Waterfall for IDS: Hardware-enforced security between OT networks and IDS sensors
Waterfall for IDS provides hardware-enforced security that deploys transparently between OT networks and IDS sensors. Hardware-enforced security enables the OT sensors to be deployed confidently on IT networks where those sensors can be conveniently adjusted and updated by central security analysts.
Cyber Security Evaluation Tool 9.2 released
CSET is a desktop software tool that guides asset owners and operators through a consistent process for evaluating control system networks as part of a comprehensive cybersecurity assessment that uses recognized government and industry standards and recommendations.
STEALTHbits releases StealthDEFEND 2.2, its real-time threat detection and response platform
With the enhancements delivered in StealthDEFEND 2.2, security professionals can now identify forged Kerberos Privileged Attribute Certificates and detect when the Ntds.dit file – Active Directory’s database – is being tampered with. Both of these attack vectors are very difficult to detect via native means, potentially draining resources with no guarantee of detection.
WatchGuard launches new cloud-managed outdoor Wi-Fi access point
The ruggedized enclosure and external antenna connectors enable the WatchGuard AP327X to thrive in extreme conditions such as snow, rain, and dust; or in locations that require flexible antenna pattern coverage capabilities. The AP327X is ideal for delivering secure outdoor Wi-Fi coverage to school campuses, warehouses, manufacturing yards, malls, public hotspots, and municipal deployments.
Adaptiva launches Evolve VM, a life cycle vulnerability management product
Adaptiva Evolve VM automatically assesses endpoints for thousands of vulnerability, compliance, and health issues and remediates them as soon as they are detected. Utilizing NIST’s National Vulnerability Database and National Checklist Program Repository as well as hundreds of built-in custom client health checks, Evolve VM leverages Adaptiva’s peer-to-peer technology to address problems without any impact on network performance.