Ixia enhances network assessment and monitoring platform
Ixia’s Hawkeye, which proactively generates and analyzes synthetic network and application traffic to assess how applications and services will perform, now includes proactive monitoring of Wi-Fi readiness. Expanded coverage in Hawkeye spans WANs, LAN VPNs and cloud access to WLAN architectures. As a result, Hawkeye can validate that complex business-critical services over Wi-Fi are available 24×7.
First digital identity certificate for drones
Drone ID is a publicly-trusted SSL/TLS certificate issued by AirMap and DigiCert. Drone operators that register their drone online will receive a digital Drone ID certificate, including a unique, validated aircraft identity number that can be loaded onto the drone and shared with others in the drone ecosystem. Drone ID will first be available for drones built with the Intel Aero Platform for Developers, including the Intel Aero Ready to Fly Drone.
Microsoft customers can now secure content on Office 365
Vera is giving Microsoft customers the ability to apply dynamic data protection to every file created in Microsoft Office 365 and stored in SharePoint or OneDrive for Business, making data security completely seamless. With this new integration, Vera can provide zero-click, data-centric security, access control, and audit that works across every major cloud-based and on-premises platform, including Microsoft, Box, and Dropbox.
DB Networks launches AI-based agentless database activity monitoring
DB Networks announced an agentless database activity monitoring (DAM) solution based on artificial intelligence. DB Networks is combining its DBN-6300 database monitoring and security technology with the CyberArk Privileged Account Security Solution to strengthen organizations’ overall security posture with a next-generation DAM solution.
Percipient Networks defends against social engineering and malware
Percipient Networks unveiled always-on protection for its flagship solution – Strongarm. The latest update to the cloud-deployed solution is designed to enable SMBs to protect mobile workers from social engineering and malware attacks. Strongarm’s light-weight solution makes it simple for small IT departments to configure employee-owned and corporate devices to protect them from phishing, ransomware and other exploits.
Radiflow introduces security assessment service for Industrial Control Systems
Radiflow introduced a new security assessment service that provides users with a full network status report including a detailed list of potential vulnerabilities that can cause disruption to automated processes. The report provides users with a good starting point to protect the ICSs, including a full ICS network map and all the information needed to make informed security decisions.
Barracuda offers Next-Generation Firewall for Google Cloud platform customers
Barracuda’s NextGen Firewall is now available for customers using Google Cloud Platform and can be purchased from Barracuda via the BYOL model. It was developed for highly distributed networks with the advanced security and management capabilities that are required for cloud and hybrid environments. Barracuda NextGen Firewall provides flexible remote access, application visibility, user awareness, and highly granular security policy management.
Resilient Access enables data-sensitive organizations to connect securely
Resilient Network Systems released Resilient Access 3.0, a contextual access solution designed for the connected organization. It extends access capabilities to automatically discover, organize and resolve the information or attributes needed to make smarter access decisions at scale.
Fall 2016 Everbridge platform update improves global security
Everbridge unveiled the latest release of its enterprise platform and suite of applications. Everbridge’s Fall 2016 Release improves the way that communities and corporations of all sizes can assess threats, locate key people, and automate processes. The new release features enhancements to the core Everbridge platform for critical event management, as well as improved workflow automation, new integrations and mobile collaboration solution features.
Iris authentication reference designs for deployment across IoT devices
EyeLock introduced three reference designs architected specifically for high volume OEM integration. EyeLock’s latest offering addresses the rapidly increasing demand for iris authentication solutions across a myriad of IoT devices and broad applications including critical infrastructure, automotive, healthcare, financial services, government and more.