Garrat-Callahan reduces cloud application access from 45 minutes to near-instant with Hillstone

The Garratt-Callahan IT department saw a dramatic increase in network and application performance with the Hillstone solution. The better network performance allowed the IT department to allocate appropriate bandwidth to more mission-critical processes. In addition to network improvement, it also reported on malware, ARP attacks and other threats that Garratt-Callahan’s existing solution was not capturing…

Hillstone Networks CTO Tim Liu’s Top Security Predictions For 2015

predictions Internet of Everything = Increased Threat of Everything Forrester predicts that 42% of the total global population will own a smartphone by end of 2015. In the meantime, more wearable electronics, sensors and industrial systems are connected to the Internet which turns into new targets for attacks. The number of mobile malware incidents will continue…

Welcome to the New Age of Threat Intelligence

Sony PlayStation Networks and Microsoft Xbox Live experienced user connection problems on Christmas Day, 2014, for which a hacker group claimed responsibility. This time, hackers launched massive distributed denial-of-service (DDoS) attacks that overloaded the servers with bogus requests. DDOS is a specific type of DOS attack where multiple compromised systems, “Zombies”, which are usually infected…

Video: If you are breached, would you know it ?

If you listened to the episode of 60 Minutes on CBS on October 5, 2014, you would have heard Director of FBI, James Comey, state “there are two types of companies: those that know they have been hacked and those that don’t know it yet.” No one is immune to security breaches and today’s headlines…

The Benefits of Behavior Analysis in Threat Detection

The next generation of security needs to “identify attacks as they are happening”. This is where behavior analysis can step in and be used as a real-time security defense tool. Today, SIEM’s are effective at identifying attack patterns but they are not sophisticated enough to convert their threat correlation analytics into actionable events, such as…