Last week, the GuardiCore team participated at the 2018 Gartner Security and Risk Management Summit in National Harbor, MD. This year we were honored to be named as a Cool Vendor in the June 2018 Gartner, “Cool Vendors in Security for Midsize Enterprises” report.
Law firms are increasingly the target of cyber attack. Cyber criminals recognize law firms as vaults of proprietary sensitive corporate data and as such optimal target for cyber security attacks. From the Panama Papers to DLA Piper, 2017 was one of the most challenging cybersecurity years for law firms and there is no indication that this trend is slowing down in 2018.
As most organisations undergo IT transformation, overhauling IT and putting it at the heart of business strategies, we ask why IT Security is being left behind and whether its time to embrace a new approach for securing hybrid data centres.
Everyone knows about the many benefits of the cloud: it is infinitely scalable, developer-friendly, and easy to use. However, we often avoid addressing the reality that the cloud is not perfect. The truth is that, despite the cloud’s many merits, it presents a significant challenge from a security standpoint.
Next week, GuardiCore will participate at the RSA Conference in San Francisco for the 3rd consecutive year. It is an important event for the larger Cyber and Network Security community and can be seen as the litmus paper for analyzing market trends and more important, understanding current and future needs.
We recently added File Integrity Monitoring (FIM) to the GuardiCore Centra Security Platform and wanted to share how it can help your organization detect breaches and achieve compliance with regulations such as PCI DSS and HIPAA.
Micro-segmentation provides the ability to isolate communication flows within applications and workloads and allows for more granular workload security than traditional tools. Beyond using micro-segmentation...
The movement of data and workloads to the cloud has been more like a headlong rush. In the quest for a competitive edge, businesses are clearly eager to take advantage of the agility and elasticity the cloud affords them – so much so that security is often an afterthought.
In traditional data center environments, security teams usually leverage their standard security tools and agents to capture network-level logs. Capturing these logs gives teams visibility into network architecture and traffic flow.