Search results for: zero trust


Product showcase: Enclave – using zero trust network access to simplify your networks

A huge number of Internet-accessible systems are protected by the principle of connect, then authenticate. This includes VPNs, web applications, databases, Windows Servers with RDP endpoints exposed, and more. Having a “private” system which is publicly-accessible means that connecting parties must connect before they can authenticate, an approach which means your private system is one phishing email, brute-force attempt or zero-day vulnerability away from being breached. Enclave is a new way to protect private systems. … More

security platform

Axis Security Atmos protects sensitive business data from cyberthreats or high-risk users

Axis Security set a new standard for securing the modern workplace today with the launch of Atmos. Short for “Atmosphere,” Atmos is the modern alternative to legacy hub and spoke network architectures, and Security Service Edge (SSE) platforms that have datacenter-based architectures. Atmos helps IT avoid the need to connect users to the corporate network, drastically reduce exposure to ransomware threats, and spend less time on costly, and complex, firewall-based network segmentation. The cloud-native platform … More


Silverfort raises $65 million to help enterprises stop identity-based attacks

Silverfort has closed $65m in Series C funding led by Greenfield Partners, alongside several VC’s and strategic investors, including GM Ventures, Acrew Capital, Vintage Investment Partners and existing investors StageOne Ventures, Singtel Innov8, Citi Ventures, Aspect Ventures and Maor Investments. The new investment, which brings Silverfort’s total funding to over $100m, follows rapid growth which saw Annual Recurring Revenue triple with hundreds of customers – including Fortune 100 companies. The funding will be used to … More


How to achieve better cybersecurity assurances and improve cyber hygiene

How can your business reduce the risk of a successful cyber attack and create a defendable network? It’s best to start with the three don’ts: Don’t believe that network engineers are immune to misconfiguring devices (including firewalls, switches, and routers) when making network changes to meet operational requirements. Human error creates some of the most significant security risks. It’s typically not the result of malicious intent – just an oversight. Technicians can inadvertently misconfigure devices … More

infosec products

New infosec products of the week: April 8, 2022

Here’s a look at the most interesting products from the past week, featuring releases from ColorTokens, Forescout, Fortinet, IBM, Imperva, Keysight Technologies, and Orca Security. IBM z16 protects data and systems against current and future threats IBM unveiled IBM z16, IBM’s next-generation system with an integrated on-chip AI accelerator—delivering latency-optimized inferencing. This innovation is designed to enable clients to analyze real-time transactions, at scale — for mission-critical workloads such as credit card, healthcare and financial … More


Organizations underestimating the seriousness of insider threats

Imperva releases data that shows organizations are failing to address the issue of insider threats during a time when the risk is at its greatest. New research, conducted by Forrester, found that 59% of incidents in EMEA organizations that negatively impacted sensitive data in the last 12 months was caused by insider threats, and yet 59% do not prioritize insider threats the way they prioritize external threats. Despite the fact that insider events occur more … More

security platform

Absolute announces product enhancements to improve zero trust security posture for organizations

Absolute Software announced enhancements to its Secure Access product portfolio (formerly NetMotion by Absolute), enabling customers to minimize risk exposure and further optimize the user experience in today’s borderless, work-from-anywhere environments. With this release, Absolute is delivering a broad range of new product innovations including self-healing Zero Trust Network Access (ZTNA); a resilient deployment architecture, and expanded network and ZTNA policy intelligence. Absolute was recently included as a Representative Vendor in the February 2022 Gartner … More

security platform

Keysight CyPerf 2.0 enables NEMs to validate devices in distributed cloud networks

Keysight Technologies released CyPerf 2.0, a new subscription-based software solution that enables network equipment manufacturers (NEMs) to validate the performance and security of their offerings when deployed in complex distributed cloud environments utilizing zero trust security policies. Traditional networks have evolved into complex distributed cloud environments where applications or services can access resources anywhere—within private, public or hybrid clouds. The highly dynamic nature of these new environments demands a new zero trust network access (ZTNA) … More


Nicolas Chaillan joins Tetrate Board of Advisors

Tetrate announced that Nicolas Chaillan will serve as a strategic advisor to the company. Chaillan became the first U.S. Air Force and Space Force Chief Software Officer in 2019 and served in that role through 2021. He also has held IT leadership roles in the U.S. Department of Defense and Department of Homeland Security, where he developed cloud, cybersecurity, DevSecOps and software initiatives. In the business world, Chaillan is a C-level executive and serial entrepreneur … More


Skyflow hires Robin Andruss as Chief Privacy Officer

Skyflow announced that Robin Andruss, formerly Twilio’s Data Protection Officer and Director, Global Privacy Governance, has joined Skyflow as Chief Privacy Officer. In this role, she will oversee the company’s privacy and data protection commitments for Skyflow’s Data Privacy Vaults for enterprise, fintech and healthcare organizations. With ongoing changes in privacy laws, data-sharing agreements and security recommendations by the US and EU governments, companies of all sizes are navigating an ever-evolving landscape. In her new … More


63% of organizations paid the ransom last year

A record 71% of organizations were impacted by successful ransomware attacks last year, according to a CyberEdge Group report, up from 55% in 2017. Of those that were victimized, 63% paid the requested ransom, up from 39% in 2017. As to why more organizations today, like Colonial Pipeline, CNA Financial, and JBS Holdings, are paying ransoms, there are three explanations: Threat of exposing exfiltrated data. Most modern ransomware attacks not only encrypt compromised data, but … More

Keeper Compliance Reports

Keeper Compliance Reports

In this video, Craig Lurey, CTO and Co-Founder of Keeper Security, talks about the new secure add-on to the Keeper enterprise platform, called Compliance Reports. Keeper Compliance Reports allow Keeper Administrators to monitor and report the access permissions of privileged accounts across the entire organization, in a zero-trust and zero-knowledge security environment. As identity and access management (IAM) cybersecurity regulations increase, organizations require comprehensive policies and tools to ensure compliance. The ability to audit and … More