New infosec products of the week​: December 9, 2016

Thales releases advanced encryption solutions for secure docker containers

Thales released new capabilities for its Vormetric Data Security Platform. These advances extend data-at-rest security capabilities with integrated Docker encryption and access controls, the ability to encrypt and rekey data without having to take applications offline, FIPS certified remote administration and management of data security policies and protections, and the ability to accelerate the deployment of tokenization, static data masking and application encryption.

Vormetric Data Security Platform

Unisys Stealth(aware) automates implementation of micro-segmentation security

Unisys launched Stealth(aware), which unleashes the Unisys Stealth micro-segmentation product portfolio – including applications focused on core, cloud, mobile, identity and analytics – which creates segments within an organization where only authorized users can access information, while others (from malware to insiders to hackers) cannot even see that those segments exist.

Unisys Stealth(aware)

End-to-end IAM for physical and IT security

HID Global announced an end-to-end identity access management solution that enables government agencies and other organizations requiring higher security to use a single credential for accessing doors, IT systems, networks and data. The HID PIV (Personal Identity Verification) solution provides identity lifecycle management – from identity proofing, plus secure credential issuance and use, to deprovisioning of these credentials. Organizations are now able to unify physical and IT security systems, while also offering strong authentication applying trusted credential and other advanced security capabilities.

HID PIV

GO-Trust launches one touch login for cloud services

GO-Trust announced the immediate availability of the GO-Trust Authenticator. This is a whole new approach for securely logging into Windows or macOS, and then into cloud services. The user’s iPhone or Android phone communicates with the work computer and once the user’s identity has been confirmed via the ‘one touch’ fingerprint sensor or the ‘one click’ camera for facial recognition, a secure dialogue logs into Windows or macOS with the equivalent of a long and complex password.

GO-Trust Authenticator

Bomgar makes remote support easier from any mobile device

Bomgar released Bomgar Remote Support 16.2, the latest version of its enterprise-leading remote support software. Bomgar Remote Support enables IT service desks and customer support centers to access and fix nearly any remote device, running any platform, located anywhere in the world. Technicians using Bomgar can quickly connect to, view, and control remote systems and devices, chat and collaborate with end-users or other technicians, all while improving remote access security.

Bomgar Remote Support

Intel Security’s True Key integrates with Windows Hello

Intel Security announced the new integration of the True Key extension with Windows Hello to deliver a multi-factor sign in experience on Microsoft Edge. The True Key extension will remember a user’s existing passwords and create new ones, as well as automatically fill in their username and password when logging in to websites or apps.

True Key

Arbor SP Insight expands and enhances network operators’ traffic analytics

Arbor SP Insight adds new visual analytics and a big data repository to Arbor SP while preserving Arbor’s flow annotations and enrichment – giving users a searchable photographic memory of their traffic data with network context. Arbor SP Insight’s all-new interactive user interface integrates with existing Arbor SP workflows for a unified user experience, so users can explore their data and reach conclusions faster.

Arbor SP Insight

Malwarebytes 3.0 combines four proprietary technologies

Malwarebytes 3.0 uses four independent technology modules (anti-malware, anti-ransomware, anti-exploit, and malicious website protection) to block and remove both known and unknown threats. The anti-ransomware and anti-exploit modules employ signature-less technology so users are protected from advanced threats that are not yet known to traditional antivirus research labs. The solution also scans 4x faster than its predecessor, Malwarebytes Anti-Malware.

Malwarebytes 3.0

Don't miss