Visit our other websites:    Consumer IT    On CE    Mobile Channels    ECI news    rAVe Europe    Digital Signage News    

 

eSP - IT Solution Providers in Europe

  • Full Screen
  • Wide Screen
  • Narrow Screen
  • Increase font size
  • Default font size
  • Decrease font size

Security

ThetaPoint and Securonix Team Up in Security

E-mail Print PDF
ThetaPoint and Securonix Team Up in Security

User and entity behaviour analytics specialist Securonix announces a partnership with ThetaPoint, a provider of strategic consulting and managed security services, in the development of enterprise security solutions.

Securonix is the first developer of user and entity behaviour analytics (UEBA) to fight advanced, targeted, cyber and insider threats. It offers products combining machine learning and AI with advanced Deep Learning and behaviour anomaly detection techniques to capture threats in near real-time.

Meanwhile ThetaPoint helps customers plan, build and run SIEM and log management platforms, and works with technology providers to properly align capabilities with client needs.

Through the partnership Securonix will apply analytical capabilities to security management tools to extract actionable security intelligence from the data generated by SIEMs, security logs, non-traditional data sources, industry-specific applications and additional data sources. The result should be a security solution able to detect threats from anywhere with "unprecedented accuracy."

Read more...

Sophos Covers Endpoint Security With Intercept X

E-mail Print PDF
Sophos Covers Endpoint Security With Intercept X

Sophos announces Intercept X-- a next-generation endpoint security product the company claims stop zero-day malware, unknown exploit variants and stealth attacks while offering "advanced" anti-ransomware features.

Intercept X works alongside existing endpoint security software from any vendor, and boosts protection by detecting and stopping malicious code before it executes. As Sophos puts it, the software combines 4 critical security components, namely Signatureless Threat and Exploit Detection (defends against zero-day, unknown and memory resident attacks and threat variants), CryptoGuard (identifies and intercepts malicious encryption activity), Root Cause Analytics (shows where attacks came in, what was affected, where it may have stopped and recommended actions) and Sophos Clean (hunts for and removes all spyware and lingering malware).

Read more...

EET Europarts Buys Agix

E-mail Print PDF
EET Europarts Buys Agix

EET Europarts makes an 8th acquisition this year with Agix, the French surveillance and security distributor. Financial details of the deal are not available as yet.

Founded in 1983, Agix specialises in IP surveillance solutions such as network cameras, software and network video recorders (NVRs). It also offers technical training and product support.

"Agix Distribution has a strong position in the French market, distributing quality products to professional surveillance customers, so it is a perfect match for EET Europarts," the distributor says. "Additionally the acquisition will further enhance EET Europarts┬┤ longstanding cooperation with Axis Communications, the market leader in network video."

Read more...

Cisco Patches Critical ASA Firewall Flaw

E-mail Print PDF
Cisco Patches Critical ASA Firewall Flaw

Cisco starts releasing security patches for a critical flaw affecting Adaptive Security Appliance (ASA) flaws-- one involving an exploit linked to the US National Security Agency (NSA).

Dubbed ExtraBacon, the exploit was recently discovered in networking hardware from Cisco and Fortinet. It is the work of a group called Shadow Brokers, who claims to have stolen "cyber weapons" from the Equation, a group believed to be an elite NSA hacking unit through its use of a 16-character string listed in an NSA manual leaked by Edward Snowden. ExtraBacon is actually just part of the toolset obtained by Shadow Brokers, and the full leaked set is currently available on auction for a million bitcoins.

The exploit affects versions 8.4(4) and earlier of ASA software, although it can be modified to work on newer versions. It involves a buffer overflow vulnerability in the Simple Network Management Protocol (SNMP) implementation, and allows attackers to remotely execute rogue code in affected devices through traffic sent to the SNMP interface.

Read more...

How Many Firms Comply With Privacy Shield?

E-mail Print PDF
How Many Firms Comply With Privacy Shield?

The US government releases a list of firms compliant with Privacy Shield US-EU security agreement-- one showing Microsoft as the only big name in public cloud holding the necessary credentials.

Launched back in 12 July, Privacy Shield is a self-certification process for US companies wanting to deal in the transfer and storage of both HR and non-HR data from the EU. So far just 35 companies have completed the process, most of which are smaller or more specialised players. In fact, apart from Microsoft the biggest names on the list are Salesforce and Workday, while the likes of Google, AWS, Rackspace and Facebook are conspicuously absent.

Read more...

Page 7 of 48