Visit our other websites:    Consumer IT    On CE    Mobile Channels    ECI news    rAVe Europe    Digital Signage News    

 

eSP - IT Solution Providers in Europe

  • Full Screen
  • Wide Screen
  • Narrow Screen
  • Increase font size
  • Default font size
  • Decrease font size

Security

Microsoft Bolster Cloud Security With Adallom

E-mail Print PDF
Microsoft Bolster Cloud Security With Adallom

Microsoft coughs up $250 million for Israel-based cloud security specialist Adallom, a purchase the company describes as "the latest example of Microsoft’s commitment to delivering innovative identity and security capabilities."

Rumours of the acquisition initially started back in July 2015, following a report by Israeli business news organisation Globes.

Founded in 2012, Adallom provides identity-based, security-as-a-service protection for enterprise application data and content stored on both on-premises and public clouds. It handles popular cloud applications, including Salesforce, Box, Dropbox, ServiceNow, Ariba and (obviously) Office 365.

Read more...

Gartner: IoT to Change Security "Forever"

E-mail Print PDF
Gartner: IoT to Change Security

According to Gartner by end 2017 20% of enterprises will acquire security services to protect business initiatives using devices and services making part of the Internet of Things (IoT).

“The IoT now penetrates to the edge of the physical world and brings an important new "physical" element to security concerns. This is especially true as billions of things begin transporting data,” the analyst says. “The IoT redefines security by expanding the scope of responsibility into new platforms, services and directions. Moving forward, enterprises should consider reshaping IT or cybersecurity strategies to incorporate known digital business goals and seek participation in digital business strategy and planning.”

Read more...

Check Point SandBlasts Zero-Day Exploits

E-mail Print PDF
Check Point SandBlasts Zero-Day Exploits

Security vendor Check Point claims to stop unknown malware, zero-day and targeted attacks from infiltrating networks with SandBlast, a solution based on new CPU-level exploit detection technologies.

SandBlast uses both sandboxing and emulation technologies to secure enterprises from known and unknown threats. It also has a CPU-level detection engine to pick up on Return Oriented Programming (ROP), an evasion technique able to beat the protection offered by Data Execution Prevention (DEP).

Another feature is Threat Extraction, a means to provide safe versions of content immediately (by converting Word documents to PDFs) while emulation takes place in the background.

Read more...

Accenture Boosts Security With FusionX

E-mail Print PDF
Accenture Boosts Security With FusionX

Accenture acquires FusionX, a Washington, DC-based specialist in cyber attack simulation, threat modeling, cyber investigations and security risk advisory services. Financial details of the deal are not available.

Founded in 2010 by security industry veterans Matthew Devost and Tom Parker, FusionX counts financial services, technology, manufacturing and government organisations as customers. Following acquisition it will be folded within the Accenture suite of global security offerings.

Read more...

Niara, Cloudera Team Up in Big Data Security

E-mail Print PDF
Niara, Cloudera Team Up in Big Data Security

Security vendor Niara forms a partnership with big data platform provider Cloudera in the adding of the Niara Security Intelligence solution to the Hadoop-based Cloudera Enterprise data management platform.

In addition Niara Security Intelligence is tested and validated through the Cloudera Certified Technology Program.

“Today, it’s the threats that have gotten through traditional defenses that grab the headlines and are the hardest to find. Cloudera Enterprise is the ideal platform on which to build a solution that provides big data security analytics,” Niara says. “By aggregating and managing the massive depth and breadth of security data required to drive sophisticated behavioral analytics, Niara not only unearths these attacks but accelerates the investigation and response as well.”

Read more...

Page 33 of 67