article thumbnail

Top Network Detection & Response (NDR) Solutions

eSecurity Planet

The Darktrace stack of solutions covers hardening, detection, and response for hybrid IT environments, including the vendor’s NDR solution, Darktrace DETECT, for applications, email, zero trust, operational technology (OT), and more. Darktrace DETECT Features. Vectra Threat Detection and Response Platform Features.

article thumbnail

Top VC Firms in Cybersecurity of 2022

eSecurity Planet

As a leading VC, BVP offers budding companies plenty to consider, with a set of roadmaps and tools for today’s technologies and market complexities. Notable cybersecurity exits for the company include AVG Technologies, Cognitive Security, OpenDNS, and Carbon Black. Also read : Addressing Remote Desktop Attacks and Security.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Top Database Security Solutions for 2021

eSecurity Planet

Launched in 2004 in Bedford, Massachusetts, EDB specializes in software solutions for the open source relational database management system (RDBMS), PostgreSQL. Started in 1987, the telecommunications provider has become a multinational technology whale. Other features include auditing, activity monitoring, threat detection, and more.

Firewall 117
article thumbnail

Best Network Monitoring Tools for 2022

eSecurity Planet

encryption in transit Tools for remote management , global dashboards, and geo IP tracking Access to 24×7 DevOps team for technical support and remediating active threats Logical secure access including role-based access control, 2FA , and SSO Automate configuration backup and recovery for resilient policies and controls. SolarWinds.

Marketing 117
article thumbnail

Sandboxing: Advanced Malware Analysis in 2021

eSecurity Planet

Also Read: Advanced Threat Detection Buying Guide. When personnel rely on sandbox technology for security, collaboration, and more, there needs to be appropriate policies surrounding use. As malware adapts to more robust security, sandbox technology for anti-malware analysis will only become more important. Established.

Malware 56
article thumbnail

Top SD-WAN Solutions for Enterprise Security

eSecurity Planet

The emergence of SD-WAN and SASE technologies bundled together has led many vendors to address both advanced routing and network security vendors for clients. The youngest secure SD-WAN pick is SASE technology vendor Cato Networks. Juniper’s security portfolio includes firewalls and advanced threat protection (ATP).

Firewall 117
article thumbnail

Main phishing and scamming trends and techniques

SecureList

By the early 2000s, charity had become a common scam topic: for example, after the massive Indian Ocean earthquake and tsunami of 2004, users received messages from fake charities pleading for donations. This allows cybercriminals to bypass at least some detection technologies. Pop-up windows. URL shorteners. Fake CAPTCHA.

Scams 100