Security News
Delta Risk, a leading provider of SOC-as-a-Service and security services, announced that it has expanded its partnership with VMware Carbon Black, a leader in cloud-delivered, next-generation endpoint security. The partnership includes fully integrated managed detection, response, threat hunting, and monitoring capabilities via Delta Risk's ActiveEye security platform for customers using VMware Carbon Black solutions, providing improved endpoint visibility for organizations of all sizes.
Qualys announced a cloud-based remote endpoint protection solution at no charge to its customers for 60 days that allows IT and security teams to protect the computers of remote employees. In summary, the free cloud-based Qualys remote protection solution allows security teams to gain instant and continuous visibility of remote computers, easily see missing patches for critical vulnerabilities and deploy them from the cloud.
Nubeva Technologies, a cloud visibility SaaS software developer for enterprises with assets in public and private clouds and data centers, announced support for modern endpoint-based decryption. Nubeva TLS Decrypt, a software solution using symmetric key intercept technology, now allows organizations to offload decryption from proxy-based systems to allow full visibility with improved speed, performance and reduced cost.
WatchGuard Technologies, a leading global provider of network security and intelligence, secure Wi-Fi and multi-factor authentication, announced that it has entered into a definitive agreement to acquire Panda Security, a leading global provider in advanced endpoint protection. Under its current leadership team, WatchGuard has continued to deliver on its vision of providing a complete security portfolio of products and services that protect users both inside and beyond the network perimeter, including secure Wi-Fi solutions, multi-factor authentication, and now most recently, user-focused security services.
An alarming number of SMBs in the US and UK are not prepared for a potential cyber attack or breach, BullGuard warns. One-third of companies with 50 or fewer employees report using free, consumer-grade cybersecurity, and one in five companies use no endpoint security whatsoever.
Adaptiva, a leading, global provider of endpoint management and security solutions for enterprise customers, announced Endpoint Health, its automated endpoint health and remediation solution for clients and servers. Release of the additional health checks comes as Endpoint Health has proven to be remarkably efficient at keeping endpoints persistently up to date.
By leveraging the power of the cloud-native CrowdStrike Falcon Platform and Threat Intelligence at the hands of CrowdStrike's highly-experienced Services team, Endpoint Recovery Services helps customers actively remediate ongoing security threats and rapidly recover from a potential incident while minimizing business interruptions. "Leveraging the power of the cloud, CrowdStrike is able to make incident recovery a quick, painless process for customers. With our innovative technology and leading group of security experts, Endpoint Recovery Services is geared to drastically reduce the average time-to-recovery, without interrupting business operations."
An enhancement to CyberArk Endpoint Privilege Manager, the new deception feature enables defenders to quickly detect and proactively shut down in-progress attacks. New research from CyberArk Labs examines characteristics and patterns of emerging credential stealing malware families, like Raccoon, which can give attackers the ability to steal secrets from more than 60 different application types.
Idaptive, the leading provider of Identity and Access Management solutions, announced a major update to its Next-Gen Access platform that adds endpoint security and passwordless capabilities. Adaptive MFA adds an extra layer of protection before access to endpoints is granted - leveraging device, network, and user behavior context, Idaptive intelligently assigns risk to each login request, allowing organizations to create dynamic access policies that are triggered when anomalous behavior is detected.
Ransomware-wielding attackers have devised a novel tactic for disabling security protections that might get in their way: they are using a deprecated, vulnerable but signed driver to deliver a malicious, unsigned one that allows them to kill processes and files belonging to Windows endpoint security products. The vulnerable driver they are misusing was created by Taiwan-based motherboard manufacturer Gigabyte, found to be vulnerable in 2018 and later deprecated, but the signing certificate was never revoked.