Come See What Makes Firewalls Intelligent at RSA Conference 2015

We’re very excited to be exhibiting again at the RSA Conference in San Francisco. This year, we’re showing two of our latest technologies, both of which have been getting a lot of interest: Behavioral Intelligence – a new layer of intelligence in our Intelligent Next-Generation Firewalls that makes it possible to find and stop insider…

Hillstone Networks CTO Tim Liu’s Top Security Predictions For 2015

predictions Internet of Everything = Increased Threat of Everything Forrester predicts that 42% of the total global population will own a smartphone by end of 2015. In the meantime, more wearable electronics, sensors and industrial systems are connected to the Internet which turns into new targets for attacks. The number of mobile malware incidents will continue…

Welcome to the New Age of Threat Intelligence

Sony PlayStation Networks and Microsoft Xbox Live experienced user connection problems on Christmas Day, 2014, for which a hacker group claimed responsibility. This time, hackers launched massive distributed denial-of-service (DDoS) attacks that overloaded the servers with bogus requests. DDOS is a specific type of DOS attack where multiple compromised systems, “Zombies”, which are usually infected…

Video: If you are breached, would you know it ?

If you listened to the episode of 60 Minutes on CBS on October 5, 2014, you would have heard Director of FBI, James Comey, state “there are two types of companies: those that know they have been hacked and those that don’t know it yet.” No one is immune to security breaches and today’s headlines…

The Benefits of Behavior Analysis in Threat Detection

The next generation of security needs to “identify attacks as they are happening”. This is where behavior analysis can step in and be used as a real-time security defense tool. Today, SIEM’s are effective at identifying attack patterns but they are not sophisticated enough to convert their threat correlation analytics into actionable events, such as…