Awake Security enhances its platform with the ability to identify attackers based on their intent

Awake Security, the only advanced network traffic analysis (NTA) company that delivers a privacy-aware solution, announced enhancements to its platform including the introduction of Adversarial Modeling, an industry-first capability that gives security teams an unparalleled ability to identify attackers based on their intent. By understanding mal-intent, versus looking for only specific indicators of an attack, Awake greatly improves the ability for organizations to see and stop attackers, especially those that are living-off-the-land. Awake’s Adversarial Modeling … More

NICE Actimize expands its Financial Crime Enterprise Consulting & Advisory Practice

Strengthening its role as a proven end-to-end full-service provider, NICE Actimize, a NICE business and the leader in autonomous financial crime management, has added new service offerings to its world-class Financial Crime Enterprise Consulting & Advisory Practice (eCAP). Designed to meet the financial crime and compliance challenges facing today’s financial services organizations, the three new expanded offerings include: Data Services, Application Managed Services, and Client Self-Sufficiency Services. Leveraging its global experience across financial crime management … More

DivvyCloud’s channel partner program broadens firm’s global footprint and helps meet market demand

DivvyCloud, the leading independent provider of security and compliance automation for cloud and container environments, announced a new channel partner program designed to broaden the company’s global footprint and help meet the demand for its solution. The program is launching with inaugural partners Trace3, Slalom, Optiv, BigCo. SmallCo., Cloud49, ThunderCat Technology, and World Wide Technology. All were selected for their digital transformation and cloud security competency, positive reputations and respectability in the IT industry, and … More

AVSystem’s enhanced DOCSIS Provisioning solution simplifies DOCSIS devices deployment

AVSystem is proud to announce the release of new DOCSIS Provisioning solution that will help telcos efficiently deploy and manage DOCSIS devices. The goal is to manage old and new DOCSIS devices as well as CPEs from other access technologies such as FTTx in one comprehensive platform. DOCSIS has been around for about 20 years now, and the standard has gone through various updates from 1.0 version to version 3.1/4.0 which enables high transmission rates … More

Asema integrates Cohesity technology into its own production environment

Cohesity announced that it has deployed its next-generation data protection solution with Asema, a leading managed service provider in France, for Asema’s own workloads, and for those of its customers too. With 20 years of experience in data protection, Asema protects more than 1,500 TB of customer data. To adapt to rapid market changes, starting in 2017, the company transformed from serving as a traditional integrator to a managed services provider (MSP). Asema developed ‘Alter’, … More

Jungle Disk adds cybersecurity awareness training to its Complete Cybersecurity Suite

Jungle Disk announced that it has added cybersecurity awareness training to its Complete Cybersecurity Suite providing small businesses access to a comprehensive cybersecurity solution to protect their business. This is the first time the training and tools needed to secure a small business have been available as a monthly subscription service. The cybersecurity awareness training is an automated online learning solution that incorporates training modules, assessments and phishing simulations. In addition to cybersecurity awareness training, … More

Proofpoint and Okta help orgs protect their most at-risk users from sophisticated cyberattacks

Proofpoint, a leading cybersecurity and compliance company, announced an expansion to its technology partnership with Okta, the leading independent provider of identity for the enterprise, to bolster how organizations protect their most at-risk users from sophisticated cyberattacks. Through this streamlined integration, joint customers can leverage Proofpoint’s people-centric Targeted Attack Protection attack index, which scores threats based on their criticality, to identify their very attacked people (VAPs) and apply stronger access controls to better protect those … More

Comcast Business, Fortinet and Akamai drive innovation in cloud-based cybersecurity solutions

Comcast Business announced two strategic initiatives aimed at driving increased innovation in cloud-based cybersecurity solutions for customers of all sizes – SMB through Enterprise. The collaborations with industry leaders Fortinet and Akamai were announced during Comcast Business’ 5th annual Analyst Day at the Comcast Technology Center in Philadelphia. “In today’s hyper-connected world, cyberthreats are becoming more sophisticated and prevalent. No organization is too large or too small to be a target,” said Bob Victor, SVP … More

HackerOne concludes its bug bounty challenge with the National University of Singapore

HackerOne, the number one hacker-powered pentesting and bug bounty platform, announced the successful conclusion of its bug bounty challenge with the National University of Singapore (NUS). NUS is the first university in Singapore to actively incentivize its own students to hone their hacking skills through a bug bounty challenge. A bug bounty challenge is used by organizations to incentivize ethical hackers to look for software vulnerabilities in exchange for a monetary rewards or ‘bounties’ in … More

SyncDog partners with Symantec to address full spectrum of mobile security concerns

SyncDog, the leading Independent Software Vendor (ISV) for next generation mobile security and data loss prevention, announced their partnership with the world’s leading cyber security company, Symantec. This partnership will integrate Symantec’s Endpoint Protection (SEP) product into SyncDog’s Secure.Systems platform to enable end-users to remain protected on both managed and unmanaged devices, ensuring they are secure before allowing them to access or download sensitive corporate data. The BYOD market is on course to hit almost … More