businesswire | December 22, 2020
Ericom Software, an innovator in Zero Trust cloud online protection arrangements and an individual from the Oracle Partner Network (OPN), today reported a development of its Ericom Global Cloud stage server farm presence in the Middle East to help developing interest for Ericom Shield Remote Browser Isolation (RBI). These ventures grow neighborhood admittance to Ericom's internationally appropriated, multi-occupant cloud stage for all associations in the locale.
The pace of cyberattacks utilizing malware intended to misuse internet browser weaknesses has been significantly quickening. These sorts of web and email based assaults utilize zero-day malware installed in the substance of sites to convey ransomware, exfiltrate information, upset tasks, and that's only the tip of the iceberg. Ericom Shield RBI forestalls 100% of online assaults by executing web content in a distant, disengaged cloud - based compartment, sending just safe delivering data to a gadget's program. At the point when clients interface with the sites they are totally protected since no web content is ever executed straightforwardly on their gadgets.
Neighborhood Cloud Datacenters Deliver Performance, Availability, and Data Sovereignty
Two of the most recent server farms in the Middle East, in Jeddah, Saudi Arabia, and in Dubai, UAE, are conveyed in Oracle's Cloud Infrastructure (OCI), a market-driving stage prepared to do flexibly expanding figure limit and handling to oblige changing information traffic needs.
“Ericom’s growing data center footprint in the Middle East is important for a number of reasons,” said Ravi Pather, Ericom Vice President, Europe and Middle East. “Meeting local data residency and sovereignty requirements means that that cloud-based services must retain data and logs in the region. Having multiple Points of Presence (PoPs) also allows us to deliver the performance and resiliency enterprises expect.”
About Ericom Software
Ericom Software is a leading provider of Zero Trust cloud cybersecurity solutions for secure web and application access that protect organizations from advanced cyberthreats. Leveraging innovative zero trust browser and application isolation technologies, Ericom's cloud and software security solutions enable simple, secure policy-driven access to mission-critical resources without impacting end-user productivity.
wthr | August 06, 2020
The Community School Corporation of Southern Hancock County was back online Thursday. But a cyberattack on the school district’s internet network prevented remote learning the previous two days in the first week of school. "To be unable to offer that right out of the gate is frustrating, especially frustrating knowing that this was a malicious attack on our system and not something of our own doing,” said Wes Anderson, CSC Southern Hancock County director of school and community relations.
PAS | July 29, 2020
PAS Global, the OT Integrity company, today announced Cyber Integrity™ now includes breakthrough in-product expansion to support industrial organizations as they mature their operational technology (OT) cybersecurity capabilities. The cyber risk for critical infrastructure and process industries is greater than ever as digitalization projects and remote work requirements have expanded the attack surface. Industrial organizations are focusing more on addressing cyber risk but are at different stages of maturity. New modular licensing and deployment options in Cyber Integrity version 7.0 provide flexibility to address specific needs as sites advance their OT cybersecurity maturity:Cyber Integrity – Inventory Management: provides discovery and topology mapping of industrial control system environments down to Level 0 devices with unmatched depth and accuracy without passive network detection limitations and active network polling risks.Cyber Integrity – Vulnerability Management: includes inventory management and enables the identification of vulnerabilities hidden in industrial infrastructure, leveraging and enhancing regular feeds from the United States National Vulnerability Database (NVD).Cyber Integrity – Enterprise: includes inventory and vulnerability & patch management as well as in-depth Level 3 to Level 0 OT asset configuration management with comprehensive cybersecurity configuration baselining, unauthorized configuration change detection, workflow-driven vulnerability remediation and incident response, risk analytics, compliance workflows and reporting, and backup and recovery support.