Global news for cybersecurity integrators
Trend Micro rebrands endpoint security offering
Trend Micro Apex One aims to redefine endpoint security with consistency across SaaS and on-premises deployments.
McAfee announces new endpoint protection and cloud security products
For organisations to adopt the cloud with peace of mind, they not only need visibility, but consistent data and threat protection policies across their data and applications.
Frost and Sullivan recognises ForeScout’s achievements in NAC
ForeScout Technologies has announced it is the recipient of the Frost and Sullivan Growth Excellence Leadership Award in the network access control (NAC) market.
More OT devices added to Tenable's industrial security offering
Most operational technology systems run in heterogeneous environments, with devices from numerous industrial vendors, often relying on unique, proprietary protocols.
SailPoint improves security and compliance with SaaS update
New in IdentityNow is the Dynamic Discovery Engine, which allows users to easily and quickly create policies, access reviews, dashboards and reporting.
CyberArk launches privileged session management for cloud
An external attacker or malicious insider who is able to hijack these types of user credentials could shut down cloud environments.
ManageEngine adds user behaviour analytics to ADAudit Plus
With its dynamic alert thresholds, ADAudit Plus reduces the number of false positives and buys ample time for security teams to focus on the real indicators of compromise.
Securonix and Cylance partner to drive end-to-end security offering
The two products will provide security operations centre (SOC) teams with a view of both cloud and endpoint security events.
A/NZ businesses taking IoT security more seriously - MapR
53% of A/NZ companies now believe that keeping IoT secure is the greatest challenge they face in rolling out their IoT capabilities.
Frost & Sullivan: Pulse Secure among best NACs for SMB to large enterprise
The recent Frost and Sullivan 2018 Network Access Control (NAC) Market, Global, Forecast to 2022 report states that network visibility is critical.
Carbon Black announces enhanced cloud security offering
The Cb ThreatHunter announcement was made from the company’s annual user conference #CbConnect18 in New York.
Organisations still can’t get access management right - One Identity
These and other findings paint a bleak picture of how many organisations approach IAM and PAM programs.
Cryptomining dethrones ransomware as 2018’s top threat - Webroot
This report also highlights the importance of implementing a robust and evolving security approach to protect valuable data and keep systems secure.
Google shutting down Google+ after covering up privacy bug
Google’s management was aware of the bug but chose not to share it with the public to avoid scrutiny by regulators.
Industrial control systems: How to approach OT cybersecurity
As the ICS industry gives more consideration to cybersecurity, vendors must develop a more holistic view.
Security spending to reach $133.7bil in 2022 – IDC
The United States will be largest geographic market for security solutions with total spending of $39.3 billion this year.
Carbon Black: Is your cyber panic room ready?
Cyber spies and cyber criminals alike are setting our networks on fire.
Palo Alto Networks to expand cloud security capabilities with RedLock acquisition
The acquisition is expected to close during Palo Alto Networks fiscal first quarter, subject to the satisfaction of customary closing conditions.
How network visibility tools are changing the security game
Without visibility into the behaviours occurring within a network, it’s almost impossible to detect if what’s happening is out of the ordinary.
Automated technology could save financial institutions nearly $10 million a year
“We’re removing some compliance complexity for our clients and offering the peace of mind that then allows them to focus on investigations that pose a real threat.”
Exclusive interview: Gemalto’s channel strategy for A/NZ
Earlier this year, Gemalto appointed Tech Data as a distributor for its portfolio of SafeNet identity and data protection solutions in New Zealand.
Ping Identity providing second-factor authentication for Microsoft Azure
The solution gives users the freedom to put MFA everywhere it is needed for employees, partners and customers.
40 million more likely affected by massive Facebook data leak - Bitdefender
Almost 50 million accounts have been compromised through a daisy-chained vulnerability in the View As feature, which allowed an unknown party to snatch authentication tokens of 50 million users.
Owning up to cloud security - who is responsible?
Many organisations are still struggling to secure their clouds – earlier this year, Australian cloud-based recruitment and HR software provider PageUp exposed two million passwords following a malware infection.
Conspiracy looms: NSS Labs takes CrowdStrike, ESET, Symantec & AMTSO to court
Cybersecurity testing organisations NSS Labs is accusing three major security firms and an industry body of boycotting independent security tests of their products.
Hitachi Vantara announces improved container security and multicloud support for devops and data services
Hitachi Vantara is partnering with Aqua Security to add security capabilities to the HEC Container Platform service.
Overview of Microsoft's artificial intelligence strategy
We look into the three key areas of Microsoft's artificial intelligence strategy
Why Microsoft is in the security business for all the right reasons
Our perception of Microsoft and it's presence in the cyber-security sector needs updating
Barracuda introduces email protection bundle for channel partners
“Email security is now viewed as mission-critical and requires a multi-layered security approach.”
Microsoft makes security offerings available to nation states and law enforcement
Microsoft aims to empower IT to unlock the security capabilities of the intelligent cloud to tip the scales in the cyber war.
Gartner names Sophos leader in Unified Threat Management
“We develop our cybersecurity products to work together as a system, enabling our defences to be as coordinated as cyber attacks.”