POLICY ENFORCEMENT FIREWALL FOR DYNAMIC SEGMENTATION

June 2, 2019

As enterprise networks become the catalyst for digital transformation and connectivity becomes ubiquitous, new policy enforcement and cyber security solutions are required to deal with challenges to traditional network and security approaches. IoT devices are joining employees, customers and guests on corporate wireless and wired networks in an ever-changing perimeter. Standard defenses such as firewalls that use rules and physical network configuration based on IP addresses are no longer adequate.

Spotlight

iViZ Techno Solutions Private Limited (a Cigital Company)

"iViZ is industry’s first cloud-based on-demand penetration testing service for web applications. Unlike conventional solutions, iViZ Security delivers consultant-grade quality with an on-demand experience. iViZ Security provides a hybrid solution that integrates automation with manual testing by security experts. This results in a cost-effective SaaS model to achieve zero false positives, manual expert validation, and business logic testing. The key advantages are high quality, on-demand manageability, high scalability and unmatched service to price value. iViZ's vulnerability research team is also credited with the discovery of several vulnerabilities in the security products of companies like Microsoft, Intel, HP, Symantec, Lenovo, CA, Sophos, AVG etc."

OTHER WHITEPAPERS
news image

Cybersecurity for Industry

whitePaper | November 24, 2022

This white paper provides an overview of “Cybersecurity for Industry.” It describes the threats and hazards to which industrial automation systems and production plants are exposed and introduces concepts for minimizing these risks and instituting a level of protection that’s acceptable on economic as well as security grounds.

Read More
news image

The Trellix Approach to Effective Cloud Security

whitePaper | October 27, 2022

In many ways, the cloud1 is more secure than a traditional data center. Asset management, inventory, audit logging, two-factor access controls, connectivity redundancy and firewalls are built into the cloud provider platform. Servers are easier to patch and won’t become outdated within a few years; there aren’t any forgotten boxes sitting in a dark corner with a note reading, “DO NOT TURN OFF.” However, assets on the cloud continue to be compromised, just as those stored in traditional data centers.

Read More
news image

Project Blackfin: Automated Breach Detection Using Intelligent Agents

whitePaper | December 4, 2019

This paper describes a distributed anomaly detection approach designed to accurately track actions performed by adversaries across a network. The illustrated approach involves running multiple machine learning models on both endpoints and the network as well as on a centralized backend, and includes communication and replication of learned states between these models.

Read More
news image

Supply Chain Security in MongoDB’s Software Development Lifecycle

whitePaper | May 25, 2022

Cybersecurity breaches do more than expose data to malicious actors. They generate headlines, captivate the public’s attention, and shine a light on security gaps. Whether it’s weak passwords or the software supply chain, if a vulnerability exists, cybercriminals will exploit it.

Read More
news image

Cyber Security in the AC500 PLC family

whitePaper | February 7, 2023

ABB offers a comprehensive range of scalable PLCs and robust HMI control panels. Since its launch in 2006, the AC500 PLC platform has achieved significant industry recognition for delivering high performance, quality and reliability. Cyber Security has become of key importance for ABB customers and ABB alike. In order to help protect ABB customers as well as our brand, cyber security must be an important aspect in our products, systems, projects and service deliveries.

Read More
news image

Cloud Security Survey 2023: Infrastructure Protection Best Practices

whitePaper | September 23, 2022

This survey was distributed by VMware User Group (VMUG) to their user base between July and September 2022. The responses were analyzed by the phoenixNAP team and key findings are presented in this document.

Read More

Spotlight

iViZ Techno Solutions Private Limited (a Cigital Company)

"iViZ is industry’s first cloud-based on-demand penetration testing service for web applications. Unlike conventional solutions, iViZ Security delivers consultant-grade quality with an on-demand experience. iViZ Security provides a hybrid solution that integrates automation with manual testing by security experts. This results in a cost-effective SaaS model to achieve zero false positives, manual expert validation, and business logic testing. The key advantages are high quality, on-demand manageability, high scalability and unmatched service to price value. iViZ's vulnerability research team is also credited with the discovery of several vulnerabilities in the security products of companies like Microsoft, Intel, HP, Symantec, Lenovo, CA, Sophos, AVG etc."

Events