This site uses cookies. By continuing to browse this site you are agreeing to our use of cookies. Find out more.X

News in brief: this week's launches at Infosecurity Europe

Share this article:

This week featured a large number of technology launches to coincide with the Infosecurity Europe conference in London. Here is a round-up of what we saw and heard.

CORE Security launched Insight Enterprise 2.0 to offer an advanced security intelligence solution to continuously predict IT threats and pre-empt business risk and link them to the actual risk to the business. A real-time security intelligence platform, CORE Insight provides unified threat validation and prioritisation while feeding key analytics to the security ecosystem. Version 2.0 offers a comprehensive set of vulnerability management capabilities, including: integrated network and web application vulnerability scanning; attack planning and simulation; threat replication; dashboards and reporting; and vulnerability remediation on a single platform.

Bloxx launched the Secure Web Gateway which combines the company's real-time content analysis and classification engine, Tru-View Technology, with Sophos's anti-malware and the Bloxx SSL proxy. This will provide customers with unsurpassed levels of content filtering and protection against web-based security threats for HTTP and HTTPS web traffic. It also launched the Bloxx iPad Browser which lets organisations quickly and easily extend the capability of their Bloxx Web Filter or Secure Web Gateway to enforce web access policies for iPads used off-network. The Bloxx iPad Browser will filter web traffic over a WiFi connection when the device is connected to an organisation's network or used off-network, for example at home or connected to a public WiFi network. In addition, if the iPad has 3G connectivity, then access policies will still be enforced with the Browser installed.

Imation launched its StealthZONE PC-on-a-stick desktop environment to enterprise customers. It said this will solve the BYOD conundrum by providing a secure, consistent work environment on any USB-capable endpoint, meaning that the choice of host machine is unimportant as the user plugs a managed, secure StealthZONE USB device into their home computer, laptop or almost any unsecured Windows PC, and boots Windows from the USB device. After up to three-factor authentication, the user gains access to a fully isolated Microsoft Windows workspace.

Cryptzone launched the latest release of its policy management software, NETconsent Compliance Suite, which ensures employees are aware of policies, educated on the reasons they are important and tested to see if they understand their responsibilities. It said documents delivered through NETconsent can now be accessed and signed up to from tablets at the point of use, while every piece of content can be categorised by any standards relating to it.

BeyondTrust launched a data-loss prevention product with real-time artificial intelligence that provides organisations with a "zero-touch" solution to secure critical data without writing a single rule. It said that PowerBroker DLP v4.0 included Active Profiler DX, BeyondTrust's patent-pending technology that intelligently monitors and profiles ongoing user behaviour and activity and learns the normal behaviour of each user in the enterprise, automatically detecting and preventing data-leak threats, and eliminating the costly process of continuously discovering and classifying data in order to then identify suspicious activity. It also said that the PowerBroker DLP is context-aware, with the ability to identify intellectual property and personal, health, or financial data, allowing it to make smarter decisions about when to report or block suspicious activities.

Digital Assurance launched the virtual penetration tester DAVE, which is designed to increase the flexibility and efficiency of security testing that resides on the network or in the cloud and can be activated to carry out rigorous penetration testing on demand. Tests are carried out manually by specialist Digital Assurance penetration testers, providing the same levels of expertise while eliminating the costs associated with bringing in personnel and direct-site access.

Conseal Security announced the launch of its server to enable organisations to maintain complete control over their private data when it is on the move. It said this gives IT departments management of removable storage as they can centrally control sensitive data stored on removable devices via their organisation's private cloud. As well as protecting data against password guessing attempts via Conseal's Dual Locks system, it allows remote wiping of any removable USB storage device, and highly flexible access control rules enable tight control over who has access to data. The Conseal Enforcer also allows administrators to enforce policy for all external devices, including being able to prevent the use of insecure data storage by locking down and controlling what is allowed to connect via users' USB ports.

Trend Micro launched Deep Discovery to prevent advanced persistent threats by providing the tools to detect zero-day malware and tell-tale malicious human activity across the entire network; it also offers in-depth analysis so firms can prevent similar attacks in the future. It said Trend Micro's Smart Protection Network reputation engine and blacklisting capabilities detect and block the command-and-control channels used by the attackers to communicate with the malware embedded in the target organisation. The company has also drawn up a set of behavioural rules based on classic signs of an APT attack, including multiple log-in failures and data exfiltration, so that Deep Discovery can flag up a possible intrusion. A sandboxing feature is offered to allow the user to put any newly discovered malware under the microscope.

Fortinet expanded its network security solution suite with dedicated distributed denial of service (DDoS) protection products. It said the FortiDDoS-100A, FortiDDoS-200A and FortiDDoS-300A are designed to detect and help protect against today's most damaging and sophisticated DDoS attacks. It said all FortiDDoS appliances feature eight virtualised network partitions with independent protection policies for virtualised environments, automatic traffic profiling and rate-limiting, context-aware policy enforcement for maximum effectiveness. They also provide real-time and historic attacking traffic analysis that delivers granular visibility of top attacks, top sources and top attackers.

Arbor Networks announced its Peakflow service platform to deliver automated protection from DDoS attacks launched by virtually all known botnets, plus a real-time update service that protects customers from new attack vectors as they emerge. Included is the ATLAS intelligence feed that delivers deep DDoS signatures in real time to keep networks protected against hundreds of botnet-fueled DDoS attack toolsets and their variants. It also delivers DDoS protections for SSL regardless of the application and blocks SSL DDoS attacks with ASERT-designed protections that guard against malformed traffic, attempts to continually renegotiate connections and other advanced attacks that aim to disrupt service availability.

Share this article:

SC webcasts on demand

This is how to secure data in the cloud


Exclusive video webcast & Q&A sponsored by Vormetric


As enterprises look to take advantage of the cloud, they need to understand the importance of safeguarding their confidential and sensitive data in cloud environments. With the appropriate security safeguards, such as fine-grained access policies, a move to the cloud is as, or more, secure than an on-premise data storage.


View the webcast here to find out more

More in News

NCA/FBI/Europol launch global cyber crime-busters, J-CAT

NCA/FBI/Europol launch global cyber crime-busters, J-CAT

The UK's National Crime Agency (NCA) has joined forces with the FBI and Europol to launch a new global crime fighting team, led by the NCA's Andy Archibald.

NATO members to get cyber war protection

NATO members to get cyber war protection

Nato cyber defence policy to declare that a cyber attack on any one member country is an attack on them all.