike domains are also increasingly becoming a problem, as recently publicized in top media outlets, like KrebsonSecurity.<br \/>\nNew real-time data feeds have also been added to Impersonation Protect engineered to better identify newly observed and registered domains to further enhance Mimecast\u2019s ability to detect security threats.<br \/>\nAdditionally, using Mimecast\u2019s global threat intelligence network, Internal Email Protect can help customers more quickly remediate security threats that originate from any email account inside or outside the organization.<br \/>\nAvailable in June 2018<br \/>\n<span style=\"color: blue;\"><b>Link:<\/b><\/span> <a href=\"https:\/\/software.einnews.com\/pr_news\/442535502\/mimecast-offers-cyber-resilience-for-email-with-new-detection-remediation-and-threat-intelligence-capabilities?n=2&amp;code=oFvCCJC2r-jYysMo\">https:\/\/software.einnews.com\/pr_news\/442535502\/mimecast-offers-cyber-resilience-for-email-with-new-detection-remediation-and-threat-intelligence-capabilities?n=2&amp;code=oFvCCJC2r-jYysMo<\/a><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/software.einnews.com\/favicon.ico\" width=\"16\" height=\"16\" \/> <b>Fortinet Receives Recommended Rating in NSS Labs Latest Advanced Endpoint Protection Test Report<\/b><\/p>\n<p><i>Nasdaq Global Newswire<\/i><\/p>\n<p>FortiClient has received NSS Labs&#8217; coveted &#8216;Recommended&#8217; rating since this test\u2019s inception in 2017, this year with an overall security effectiveness rating of 97.3%.<br \/>\n\u2022 Several Fortinet Fabric-Ready technology alliance partners are also among the \u201cRecommended\u201d vendors in this report, including Carbon Black and SentinelOne.<br \/>\nThese solutions are among those certified compatible with FortiClient Fabric Agent to provide integration and intelligence sharing with the Security Fabric.<br \/>\nThe broad Fortinet Fabric-Ready Partner Program ecosystem of complementary technologies enables customers to maximize their existing technology investments and get even more value from their security deployments.<br \/>\nAEP Test Report Highlights for FortiClient<br \/>\n\u2022 100% block rate on exploits<br \/>\n\u2022 100% block rate on document and script-based malware<br \/>\n\u2022 100% block rate for web, 99.4% for email, and 100% for offline threats<br \/>\n\u2022 97.2% detection rate for evasions<br \/>\n\u2022 97.3% overall security effectiveness rating<br \/>\n\u2022 Zero false positives<br \/>\n<span style=\"color: blue;\"><b>Link:<\/b><\/span> <a href=\"https:\/\/software.einnews.com\/pr_news\/442541712\/fortinet-receives-recommended-rating-in-nss-labs-latest-advanced-endpoint-protection-test-report?n=2&amp;code=oFvCCJC2r-jYysMo\">https:\/\/software.einnews.com\/pr_news\/442541712\/fortinet-receives-recommended-rating-in-nss-labs-latest-advanced-endpoint-protection-test-report?n=2&amp;code=oFvCCJC2r-jYysMo<\/a><\/p>\n<p><b>The cloud has caused &#8216;pretty negative byproducts&#8217; &#8211; Cisco <\/b><\/p>\n<p><i>Tom Wright<\/i><\/p>\n<p>Cisco has called on partners to help customers address the &#8220;negative byproducts&#8221; of moving to the cloud by adopting its multi-cloud approach.<br \/>\nSpeaking at Cisco&#8217;s Partner Connection Week in the Bahamas, Cisco VP of growth initiative Ruba Borno said that customers have been caught off guard by the challenges of moving to the cloud.<\/p>\n<p>Borno told partners that currently four in\u00a0five Cisco customers use more than one cloud, but need more assistance when it comes to managing these infrastructures.<br \/>\nBut Cisco says that the cloud &#8211; and new technologies such as\u00a0artificial intelligence and machine learning &#8211; require partners to position themselves differently in the market.<br \/>\nWendy Bahr, senior vice president of Cisco&#8217;s Global Partner Organisation, said partners should specifically be adapting to target three key areas.<br \/>\n&#8220;I would suggest the three biggest opportunities we have are core networking, security and multi-cloud.<br \/>\nWhen you couple in the life-cycle value and that services revenue, these are the three big tickets.&#8221;<br \/>\n<span style=\"color: blue;\"><b>Link:<\/b><\/span> <a href=\"https:\/\/www.channelweb.co.uk\/crn-uk\/news\/3030393\/the-cloud-isnt-as-simple-as-we-thought-it-would-be-cisco\">https:\/\/www.channelweb.co.uk\/crn-uk\/news\/3030393\/the-cloud-isnt-as-simple-as-we-thought-it-would-be-cisco<\/a><\/p>\n<p><b>&#8216;Local option&#8217; ESET on hunt for 700 partners <\/b><\/p>\n<p><i>Marian Mchugh<\/i><\/p>\n<p>End-point security vendor ESET says it can provide UK resellers with a &#8220;local&#8221; alternative to its competitors as it hunts for 700 new partners.<br \/>\nThe Slovakia-based outfit has launched a partner recruitment push in this country after moving to a two-tier channel model last year.<\/p>\n<p>Last year, ESET took on its first two UK distributors in the shape of Exertis and Distology.<br \/>\nThe recruitment push and distributor appointments are part of ESET&#8217;s plan to enter the competitive enterprise market, and to do that the company wants to recruit a wider range of resellers.<br \/>\n<span style=\"color: blue;\"><b>Link:<\/b><\/span> <a href=\"https:\/\/www.channelweb.co.uk\/crn-uk\/news\/3030435\/local-option-eset-on-hunt-for-700-partners?utm_medium=email&amp;utm_content=&amp;utm_campaign=CRN.Daily_RL.EU.A.U&amp;utm_source=CRN.DCM.Editors_Updates&amp;utm_term=&amp;\">https:\/\/www.channelweb.co.uk\/crn-uk\/news\/3030435\/local-option-eset-on-hunt-for-700-partners?utm_medium=email&amp;utm_content=&amp;utm_campaign=CRN.Daily_RL.EU.A.U&amp;utm_source=CRN.DCM.Editors_Updates&amp;utm_term=&amp;<\/a><\/p>\n<p><b>Centrify Offers Free Security Software, Services to Election Boards <\/b><\/p>\n<p><i>Chris Preimesberger<\/i><\/p>\n<p>Centrify, a proponent of a relatively new approach to enterprise security called Zero Trust, on April 16 at the RSA Security Conference revealed the industry\u2019s first IT campaign to Secure the Vote for the 2018 elections.<br \/>\nThe initiative involves the free distribution of Centrify software to election boards that includes multi-factor authentication and validation of device access for voters in their jurisdictions.<\/p>\n<p>Centrify\u2019s package is called Identity-as-a-Service and Privileged Access Management leadership Effective April 16, the company is providing its access solutions to eligible election boards at no cost for the first eight months of a 12-month (or more) SaaS subscription, representing a 66 percent discount on MSRP.<br \/>\nCentrify is also offering a 10 percent discount to new election board customers to take advantage of its Jump Start professional services program to ensure a smooth deployment of Centrify Zero Trust Security.<br \/>\n<span style=\"color: blue;\"><b>Link:<\/b><\/span> <a href=\"http:\/\/www.eweek.com\/security\/centrify-offers-free-security-software-services-to-election-boards\">http:\/\/www.eweek.com\/security\/centrify-offers-free-security-software-services-to-election-boards<\/a><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/www.oaoa.com\/favicon.ico\" width=\"16\" height=\"16\" \/> <b>ZeroFOX Names Industry Thought Leader Dr. Sam Small as Chief Security Officer<\/b><\/p>\n<p>BALTIMORE&#8211;(BUSINESS WIRE)&#8211;Apr 18, 2018&#8211;ZeroFOX, the social media security category leader, today announced the hiring of Dr.<br \/>\nSam Small as Chief Security Officer (CSO).<br \/>\nIn his new role, Dr.<br \/>\nSmall will work with ZeroFOX\u2019s rapidly-growing enterprise customer portfolio to develop, execute and maintain strategies that address the security threats intertwined with social media platforms.<br \/>\nThis strategic hire comes on the heels of several other important company milestones, including major organizational wins such as The National Hockey League Players&#8217; Association (NHLPA).<br \/>\nAdditionally, ZeroFOX recently hired Todd Laughman as Head of U.S.<br \/>\nSales and Brian Cyr as the company\u2019s first General Counsel earlier this year.<br \/>\nAs one of the country\u2019s foremost experts on intellectual property (IP), Dr.<br \/>\nSmall will continue to invest, build upon and protect ZeroFOX\u2019s proprietary platform and continued growth.<br \/>\nAt ZeroFOX, Dr.<br \/>\nSmall will drive ZeroFOX\u2019s security vision both internally and externally for customers.<br \/>\nDr.<br \/>\nSmall will work directly with customers at the CXO level to deliver the company&#8217;s services and technology as well as infusing the ZeroFOX Platform with his expertise.<br \/>\nFinally, Dr.<br \/>\nSmall will help oversee all ZeroFOX\u2019s IP and internal security operations.<br \/>\n<span style=\"color: blue;\"><b>Link:<\/b><\/span> <a href=\"http:\/\/www.oaoa.com\/news\/us_news\/article_a7995813-d26a-5b7c-b37e-f8046480190b.html\">http:\/\/www.oaoa.com\/news\/us_news\/article_a7995813-d26a-5b7c-b37e-f8046480190b.html<\/a><\/p>\n<p><b>Microsoft brings its antivirus protection to Google\u2019s Chrome browser <\/b><\/p>\n<p><i>Tom Warren<\/i><\/p>\n<p>Microsoft is releasing its Windows Defender antivirus scanner for Google Chrome this week.<br \/>\nThe software giant has released a Chrome extension, that includes a list of malicious URLs that will be blocked in Chrome.<br \/>\nThe extension is designed to stop malware being loaded onto PCs from malicious sites, and to prevent phishing emails from being successful.<br \/>\n<span style=\"color: blue;\"><b>Link:<\/b><\/span> <a href=\"https:\/\/www.theverge.com\/2018\/4\/18\/17250906\/microsoft-windows-defender-google-chrome-extension\">https:\/\/www.theverge.com\/2018\/4\/18\/17250906\/microsoft-windows-defender-google-chrome-extension<\/a><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.prlog.org\/favicon.ico\" width=\"16\" height=\"16\" \/> <b>CounterSnipe S<\/b><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Table of Contents Teramind Prevents Insider Threats Combining New Data Loss Prevention Features with User Behavior Analytics &amp; Forensic Insights Symantec Analytics Enables Customers to Uncover the Most Dangerous Cyber Attacks 1Cisco Fights Malware, Email Intrusions with New Services Cybersecurity Companies Demo Support for STIX and TAXII Standards for Automated&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[29,3],"tags":[],"class_list":["post-2506","post","type-post","status-publish","format-standard","hentry","category-news","category-product"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2506","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=2506"}],"version-history":[{"count":3,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2506\/revisions"}],"predecessor-version":[{"id":4998,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2506\/revisions\/4998"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=2506"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=2506"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=2506"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}