Search results for: software


Veritas InfoScale 8 provides storage optimization for stateful Kubernetes critical workloads

Veritas Technologies announced the next evolution of Veritas InfoScale that will enable customers to deploy InfoScale as containers in native Kubernetes platforms, including Red Hat OpenShift. Native deployment will make it easier to provide InfoScale’s high availability, persistent storage and storage optimization for stateful Kubernetes critical workloads. “Containerization is revolutionizing the data center, allowing applications to burst and shrink their processing capacity to reduce costs and deliver scalability,” said Karthik Ramamurthy, vice president of product … More

Datto SaaS Defense protects cloud-based applications for MSPs

Following its acquisition of Israel-based cyber threat detection company BitDam earlier this year, Datto debuted its SaaS Defense security product built exclusively for MSPs. The advanced threat protection and spam-filtering solution provides MSPs with patented technology to proactively detect and prevent malicious malware, phishing, and Business Email Compromise (BEC) attacks that target Microsoft Exchange, OneDrive, SharePoint, and Teams. “MSPs protect and manage more Microsoft 365 accounts collectively than any one enterprise. This technology will now … More


Axio QuickQuant prepares CISOs to quantify their cyber risk in dollar terms

Axio released QuickQuant, a new cyber risk tool that allows CISOs to quantify their cyber risk in dollar terms. QuickQuant helps security and business leaders maximize cyber risk reduction by illuminating the cyber risks that could lead to a business-crippling event – like ransomware. The impact-based solution enables security and business leaders to align on the cyber risks that matter most to the business, and to deliver results quickly, transparently, and in a language that … More


Keysight’s IoT Security Assessment software offers automated cybersecurity validation of IoT devices

Keysight Technologies has delivered a new Internet of Things (IoT) Security Assessment software solution that enables IoT chip and device manufacturers, as well as organizations deploying IoT devices, to perform comprehensive, automated cybersecurity assessments. Increasing numbers of connected IoT devices enable hackers to leverage cybersecurity vulnerabilities for a range of attacks including malware, ransomware and exfiltration of data. According to Statista, the total installed base of IoT connected devices worldwide is projected to grow to … More


Okta expands customer identity and access management offerings to improve security for users

Okta announced continued growth and advancements in both Okta’s and Auth0’s Customer Identity and Access Management (CIAM) offerings. The team unveiled new capabilities from Okta’s Customer Identity products, including Device Authorization Grant, Branding, and Custom Administrator Roles. The development time and continuous optimization required to deliver digital experiences across devices and applications is increasingly burdensome and complex for companies in today’s marketplaces. It requires customization per application, specific coding, and additional security measures to protect … More


CircleCI server 3.2 allows enterprise teams to secure installation environments

CircleCI announced insights and enhanced installation features to their self-hosted server offering. CircleCI’s self-hosted server solution offers software engineering teams the ability to scale under load and run multiple services at once, all within an individual’s Kubernetes cluster and network, but with the full CircleCI cloud experience. It increases privacy, efficiency, and collaboration across teams, which is especially useful for teams working in healthcare, finance, and other industries with high governance and compliance standards. “Users … More

SentinelOne achieves AWS Security Competency status to help customers in defending cloud workloads

SentinelOne announced that the company has achieved Amazon Web Services (AWS) Security Competency status. The designation recognizes SentinelOne’s deep technical expertise and proven customer success protecting user endpoints and securing cloud adoption. As an AWS Partner, SentinelOne is committed to working closely with AWS customers to secure their cloud estates from the evolving threat landscape. The competency designation differentiates SentinelOne as an AWS Partner Network (APN) member that provides specialized software designed to help enterprises … More


How do I select a SASE solution for my business?

Many organizations have turned to SASE adoption as a result of the pandemic, seeing it as a a security-first initiative, a recent survey has revealed. The report found that 48% of those surveyed view SASE as a security-first initiative, while 31% see it as a network-first strategy. SASE adoption is most often being led by senior IT leaders, and is still relatively early, with only 37% having begun implementing a plan. But while it can … More


Organizations losing business due to connected product security concerns

59% of executives with cybersecurity decision-making responsibility at large and mid-sized companies say that their organizations have lost business due to product security concerns for connected devices and embedded systems, according to a Ponemon Institute survey. The results highlight a growing need to strengthen supply chain security by securing connected devices, including those connected to the Internet of Things (IoT). 45% of respondents’ customers want detailed information about the components of their devices, but only … More


ThreatMapper: Open source platform for scanning runtime environments

Deepfence announced open source availability of ThreatMapper, a signature offering that automatically scans, maps and ranks application vulnerabilities across serverless, Kubernetes, container and multi-cloud environments. Scanning runtime environments ThreatMapper is an open source platform for scanning runtime environments for software supply chain vulnerabilities and contextualizing threats to help organizations determine which to address and when. Taking threat feeds from more than 50 different sources, the comprehensive suite of ThreatMapper capabilities and features are available on … More


Everyday cybersecurity practices inadequate among many online consumers

Bitdefender released a report which reveals how consumers across various age groups and socio-demographic backgrounds behave on popular platforms, applications and devices, affecting cybersecurity risk. Findings show basic practices for securing data, protecting identity and sharing information are lacking despite increased threats and heightened concern over cybercrime. “Understanding consumer online security behavior trends is crucial for strengthening cybersecurity across society at large,” said Bogdan Botezatu, director, threat research and reporting at Bitdefender. “Cybercriminals continuously explore … More


Storage systems vulnerabilities: Act now to avoid disasters

Continuity issued a research report which provided an analysis of the vulnerabilities and misconfigurations of enterprise storage systems. The findings revealed that storage systems have a significantly weaker security posture than the other two layers of IT infrastructure: compute or network. These findings are alarming given the fact that, unlike an attack on individual endpoints or servers, which can cause problems, an attack that targets storage systems can be truly devastating. A compromise of a … More