SecurityFocus
Proofpoint Positioned in “Leaders” Quadrant in Gartner’s 2013 Magic Quadrant for Enterprise Information Archiving for Second Consecutive Year
50I S S U E 5 0
D e c e m b e r2 0 1 3
M O N T H LY
J O U R N A L O F
I N F O R M AT I O N
T E C H N O L O G Y
this issue Proofpoint
Posit ioned in “Leaders”
Quadrant in Gartner ’s
2013 Magic Quadrant for
Enterprise Information
Archiving
Upcoming Events and Promotions
• SolarWinds Partner Enablement Program Date: 5th December 2013
Venue: Secure Source Training Center
• ISS World Asia 2013 Date: 3rd to 5th December 2013
Time: 8.30 am to 5.00 pm
Venue: Hilton KL Sentral
• Imperva Incapsula WAF and DDoS Protection Campaign From 16th October 2013 until 15th March 2014
• Eliminate DDoS Attacks with Cloud and On-Premise DDoS Protection
• AlgoSec Best Buy Promo Until 20th Dec 2013
Read More >>
Secure Source Distribution (M) Sdn BhdUnit 629 & 631, Block A, Kelana Centre Point,Jln SS7/19, Kelana Jaya, 47301, Petaling JayaTel: 03-7805 7568 Fax: 03-7880 9568Email: [email protected]
Security Focus Issue 50 Dec 2013
Imperva Ranked Number 352 Fastest Growing Company in North America on Deloitte’s 2013 Technology Fast 500
Imperva, Inc. (NYSE: IMPV),
pioneering the third pillar of
enterprise security with a new
layer of protection designed
specifically for physical and
virtual data centers, today
announced it ranked 352 on
Deloitte’s Technology Fast
500(TM), a ranking of the 500
fastest growing technology,
media, telecommunications,
life sciences and clean tech-
nology companies in North
America. Imperva grew 224.3
percent between 2008 and
2012.
Read More >>
We Are DIFFERENCE
We Are DIFFERENCE
Gartner, Inc. positions Proofpoint in the Leaders Quadrant in
its 2013 Magic Quadrant for Enterprise Information Archiving.
“We are excited to be placed in the Leaders quadrant by
Gartner for the second consecutive year,” said Gary Steele,
CEO of Proofpoint.
Read More >>
For further enquiries, please contact us at :
DDoS Protection For SecureSphere
Distributed Denial of
Service (DDoS) attacks
are more devastating than
ever; DDoS attacks in 2013
averaged 2.7 Gbps,1 with
many attacks exceeding
50 Gbps of throughput.
SecureSphere Web
Application Firewall stops
application-layer DDoS
attacks, but massive net-
work-based DDoS attacks
can still saturate organiza-
tions’ Internet connections
and prevent traffic from
ever reaching the organi-
zation. The best way to
combat network DDoS
threats is to block mali-
cious traffic in the cloud-
-before the attack can
take down the network.
Read More >>
EYE ON ITNAC and MDM go Together Like Peanut Butter and Chocolate
As an influx of new mobile
products enters the market,
employees are pressuring
organizations to allow more
devices to gain access to the
network. While mobile device
management tools can help
save time and money, organi-
zations shouldn’t rely on the
program to become the
network’s device manage-
ment.
Read More >>
As firms harness the power of
big data and cloud computing,
securing their networks and
the vast amounts of informa-
tion stored on them becomes a
much more challenging propo-
sition for IT departments. With
the increasing complexity of
data protection in the cloud-
centric corporate landscape, it
can be easy to overlook some
of the more traditional and
long-standing cybersecurity
techniques - but without these
in place, it’s impossible to con-
ceive of effective cloud security.
In a post for PC Mag, security analyst
Fahmida Rashid pointed out that the
best and only sure fire method of
preventing data loss in the case of
a stolen laptop or hard drive is to
back up and encrypt email and data.
Read More >>
Do Your Employees Even Know What BYOD Stands For? Even as industry pundits spill tons of digital ink
debating the BYOD revolution, the truth is that the
typical user has a 50-50 chance of knowing what the
letters “BYOD” stand for. A recent survey from the
CTIA wireless association and conducted by Harris
Interactive showed that 47 percent of consumers had
never heard of BYOD.
Read More >>
Blogs & Community
In cloud environments, security basics remain essential to data loss prevention
VSS Monitoring Delivers Network Data to Big Data Analytics Systems
VSS Monitoring, a leading provider of network packet brokers (NPBs), today launched the Big Data Visibility
solution, a system that closes the visibility gap into corporate data by combining network data with big data
from external sources to allow analysis of that data as a single dataset - whether for performance or business
intelligence applications, forensics, compliance, or security assurance.
Read More >>
ForeScout Changes the Game for Network Security
Just as Bruce Lee was a game changer in martial arts, ForeScout has changed the game for network security
with the ControlFabric™ platform, an open platform that enables ForeScout CounterACT and other IT solutions
to exchange information and mitigate a wide variety of network and endpoint security concerns. The platform
helps enterprises to advance situational awareness by leveraging infrastructure data and to improve the security
posture by applying policy-based controls to expedite remediation actions.
Read More >>
5 Warning Signs Your Business Has been Breached Attackers Use Similar Tactics
Cybercriminals choose the
cheapest and easiest way
to gain access to the corpo-
rate network. Fortunately,
the path of least resistance
also causes subtle changes
in system resources and net-
work behavior that an expe-
rienced network security pro-
fessional can detect, said
Barry Shteiman, director of
security strategy at Imperva.
Read More >>
Examining the Impact of Security Management The “Examining the Impact of Security Management on the Business” survey was conducted to determine how
security management affects organizations’ agility with regards to connectivity of critical business applications
in the modern data center.
Read More >> PRODUCT DEMO
See for yourself how AlgoSec
helps you automate security
policy management in these
short videos.
Watch The Demo >>