Secure East-West Traffic in Virtualized Data Centers

The other big topic we’re focusing on at RSAC this year is network security for highly virtualized data centers. We’re giving presentations each hour about our new Virtualized Elastic Security Appliance (vESA), which makes it possible to protect network traffic that is traveling among constantly-changing virtual machines (VMs) in multi-tenant environments. vESA solves the problem…

Find Threats in Minutes with Behavioral Intelligence

At this year’s RSA Conference, we’re showing the latest version of our Stone OS security platform. It combines our traditional high-performance networking with new advanced Behavioral Intelligence so that you can find and stop insider and external threats faster, often in just minutes. Hillstone’s Behavioral Intelligence adds four technologies on top of the capabilities traditionally…

Come See What Makes Firewalls Intelligent at RSA Conference 2015

We’re very excited to be exhibiting again at the RSA Conference in San Francisco. This year, we’re showing two of our latest technologies, both of which have been getting a lot of interest: Behavioral Intelligence – a new layer of intelligence in our Intelligent Next-Generation Firewalls that makes it possible to find and stop insider…

Hillstone Networks CTO Tim Liu’s Top Security Predictions For 2015

predictions Internet of Everything = Increased Threat of Everything Forrester predicts that 42% of the total global population will own a smartphone by end of 2015. In the meantime, more wearable electronics, sensors and industrial systems are connected to the Internet which turns into new targets for attacks. The number of mobile malware incidents will continue…

Welcome to the New Age of Threat Intelligence

Sony PlayStation Networks and Microsoft Xbox Live experienced user connection problems on Christmas Day, 2014, for which a hacker group claimed responsibility. This time, hackers launched massive distributed denial-of-service (DDoS) attacks that overloaded the servers with bogus requests. DDOS is a specific type of DOS attack where multiple compromised systems, “Zombies”, which are usually infected…