Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Friday, 31 March, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

Daily News Digest- 25th Feb – RSA news round-up

by The Gurus
February 25, 2014
in Opinions & Analysis
Share on FacebookShare on Twitter

Here we are on day two of RSA and the news has been rolling in. We have rounded up a selection of announcements for the IT Security Guru.
Check Point has introduced Software-defined Protection (SDP), a three-layer security architecture that protects against new and emerging threats through a design that is modular, agile and secure. SDP converts threat intelligence into immediate protections and is managed by a modular and open management structure.
There are a multitude of point security products that are reactive and tactical in nature rather than architecturally oriented,” said Amnon Bar-Lev, president at Check Point. “We developed SDP in response to this gap, and to give organisations an agile and secure security infrastructure.”
CA Technologies announced new and updated identity-based solutions to help secure the increasing number of cloud, web and mobile applications for improved application performance and security and user convenience from the client to the backend.
“The expansion of mobile and cloud use and the growth in API adoption has opened the enterprise and further complicated the security challenge of balancing business enablement with business protection,” said Mike Denning, senior vice president and general manager, Security business, CA Technologies.
CA’s identity and access management (IAM) solutions help ensure the right users and devices have the right access to the right data—whether the user is a developer building the latest cloud mashup or mobile app, a customer accessing his or her mobile banking application or an employee accessing a corporate cloud service.
Blue Coat Systems, Inc. announced it is collaborating with HP to deliver a transformative lifecycle defense to combat the onslaught of advanced persistent threats. The new solution provides operational control across detection, isolation and remediation by aligning perimeter protection with actionable security intelligence and analytics.
“The number of successful breaches continues to surge despite higher levels of investment in security defenses, which calls for a new approach that enables seamless sharing of threat intelligence information across the industry,” said Rob Greer, vice president and general manager, TippingPoint , Enterprise Security Products, HP. “Through collaboration with Blue Coat, HP is addressing this challenge head on, bringing together powerful, complementary security solutions that can provide an integrated defense that continues to get smarter as new threats are discovered.”
Vormetric has announced that it will be demonstrating its cloud security technology with Virtustream and Intel. The project, which has been fostered by the SAP Co-Innovation Lab, demonstrates the SAP HANA platform running in the cloud on the latest Intel Xeon processor E7 v2 family. The managed service is performed by Virtustream, and security for the persistent storage in SAP HANA is provided by Vormetric Data Firewall through privileged-user controls, encryption, and security intelligence that have no noticeable performance impact on the user experience. The Vormetric technology makes it possible for the customer to be the sole custodian of the keys in encryption and access control.
Ashvin Kamaraju, vice president of product development and partner management at Vormetric, said, ” Our goal is to ensure customers always control their data, deny third-party administrators access to sensitive data, and give customers the visibility they need for security and compliance. Vormetric is excited to be part of the technology leadership team that the SAP Co-Innovation Lab has brough
t together to develop innovative cloud solutions that are secure and high-performing at scale.”
Emulex Corporation , specialist in network connectivity, monitoring and management, announced the Endace Fusion Connector for Sourcefire Defense Center, enabling 100 per cent packet capture at speeds up to 100Gb Ethernet (100GbE) and seamless click-through workflow between the security event and the packets on the EndaceProbe™ Intelligent Network Recorders (INRs). This allows rapid response and root cause analysis, drastically reducing the time and operational overhead of packet data access. By narrowing the time gap between alert, investigation, and response, the overall effectiveness of the Security Operations (SecOps) team increases, translating to improved system uptime, higher customer satisfaction and increased business continuity.
Tripwire® debuted SecureScan™, a free, cloud-based vulnerability management service for up to 100 Internet Protocol (IP) addresses on internal networks. This new tool makes vulnerability management – a widely recognized security best practice among large corporations – easily accessible to small and medium-sized businesses that may not have the resources for enterprise-grade security technology.
“Our goal is to raise the bar for cybersecurity because we want to help make the Internet a safer place for everyone,” said Dwayne Melancon, chief technology officer for Tripwire. “As more individuals connect to corporate networks from remote locations, it is increasingly important to find ways to limit the risk these connections introduce to company networks. This will become even more critical as the ‘Internet of Things’ leads to more Internet-connected devices on our home networks, increasing the opportunity for compromise.”
Qualys, Inc., a provider of cloud security and compliance solutions, announced the general availability of its QualysGuard Web Application Firewall (WAF) service for web applications running in Amazon EC2 and on-premise. Deployed as a virtual image alongside web applications, the QualysGuard WAF can be set up and configured within minutes, enabling organisations to easily provide protection for their websites.
“Large organisations typically have thousands of web applications to protect, while smaller businesses don’t have the resources and IT staff to protect them,” said Philippe Courtot, chairman and CEO for Qualys. “The general availability our WAF service will offer customers the flexibility they need to protect their applications no matter where they reside and whether they have a few or thousands of them.”
That’s it for today, but stay tuned for more news throughout the rest of the busy week.

FacebookTweetLinkedIn
Tags: RSA Conferencesecurity news
ShareTweetShare
Previous Post

News from Mobile World Congress 2014

Next Post

MasterCard testing security feature that okays purchases based on phone location

Recent News

Data Privacy Day: Securing your data with a password manager

For Cybersecurity, the Tricks Come More Than Once a Year

March 31, 2023
cybersecurity training

Only 10% of workers remember all their cyber security training

March 30, 2023
Pie Chart, Purple

New API Report Shows 400% Increase in Attackers

March 29, 2023
Cato Networks delivers first CASB for instant visibility and control of cloud application data risk

Cato Networks Recognised as Leader in Single-Vendor SASE Quadrant Analysis

March 29, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information