THREAT INTELLIGENCE AND ANALYSIS

May 9, 2019

Threat Intelligence and Analysis Bromium Secure Platform provides unique insights into threats that bypass traditional detection-based enterprise security solutions. Bromium-protected endpoints are not impacted by these threats that typically arrive as email attachments, downloaded files or links that direct the user to a malicious site. Bromium isolates malware inside a virtual machine before it has a chance to infect the PC or move laterally onto the corporate network.

Spotlight

Daon

Daon is a leading provider of award-winning biometric identity assurance software products and services focused on meeting the needs of governments and large commercial organizations worldwide. Daon supports customers and system integrators in building enterprise solutions requiring the highest level of security, performance, scalability, reliability and privacy. Daon’s IdentityX platform ensures that only you can authorize your financial / business transactions or access your most important and personal information. Using your mobile phone, IdentityX offers risk solutions and empowers you to securely establish your identity through a combination of encryption, biometrics such as face, voice, and fingerprint, PIN entry, and location-based technology . IdentityX is a fully mobile, private and cost effective solution that allows you to decide the level of security for each type of transaction - balancing convenience and security as you desire. IdentityX has been deployed by a growing lis

OTHER WHITEPAPERS
news image

Avoiding the Security Pitfalls of Digital Transformation

whitePaper | April 1, 2020

Avoiding the Security Pitfalls of Digital Transformation is a webinar that will explore how organizations can cut through the noise and make a success of cloud transformation, leveraging the benefits of cloud technologies including efficiency, agility and scalability while avoiding the pitfalls.

Read More
news image

Cyber Risk Appetite: Defining and Understanding Risk in the Modern Enterprise

whitePaper | January 16, 2020

Managing risk is a balancing act for organizations of all sizes and disciplines. While some organizations take on too much risk, others arguably do not take on enough. Complicating this equation is the emergence of cyber as one of the most impactful sources of risk in the modern enterprise. In fact, cyber security is now increasingly reviewed by corporate boards of directors and often discussed with financial analysts who see cyber security risk as an imminent and paramount business risk. Because the consequences of cyber security failures can be damaging to business revenues and brand reputation, CEOs have lost their positions as a result of data breaches and inept preparation and planning.

Read More
news image

AI Security White Paper

whitePaper | January 23, 2020

With the accumulation of big data, dramatic improvements in computing power, and continuous innovation in Machine Learning (ML) methods, Artificial Intelligence (AI) technologies such as image recognition, voice recognition, and natural language processing have become ubiquitous. Meanwhile, AI poses a significant impact on computer security: on the one hand, AI can be used to build defensive systems such as malware and network attack detection; on the other hand, AI might be exploited to launch more effective attacks.

Read More
news image

Sharkgate Whitepaper

whitePaper | December 11, 2019

SharkGate specializes in protecting websites and has geared up to build the next-generation of website cyber protection: SharkGate is creating the World’s first distributed ledger powered Cyber Security solution designed exclusively to protect websites against hackers. SharkGate is taking a new approach that will change website security as the industry knows it and make the next-generation of cyber protection available to all websites worldwide.

Read More
news image

NMS Security Architecture Considerations & Approaches

whitePaper | August 26, 2022

The SolarWinds compromise became public in December 2020 and was a massive wake up to the industry. Likely a state-sponsored attack, it compromised potentially thousands of governments and other high-profile organisations across the globe. Many organisations are currently in damage control following the breach. Many of them are unsure if the perpetrators have entered, spread and are still persistent within their environment - even after they shut down the SolarWinds Platforms.

Read More
news image

Privileged Remote Access Security in Cloud Whitepaper

whitePaper | May 5, 2022

The purpose of this document is to help technically-oriented professionals understand the security-related value BeyondTrust can bring to your organization. BeyondTrust can help your organization stay secure and compliant, while improving the efficiency and success of your organization with a better user experience.

Read More

Spotlight

Daon

Daon is a leading provider of award-winning biometric identity assurance software products and services focused on meeting the needs of governments and large commercial organizations worldwide. Daon supports customers and system integrators in building enterprise solutions requiring the highest level of security, performance, scalability, reliability and privacy. Daon’s IdentityX platform ensures that only you can authorize your financial / business transactions or access your most important and personal information. Using your mobile phone, IdentityX offers risk solutions and empowers you to securely establish your identity through a combination of encryption, biometrics such as face, voice, and fingerprint, PIN entry, and location-based technology . IdentityX is a fully mobile, private and cost effective solution that allows you to decide the level of security for each type of transaction - balancing convenience and security as you desire. IdentityX has been deployed by a growing lis

Events