PLATFORM SECURITY,SOFTWARE SECURITY

Vipre Security Group’s New Endpoint Detection & Response Technology for SMEs

VIPRE Security Group | January 19, 2023 | Read time : 02:00 min

vipre-security-groups-new-endpoint-detection-and-response-technology-for-smes

VIPRE Security Group, an award-winning data, cybersecurity, privacy, and user protection company, recently announced the launch of its latest cybersecurity product, VIPRE Endpoint Detection & Response (EDR). VIPRE EDR is built to assist small and medium-sized businesses including their IT partners navigate the intricacies of EDR management with a single, simple-to-use console.

VIPRE EDR provides a sophisticated high-performance, cloud-based solution while overcoming the problems users typically expect from an EDR solution. . This advanced technology detect better and uncovers more unusual behavior than a standalone antivirus file, process, and networking analysis solutions, while offering investigation and remediation tools to accelerate response times.

The VIPRE EDR solution is based on the fundamental pillars of Detection, Investigation, Containment, and Remediation, transforming threats into intelligence and suggesting next steps for security professionals, as simply detecting a threat is insufficient.

Advantages of VIPRE's Endpoint Detection and Response (EDR) System:

  • Exploit prevention – It helps to prevent network threats with built-in DNS , intrusion protection and in-browser exploit prevention
  • EPP/Next-generation Antivirus - VIPRE EDR, constantly scans processes, files, and network activity for known and undiscovered threats
  • Correlated Behavior Engine - Examine endpoint behavior in greater depth to identify emergent or suspicious behavior connected across all engines
  • Endpoint Isolation – Quickly isolates an afflicted device to prevent threat spreading
  • Threat Incident Visualization – View and respond to all threat activity from a central location. Understand all aspects of endpoint activity related to the threat, including every user, process, file, and network activity
  • Remote Shell - VIPRE EDR's click-button reporting enables admins instant remote access to the endpoint for a deeper look
  • Suspicious file/link sandboxing - Detonates files and links in a private cloud sandbox for comprehensive examination and forensic investigation
  • Integrated Vulnerability Management - App scanning and vulnerability management to close potential security gaps

Built on the foundation of VIPRE's top-ranked Endpoint Security Cloud (EPP) platform, protection begins with extensive monitoring and automated blocking of malicious behavior across all endpoint processes, files, and network activity. This protection includes web, DNS and network monitoring, as well as AI-driven hostile process behavior detection.

About VIPRE Security Group

A part of Ziff Davis, Inc., VIPRE Security Group is a global organization specializing in cybersecurity, privacy, and data protection. It protects millions of people and businesses globally, including some very well-known brands. . For nearly 30 years, VIPRE Security Group's primary mission has been to provide easy solutions to protect against existing and potential internet threats in an ever-expanding, digitally connected world.

Spotlight

Web application and API protection (WAAP) is the evolution of cloud web application firewall services that were designed to protect internet-facing web applications and web APIs (application program interfaces).

Spotlight

Web application and API protection (WAAP) is the evolution of cloud web application firewall services that were designed to protect internet-facing web applications and web APIs (application program interfaces).

Related News

SECURITY AUDIT AND COMPLIANCE, SOFTWARE SECURITY

Acalvio Introduces Active Defense-Based Identity Threat Detection and Response (ITDR) Solution

Acalvio Technologies | February 10, 2023

On February 9, 2023, Acalvio Technologies, the market leader in cyber deception technology, announced the release of its Identity Threat Detection and Response solution, which provides visibility and control of the identity attack surface area and a cutting-edge active defense against identity threats. By adding Active Defense, Acalvio's ITDR solution transforms the environment not only to detect and repel cyber assaults but also to collect threat information to get a deeper understanding of the adversary and better train future defenders. "Modern identity threats can subvert traditional identity and access management (IAM) preventive controls, such as multi-factor authentication (MFA). This makes Identity Threat Detection and Response (ITDR) a top cybersecurity priority for 2022 and beyond." According to October 2022 research from Gartner Acalvio's patent-protected, unique, and comprehensive ITDR solution is the foundation for building and maintaining a robust zero-trust security model. It enhances identity protection in three important ways Active Defense against malicious activity: ShadowPlex Advanced Threat Defense from Acalvio generates a rich and broad collection of honey accounts that are automatically blended into Active Directory and distribute honey tokens throughout the company network for malicious actors to locate and exploit. It also identifies tools for stealing credentials by presenting options to use deception. Identity Attack Surface Management: ShadowPlex Identity Protection outlines the attack surface in identity repositories such as Microsoft Active Directory and Azure Active Directory, as well as the credential caches on different endpoints. This enables a comprehensive study of identity misconfigurations and possible attack vectors via vulnerable relationships, cached credentials, and linkages for lateral movement. Extensive integrations with the security ecosystem: The ITDR solution from Acalvio integrates with an enterprise's existing SIEM, EDR, SOAR, NAC, and other security solutions to understand the environment's assets, automatically deploy deception across the enterprise, detect the use of decoy credentials, and enable a variety of automated real-time responses. About Acalvio Technologies Acalvio, the market leader in cyber deception technology, assists businesses in proactively defending against sophisticated security attacks. Built on 25 granted patents for autonomous deception and sophisticated AI, the Acalvio Active Defense Platform offers comprehensive solutions for ITDR, advanced threat detection, zero trust, OT security, active directory protection, and ransomware protection. The Silicon Valley-based firm's solutions serve Fortune 500 companies and government organizations and are deployable on-premises, in the cloud, or via renowned managed service providers.

Read More

PLATFORM SECURITY,SOFTWARE SECURITY,WEB SECURITY TOOLS

Skyhigh Security Announces Achieving Amazon Web Services Security

Skyhigh Security | December 28, 2022

Skyhigh security, a leading data security solutions provider, recently announced receiving Amazon Web Services (AWS) Security Competency accreditation in the infrastructure security industry. This distinction recognizes Skyhigh Security's extensive technical expertise in AWS and proven success in its ability to assist customers in achieving their cloud security objectives. Achieving AWS Security Competency distinguishes Skyhigh Security as a member of the AWS Partner Network (APN) that offers specialized software to assist organizations in adopting, developing, and deploying complex security projects on AWS. To achieve the distinction, APN Partners must have in-depth knowledge of AWS and provide solutions on AWS effortlessly. AWS delivers scalable, versatile, and cost-effective solutions to startups and large-sized organizations. To enable the seamless integration and implementation of these solutions, AWS launched the AWS Competency Program to assist customers in identifying consulting and technology APN Partners with extensive industry knowledge and expertise. AWS users can buy the entire Security Service Edge (SSE) portfolio of Skyhigh Security through the AWS Marketplace, which enhances the efficiency of the procurement process and provides flexible licensing options. The company's SSE portfolio is cloud-native, designed from the bottom up with Zero Trust principles, and includes a unified data loss prevention and policy engine. Skyhigh SSE contains, Skyhigh Cloud Access Security Broker, Skyhigh Secure Web Gateway, and Skyhigh Private Access, among other products, offering one of the most extensive portfolios in the market. About Skyhigh Security Based in California, U.S., Skyhigh Security, a provider of a complete, market-leading data security platform built on a modern cloud stack, focuses on helping customers protect the world's data. It protects businesses with data-aware and user-friendly cloud-native security solutions. Its industry-leading Security Service Edge (SSE) portfolio extends beyond data access and focuses on data use, enabling enterprises to communicate from any device and location without compromising security.

Read More

DATA SECURITY,PLATFORM SECURITY,SOFTWARE SECURITY

Immuta Announces the Release of Immuta Detect for Continuous Security Monitoring

Immuta | January 20, 2023

On January 19, 2023, Immuta, a leading data security firm, announced the launch of its latest product, Immuta Detect. Immuta Detect notifies data and security teams about unsafe data access behavior with its continuous data security monitoring capabilities, therby enabling faster and more accurate risk response and improved data security posture management across advanced and modern cloud data platforms. The product is the new vital component of Immuta's comprehensive Data Security Platform that offers security and access control, data activity monitoring and sensitive data discovery. The platform uniquely integrates with the leading cloud data platforms along with existing SIEM and Managed Detection and Response (MDR) tools. As data sources and users in modern cloud settings increase, monitoring data usage and responding to threats becomes more challenging. This is critical for safeguarding against insider threats and adhering to rules and regulations. Existing strategies to solve these problems include manual and time-consuming audits of millions of log data records housed in disparate data sources. To stay up with business demands, data and security teams need improved ways for monitoring data access, address issues precisely, and quickly adjust to shifting risk appetites. With Immuta Detect, customers can swiftly surface and prioritize data usage risks, decrease time to risk mitigation, and maintain data security by utilizing the following new features: Advanced access behavior analytics - Immuta Detect consolidates data access logs, allowing data and security teams to continuously monitor and evaluate changes in user behavior and data access entitlements by source, user activity or query, as well as get insight into changes in data classification and security configuration. Sensitive data views and indicators – The company offers a detailed analysis of each user and data activity in depth, summarizing activity across multiple criteria such as time frame, data access event categorization, sensitive data indicators, and most active data sources. Risk severity detection and scoring - It automatically scores data based on its sensitivity and security, thereby enabling data and security teams to prioritize risks and receive real-time notifications about potential security incidents. About Immuta Founded in 2015 and headquartered in Boston, MA, Immuta is a leading cloud data access control provider. It offers data engineering and operations teams a unified platform for controlling access to analytical data sets in the cloud. Additionally, it helps businesses extract value from their cloud data by securing it and giving secure access. It automates access control for any type of data on any cloud service and across any computing infrastructure. The company is now trusted for data security by Fortune 500 organizations and government agencies all around the world.

Read More