5G Networks Security Challenge

Juniper Networks Rises to 5G Networks Security Challenge

Juniper Networks this week took the wraps off an acceleration card for its firewall designed to keep pace with the volume of traffic expect to be generated by 5G networks. Amy James, director of security product marketing for Juniper Networks, said the SPC3 Advanced Security Acceleration card the company is ... Read More
Security Boulevard
Employee Security Training

Cisco Outlines Strategy Post $2.35B Duo Security Deal

Cisco Systems is gearing up to extend its cybersecurity reach all the way out to the endpoint, in the wake of plopping down $2.35 billion to acquire Duo Security, a provider of identity management software delivered as cloud service. The deal, which is based on cash and assumed equity awards, ... Read More
Security Boulevard
FireEye Infuses Machine Learning

FireEye Infuses Machine Learning into Endpoint Security

FireEye has become the latest provider of IT security technologies to incorporate machine learning algorithms into their portfolio. Unveiled this week, MalwareGuard adds a machine learning-based detection and prevention engine to FireEye Endpoint Security solution to make it possible to respond immediately to zero-day attacks, said Phil Montgomery, vice president ... Read More
Security Boulevard
Imperva Acquires RASP Provider

Imperva Acquires RASP Provider to Advance DevSecOps

Imperva revealed it plans to more closely align application and data security after acquiring Prevoty, provider of runtime application self-protection (RASP) software designed to be embedded in an application. The all-cash transaction, expected to close in the third quarter of this year, is valued at $140 million. Eldad Chai, vice ... Read More
Security Boulevard
Gigamon Acquires ICEBRG

Gigamon Acquires ICEBRG to Meld Security, Network Monitoring

Gigamon announced it is expanding the scope of its cybersecurity monitoring efforts significantly by acquiring ICEBRG, a provider of a cloud-based threat detection service. The combination of the sensors ICEBRG deploys coupled with the real-time network monitoring platform developed by Gigamon promises to limit the “blast radius” of cybersecurity breaches ... Read More
Security Boulevard
Rubrik Adds Cybersecurity App to Combat Ransomware

Rubrik Adds Cybersecurity App to Combat Ransomware

Rubrik today unfurled a security application that runs on top of its data management platform and leverages machine learning algorithms to combat security breaches such as ransomware. Soham Mazumdar, co-founder and chief architect for Rubrik, said Polaris Radar is the first security incident management application Rubrik has developed on top of ... Read More
Security Boulevard
Barracuda Networks Extends WAF Reach to Google Cloud Platform

Barracuda Networks Extends WAF Reach to Google Cloud Platform

Barracuda Networks has made its web application firewall (WAF) available on the Google Cloud Platform (GCP). Tim Jefferson, vice president of public cloud for Barracuda Networks, said the availability of CloudGen WAF on GCP means organizations can now deploy a common approach to manage a WAF across all three of ... Read More
Security Boulevard
McAfee to Advance Cybersecurity AI via the Cloud

McAfee to Advance Cybersecurity AI via the Cloud

McAfee this week announced the availability of McAfee ePolicy Orchestrator (ePO) software on Amazon Web Services (AWS), which sets the stage of applying artificial intelligence (AI) to the massive amounts of data being collected by its endpoint security software. To further facilitate that ability, McAfee this week also unfurled McAfee ... Read More
Security Boulevard
Breach Discovery Takes 197 Days

Survey Finds Breach Discovery Takes an Average 197 Days

A new global study based on 500 interviews conducted by The Ponemon Institute on behalf of IBM finds that the average amount of time required to identify a data breach is 197 days, and the average amount of time needed to contain a data breach once it is identified is ... Read More
Security Boulevard
SolarWinds Acquires Trusted Metrics

SolarWinds Acquires Trusted Metrics

SolarWinds moved to expand its portfolio of security technologies by acquiring Trusted Metrics, a provider of real-time threat monitoring and management software. SolarWinds immediately then launched SolarWinds Threat Monitor, a tool for detecting suspicious activity and malware by aggregating asset data, security events, host intrusion detections and network intrusion detections ... Read More
Security Boulevard
Loading...