Continuous vulnerability management for ICS cybersecurity
PAS Cyber Integrity 6.0 now includes continuous vulnerability management providing visibility into vulnerability risk within industrial process control networks. Cyber Integrity moves beyond traditional IT vulnerability management by also addressing the proprietary industrial control systems that comprise 80 percent of a facility environment.
BlackBerry releases cloud-based static binary code scanning solution
BlackBerry Jarvis is a cloud-based static binary code scanning solution that identifies vulnerabilities in software used in automobiles. Offered on a pay-as-you-go usage basis, Jarvis is customized for the unique needs of each OEM and their entire software supply chain. Once initiated, automakers will have online access to Jarvis and can scan any number of binary files at every stage of software development. This includes the capability to evaluate new software under consideration as well as the ability to assess existing software already in production.
Automatically classify known and unknown cloud apps
Bitglass announced the addition of Zero-day Shadow IT discovery to its Zero-day CASB Core, expanding Bitglass’ Shadow IT index to more than 100,000 apps. The technology automatically indexes and dynamically computes reputation ratings for known and unknown cloud applications using machine learning techniques. Zero-day Shadow IT Discovery works by crawling the web, as well as several other curated datasets, to identify, categorize and classify new cloud applications in near real-time as they are discovered on customer networks.
HID Global rolls out next-gen solution for virtual smart cards
HID Global announced a new version of its Credential Management System (CMS) that digitizes smart card technology, expands the use of digital certificates in credentials and reaches new platforms that plastic cards don’t reach. HID’s CMS is widely used in the U.S. federal government to manage government ID badges (known as PIV cards) as well as by enterprise organizations to increase the secure access of online resources. The new ActivID CMS 5.0 makes it possible for people to be authenticated for digital access without using a physical smart card.
Thycotic launches new privilege account management software
Thycotic released the latest version of Privilege Manager. The 10.4 release introduces Privilege Manager’s least privilege and application control functionality. This allows administrators to implement and enforce a least privilege security posture across their organization’s endpoints. Together, this combined approach to least privilege and application control can help prevent malware from exploiting local credentials on endpoints – the most vulnerable part of an attack surface.
Data pseudonymization for GDPR compliance
Striim announced today its capabilities in delivering data pseudonymization to help organizations achieve compliance with the GDPR. In response to the regulation’s strong focus on data privacy, the Striim platform helps companies to continuously capture real-time data, and provide pseudonymization of direct identifiers by filtering, enriching, masking, obfuscating, and encrypting data while streaming. The Striim 3.8 product release includes built-in data masking functions that users can implement through its UI and wizards-based development environment.
NS1 has implemented DNSSEC
NS1 announced support for Domain Name System Security Extensions (DNSSEC). Unlike the DNSSEC implementations from traditional managed DNS providers, NS1 enables organizations to gain the benefits of advanced DNS traffic management on zones protected by DNSSEC. Now organizations no longer need to choose between security and the traffic management capabilities that are essential to providing high-quality online services.
ZeroStack enhances IT visibility in self-driving cloud platform
ZeroStack unveiled new host-based metrics that enable better, more proactive IT management of its cloud platform. Cloud administrators can now define and enable alerting policies based on the status of physical hosts. Alerting policies can be defined on specific host-based CPU utilization, storage, network bandwidth, and other parameters, providing proactive alerting that allows the IT department to control and monitor the cloud environment. This visibility ensures that DevOps workbench users have access to the resources they need without overloading IT infrastructure.