HomeCII/OTNew infosec products of the week - July 14, 2023

New infosec products of the week – July 14, 2023

Published on

spot_img

WatchGuard, a global provider of network security solutions, has introduced AuthPoint Total Identity Security, a new offering designed to enhance identity protection capabilities. AuthPoint Total Identity Security provides managed service providers (MSPs) with the tools to offer their customers credentials monitoring, on-demand dark web exposure alerts, and password management. This all-in-one mobile authenticator app is available for both iOS and Android devices.

Credential compromise is a significant issue in today’s digital landscape, with cybercriminals constantly seeking opportunities to steal sensitive information. By offering credentials monitoring, AuthPoint Total Identity Security allows organizations to keep track of their credentials and receive alerts if they are compromised on the dark web. This early detection can help prevent potential security breaches and minimize the impact of credential theft.

The app also includes a password management feature, which enables users to securely store their passwords and access them whenever needed. This eliminates the need to remember multiple passwords or write them down, reducing the risk of password-related vulnerabilities.

One key benefit of AuthPoint Total Identity Security is its ease of use. The app provides a user-friendly interface that makes it simple for individuals to monitor their credentials and manage their passwords. With just a few taps on their mobile devices, users can access important security information and take necessary actions to protect their identities.

NETSCOUT, a leading provider of network performance management and cybersecurity solutions, has announced enhancements to its Advanced Edge Defense (AED) solution. AED is designed to protect organizations from Distributed Denial of Service (DDoS) attacks and other cyber threats by screening incoming and outgoing network traffic.

A key feature of the enhanced AED solution is its use of machine learning (ML) algorithms. These algorithms analyze network traffic patterns to identify potential threats in real-time, enabling organizations to proactively block malicious traffic. By leveraging ML-based adaptive DDoS protection, AED can effectively mitigate the risks associated with DDoS attacks and reduce the load on firewalls, load balancers, and VPN concentrators.

Deployed at the internet edge in front of existing network infrastructure, AED acts as a critical layer of defense against cyber threats. By detecting and blocking malicious traffic before it reaches the organization’s internal network, AED helps prevent the spread of malware and protects sensitive information.

Fidelis Cybersecurity, a leading provider of network detection and response solutions, has released Fidelis Active Directory Intercept as part of its Fidelis Network and Deception 9.6.1 product release. Fidelis Active Directory Intercept combines network detection and response capabilities with Active Directory (AD) security to enable organizations to identify and address potential AD issues.

Active Directory is a crucial component of most modern IT infrastructures, as it serves as a central repository for user account information and access controls. However, AD can also be a target for cybercriminals seeking to gain unauthorized access to sensitive information. Fidelis Active Directory Intercept helps organizations detect and respond to AD-related threats, such as privilege escalation and unauthorized modifications.

Hubble, a leading provider of asset intelligence solutions, has introduced Hubble Aurora, a new offering that empowers businesses to gain insights into their technology ecosystems. Building on the foundation of Hubble’s existing Asset Intelligence platform, Aurora provides users with enhanced asset visibility and cybersecurity posture insights.

Aurora features a no-code dashboarding interface, allowing users to easily visualize and analyze their asset data without the need for extensive technical knowledge. The platform also offers a rich, open schema and software development kit (SDK), enabling seamless integration with third-party applications.

With its comprehensive asset visibility and cybersecurity posture insights, Aurora enables organizations to make informed decisions regarding their technology investments and security strategies. By understanding the vulnerabilities and strengths within their technology ecosystems, businesses can proactively address potential security gaps and optimize their IT infrastructure.

Regula, a leading provider of document examination solutions, has announced enhancements to its Regula 4306 product. The update focuses on light sources that are essential for thorough document examination, particularly for identifying various security features that are invisible to the naked eye.

The redesigned Regula 4306 features a new light source for the analysis of anti-Stokes luminescence, which is critical for detecting counterfeit and altered documents. Additionally, the device offers the ability to regulate the angle of oblique light, enabling forensic experts to perform certain tasks more effectively.

These enhancements enhance the capabilities of Regula 4306, providing forensic experts with advanced tools to combat identity fraud. By leveraging the latest technology in document examination, organizations can ensure the authenticity of important documents and prevent fraudulent activities.

In conclusion, the introduction of these innovative products highlights the ongoing efforts of organizations in the information security sector to address emerging cyber threats and enhance protection for individuals and businesses alike. By leveraging advanced technologies such as machine learning and enhanced light sources, these solutions offer effective tools for detecting and preventing credential compromise, DDoS attacks, AD-related issues, and identity fraud. As the threat landscape continues to evolve, it is essential for organizations to stay ahead of cybercriminals by adopting robust security measures and leveraging cutting-edge technologies.

Source link

Latest articles

Strengthening Cyber Resilience Through Supplier Management

 Recent data shows third-party and supply chain breaches — including software supply chain attacks...

A New Wave of Finance-Themed Scams

 The hyperconnected world has made it easier than ever for businesses and consumers...

New DroidLock malware locks Android devices and demands a ransom

 A newly discovered Android malware dubbed DroidLock can lock victims’ screens for ransom...

Hamas-Linked Hackers Probe Middle Eastern Diplomats

 A cyber threat group affiliated with Hamas has been conducting espionage across the...

More like this

Strengthening Cyber Resilience Through Supplier Management

 Recent data shows third-party and supply chain breaches — including software supply chain attacks...

A New Wave of Finance-Themed Scams

 The hyperconnected world has made it easier than ever for businesses and consumers...

New DroidLock malware locks Android devices and demands a ransom

 A newly discovered Android malware dubbed DroidLock can lock victims’ screens for ransom...