Logo
15.11.2018

Nachrichten

Blog: The Low Down on Threat Hunting

Recently we announced our 2018 State of Threat Detection survey results and we picked up on some interesting trends around the subject of threat hunting. But what exactly is threat hunting? Who's doing it? And how can you do it too? Find out the answers below: What is ...

lesen
Logo
09.11.2018

Nachrichten

On Demand Webinar: You Can't Detect What You Can't See: Illuminating the Entire Kill Chain

Summary With technology advances and threats seemingly coming from every direction, security environments have become more complex. Sensitive data is no longer locked within the corporate walls as the boundaries have expanded from the network to endpoints to the cloud. ...

lesen
Logo
07.11.2018

Nachrichten

MDR vs MSSP: What to think about when choosing an outsourcing model

Business and government IT workloads are rapidly transitioning from premises-based data centers to cloud service providers (CSPs). But challenges arise when CSP compute instances are ....

lesen
Logo
06.11.2018

Nachrichten

BLOG: Extending Your Network Security to AWS

Read full Blog here: https://www.fidelissecurity.com/threatgeek/cyberdefense/aws-security Business and government IT workloads are rapidly transitioning from premises-based data centers to cloud service providers (CSPs). But challenges arise when CSP compute instances are una

lesen
Logo
05.11.2018

Veranstaltungen

Extending Your Network Security to AWS (Webinar)

05.12.2018 von 17:00 Uhr - 18:00 Uhr

Veranstaltungsort: https://www.fidelissecurity.com/resources/webinar/network-security-aws

As more organizations implement cloud strategies and technologies, the volume of data being transmitted to and from the cloud increases – data that must be protected. Security monitoring for threats, compromise or data theft within cloud-based applications has been ....

lesen
Logo
05.11.2018

Nachrichten

Fidelis Cybersecurity and Netgate Announce Integrated Network Security Solution for AWS Hosted Applications

Fidelis Network Sensors coupled with Netgate TNSR provides easy-to-deploy cloud mirror port for traffic visibility, threat detection, and data loss and theft detection November 1, 2018 (AUSTIN, TX and BETHESDA, MD) – Fidelis Cybersecurity and Netgate today announced an ...

lesen
Logo
02.11.2018

Link

10 Deployment Considerations for your Deception Strategy (White Paper)

Stay one step ahead- Read this e-book to learn about different deception deployment strategies. Download here: https://www.fidelissecurity.com/resources/whitepaper/10-deployment-considerations-your-deception-strategy

Logo
01.11.2018

Nachrichten

Fewer than a fifth of organizations have a dedicated threat hunting team (Tim Roddy)

Threat hunting likely ranks second after artificial intelligence as a leading cybersecurity marketing buzzword and top airport advertising theme. Why not hunt for threats when dwell time between attack infections and detections can take months? Hiring threat hunters could ...

lesen
Logo
01.11.2018

Link

Network DLP Buyer's Guide (Whitepaper)

Mapping out data security features across an entire environment is no simple task. This guide explains what to look for in a Network DLP solution.

Logo
31.10.2018

Link

Fidelis Endpoint®: A Technical Deep Dive (Whitepaper)

Security teams lack complete, unified and automated endpoint detection and response technology. Fidelis Endpoint is designed to help solve this issue. Download here: https://www.fidelissecurity.com/resources/whitepaper/endpoint-technical-dive

Logo
30.10.2018

Nachrichten

How confident are you in your organization's threat detection capabilities?

How confident are you in your organization's threat detection capabilities? We asked over 580 #cybersecurity professionals the same question. Check out the 2018 State of Threat Detection Report to find out what they said: Read more here

lesen
Logo
30.10.2018

Nachrichten

BLOG: Strategien für Deception-Techniken: Eindämmung versus Erkennung von Angriffen

Die Diskussionen zu Deception führen oft zum Thema Honeypots und dies kann für Verwirrung sorgen. Sprechen wir dann noch über weitere Begriffe, die im Zusammenhang mit Täuschungstechnologien oftmals genannt werden – wie Breadcrumbs, Decoys (Köder für Angreifer), Fallen, ...

lesen
Logo
29.10.2018

Veranstaltungen

The State of Threat Detection in 2018 (Fidelis - Webinar)

28.11.2018 von 17:00 Uhr - 18:00 Uhr

Veranstaltungsort: https://www.fidelissecurity.com/resources/webinar/state-threat-detection-2018

Summary As cyber criminals and nation-states continue to improve the sophistication of attacks that bypass traditional preventive defenses, organizations must evolve their security defenses to reduce dwell time. Join Fidelis Advisor, and ex CIA CTO, Bob Flores and Fidelis ...

lesen
Logo
26.10.2018

Veranstaltungen

Making Threat Hunting a Reality (SC Digital Webcast)

26.10.2018 von 20:00 Uhr - 21:00 Uhr

Veranstaltungsort: SC Digital

Traditional security has focused on preventive defenses, but data breaches continue to occur despite the many security tools deployed. With cybercriminals and nation states continuing to innovate and find ways to bypass defenses, organizations continue to be in a reactive ...

lesen
Logo
25.10.2018

Link

The State of Threat Detection Report 2018 (Report)

New report from Fidelis Cybersecurity identifies that organizations want to threat hunt, but can’t due to lack of time, skills and visibility. Read the full report here: http://go.fidelissecurity.com/E0I0Z05BRqs0808Z3006w0c

Logo
25.10.2018

Nachrichten

It's Time to Threat Hunt - THE STATE OF THREAT DETECTION REPORT 2018

Is your organization threat hunting? Nearly half of the professionals who participated in The State of Threat Detection study noted that they didn't have the time to #threathunt, and a third cited lack of skills. ...

lesen
Logo
24.10.2018

Link

4 Keys to Automating Threat Detection, Threat Hunting and Response (Whitepaper)

Automating elements of threat detection, threat hunting and response can speed up detection and response, reducing the impact of a threat. Read the White Paper

Logo
22.10.2018

Veranstaltungen

Fidelis Elevate™ - Platform Training (Europe)

06.11.2018 um 09:00 Uhr - 09.11.2018 um 15:00 Uhr

Veranstaltungsort: Fidelis EMEA HQ - 8 Ancells Court, Ancells Business Park, Fleet, Hampshire GU51 2UY

During the training course we will provide best practices and demonstrations on how to successfully deploy and use the ...

lesen
Logo
22.10.2018

Nachrichten

BLOG: Von Honeypots zu autom. Deception & Defense

Eine sehr häufige Antwort, wenn es um Deception (Täuschung) geht, ist ein Verweis auf Honeypots im Bereich der Cyber-Sicherheit. Ja, moderne Deception-Lösungen werden von Honeypots abgeleitet und die Weiterentwicklung dieser effektiven Verteidigung steht im ... Read more:

lesen
Logo
19.10.2018

Nachrichten

When cybersecurity capabilities are paid for without any results... (Article)

Government agencies, like too many large enterprises, have built out increasingly complex and overlapping technology stacks, and this problem is especially prominent in cybersecurity technology. Driven by contracting limitations, lack of manpower and limited training, ...

lesen
Logo
19.10.2018

Produkte

Fidelis Deception™ Reduce Dwell Time By Quickly Detecting Post-Breach Attacks

Classify network assets and automatically create a deception layer to lure and trap attackers. Automatically Discover and Classify Networks and Assets Classify all network assets, communication paths, and network activity to profile your users, services, and assets. The ...

lesen
Logo
18.10.2018

Produkte

Fidelis Endpoint®: Automate Endpoint Detection and Response (EDR)

Increase endpoint visibility, reduce response time from hours to minutes, and enhance your endpoint protection. Greater Visibility Means Deeper Insight Fidelis Endpoint provides visibility into all endpoint activity including process actions, logged in users, registry writes, ...

lesen
Logo
17.10.2018

Produkte

Fidelis Network®: Best-of-Breed Breach Detection and Data Loss Prevention (DLP)

Gain visibility into content over all ports and protocols to detect threats and prevent data loss. See More, Inspect More Identifying threats and data leakage requires deep inspection and analysis of all forms of content, including unpacking and extracting deeply embedded ...

lesen
Logo
16.10.2018

Produkte

Fidelis Elevate: Security Operations Platform

One unified platform ensures faster detection and automated response – providing accuracy, clarity and certainty for your cyber security team. Even with many prevention tools in place, organizations are still getting breached. That's why more organizations are shifting from ...

lesen
Logo
16.10.2018

Nachrichten

SC Media Fidelis Deception™ (Review)

Cyber attacks are not single events, they're processes. Once an attacker has managed to access a network or endpoint they don't know where they are, and they gather intel by searching assets for valuable information and clues about where the desired data or location. Read more:

lesen
Logo
16.10.2018

Veranstaltungen

Webinar: SANS // Improving the Incident Response Function: Incident Response Survey Results Part II

01.11.2018 von 18:00 Uhr - 20:00 Uhr

Veranstaltungsort: http://www.workcast.com/register?cpak=7195861189165653&referrer=fidelisA

Overview Incident responders are catching and remediating threats faster than ever, according to past SANS surveys. Much of their success can be attributed to improving technologies, such as threat intelligence--73 percent of respondents to last year's survey said they were ...

lesen
Logo
16.10.2018

Veranstaltungen

Webinar: Sc Magazin DemoCast- Making threat hunting a reality

26.10.2018 von 20:00 Uhr - 21:00 Uhr

Veranstaltungsort: http://www.workcast.com/register?cpak=7195861189165653&referrer=fidelisA

Friday, October 26, 2018 at 2 PM ET Traditional security has focused on preventive defenses, but data breaches continue to occur despite the many security tools deployed. With cybercriminals and nation states continuing to innovate and find ways to bypass defenses, Read more...

lesen
Logo
16.10.2018

Nachrichten

threatgeek - BLOG: It's Time to Seek: 3 Ways to Take Detection to a New Level

The year so far has been a busy one – crypto mining is happening more frequently, the volume of cyberattacks is growing and cybercrime continues to be extremely well-funded. To top it off, with the number of devices being used, cybersecurity has never been more complicated. ...

lesen
Logo
11.10.2018

Nachrichten

It's Time to Seek: 3 Ways to Take Detection to a New Level

The year so far has been a busy one – crypto mining ishappening more frequently, thevolume ofcyberattacks is growing and cybercrime continues to be extremely well-funded. To top it off, with the number of devices being used, cybersecurity has never been more complicated. ...

lesen
Logo
10.10.2018

Nachrichten

Fidelis Cybersecurity Announces Support for Microsoft Azure’s Virtual Network TAP

Bethesda, MD – October 10, 2018 – Fidelis Cybersecurity announces support for Microsoft Azure’s high-speed virtual network terminal access point (TAP) to enable continuous mirroring of virtual machine (VM) network traffic, without the use of agents, directly to Fidelis Network ..

lesen
Logo
28.09.2018

Nachrichten

We're Going Native: Introducing the Azure Virtual Network TAP

This week at Microsoft Ignite, Microsoft called cybersecurity the “central challenge of the digital age,” and drew attention to the fact that organizations are spending valuable time and shifting “resources away from their core business mission to defend against, and ...

lesen
Logo
28.09.2018

Nachrichten

threatgeek - BLOG: We're Going Native: Introducing the Azure Network VTAP

Up until now, organizations could only conduct cloud network traffic analysis with the use of agents within VMs. This is changing and here's how. This week at Microsoft Ignite, Microsoft called cybersecurity the “central challenge of the digital age,” and drew attention to ...

lesen
Logo
26.09.2018

Link

EXTEND YOUR NETWORK SECURITY TO MICROSOFT AZURE (Datasheet)

Organizations are increasingly embracing the benefits of the Cloud, but up until now native security monitoring for threats, compromise or data theft within cloud-based applications, workloads and databases has been difficult to achieve without the use of performance limiting ...

Logo
26.09.2018

Veranstaltungen

Fidelis - Technischer Workshop für Partner (Channel) in München (ectacom)

24.10.2018 von 13:00 Uhr - 18:00 Uhr

Veranstaltungsort: ectacom HQ - Friedrich-Bergius-Straße 12 85662 Hohenbrunn, Deutschland

Während Netzwerkspezialisten den Fokus von der Perimeter-Verteidigung immer mehr in Richtung Angriffserkennung verlagern, werden traditionelle Sicherheitssysteme zunehmend unbrauchbar. Entweder erzeugen sie viel zu viele Fehlalarme oder können Angriffe nicht in Echtzeit erkenn

lesen
Logo
26.09.2018

Link

About the State of the SOC - About the State of the SOC (Download Report)

If your security operations team is overburdened and overwhelmed, you are not alone. Fidelis Cybersecurity recently commissioned former Forrester Research analyst, Dr. Chenxi Wang, to look into security operations challenges as well as opportunities for efficiency and (more here)

Logo
25.09.2018

Veranstaltungen

Critical Capabilities for MDR Services - Know Before You Buy (Webinar)

26.09.2018 von 17:00 Uhr - 18:00 Uhr

Veranstaltungsort: https://fidelissecurity.webex.com....

24/7 coverage and skills shortages for post breach detection and response are driving the need for Managed Detection and Response (MDR) Services. Analysts are predicting 15X growth for MDR services over the next few years as security leaders change focus f

lesen
Logo
24.09.2018

PDF

Networks Threat Evaluation - Die kostenlose Bedrohungsanalyse (Datenblatt Deutsch)

Rote Gummibärchen finden ist leicht ;-) Wir zeigen Ihnen wie Sie schnell und effektiv Bedrohungen im Unternehmensnetzwerk erkennen und automatisiert abwehren können

Logo
24.09.2018

Nachrichten

Try Fidelis Network - Start our 15-day Free Trial

Detect Threats Faster Fidelis Network® provides unparalleled network visibility across all ports and protocols, detects threats and prevents data loss. Unlike other solutions Fidelis Network goes beyond inspecting just packets; the technology looks deep into the content ...

lesen
Logo
24.09.2018

Nachrichten

Fidelis Elevate In Action / Live Product Demo (Webinar - Recorded)

See how Fidelis Elevate™ helps organizations shift from a prevention-focused approach to one that prioritizes detection and response. Fidelis Elevate is the only unified security operations platform that automates threat detection and response and prevents data theft. Read more..

lesen