Empowering security teams with unlimited security data collection, indexing and search
Exabeam Data Lake centralizes all relevant logs to reduce the work of collecting logs from multiple systems. It is built on open source, big data technology, providing unlimited security data collection, indexing, and search. It supports better analytics and enables compliance reporting. Data Lake now has a database collector which enables logs to be collected from remote Microsoft SQL Server and MySQL databases.
Proxmox Mail Gateway 5.0 is now open source
Proxmox Mail Gateway is a full featured mail proxy deployed between the firewall and the internal mail server. Version 5.0 is now completely open source. The Mail Gateway is a complete operating system based on Debian Stretch 9.3 with a 4.13.13 kernel, and has a new RESTful API, includes support for all ZFS raid levels, comes with LDAP, IPv4 and IPv6 support, and with a new interface framework based on Sencha ExtJS.
Carbon Black announces new threat hunting service
Cb ThreatSight leverages the Cb Predictive Security Cloud (PSC) to provide customers with a managed threat hunting service, which simplifies alert management with a console that prioritizes and streamlines the validation of important alerts. The service is staffed by threat experts who keep constant watch over an organization’s environment, alert teams to emerging threats, and provide access to security services when they are needed most.
New ZyWALL VPN 50/100/300 firewalls released
The ZyWALL VPN family provides comprehensive types of VPN connection for your business and supports Amazon Virtual Private Cloud (AWS VPC). Moreover, the business grade ZyWALL VPN family is equipped with IPSec VPN Hardware engine for VPN tunnel and VPN load balance/failover with stronger VPN algorithm (IKEv2 & SHA-2) that ensure the VPN reliability and security for business communications.
Cybersecurity suite for protecting ICS
The Tripwire ICS Cyber Resiliency Suite provides secure configuration management (SCM), vulnerability management (VM) and log management (LM) capabilities purpose-built for industrial use cases. It offers the industry no-touch security configuration and vulnerability assessment capabilities that can operate within ICS levels without disrupting controller function, and can monitor a full range of ICS devices and system manufacturers.
Real-time awareness to detect infected assets, anomalies and malicious activity
Fidelis Cybersecurity announced the Fidelis Deception Module that improves and becomes deterministic with breadcrumbs leading to decoys to lure attackers and automated malware known to scan hundreds of applications. Instead of searching in vain for the bad actor within an ocean of good data, deception delivers actionable alerts and events from decoys. Fidelis Deception goes a step further and creates evidence of credentials and connections from breadcrumbs throughout the network which are irresistible to attackers.