One of the key use cases for our customers is the protection of their data center environments, which can involve moving off the perimeter into the data center or segmenting their data center from the rest of the organization. It is imperative that a data center security solution not only deliver high inspection throughput and low latency for the significant traffic demands, but also accurate and effective security that doesn’t introduce false positives or create any network traffic bottlenecks. Continue reading
It seems that each year that passes is worse than the last in terms of hacking and cyber attacks, and 2017 was no exception.
“Surprising no one, 2017 was marked another ‘worst year ever’ in data breaches and cyber incidents around the world,” said Jeff Wilbur, director of the Internet Society’s Online Trust Alliance. Continue reading
Business Email Compromise (BEC) attacks have expanded tremendously over the past few years, with a projected growth of over $9 billion in 2018. The combination of simplicity and effectiveness have ensured that BEC will continue to be one of the most popular attacks, especially for those who lack special tools and knowledge to pull off more complicated schemes. Continue reading
First, What is IDPS and Why Do We Care?
Intrusion Prevention Systems (IPS) emerged as an improvement on Intrusion Detection Systems (IDS). IDS are out-of-band collectors of network traffic that analyze the information and provide alerts. Continue reading