We are very excited to share with you that we have acquired IntSights, a leader in contextualized external threat intelligence and proactive threat remediation.We’ve seen firsthand that with digital transformation the attack surface has increased exponentially and customers are recognizing...
With our growing need to use and share sensitive data from any location, vulnerabilities abound for malicious actors and nation-states to manipulate, corrupt, or steal sensitive information. Conent, Disarm, and Reconstruction (CDR) technology is a new and groundbreaking method for protection...
Press release, Bratislava, 19.04.2021 We would like to inform you that there have been changes in the distribution on the Slovak market. The Flowmon and Kemp product portfolio will be directed by SecTec a.s. from April 1, 2021. Thanks to this, we have decided and we are issuing a conceptual...
Press release, Bratislava, 19.04.2021 MAHWAH, N.J., April 13, 2021 (GLOBE NEWSWIRE) -- Radware® (NASDAQ: RDWR), a leading provider of cyber security and application delivery solutions, has been recognized as a Customer’s Choice in the March 2021 Gartner Peer Insights ‘Voice of the...
Acquisition enables Imperva customers to increase user access to sensitive data assets while reducing risk Imperva has acquired the assets of Camouflage Software, Inc., a data masking company. In addition, Imperva has hired nearly all of Camouflage's employees. This acquisition furthers a...
Real-time, deception-based approach protects against ransomware before valuable data is encrypted Imperva announced the release of Imperva SecureSphere File Firewall v12 with real-time deception technology designed to detect ransomware and to prevent it from encrypting enterprise data. The...
Radware® (NASDAQ: RDWR), a leading provider of cyber security and application delivery solutions has acquired Seculert, a SaaS cloud-based provider of protection against enterprise network breach and data exfiltration. This acquisition enhances Radware’s attack mitigation system with...
To protect your organization from a hijacked system, stolen credentials, a rogue insider or an employee’s unintentional actions, you need complete data protection with the unrivaled visibility of Forcepoint™’s Insider Threat Data Protection (ITDP) solution, which links data movement with user...
New hardware appliances enable businesses to deploy next-generation security in all locations, from large data centers down to small branch offices. Designed to handle demanding throughput needs due to increasing amounts of application-, user- and device-generated data, these appliances offer: ...
To provide organizations with the best security capabilities to prevent successful cyberattacks, PAN-OS® 8.0, includes a colossal amount of enhancements and capabilities, including: Secure any cloud! AWS, Azure and more Secure SaaS (Office 365®, Box, Slack®) with visibility and...
INDUSTRY ANALYST REPORT In Gartner's recently published report, “Critical Capabilities for Enterprise Data Loss Prevention*,” Forcepoint’s TRITON AP-DATA DLP solution received the highest Product Score given in the Regulatory Compliance use case, scoring a 4.0 out of...
With the modern day cyber threat constantly changing, it is of utmost importance for security teams to be sufficiently prepared to defend. The CyberKombat is an attack/defence experience program delivered at Satisnet Innovation Centre in Luton, United Kingdom.“CyberKombat is created through a...
Kaspersky Lab launched Kaspersky Anti-Ransomware Tool for Business – a free software that offers complementary security to protect corporate users from ransomware. To identify ransomware behavior patterns and protect Windows-based endpoints, Kaspersky Anti-Ransomware Tool for Business leverages...
Attackers have traditionally profited by stealing identities or credit card numbers, and then selling them on underground markets. According to the Verizon Data Breach Investigations Report, the price for stolen records has fallen, so cyber attackers are on the hunt for new ways to make a profit....
This certifikate of acknowledgement confirms that SecTec has successfully earned Palo Alto Networks Authorized Support Center designation based on demonstrated technical certifications, support experience, support lab capabilities, and commitment to Palo Alto Networks customer support quality...
All of them mean the same thing: A hacker that helps organizations uncover security issues with the goal of preventing those security flaws from being exploited. The idea behind ethical hacking is to pay the ‘good guys’ to find any holes the ‘bad guys’ would, before they can get to them. ...
In this case, the sources of the attack were thousands of servers and various networks including unsecured household devices, computers, printers and other “things” connected to the Internet. With the rise of IoE / IoT, increasing capacity of networks, massive digitization, automation and...
Great news – you purchased a new iPad! Of course, you’ll want to set it up, install a number of apps and start using it on all cylinders. So, let’s now see what each new iPad user should know before getting started. There are a lot of articles on the Internet, which cover the best iOS apps...
Flowmon 8.01 and DDoS Defender 3.0 are releases we can be really proud of. Decrease of granularity to 30 sec has a massive effect, especially in use cases where the reduction of reaction time is desired, e.g. detection of anomalies and threats, mitigation of DDoS attacks or identification of...
Forcepoint has appointed Matt Moynahan as chief executive officer effective May 9, 2016. Matt brings more than 20 years of experience at some of the world's leading security and information technology companies, including Arbor Networks, Veracode and Symantec, among others. More...