Masergy launches Secure Wi-Fi and extends protection into the customer LAN
Masergy has launched Masergy Secure Wi-Fi as the latest feature in the ongoing evolution of the company’s Secure Hybrid Networking offering. The new capability delivers swift and secure enterprise-grade wireless network access to both high- and low-density areas including retail and corporate environments.
Mitsubishi Electric develops security technology to detect attacks on equipment sensors
Mitsubishi Electric announced that it has developed what is believed to be the world’s first sensor-security technology that detects measurement-data inconsistencies by embedding a proprietary algorithm in sensor fusion algorithms, which combine multiple sensors for measurements used in the automatic control of drones, in-vehicle devices, production equipment and more.
CloudPassage announces Cloud Secure for Azure
Cloud Secure, part of the CloudPassage Halo platform, is an automated Cloud Security Posture Management (CSPM) solution that delivers visibility, protection and continuous compliance monitoring for compute, storage, database, networking and identity services. Unlike point-solutions that provide an incomplete and disjointed view of public cloud services, Cloud Secure provides a comprehensive, integrated view of IaaS (Infrastructure-as-a-Service) environments and resources from a single interface.
Veriato announces Cerebral threat intelligence platform
Cerebral is a complete insider threat intelligence platform that integrates behavioral analytics (UEBA), user activity monitoring (UAM) and data breach response (DBR) into a single solution that enables security teams to identify and lock down insider threats with a speed and level of confidence not previously available.
Honeywell’s industrial cybersecurity solution guards against USB device attacks
Secure Media Exchange (SMX) is a cybersecurity solution that protects industrial operators against new and emerging USB threats. SMX now includes patent pending capabilities to protect against a broad range of malicious USB device attacks, which disrupt operations through misuse of legitimate USB functions or unauthorized device actions.