Symantec protects Office 365 with DLP and new data rights management

Symantec announced new enhancements to its Data Loss Prevention (DLP) technology to protect information in Office 365. With Symantec DLP, data is protected whether at rest or in transit, on-premises or in the cloud, and everywhere it flows through a management console. Monitoring and protecting data in the cloud generation is a complex task, and GDPR and other similar privacy regulations have raised the stakes on data security, privacy and compliance. As such, companies must … More

The Linux Foundation brings network automation and cloud native communities together

The Linux Foundation announced further collaboration between telecom and cloud industry leaders enabled by the Cloud Native Computing Foundation (CNCF) and LF Networking (LFN), fueling migrations of Virtual Network Function (VNFs) to Cloud-native Network Functions (CNFs). As networks evolve to support services and applications, they will need to embrace characteristics inherent to cloud native architecture, such as scalability, automation, and resiliency. Compared to traditional VNFs (network functions encapsulated in a Virtual Machine (VM) running in … More

Barracuda announces integration with Microsoft Azure Virtual WAN

Barracuda Networks announced support for Microsoft Azure Virtual WAN service through its CloudGen Firewall, extending networking security to organizations looking to deploy Azure Virtual WAN. “Customers want choice and flexibility in the cloud, but they can’t sacrifice security,” said Tim Jefferson, VP Public Cloud at Barracuda. “By using our integration with Azure Virtual WAN, customers can have the best of both worlds — large-scale branch connectivity over Azure Virtual WAN with enhanced network security via … More

Attivo Networks closes serverless and container security gaps through deception

Attivo Networks announced that the company has further enhanced its portfolio with deception techniques designed to detect and derail attacks targeting serverless applications in cloud and data center environments. Designed for the dynamic nature of cloud environments and shared security models, organizations can now add a defense across traditional data centers and within public cloud platforms such as Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform (GCP). Serverless and container architectures are growing … More

Yubico launches YubiKey 5 Series, the multi-protocol security keys supporting FIDO2

Yubico announced the launch of the YubiKey 5 Series, the multi-protocol security keys supporting FIDO2/WebAuthn. With this new addition, the YubiKey 5 Series has the capability to replace password-based authentication with hardware-based authentication. Yubico continues to create authentication technologies that not only work for today’s authentication scenarios, but into tomorrow’s, helping to bridge the gap from existing solutions to a future of passwordless login. The YubiKey 5 series delivers the ease of use, high level … More

Code42 Forensic File Search delivers visibility to file movement across cloud services

Code42 has extended the investigation capabilities of its Code42 Forensic File Search product beyond endpoints to include cloud services, offering security teams visibility to data no matter where it lives and moves. To start, the company is offering this new expanded cloud search capability for Google Drive and Microsoft OneDrive. In the near future, Code42 plans to broaden its support to additional cloud services, such as Box and Slack. Code42 Forensic File Search will save … More

ID R&D announces biometric authentication for messaging platforms

ID R&D releases the biometric authentication technology for messaging. The new solution, SafeMessage, offers multi-layer authentication across messaging platforms without any impact to the user experience. SafeMessage provides authentication of verified users when integrated across messaging platforms, including Signal, WhatsApp, Telegram, Skype, Slack, and others. Using SafeMessage, users will receive a positive ID icon with each incoming message, ensuring the authentic biometric identity of the sender. There are no additional steps that are required by … More

Motorola Solutions adds new features to Ally cloud-based security software

Motorola Solutions announced new features for Ally, its cloud-based security software platform for enterprises in North America. Available now, the enhancements enable communication and real-time information-sharing for security teams. Created for private security companies as well as security teams at hospitals, schools, resorts, manufacturing plants and more, Ally streamlines the management, response and reporting of incidents ranging from an injured employee to more critical situations. “Safety and security are increasingly important in the private sector,” … More

Verint strengthens fraud reduction and improves investigations for financial institutions

Verint Systems continues to experience demand for its integrated solutions for the global banking market. Verint’s Security, Surveillance and Fraud Investigation offerings enable financial leaders to integrate fraud mitigation and risk management to streamline operations and realize stronger security postures. The banking environment faces a new risk paradigm—one that encompasses cyber and physical threats, such as ATM skimming, identity theft, data breaches, scams, and phishing. These types of threats can lead to losses, so banks … More

Verizon Digital Media Services adds managed security services to its Cloud Security Solution

Verizon Digital Media Services announced it has added a managed cloud security offering as part of its global Cloud Security Solution. The managed cloud security component provides access to security professionals who monitor and take corrective action against the security threats, no matter the time of day. The addition of this offering complements features previously available within Verizon Digital Media Services’ Cloud Security Solution, including a dual web application firewall (WAF), distributed denial-of-service (DDoS) protection, … More