Fastly, Inc. has launched Fastly Managed Security Service, a premier 24/7 threat detection and response service dedicated to helping organizations significantly reduce the risk of web application attacks and associated business costs due to lost transactions. Available to Fastly’s global Next-Gen WAF customers, Fastly Managed Security Service further demonstrates the …
Read More »Check Point Software Introduces Quantum SD-WAN
Check Point® Software Technologies Ltd. (NASDAQ: CHKP), a provider of cyber security solutions globally, has today introduced Check Point Quantum SD-WAN, a new software blade in the Check Point Quantum Gateways. Check Point Quantum SD-WAN combines the highest level of security with optimized network and internet connectivity to protect branch …
Read More »Why strong passwords aren’t enough to stop identity-based attacks
David Higgins, Senior Director at CyberArk’s Field Technology Office explains why strong passwords aren’t enough to stop identity based cyberattacks. In a world where anything can be bought and delivered online, it would be naïve to assume that stolen credentials couldn’t. A Remote Desktop Protocol (RDP) can be bought for …
Read More »KnowBe4 Launches New Mobile Learner App for Anytime, Anywhere Cybersecurity Learning
The new KnowBe4 Mobile Learner App from KnowBe4 enables end users to complete their security awareness and compliance training from a tablets or smartphones. “This new app will enable IT and security teams to improve engagement and completion rates for required training thanks to a seamless user experience. This will …
Read More »Backup for QuickBooks supports Redstor in Helping MSPs
A new service that offers improved security and integrates with Backup for QuickBooks Online and QuickBooks Desktop is being offered by Redstor for SMBs. “QuickBooks is vital to many SMBs but none of the product tiers include backup and recovery except the most expensive option,” said Rob Glass of Computer …
Read More »Pax8 Now Offering Todyl Solutions – Single Agent Security Platform to MSPs
Pax8 has added the Todyl security platform to its cloud marketplace. “Statistics show that more than 89 percent of businesses have been affected by a cyberattack,” said Sophie Merrifield, VP of Vendor Product Management at Pax8. “Offering best-in-class security solutions for our partners is a top priority for Pax8, and …
Read More »Cybersecurity – the Individual, the Organisation and the Future
Currently, in its 19th year, Cybersecurity Awareness Month is guided by the National Cybersecurity Alliance and the Cybersecurity and Infrastructure Agency, with the central theme for 2022: See Yourself In Cyber. The theme emphasises that cybersecurity is ultimately about individuals, and calls for employees to see themselves as an integral part of …
Read More »OneSpan launches cloud-configurable personal security devices
OneSpan’s latest cloud-connected DIGIPASS CX devices address the threat of identity and credential theft. The devices support the use of high-security fingerprint biometrics and other methods, to ensure the integrity of authentication in high-value transactions and agreements. Select from multiple authentication protocols – including the OneSpan secure Digipass protocol and …
Read More »Zyxel launches ‘Connect and Protect’ WiFi security solution for small businesses
Zyxel Networks’ new ‘Connect and Protect’ solution filters out any unsafe web content and prevents users from accessing dangerous websites. It ensures that logged-on users cannot access the data streams of others, preventing malicious actors from spying on or stealing the information of other users. All security functions are predefined, and the …
Read More »Trustwave Launches Enhanced Co-Managed SOC Capabilities to Maximise Value from SIEM Investments
Trustwave has enhanced its Co-Managed SOC capabilities, adding access to its cybersecurity collaboration platform, Security Colony. The offer is also supported by a dedicated Cyber Success Team with SIEM, SOAR, and SOC experience and associated certifications. While a SIEM is a core technology for many security operations teams, it is …
Read More »