ThreatConnect Security Operations and Analytics Platform

January 17, 2019

ESG Lab evaluated the ThreatConnect threat intelligence, analytics, and orchestration platform to validate how it enables organizations to identify, manage, and block threats. We also gauged the extensibility of the platform to enable users to adapt and create automation for their processes, rather than forcing them to adapt their processes to ThreatConnect’s paradigm.

Spotlight

WWPASS Corporation

Frustrated with the inadequate security provided by username and password authentication and the increasing vulnerabilities exploited by hackers to overcome two-factor authentication solutions, Eugene Shablygin founded WWPass Corporation in 2008. After 6 years of research & development, the company introduced our unique authentication solution which replaces the username with a secure PassKey. The PassKey does not contain any identity data; it serves only as a unique cryptographic identifier that is used to retrieve identity data from our patented Distributed Data System. By combining multiple standards-based technologies such as symmetric and asymmetric keys with AES-256 encryption and Reed-Solomon codes, the solution is immune to modern sophisticated attacks by cyber criminals seeking to impersonate user accounts. The user’s identity is never exposed in transit or at rest making credential theft virtually impossible.

OTHER WHITEPAPERS
news image

Apple Platform Security

whitePaper | May 26, 2022

Apple designs security into the core of its platforms. Building on the experience of creating the world’s most advanced mobile operating system, Apple has created security architectures that address the unique requirements of mobile, watch, desktop, and home.

Read More
news image

OT/IoT Security Report Cyber War Insights, Threats and Trends, Recommendations

whitePaper | August 30, 2022

Nozomi Networks Labs is dedicated to reducing cyber risk for the world’s industrial and critical infrastructure organizations. Through its cybersecurity research and collaboration with industry and institutions, it helps defend the operational systems that support everyday life. The Labs team conducts investigations into industrial device vulnerabilities and, through a responsible disclosure process, contributes to the publication of advisories by recognized authorities.

Read More
news image

C2 Identity Security White Paper

whitePaper | December 20, 2022

Organizations are adopting distributed and complex network security due to the changing organizational structure trend. C2 Identity is essential to any business to improve convenience and flexibility in managing identity information and access privileges while protecting corporate resources from unauthorized access, both within and outside the organization's boundaries.

Read More
news image

2023 Data Protection Trends Executive Brief Japan Edition

whitePaper | February 3, 2023

In late 2022, an independent research firm completed their survey of 4,200 unbiased IT leaders and implementers on a variety of data protection drivers, challenges, and strategies — including 286 in Japan. This broad-based market study on unbiased organizations is conducted annually on Veeam’s behalf to understand how the data protection market continues to evolve, so that Veeam can ensure product strategies and market initiatives align with where the market is going.

Read More
news image

Network Traffic Analysis (NTA): A Cybersecurity ‘Quick Win’

whitePaper | February 27, 2020

According to research from ESG and the Information Systems Security Association (ISSA), 91% of cybersecurity professionals believe that most organizations are either extremely or somewhat vulnerable to a significant cyber-attack or data breach.1 This level of cyber-risk demands immediate attention and action from CISOs, CIOs, and business executives. As a result, 62% of organizations plan to increase cybersecurity spending in 2020.2 Here’s the problem: Increasing security budgets alone isn’t enough. CISOs need quick and easy wins that can greatly bolster security efficacy and streamline operations without demanding massive projects and vast resources. There is a lot of work ahead. This white paper concludes.

Read More
news image

Cybersecurity Considerations in Autonomous Ships

whitePaper | October 18, 2022

The NATO Cooperative Cyber Defence Centre of Excellence (CCDCOE) is a NATO-accredited knowledge hub offering a unique interdisciplinary approach to the most relevant issues in cyber defence.

Read More

Spotlight

WWPASS Corporation

Frustrated with the inadequate security provided by username and password authentication and the increasing vulnerabilities exploited by hackers to overcome two-factor authentication solutions, Eugene Shablygin founded WWPass Corporation in 2008. After 6 years of research & development, the company introduced our unique authentication solution which replaces the username with a secure PassKey. The PassKey does not contain any identity data; it serves only as a unique cryptographic identifier that is used to retrieve identity data from our patented Distributed Data System. By combining multiple standards-based technologies such as symmetric and asymmetric keys with AES-256 encryption and Reed-Solomon codes, the solution is immune to modern sophisticated attacks by cyber criminals seeking to impersonate user accounts. The user’s identity is never exposed in transit or at rest making credential theft virtually impossible.

Events