Visibility Is the Key to Micro-Segmentation

Server and network virtualization, combined with ever-increasing traffic, network speed and server density have created a visibility gap. Administrators simply cannot “see” what is going on deep in their data centers and sophisticated attackers can go undetected for extended periods of time. GuardiCore VP of Marketing Dave Burton explores this issue in this article published in Data Center Dynamics.

Hot Products from VMWorld 2016

VMware has moved its domestic VMWorld conference to Las Vegas – and what better place than under the bright lights of the strip to talk about the latest in virtualization, SDN, containers, hyperconverged infrastructure and mobile management. Check out our compilation of the hottest new products and services being announced and displayed at VMWorld 2016.

Deception Technology Grows and Evolves

Deception technologies such as honeypots are becoming increasingly popular with enterprises as the products get more flexible and the tools allow security analysts swamped with incident reports to zero in on cases of actual ongoing infiltration. According to a report released in August by research firm Technavio, the deception technology market is growing at a compound annual growth rate of 9 percent, and is predicted to reach $1.33 billion by 2020.

VMworld 2016

VMworld 2016 is about to begin this week. Unlike previous years, the US event will take place in hot Las Vegas, Nevada.

One of the key objectives of 20,000 and some attendees is to learn about new virtualization and Data Center technologies as the Data Center is being transformed, changed and converged. Modernization is the keyword that many of the people I was talking with were using.

Solutions vendors will present how to automate, transform and build a modern Data Center in the cloud but also on premises.

Team GuardiCore will demonstrate how to secure the current and new data center with some new and exciting capabilities that were added to Centra recently. We show some amazing micro-segmentation capabilities and demonstrate how to accelerate VMware NSX deployments.

 

Come to say hello, learn something new and give us your feedback. We are looking forward to meet you. We will be at booth #764

What Do Data Breaches Really Cost? Let’s Break It Down.

This is part 1 of a 4-part series examining data breaches, what they cost, why they are increasing in frequency, and what you can do about them.

By just about every measure, 2015 was a record year for data breaches, and 2016 is on pace to beat it. Not only is the number of breaches increasing, but so are the costs. The Ponemon Institute’s 2016 study of 383 organizations worldwide found that the average cost of a data breach rose from $3.79 to $4 million over the previous year. If numbers like that make your eyes glaze over, let’s break them down into components any business can relate to: what really constitutes the cost of a breach?

Read more

Best 8 Hacking Tools from This Years Black Hat Conference

Here are 8 absolute badass hacking tools which were demoed in this year’s Black Hat Conference. Hackers and security researchers are pulling out all the stops yet again, using Black Hat as a platform to explain, release and/or promote a ton of great tools for pen testers and security operations experts. Here are some of the highlights and tools that are being or will be demoed during the course of the conference which will end on 4th August.