SOFTWARE SECURITY

To address the increasing demand for sensitive data protection, Netwrix and Stealthbits merge to address

prnewswire | January 04, 2021

Netwrix, a network safety merchant that makes information security simple, today declared a consolidation with Stealthbits, a network safety pioneer that shields delicate information and qualifications from assailants. The joined substance will keep on contribution its total arrangement of in excess of about six security arrangements pointed toward recognizing and distinguishing information security hazard just as ensuring, reacting and recuperating from network safety assaults. Terms of the exchange were not uncovered.

Divided arrangements in the information security market keep associations from building thorough security techniques to ensure their delicate and managed information. To address this test, Netwrix and Stealthbits are uniting to use each other's mastery to widen item abilities and improve client experience. This will empower the consolidated association to offer seven center items crossing all components of information and data security, put resources into development to surpass the assumptions for existing clients and accomplices, and grow its client base worldwide.

With more than 500 representatives and clients from in excess of 50 nations, the consolidated organization will work as Netwrix with Steve Dickson proceeding to fill in as its CEO and on the organization's Board of Directors. Steve Cochran, organizer and administrator of Stealthbits, will be a speculator in Netwrix and will serve on its Board of Directors.

"We couldn't be more thrilled to be merging with the people and products of Stealthbits. Our combined organization can now offer data security solutions for any organization anywhere in the world," said Steve Dickson, CEO at Netwrix.       

"Stealthbits has always been driven to work with our customers to solve their most challenging credential and data security requirements. Combining our breadth of products and depth of expertise with that of Netwrix means our customers can quickly strengthen their security posture and address multiple projects and requirements through a single provider," said Steve Cochran, founder and chairman of Stealthbits.

For a long time to come, clients, prospects and accomplices of each organization will keep on collaborating with each organization as they do today for deals, backing and accomplice action. Both Netwrix and Stealthbits are focused on straightforwardness and will educate their clients, prospects and accomplices of operational changes through this cycle throughout the next few months.

About Netwrix

Netwrix makes data security easy, thereby simplifying how professionals can control sensitive, regulated and business-critical data, regardless of where it resides. More than 10,000 organizations worldwide rely on Netwrix solutions to secure sensitive data, realize the full business value of enterprise content, pass compliance audits with less effort and expense, and increase the productivity of IT teams and knowledge workers.

Founded in 2006, Netwrix has earned more than 150 industry awards and been named to both the Inc. 5000 and Deloitte Technology Fast 500 lists of the fastest growing companies in the U.S.

About Stealthbits

Stealthbits Technologies, Inc. is a customer-driven cybersecurity software company focused on protecting an organization's sensitive data and the credentials attackers use to steal that data. By removing inappropriate data access, enforcing security policy, and detecting advanced threats, we reduce security risk, fulfill compliance requirements, and decrease operational expense.

Spotlight

Cybercriminals are becoming more sophisticated and are eager to get their hands on sensitive data. Therefore, the decision to invest in new technology, like unified communications (UC) platforms, should never be taken lightly. This white paper provides 5 steps to educating yourself on the common pitfalls when investing in a unified communications platform.

Spotlight

Cybercriminals are becoming more sophisticated and are eager to get their hands on sensitive data. Therefore, the decision to invest in new technology, like unified communications (UC) platforms, should never be taken lightly. This white paper provides 5 steps to educating yourself on the common pitfalls when investing in a unified communications platform.

Related News

DATA SECURITY

Cyber Threat Intelligence to be Launched by TruKno for the 99%

TruKno | July 15, 2021

TruKno has announced a new Cyber Threat Intelligence SaaS subscription. The subscription aims at helping various organizations to reduce the risk of cyber threats by empowering their entire IT security staff with actionable, easy-to-use, and real-time cyber threat dashboards. Powered by digitization of commerce across the globe, growth of remote workers, the exponential rise of internet-connected devices, and surge in nation-state adversaries and well-financed organized cyber-crime groups, cybersecurity has become one of the main risks facing enterprises and organizations. New high-profile breaches have exposed that challengers are abusing zero-day or known susceptibilities to penetrate enterprise networks via aiming critical OT infrastructure, cryptojacking cloud environments, highly sophisticated supply chain attacks, etc. Solution of TruKno can be consumed as SaaS-based threat dashboards or via easy-to-use Application Programming Interfaces (APIs) that enable enterprises to directly integrate TruKno Threat Intelligence into their existing security and risk management technologies & workflows. Further, TruKno is vigorously building a system of ‘out of the box’ product combinations for SIEM (Splunk Enterprise Security, LogRhythm, etc.), IOC enrichment (VirusTotal is available today), and Susceptibility Management (Tenable, Qualys, etc.). About TruKno TruKno is the leading and the first platform built from the ground up to take Cyber Threat Intelligence to the grassroots. Based in Denver, TruKno provides actionable, easy-to-use, and real-time APIs and cyber threat dashboards to allow security teams to decrease the jeopardy of breach by effortlessly keeping up with the ever-dynamic cyber threat setting.

Read More

Flowmon and Paessler Bring a Symbiosis of IT Infrastructure, Performance, and Security Monitoring

prnewswire | September 08, 2020

Flowmon Networks, a network intelligence company, has today announced an alliance with Paessler AG, an IT monitoring specialist. The integrated solution brings together broad IT infrastructure monitoring and advanced performance and security analysis to ensure a healthy and secure run of digital environments.Managing today's ever-changing IT environment requires a bullet-proof certainty that all assets are reliable, well-functioning and protected. Enhancing the symbiosis of IT infrastructure monitoring with advanced NetSecOps technology is only a natural step along the path to reaching this goal. Flowmon and Peassler's PRTG integrated solution brings together the excellence of both worlds.

Read More

DATA SECURITY

Lack of Remote and Hybrid Work Policies Put Education Industry at Risk for IT Security Issues

Apricorn | July 23, 2021

The leading manufacturer of software-free, 256-bit AES XTS hardware-encrypted USB drives, Apricorn, has announced various findings for the education sector from the Apricorn Global IT Security Survey, 2021. The survey says the education industry lacks concern about security threats from employees and, due to limited IT security policies related to remote work, has a greater risk for cybersecurity breaches and data loss than other industries. For example, 69.4% of respondents say, as targets that attackers can use to access data, employees at their organizations don't think of themselves, compared to 37.5% in information technology (IT). The survey was to compare cybersecurity policies of various industries about hybrid and remote work. More than 400 respondents completed the survey. Unfortunately, the education industry constantly lags behind many other healthcare, manufacturing, IT, and financial services when executing lost/stolen devices and data security policies. Remarkably, compared to 55% in IT, only 26% of respondents in the education industry agreed that they have policies regarding lost/stolen devices. Many education institutions, in the Fall, will be returning to in-person instruction; however, in the education sector, most survey respondents (90.77%) said a hybrid work option exists. Organizations in education demonstrated a trend of allowing employee choice when it comes to policy adherence when asked about policies and procedures that have been put in place regarding transporting data and devices. Compared to an average of 52% for other top industries, only 20% of education organizations require encrypted hardware. More than half of EDUCATION organizations permit the use of personal USB devices. About Apricorn Founded in 1983, Apricorn is a leading provider of secure storage innovations to prominent companies in education, healthcare, finance, and government throughout North America, EMEA, and Canada. Apricorn products have become the trusted standard for a myriad of data security strategies worldwide. Under the Apricorn brand, numerous award-winning products and patents have been developed.

Read More