Video: If you are breached, would you know it ?

If you listened to the episode of 60 Minutes on CBS on October 5, 2014, you would have heard Director of FBI, James Comey, state “there are two types of companies: those that know they have been hacked and those that don’t know it yet.” No one is immune to security breaches and today’s headlines…

The Benefits of Behavior Analysis in Threat Detection

The next generation of security needs to “identify attacks as they are happening”. This is where behavior analysis can step in and be used as a real-time security defense tool. Today, SIEM’s are effective at identifying attack patterns but they are not sophisticated enough to convert their threat correlation analytics into actionable events, such as…

Virtual Elastic Firewall For Cloud Security – Part II

This is Part II of a three-part series on the value proposition of a Virtual Firewall Architecture (VFA) for Cloud Security. Part II: Challenges for cloud security solutionsMost security solutions were designed for SMB, enterprise, or physical data center architectures. Requirements for these solutions do not necessarily apply to virtualized environments. A security service for cloud…

Virtual Elastic Firewall Architecture For Cloud Security – Part I

Security is a necessary building block for modern data center architectures. Without an established security, organizations will not put computing tasks and sensitive data in the cloud. Traditional security solutions, which were designed for SMB, enterprise, or data center perimeters, cannot be deployed in modern data centers efficiently. A good data center security solution has…

Guarding the Data Center

Data center operators – especially those who offer space and services to the public – are constantly guarding their infrastructure. Not an hour goes by that doesn’t bring a new would-be attacker. Most data center operators deal with a constant influx of hackers from remote countries just trying to gain access to their network, pinging…