Juniper Networks fosters adoption of network automation

Juniper Networks released new offerings to accelerate the industry’s adoption of automation practices. With this latest announcement, Juniper is unveiling a collaborative community that includes tools, labs, libraries and an exchange of applications to accelerate automation adoption for companies and individuals. Juniper EngNet features access to virtual devices that run in the cloud, complete with documentation, along with a suite of tools to move from manual to automated operations. To complement Juniper EngNet, Juniper designed … More

AVG 2019 now includes enhanced phishing threat detection

With AVG 2019 customers can now tailor new features for themselves and family members that include additional privacy protection, automatic threat detection using the Artificial Intelligence (AI) technology, and reduced notifications from other apps and programs when using full screen mode. Privacy protection One of the new privacy features in AVG 2019 is Sensitive Data Shield, which allows premium users to safeguard personal data they may have stored on devices in the home with an … More

Arcserve Business Continuity Cloud safeguards complex IT infrastructures

Arcserve unveiled Arcserve Business Continuity Cloud, the fully-integrated, cloud-born solution to prevent the impacts of downtime by restoring access to critical data, systems and applications across IT infrastructures ranging from non-x86 and x86, to software as a service (SaaS) and infrastructure as a service (IaaS). With this solution, Arcserve solves the challenges of protecting modern IT caused by the time, skill, expense and multiple tools needed to protect new workloads. According to new data being … More

InfluxData integrates with Google Cloud IoT Core to improve users’ IoT environments

InfluxData released a Telegraf agent for Google Cloud IoT Core. Now Google Cloud IoT Core users can get insight and analytics from their IoT environments by using the time series database solution to provide insight, improve operational efficiency, and optimize their businesses with real-time decision making and control. Google Cloud IoT Core is a set of tools to connect, process, store, and analyze data both at the edge and in the cloud. InfluxData’s Telegraf is … More

Fidelis Cybersecurity announces support for Microsoft Azure’s virtual network TAP

Fidelis Cybersecurity now supports Microsoft Azure’s virtual network terminal access point (TAP) to enable mirroring of virtual machine (VM) network traffic, without the use of agents, directly to Fidelis Network sensors. Applications and workloads are continuing to migrate to the cloud but security visibility for cloud-based applications has lagged behind. With cyber attackers exploiting weaknesses and access credentials, cloud network traffic analysis is critical for threat detection, threat hunting, and data loss and theft detection. … More

Portnox provides risk assessment and management to all levels of access

Portnox released a solution offering network protection and control to organizations using Microsoft DirectAccess. According to IDC, mobile workers will account for nearly 73 percent of the US workforce by 2020. Organizations with decentralized structure and multiple locations deal with different security issues and risks on the network. To monitor for and combat these risks, Portnox’s NAC as-a-Service solution, Portnox CLEAR, offers the benefits of on-premise NAC solutions, delivering visibility and risk monitoring capabilities from … More

On-demand connectivity to cloud and data center

Enterprises need a secure, fast and easy way to connect their locations and data centers to cloud service providers to support their changing IT application and infrastructure demands. CenturyLink launched Cloud Connect Dynamic Connections, which provides enterprises with control over their networks and gives them the ability to self-provision connections on-demand through a secure portal or via API integration. CenturyLink Cloud Connect Dynamic Connections enables real-time creation and deletion of private Ethernet connections to cloud … More

Symantec expands cloud security portfolio to secure cloud applications and infrastructure

Symantec’s Cyber Defense Platform cloud protection provides visibility and control for any cloud app and integration with CloudSOC CASB, Cloud Workload Protection (CWP) and Data Loss Protection (DLP). It also gives customers the ability to track more risk attributes and scan cloud applications and repositories with new API Integrations. As enterprises move critical infrastructure, applications and workloads to the cloud, they gain advantages in scale, convenience, cost and performance. However, this adoption often comes without … More

Alert Logic extends security to cover any container across multiple platforms

Alert Logic’s update to the Network Intrusion Detection System (NIDS) for containers adds container log management and extends capabilities beyond Amazon Web Services (AWS) to Microsoft Azure, on-premises and hosted environments. Organizations gain a picture of their risk through visibility into any workload in any container, as well as the ability to collect, aggregate and search container log data for security and compliance. According to 451 Research Principal Analyst Jay Lyman, containers can enable faster … More

WhiteHat Security introduces new feature for dynamic single-page application scanning

WhiteHat Security’s new feature for dynamic single-page application scanning in the WhiteHat Sentinel Dynamic product is designed to automate the scanning for, discovery and updating of webpages, links and architecture, seamlessly and without impact on the customer experience. A single-page application (SPA) is a site that interacts with the user by dynamically rewriting the current page rather than loading entire new pages from a server. This approach avoids interruption between successive pages, making the application … More

ZeroFOX introduces new social media and digital protection managed services platform

ZeroFOX launches ZeroFOX OnWatch, a managed monitoring and protection service designed to help companies safeguard themselves against threats plaguing a broad range of platforms, including social media and digital platforms, the surface web, deep and dark web and mobile app stores. With social media serving as a primary communication method for both businesses and individuals, companies are increasing their marketing and advertising budget spend on these platforms. In fact, worldwide social advertising investments are forecasted … More

Centrify spins out IDaaS business as Idaptive

Centrify is spinning out its IDaaS business as a standalone company named Idaptive. Centrify is sharpening its focus on redefining the legacy approach to Privileged Access Management with cloud-architected Zero Trust Privilege to stop the leading cause of breaches — privileged access abuse. Idaptive will deliver Next-Gen Access to protect employees, partners and customers with their IDaaS solution. Tim Steinkopf, Chief Financial Officer, has been named CEO of Centrify effective January 1, 2019. During his … More