Blue Coat Systems says that its cloud-based Global Intelligence Network now integrates Blue Coat’s entire portfolio, including the Norman Shark sandboxing technology and Solera Networks forensics and incident response products recently acquired by Blue Coat. All products now feed and receive threat information on a continuous basis, providing security professionals real-time intelligence that allows them to more effectively blocks threats. This leads to reduced attacks and a more...
Read MoreCorero Network Security has released the findings of its inaugural Quarterly DDoS Trends and Analysis Report. Through the analysis of customer data from the fourth quarter of 2014, Corero found that attackers are evolving their use of DDoS attacks to circumvent companies’ cybersecurity solutions, disrupt service availability and infiltrate victim networks.
Read MoreCorero Network Security has been named a finalist for Security Product of the Year in the Datacentre Solutions Awards 2015 with its SmartWall Threat Defense System (TDS) that inspects traffic, detects DDoS attacks against protected resources such as corporate IT infrastructures, servers and services and blocks attacks in real time, preventing service and network outages. After the initial judging process, voting is now open the public until the 23rd April 2015.
Read MoreFunding bodies’ support for Centre for Secure Information Technologies (CSIT) at Queen’s University Belfast will help deliver a resilient and connected nation.
Read MoreHuawei has unveiled its latest terabit Next Generation Anti-Distributed Denial-of-Service (DDoS) Solution at CeBIT 2015 in Hannover, Germany. The solution facilitates the prevention of DDoS attacks to improve the security and competitive edge of enterprises across the Europe region. Together with Black Lotus, a leading managed security service provider (MSSP) in the United States, Huawei also announced additional services offered through its DDoS cloud scrubbing center in Amsterdam, the first...
Read MoreContinual high-profile internal security breaches prompt a surge in preventative measures against insider threat.
Read More