Rahul Kashyap joins Awake from endpoint security company Cylance and says while endpoint has seen all the action over the past couple of years, “the network is where the
Prevoty’s product uses runtime application self-protection (RASP), an emerging security technology that is built into an application and can detect and respond to attacks in real time.
Software revenue wasn’t enough to push the company back to year-over-year growth. It reported net revenue of $1.2 billion for the second quarter, an 8-percent drop compared to last
Threat researchers found a rise in attacks on widely-used enterprise resource planning (ERP) applications such as SAP and Oracle, which currently have a combined 9,000 known security vulnerabilities.
While it’s not the first security firm to go public this year — Zscaler and Carbon Black also completed successful IPOs — at $288 million it would be the
Unlike traditional security platforms that target this type of malware from a threat prevention vantage point, the data protection and management company comes at it from a backup perspective.
At the annual Google Next conference the company launched an integrated portfolio of cloud services that combine open source projects with Google’s cloud infrastructure and security services.
Gigamon will combine its network traffic visibility capabilities with Icebrg’s security platform and allow SOC teams to deploy new security technologies as “security applications” on top of it.
The company’s platform uses blockchain to connect industrial IoT devices and synchronize and store credentials, certificates, policies, and data between edge and data center locations.
Sift’s product, Cloud Hunter, uses machine learning, analytics, and graph visualization capabilities to detect and respond to threats across infrastructure-as-a-service platforms.
Dell EMC’s new device provides converged data protection, and comes bundled with software for backup, deduplication, replication and recovery, along with disaster recovery and long-term retention to the cloud.
Illumio’s new head of cybersecurity strategy — former Obama administration executive Jonathan Reiber — literally wrote the book on cyberstrategy at the U.S. Department of Defense. Reiber is Illumio’s
Security Log Monitoring is a SaaS-based log collection and security information and event management (SIEM) platform built on open source and proprietary tools.