Posts

Security Features of the Hybrid Cloud (OpenStack and AWS)

Everyone knows about the many benefits of the cloud: it is infinitely scalable, developer-friendly, and easy to use. However, we often avoid addressing the reality that the cloud is not perfect. The truth is that, despite the cloud’s many merits, it presents a significant challenge from a security standpoint. Security concerns might make you hesitate to deploy your workloads in any cloud, be it public or private – and understandably so.

Read more

GuardiCore Named Info Security Product Guide’s Gold Innovative Company of the Year in 14th Annual 2018 Global Excellence Awards

Also Wins Bronze in Cloud Security and Deception; Honored at Info Security Products Guide Awards Gala at RSA Conference 2018

Read more

GuardiCore Recognized in Cloud Security and Micro-Segmentation at RSA Conference by Cyber Defense Magazine Infosec Awards

Cyber Defense Magazine, The Premier Source of IT Security Information, Honors GuardiCore’s Centra Security Platform

Read more

What You Should Expect at RSA Conference 2018

Next week, GuardiCore will participate at the RSA Conference in San Francisco for the 3rd consecutive year.  It is an important event for the larger Cyber and Network Security community and can be seen as the litmus paper for analyzing market trends and more important, understanding current and future needs.

Read more

Integrating Security and DevOps to Protect Cloud Workloads

CSO Online recently reported on a study conducted by the Cloud Security Alliance that listed the top twelve threats to cloud computing. The threats range from data breaches, to advanced persistent threats (APTs), to abuse and nefarious uses of cloud services. For example, the report discusses how malicious actors exploit poorly secured or misconfigured cloud services to abuse compute resources for nefarious purposes, such as DDOS attacks or attempts to exfiltrate data as part of a breach.

Read more

Leveraging Micro-Segmentation Data to Accelerate Breach Detection

Micro-segmentation provides the ability to isolate communication flows within applications and workloads and allows for more granular workload security than traditional tools. Beyond using micro-segmentation to allow or block connections and alert on those activities, the ability to compare, within a single platform, policy violations to historical observations can dramatically accelerate threat detection, investigation, and response.

Read more

Why Native Cloud Controls Are Not Enough for Meaningful Micro-Segmentation

The movement of data and workloads to the cloud has been more like a headlong rush. In the quest for a competitive edge, businesses are clearly eager to take advantage of the agility and elasticity the cloud affords them – so much so that security is often an afterthought. But hey, isn’t the cloud provider taking care of that? 

Some companies are surprised to hear the answer is no, at least not entirely.
Read more

GuardiCore Named Best Buy by SC Magazine in Cloud-Based Security Group Review for Second Year in a Row

San Francisco, CA and Tel Aviv, Israel – GuardiCore, a leader in internal data center and cloud security, today announced that SC Magazine, the cybersecurity source, named the GuardiCore Centra Security Platform a Best Buy.

Read more

Improving Workload Security in AWS Using VPC Flow Logs

In traditional data center environments, security teams usually leverage their standard security tools and agents to capture network-level logs. Capturing these logs gives teams visibility into network architecture and traffic flow. However, when we migrate applications to AWS, these standard practices change. The same toolsets might not be as efficient as they were in the traditional environment. While security fundamentals are the same, the approach changes. Security teams need to explore new options and adopt new tools to ensure adequate security coverage.

Read more

Why Security Teams Need Visibility into Container Networks

Containers and orchestration systems use numerous technical abstractions to support auto-scaling and distributed applications that obfuscate visibility into application communication flows. Security teams lose visibility into application communication flows, rendering traditional tools useless and exposing the application to risk.
Read more