CyberSift

cybersift.net

Cybersift is the leading platform supplier of multi-port 1 GbE and 10 GbE network adapters for patented real-time, line-rate, Dynamic Parallel Inspection (DPI). The Sifter's unique hardware-based engine is the next generation in scalable high performance security architecture. DPI enables the Sifter to deliver reliable, scalable, low latency security capabilities at an unprecedented 10-Gigabit line rate. The Sifter family provides open flexibility for the dynamic and ever changing nature of IDS/IPS, DDoS Protection, Anti-Spam, Firewall, Lawful Intercept, Data Leak Prevention and High Speed Surveillance.

C-Suite On Deck

Responsive image

Feature market insights and perspectives from top C-Level executives, elite technology influencers and thought leaders from your company here. This signature initiative has garnered immense support...

Contact Us

Events

Related News

Platform Security

AXONIUS ADDS KEY INTEGRATIONS WITH AWS

Axonius | July 25, 2022

news image

Axonius, a cybersecurity asset management provider, today announced integrations with Amazon Macie, Amazon GuardDuty, and AWS SecurityHub while extending its Amazon Inspector functionality. These new integrations will help customers to better understand and manage vulnerabilities across their Amazon Web Services (AWS) infrastructure. By connecting to both AWS first-party and ISV-third party security solutions, Axonius provides comprehensive visibility and management of assets acro...

Read More

Data Security

DOCONTROL INTEGRATES WITH BOX TO TRANSFORM SAAS DATA ACCESS SECURITY

DoControl | August 03, 2022

news image

DoControl, the automated Software as a Service (SaaS) security company, today announced an expanded integration with Box, the leading Content Cloud, that adds a foundational layer of granular controls to protect sensitive data and provide comprehensive data access security. The solution further secures cross-application, business-critical data, and files accessed by every identity and entity, both internal employees and external collaborators, allowing for content collaboration to be achieved se...

Read More

MICROSOFT APRIL PATCH TUESDAY FIXES THREE CURRENTLY EXPLOITED VULNERABILITIES

SC Magazine | April 14, 2020

news image

For the second consecutive month Microsoft rolled out a 100-plus batch of security updates for Patch Tuesday, this time including three vulnerabilities being exploited in the wild. Overall, the month saw 113 vulnerabilities addressed with 19 critical issues patched. The three currently exploited vulnerabilities are CVE-2020-1020, CVE-2020-0938, CVE-2020-0968 and CVE-2020-1027. The first two were initially disclosed on March 23 and can be found in the Adobe Font Manager Library and can lead to re...

Read More

IT-HARVEST RESEARCH: ROOM FOR CYBER THREAT INTELLIGENCE GROWED BY 3% IN 1H 2020

prnewswire | September 17, 2020

news image

IT-Harvest, an independent research firm covering the cybersecurity industry, has published a "Cyber Threat Intelligence Market Research Report 1H 2020" – Richard Stiennon and Ron Moritz on the cyber threat intelligence (CTI) sector. The report includes 61 vendors that provide threat intelligence to the enterprise or collect and manage threat intelligence. These include, Recorded Future acquired by Insight Partners in 2019, Anomali, LookingGlass Cyber Solutions, ZeroFOX, and Ints...

Read More
news image

Platform Security

AXONIUS ADDS KEY INTEGRATIONS WITH AWS

Axonius | July 25, 2022

Axonius, a cybersecurity asset management provider, today announced integrations with Amazon Macie, Amazon GuardDuty, and AWS SecurityHub while extending its Amazon Inspector functionality. These new integrations will help customers to better understand and manage vulnerabilities across their Amazon Web Services (AWS) infrastructure. By connecting to both AWS first-party and ISV-third party security solutions, Axonius provides comprehensive visibility and management of assets acro...

Read More
news image

Data Security

DOCONTROL INTEGRATES WITH BOX TO TRANSFORM SAAS DATA ACCESS SECURITY

DoControl | August 03, 2022

DoControl, the automated Software as a Service (SaaS) security company, today announced an expanded integration with Box, the leading Content Cloud, that adds a foundational layer of granular controls to protect sensitive data and provide comprehensive data access security. The solution further secures cross-application, business-critical data, and files accessed by every identity and entity, both internal employees and external collaborators, allowing for content collaboration to be achieved se...

Read More
news image

MICROSOFT APRIL PATCH TUESDAY FIXES THREE CURRENTLY EXPLOITED VULNERABILITIES

SC Magazine | April 14, 2020

For the second consecutive month Microsoft rolled out a 100-plus batch of security updates for Patch Tuesday, this time including three vulnerabilities being exploited in the wild. Overall, the month saw 113 vulnerabilities addressed with 19 critical issues patched. The three currently exploited vulnerabilities are CVE-2020-1020, CVE-2020-0938, CVE-2020-0968 and CVE-2020-1027. The first two were initially disclosed on March 23 and can be found in the Adobe Font Manager Library and can lead to re...

Read More
news image

IT-HARVEST RESEARCH: ROOM FOR CYBER THREAT INTELLIGENCE GROWED BY 3% IN 1H 2020

prnewswire | September 17, 2020

IT-Harvest, an independent research firm covering the cybersecurity industry, has published a "Cyber Threat Intelligence Market Research Report 1H 2020" – Richard Stiennon and Ron Moritz on the cyber threat intelligence (CTI) sector. The report includes 61 vendors that provide threat intelligence to the enterprise or collect and manage threat intelligence. These include, Recorded Future acquired by Insight Partners in 2019, Anomali, LookingGlass Cyber Solutions, ZeroFOX, and Ints...

Read More

Resources

resource image

Enterprise Security, Platform Security, Software Security

API Security: Best Practices for Vulnerability Mitigation

Whitepaper

resource image

Enterprise Security, Network Threat Detection, Software Security

2023's Must-Attend Networking Security Conferences for Businesses

Article

resource image

InfoSec Project Management

Protecting Public Water Systems From Cyberattacks

Whitepaper

resource image

Cloud Security

ESG Passwordless in the Enterprise

Whitepaper

resource image

Enterprise Security, Platform Security, Software Security

API Security: Best Practices for Vulnerability Mitigation

Whitepaper

resource image

Enterprise Security, Network Threat Detection, Software Security

2023's Must-Attend Networking Security Conferences for Businesses

Article

resource image

InfoSec Project Management

Protecting Public Water Systems From Cyberattacks

Whitepaper

resource image

Cloud Security

ESG Passwordless in the Enterprise

Whitepaper

Events

C-Suite On Deck

Responsive image

Feature market insights and perspectives from top C-Level executives, elite technology influencers and thought leaders from your company here. This signature initiative has garnered immense support...

Contact Us