Privileged Identity Management Suite for Critical Infrastructure Protection Secures and Manages Privileged Access in SCADA, ICS, Smart Grids and other Operational Technologies. The solution secures critical infrastructure by preventing the exploitation of local or remote access to privileged accounts – the primary target of Industrial Control Systems (ICS) and SCADA cyber-attacks.
Cyber-Ark® Software is announced that the company has been named an Excellence award finalist in the Best Security Company category of the 2013 SC Awards. The designation recognizes the company for outstanding leadership and achievement in information security. In addition, Cyber-Ark’s Privileged Identity Management solution was selected as a Reader’s Trust Award finalist in the Best Identity Management Application category.
Finding, managing and analyzing SSL and other digital certificates can be time-consuming, complex and expensive. To help automate and simplify these tasks, Entrust introduces features for the Entrust Discovery service that is designed to help solve three of the industry's top SSL challenges: avoiding application outages, ensuring compliance and managing multi-source certificate environments.
Privileged Identity Management Suite recognized as the most innovative security solution for its protection against insider threats and targeted cyber-attacks. Cyber-Ark's Privileged Identity Management Suite has won the “Security Innovation of the Year” award at this year’s UK IT Industry Awards 2012.
The amount of mobile Android malware has surged this year, from a count of 30,000 malware specimens in June to almost 175,000 last month. In spite of legal threats from adware firms, Trend names Top 10 Most Aggressive Android Adware.
Trend Micro is introducing Custom Defense – an advanced threat protection solution that enables businesses and government agencies not only to detect and analyze APTs and targeted attacks, but also to adapt their protection and respond to these attacks.
While early versions of DoS attacks that tended to focus at the network layer were aimed at shutting down server ports, the most modern strategies moved straight up the stack to the application level, according to Tal Beery, Security Researcher at Imperva.