Eskenzi PR ad banner Eskenzi PR ad banner

Threat Detection

Tripwire Logo

Tripwire, Inc., a leading global provider of security and compliance solutions for enterprises and industrial organisations, announced with Lastline®, the leader in AI-powered network security, a partnership agreement that will incorporate Lastline’s advanced malware detection technology into Tripwire’s Malware Detection Service. Tripwire’s resulting solution combines Lastline malware analysis with Tripwire® Enterprise's change detection capabilities to identify malware as soon as it is introduced to a system. "Cyber incidents always involve some kind of change to...

Read more
AlienVault Unveils Free Threat-Scanning Service for Endpoint Devices through  Open Threat Exchange.

OTX Endpoint Threat Hunter Delivers Simple, Fast Threat Visibility to Assess Business Risk from Malware and Other Threats. At RSA Conference 2018, AlienVault®, the leading provider of Unified Security Management® (USM) and crowdsourced threat intelligence, today announced the launch of its OTX Endpoint Threat Hunter™, a free threat-scanning service in the Open Threat Exchange® (OTX™) available to any registered OTX user. This first-of-its-kind service natively leverages over 19 million indicators of compromise (IoCs) contributed to...

Read more
Threat Detection

Ensono™, a leading hybrid IT services provider, partnered with Alert Logic, a leading provider of Security-as-a-Service solutions, to deliver continuous monitoring, threat detection and response for Ensono’s managed Amazon Web Services (AWS) clients. Ensono will leverage Alert Logic’s managed security service offering built on Alert Logic Cloud Defender suite to deliver increased security and compliance protection for clients’ data, workloads and applications based on AWS. This new service offering combines security tools, experts and operational...

Read more
AlienVault Unveils Free Threat-Scanning Service for Endpoint Devices through  Open Threat Exchange.

OTX Endpoint Threat Hunter Delivers Simple, Fast Threat Visibility to Assess Business Risk from Malware and Other Threats. At RSA Conference 2018, AlienVault®, the leading provider of Unified Security Management® (USM) and crowdsourced threat intelligence, today announced the launch of its OTX Endpoint Threat Hunter™, a free threat-scanning service in the Open Threat Exchange® (OTX™) available to any registered OTX user. This first-of-its-kind service natively leverages over 19 million indicators of compromise (IoCs) contributed to...

Read more
cybersecurity

A new Total Economic Impact (TEI) study conducted by Forrester Consulting and commissioned by AlienVault, a leading crowdsourced threat intelligence provider, examined the potential return on investment (ROI) for organisations that deployed the AlienVault Unified Security Management (USM) Platform and has revealed excelling results for the product. Organisations that deployed the AlienVault solution saw an 80 percent improvement in threat detection and incident response time, effectively reducing the risk of a security breach and bringing down the...

Read more

SANS Report Sponsored by DomainTools Reveals Cyber Threat Intelligence (CTI) Gaining Momentum as Organizations Battle to Keep Up with Hackers] As cyberattacks and attackers become more blatant and pervasive each year, a new SANS Institute report, in conjunction with DomainTools, shows organizations around the globe are turning towards Cyber Threat Intelligence (CTI) to detect, respond, and ultimately prevent attacks. DomainTools, the leader in domain name and DNS-based cyber threat intelligence, co-sponsored the SANS survey and...

Read more
cybersecurity

The leading provider of Security-as-a-Service solutions, Alert Logic, has announced the results of their recent survey, revealing the latest data points and trends in cybersecurity. The survey was conducted in the UK, Benelux and Nordics, amongst 317 professionals in the security industry. Cybersecurity is all about preventing, detecting and remediating both internal and external threats which companies and government organisations face daily. A continuous stream of new technologies, in various forms, have emerged as a...

Read more

Unlike legacy signature-based detection systems, today’s generation of AI-powered security technologies are rarely suited to a plug-it-in-and-watch-it-light-up evaluation strategy. They often include a mix of supervised and unsupervised machine learning, automated threat hunting, trained classifiers, and focus on reducing the number of erroneous and unactionable alerts. As a result, evaluating their detection efficacy requires carefully planned testing before making a buying decision. For products focused on detecting network-borne threats, it is always wise to account...

Read more
Page 4 of 4 1 3 4