Qualys is making its Global IT Asset Discovery and Inventory app available to all businesses for free
Qualys is making its Global IT Asset Discovery and Inventory app available to all businesses for free. In a world where connected devices are exploding, visibility across all devices and environments is critical.
Capsule8 Protect now solves production security’s data warehousing problem
Capsule8 announced Investigations, new functionality that adds full endpoint detection and response (EDR)-like investigations capabilities for cloud workloads to Capsule8 Protect, its high-performance attack protection platform for Linux production environments.
Avast Secure Browser enhanced with built-in memory and battery-saving controls
Alongside the performance updates, Avast Secure Browser’s Anti-Fingerprinting technology has been upgraded to protect user identities against advanced data gathering methods and tailored attacks by cybercriminals looking to exploit installed software modules.
Attivo Networks’ portfolio enhancements lock down endpoints so attackers cannot advance
The company’s ThreatDefend Detection Platform provides a comprehensive deception fabric that interweaves decoys, lures, and breadcrumbs throughout the network. By blending in seamlessly with the production environment, the deception fabric sets landmines and bait to derail attackers and alert on their presence.
Gurucul Network Behavior Analytics solution provides identification of advanced and unknown cyber threats
The Gurucul Network Behavior Analytics solution delivers flexible entity modeling to monitor and identify unusual, risky behavior from any entity. This includes traditional devices like workstations, servers and firewalls, as well as extended network devices such as Robotic Process Automation (RPA) processes, IoT devices (CCTV, vending machines), OT infrastructure (automation sensors used in manufacturing and utility industries) and POS devices.
Elastic Cloud Enterprise 2.3 features role-based access control
Elastic Cloud Enterprise 2.3 is now available, bringing one of the most anticipated features, role-based access control (RBAC), into general availability. The addition of RBAC capabilities to ECE allows organizations to safely expand self-service access to ECE for a larger group of users, and relieve some of the operational load off of ECE admins.