What’s Behind the Continuous Increase in Breaches?

This is part 3 of a 4-part series examining data breaches, what they cost, why they are increasing in frequency, and what you can do about them.

In our September 6, 2016 post, we broke down the issue of dwell time, and its impact on the financial impact of a breach. In this blog we look at what’s behind the continuous increase in breaches.

Read more

Developing Advanced Data Centre Security for Under Fire Healthcare Organisations

British healthcare organisations, like their counterparts in the US and Europe, are currently facing a deluge of ransomware that threatens to overwhelm systems. Widely reported figures gleaned from an FoI request reveal nearly half (47%) of NHS Trusts in England have been infected over the past year. This is just the tip of the iceberg. Ransomware is one of many online threats facing healthcare IT bosses coming to terms with the fact patient data is increasingly highly sought after on the dark web.

The mission criticality of IT systems, rigorous compliance requirements and often stretched resources make securing these environments even more challenging. That’s why IT buyers need to consider a new approach designed to focus on east-west traffic inside the data centre.

Read more

How Next Gen Security Can Help Finance Firms Stay on the Right Side of New Euro Laws

Financial services firms have never faced a more agile and determined online foe. Barclays Global CISO Troels Oerting said recently that elite cybercrime gangs armed with advanced malware and a sophisticated skillset pose a major threat to the industry. They can get deeper inside networks, stay hidden for longer and steal more data than ever before. Additionally, as if that weren’t enough to worry about, coming European data protection laws will introduce a stringent new set of requirements and penalties on businesses, forcing improvements to cybersecurity.

Read more

Cybersecurity as Business Enabler: Why Hyper-Growth FinTech Needs Next Gen Tools

FinTech is booming. Last year it received a staggering $14.5 billion in venture funding – more than double the 2014 figure. And the UK is Europe’s unofficial capital. That’s good news all round. But that also puts this rapidly growing sector very clearly in the crosshairs of formidable assailants. As these firms race to offer a wider range of agile, cloud-based services to a whole new set of customers they begin to present an even greater target for the aforementioned assailants.

Read more

Dwell Time: The Real Killer in Data Center Breaches

This is part 2 of a 4-part series examining data breaches, what they cost, why they are increasing in frequency, and what you can do about them.

In our August 23, 2016 post, we broke down the many costs of data breaches, both direct and indirect, that hit organizations in a variety of areas. Now, let’s look at one of the chief culprits driving up the cost of breaches: dwell time.

Read more

VMworld 2016

VMworld 2016 is about to begin this week. Unlike previous years, the US event will take place in hot Las Vegas, Nevada.

One of the key objectives of 20,000 and some attendees is to learn about new virtualization and Data Center technologies as the Data Center is being transformed, changed and converged. Modernization is the keyword that many of the people I was talking with were using.

Solutions vendors will present how to automate, transform and build a modern Data Center in the cloud but also on premises.

Team GuardiCore will demonstrate how to secure the current and new data center with some new and exciting capabilities that were added to Centra recently. We show some amazing micro-segmentation capabilities and demonstrate how to accelerate VMware NSX deployments.

 

Come to say hello, learn something new and give us your feedback. We are looking forward to meet you. We will be at booth #764

What Do Data Breaches Really Cost? Let’s Break It Down.

This is part 1 of a 4-part series examining data breaches, what they cost, why they are increasing in frequency, and what you can do about them.

By just about every measure, 2015 was a record year for data breaches, and 2016 is on pace to beat it. Not only is the number of breaches increasing, but so are the costs. The Ponemon Institute’s 2016 study of 383 organizations worldwide found that the average cost of a data breach rose from $3.79 to $4 million over the previous year. If numbers like that make your eyes glaze over, let’s break them down into components any business can relate to: what really constitutes the cost of a breach?

Read more

GuardiCore Raises $20M; Continues Traction Protecting Enterprise Data Centers Globally

Today I am excited to share that we have secured a financing round (Series B) in the amount of $20M.  The round was led by our existing investors, 83 North and Battery Ventures, who continue to give us valuable contributions in terms of the support and guidance we need at this stage in our company’s lifecycle. We are also very happy to welcome Cisco to the table at this financing round.

Read more

Centra Celebration

East West traffic at a glance

East West traffic at a glance

The first week of July provides a great opportunity to celebrate.

At GuardiCore we like to celebrate, especially with new releases and product achievements. Several weeks ago we started deploying the latest version of our flagship product Centra, with first controlled upgrades taking place for our SaaS customers. The new Centra 2.0 release 16 is loaded with great and many enhancements, including important Reveal features. For those of you who were unable to review the upgrade or read the entire release notes, here’s a very short list:

We introduced major enhancements to Reveal to better handle large data center scale flow analysis and advanced queries (check this cool video here).

Reveal now includes numerous new filtering methods to allow you to quickly get to what matters most: Detect applications, find anomalies or make sure that only allowed connections are made between servers. Reveal data center process level flows can be filtered by applications, asset names, port numbers, ESX folders, inbound and outbound Internet connections, user-defined labels and more.

Read more

Bait, Wait, Beat Ransomware

Attackers will always find a way to penetrate your perimeter defenses. If you are ‘lucky’ they will only steal the organization’s compute resources. In other cases, they will cause real damage, fast. Ransomware is becoming a big issue for too many organizations.

We’ve lately been approached by many of our users, asking how they can leverage the Centra security platform to fight ransomware. In this post we will talk about how our deception technology helps contain ransomware and minimize the inflicted damage.

Ransomware is dynamic in nature and changes frequently, making traditional security tools ineffective. Signature based solutions simply can’t keep track while more sophisticated heuristics based solutions can often be detected by the malware and evaded.

Read more