Awake Security enhances its platform with the ability to identify attackers based on their intent
Awake Security introduced Adversarial Modeling, an industry-first capability that gives security teams an unparalleled ability to identify attackers based on their intent. By understanding mal-intent, versus looking for only specific indicators of an attack, Awake greatly improves the ability for organizations to see and stop attackers, especially those that are living-off-the-land.
RocketBroadband’s SD-WAN solution allows businesses to keep critical apps online
RocketSD is a fully managed SD-WAN solution which incorporates multi-carrier 4G/5G connectivity, distributed network monitoring, SD-WAN FlowTracking, AI-based analysis, IntelligentAlerts, and a centralized monitoring dashboard. These features provide centralized visibility showing connectivity and network performance for all business locations using PCs, iOS, or Android.
Dragos ICS app bridges the IT-OT threat detection divide
The app gives customers additional insight into threat activity targeting industrial operations, such as electric power generation or manufacturing. The insights discovered in the Falcon endpoint data provides customers with an early warning mechanism to protect their ICS or OT environments. It is currently the only app in the CrowdStrike Store to be solely focused on detecting ICS-focused threats targeting industrial organizations.
Gigamon Application Metadata Intelligence delivers app visibility to an org’s tools ecosystem
Gigamon Application Metadata Intelligence (AMI) delivers application visibility to an organization’s tools ecosystem.It provides over 5,000 applications-related attributes extracted from network packet data, allowing NetOps, SecOps and analytics tools to quickly identify and troubleshoot performance and security trouble spots.
AWS launches Amazon Quantum Ledger Database
Amazon Quantum Ledger Database (QLDB) is a fully managed service that provides a high-performance, immutable, and cryptographically verifiable ledger for applications that need a central, trusted authority to provide a permanent and complete record of transactions across industries like retail, finance, manufacturing, insurance, and human resources.
Apricorn launches Central Database version of the Aegis Configurator
In addition to the original Aegis Configurator feature set, the Central Database version allows for a corporate license to create and store Aegis Secure Drive configurations, settings, and logfiles on a corporate-wide server, either online or on-prem, an unlimited number of admins / users, and four levels of user group access with preset role permissions for each.