threat prevention

FireEye Demonstrates Superior Email Threat Detection with No-Cost Cloud Email Evaluations

Grazed from FireEye

FireEye, Inc., the intelligence-led security company, today announced the availability of a new capability that allows organizations to evaluate email threat detection efficacy with a no-charge evaluation service powered by FireEye Email Security.

"Email continues to be the most prevalent attack vector, and adversaries are taking advantage. In fact, our recent study found that less than a third of email traffic was considered ‘clean'," said Ken Bagnall, vice president of email security at FireEye. "With the introduction of FireProof Email Threat Analysis, we provide the ability for organizations to assess their cloud email security - at no charge. The evaluation analyzes an organization's delivered email to determine if advanced threats are getting past current defenses. And in the evaluations that we've run for organizations, we've found a significant amount of malware that had bypassed their existing security tools."

A10 Networks Provides Ability for Service Providers to Deliver Cloud Scrubbing Services With Automation and Scale

Grazed from A10 Networks

A10 Networks today announced availability of an advanced solution for Service Providers to deliver more profitable DDoS scrubbing services to their enterprise customers with the A10 Thunder Threat Protection System (Thunder TPS). The new solution reduces TCO via advanced intelligent automation capabilities, continuous machine learning, and greater scale than competing solutions. 

The solution empowers a wide range of service providers to better serve and protect their enterprise customers at scale and increase revenue by delivering highly profitable scrubbing services with differentiated faster mitigation times, lower operating costs, and service delivery options tailored to different business needs. The result is a solution ideal for mobile, internet, cloud, hosting and managed service providers.

A10 provides the advanced intelligent automation capabilities, powered by machine learning, to enable proactive and precise DDoS defenses throughout the entire protection lifecycle. Operators define the networks to be protected and A10 powered defenses do the rest. A10's solution provides granularity at scale to accurately profile and monitor over 100,000 servers and services, distributed over thousands of networks, while enabling up to 3,000 simultaneous attack mitigations.

Cylance Extends AI-Driven Security to Hybrid Environments and Private Networks With CylanceHYBRID and CylanceON-PREM

Grazed from Cylance

Cylance Inc., the company that revolutionized endpoint security by delivering AI-powered threat prevention, today announced the availability of CylanceHYBRID and CylanceON-PREM, two new deployment and management options for CylancePROTECT. Cylance's flagship endpoint security product now serves any environment: public cloud, private cloud and air-gapped networks. 

Nearly two-thirds of enterprise computing still occurs in on-premises data centers, and 90 percent of organizations will adopt hybrid strategies by 2020. Organizations with closed networks, private clouds or limited connectivity face the problem of protecting against both outside and inside threats without exposing their infrastructure to outside connections. In fact, over half of technology leaders cite security as the greatest challenge to both private and hybrid clouds. CylanceHYBRID and CylanceON-PREM close this gap by bringing AI-driven predictive threat analysis to restricted or completely isolated infrastructures.

Nine Top Tips for Staying Safe Online in Work

As an employee of a business, you will spend most of your life in work, from the moment the sun comes up, to the time of day when it starts to sink back down. As with most business positions, you will be spending most of your time online, which means you could be open to security threats that can gain entry to your business. This is a scenario that nobody wants to face, as it can impact a wider demographic than you alone. When you are at work, it's a great idea to follow a bank of simple tips, which will ensure the safety of your and your fellow staff members as you go about your daily business.

Install a trusted anti-virus

Before you go online, you need to make sure that your computer has anti-virus installed. Although your work system will likely have one that covers each monitor, you will still need to have one installed on your own laptop if you are conducting company business on there. There is a range of free anti-viruses you can install, but the best ones are those which you pay a small sum for, which have heightened security features that have your online security at heart.

Capsule8 Launches Beta Release of Industry's Only Threat Prevention and Response Platform for Cloud-Native Environments

Grazed from Capsule8

Capsule8 today launched the beta version of Capsule8 Protect, the industry's first threat prevention and response platform purpose-built for cloud-native environments. Capsule8 Protect brings continuous security to an enterprise's production environment, allowing them to detect and shut down attacks in the instant they happen. The company is conducting private demonstrations of its beta product at Black Hat USA from July 22-27.

Organizations are rapidly shifting toward containerized and microservice architectures. However, this explosive growth brings significant challenges that require solutions to simplify and automate complex security requirements for this next-generation infrastructure. Existing solutions such as security appliances, which rely on IP or host names for monitoring, simply don't work in the dynamic world of containers. Meanwhile container-focused security solutions provide some vulnerability scanning and threat alerting, but cannot protect large amounts of the legacy infrastructure or actually stop attacks from happening.