Satisnet Ltd, Basepoint Innovation Centre, 110 Butterfield Great Marlings, Luton, Bedfordshire, LU2 8DL enquiry@satisnet.co.uk
+44 (0) 1582 434320
Filter posts by solution, product or vendor

FireEye Announces Helix -- the First Intelligence-led Platform to Simplify, Integrate, and Automate Security Operations

FireEye, Inc, the intelligence-led security company, today introduced FireEye® Helix™, a platform to simplify, integrate, and automate security operations for organizations of all sizes and industries. This intelligence-led platform unifies network, endpoint and third-party product visibility with industry leading FireEye iSIGHT® Intelligence and Mandiant® expertise.

Read More

5 Steps For Adopting Privileged Local Account Auditing Best Practices

STEALTHbits has over a decade of experience helping customers understand how administrative access has been granted to their desktop and server infrastructure, and who effectively has these highly privileged access rights. This blog outlines a 5-step process you can follow to bring your systems back under centralized control. It also highlights key reports that provide even deeper insight into critical system-level configurations and conditions that attackers exploit in almost every breach scenario.

Read More

There is No Silver Bullet in Endpoint Security

We would all love to believe there was a technology sophisticated enough to stop every cyber threat in its tracks, but the ‘silver bullet’ is a myth, plain and simple. However, the lack of a perfect weapon doesn’t negate the possibility of an exemplary system of defense. Here at Trend Micro, we’ve spent the past 27 years forging a seamless “coat of arms”—XGen endpoint security.

Read More

Vulnerability Prioritization with Nessus Cloud

If you’re a security professional, vulnerability prioritization is likely something you deal with frequently. Few, if any organizations ever address 100% of discovered vulnerabilities, as new vulnerabilities come out every day and old vulnerabilities can hide out on unknown and shadow assets or simply never make it to the top of the patching priority list.

Read More

Why You Need Multi-layered Security for Maximum Endpoint Protection

Recent headlines have highlighted once again that many organisations are just a click away from a potentially catastrophic malware infection or data breach. See how you can solve this with Trend Micro's XGen™ endpoint security

Read More

Tenable Network Security Integation with McAfee ePolicy Orchestrator Delivers Comprehensive Vulnerability Data To Customers

Industry leader in next-generation vulnerability management helps Intel Security customers fill security gaps and maintain an accurate inventory of assets across the IT environment

Read More

Carbon Black's Cb Defense is the First NGAV To Prove Complete Antivirus Efficacy to Meet PCI DSS Requirement 5

Many organizations are very unhappy with their traditional antivirus (AV) products. At the same time, there’s concern within these organization’s that if they try to replace AV, they will fail to meet compliance requirements. That’s no longer a concern with Cb Defense.

Read More

Tenable Network Security Acquire FlawCheck - Container Security

See what our Tenable Engineer has to say about Tenable Network Security's new acquisition of FlawCheck

Read More

Flowmon ADS and IBM QRadar To Deliver Solution Against Sophisticated Cyber-Threats

Flowmon Networks, a network monitoring and security vendor, announced the cooperation between its network behavior anomaly detection system Flowmon ADS and IBM QRadar, a leading SIEM system. Thanks to this, customers can significantly improve visibility into network traffic, eliminate advanced threats and make it easier to deal with security incidents.

Read More

Expanding Vulnerability Management to Container Security: FlawCheck Joins Tenable

Today marked a significant milestone, as Tenable Network Security announced the acquisition of FlawCheck, a company that Sasan Padidar and I founded in early 2015. We built FlawCheck to address the difficulty of detecting security risks, at scale, in the world's largest data centers. As we engaged with some of the largest companies on their next-generation data center security challenges, we honed in on container environments as an area particularly fraught with issues.

Read More

Pages