Security News

KORE, the independent global IoT leader, announced the launch of a new comprehensive managed services solution for Critical Asset Management, utilizing the Visilion asset tracking platform from Sony Network Communications Europe. KORE's solution introduces a new level of condition management, allowing companies in the medical instrumentation, pharmaceutical, and food and beverage industries to maintain real-time condition visibility of critical and high-value goods.

Corsa Security announced their Corsa Security Orchestrator, a virtual infrastructure manager for operating virtual machines and the infrastructure to virtualize Next Generation Firewalls at high capacity Internet gateways. Working with the Corsa Network Security Virtualization platform, the Security Orchestrator provides an intuitive interface which simplifies the complex operations associated with running hundreds of virtual NGFW instances.

Entrust Datacard, a leading provider of trusted identity and secure transaction technology solutions, announced the Entrust Datacard Certificate Hub, a portal that allows customers to find, control and automate their public and private certificate deployments via a single pane of glass. "Security-minded enterprises have a critical need to track their certificates and know when they're going to expire. Many enterprises struggle to track their certificates and proactively manage them - their environments have grown too complex and distributed to manage hundreds or thousands of certificates on spreadsheets, which opens weaknesses that attackers prey upon," said Robyn Westerveldt, Research Director, Security & Trust at IDC. "A certificate lifecycle management tool like Certificate Hub helps enterprises deal with complexity by standardizing, simplifying and streamlining certificate discovery, management and automation."

NeuVector, the leader in Full Lifecyle Container Security, announced the NeuVector platform includes new features - purpose-built for enterprise DevOps and security teams - focused on automated end-to-end vulnerability management and protection, expanded registry scanning, and host protection in production environments. The platform additions include the new Vulnerability and Compliance Explorer for quickly investigating, prioritizing, reporting, and mitigating potentially damaging vulnerability and compliance issues.

IBM, the leader in multicloud management and Turbonomic, the leader in Application Resource Management, announced a partnership that brings the power of continuous application performance to IBM's multicloud management solutions. IBM clients can leverage MCM with Turbonomic's AI-driven automation to manage the entire stack of resources that deliver today's applications.

Revolutionary Security's portfolio of cybersecurity services includes assessment and testing, design and build of security programs and functions as well as security operations across its clients' IT and OT systems. Revolutionary Security leverages proprietary technology and methods to help mature the security capabilities of its clients and manage risk.

What are the most unexpected pitfalls for a CISO that wants to strengthen an enterprise third-party risk management program? Before third-party risk management can become a competitive advantage, businesses need to perfect the block-and-tackle basics of third-party risk management.

Lenovo Data Center Group expands its portfolio of IT infrastructure solutions. "At a time when the speed and agility of processes critically impacts your daily business operations, our customers demand more powerful, secure and flexible solutions," said Kamran Amini, Vice President and General Manager of Server, Storage and Software Defined Infrastructure at Lenovo DCG. "Lenovo's technology architecture is purpose-built to deliver real-time, valuable insights from edge to core to cloud, enabling a new era of intelligence where customers can fully realize the potential of the data at their disposal."

Spectra Logic, a leader in data storage and data management solutions, announced that StorCycle, its new Storage Lifecycle Management software, now supports Linux in addition to Windows operating systems, providing effortless data management for midsize and large enterprises. "Organizations must brace for this new paradigm and optimize their infrastructures to remain competitive. StorCycle alleviates the strain placed on the Primary Tier of storage by finding less active data and moving it to a Perpetual Tier where it is accessible and protected for the long term. This can help organizations accelerate IT efficiencies right away."

Let's look at and debunk the top vulnerability management myths, so that enterprises may opt to change their practices in ways that make fortifying cyber defenses and reducing risks significantly easier. New vulnerability management solutions make scanning at scale significantly faster and easier without impacting network performance, so there is really no good reason why enterprises should put networks at risk unnecessarily.