article thumbnail

Anton and The Great XDR Debate, Part 2

Anton on Security

In most cases, my instinctive reaction was to argue with them, because I very clearly saw “SIEM” (or pieces of SIEM ) in what they showed me … Admittedly, my thinking has been colored by SIEM since 2002 when I joined my first SIEM vendor (a SIM vendor, to be precise). For this, we need to imagine the world without SIEM. but not cloudy?—?1990s…

article thumbnail

Quantum computing brings new security risks: How to protect yourself

CyberSecurity Insiders

Quantum computing focuses on developing computer technology based on principles that describe how particles and energy react at the atomic and subatomic levels. While the science is a bit muddy for those who are not quantum theory experts, we can all agree that quantum computing is faster than any other computing technology.

Risk 134
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Anton and The Great XDR Debate, Part 2

Security Boulevard

Admittedly, my thinking has been colored by SIEM since 2002 when I joined my first SIEM vendor (a SIM vendor, to be precise). I did tend to treat every technology that analyzes log files and perhaps other similar telemetry as a SIEM. Imagine this technology was never born (as SIM and SEM) back in the murky?—?but

article thumbnail

Top Database Security Solutions for 2021

eSecurity Planet

Started in 1987, the telecommunications provider has become a multinational technology whale. At just $42M, Huawei added HexaTier’s patented technology offering cloud-based databases (DBaaS) security via a reverse proxy on endpoints. Other features include auditing, activity monitoring, threat detection, and more.

Firewall 117
article thumbnail

Top VC Firms in Cybersecurity of 2022

eSecurity Planet

As a leading VC, BVP offers budding companies plenty to consider, with a set of roadmaps and tools for today’s technologies and market complexities. Notable cybersecurity exits for the company include AVG Technologies, Cognitive Security, OpenDNS, and Carbon Black. AllegisCyber Capital. Evolution Equity Partners. EEP Investments.

article thumbnail

Sandboxing: Advanced Malware Analysis in 2021

eSecurity Planet

Also Read: Advanced Threat Detection Buying Guide. When personnel rely on sandbox technology for security, collaboration, and more, there needs to be appropriate policies surrounding use. As malware adapts to more robust security, sandbox technology for anti-malware analysis will only become more important. Proofpoint.

Malware 56
article thumbnail

Top SD-WAN Solutions for Enterprise Security

eSecurity Planet

The emergence of SD-WAN and SASE technologies bundled together has led many vendors to address both advanced routing and network security vendors for clients. Launched in 2002 and specializing in wireless networking , Aruba Networks’ success led to its acquisition by Hewlett-Packard in 2015. Cato Networks. Juniper Networks.

Firewall 117