Satisnet Ltd, Basepoint Innovation Centre, 110 Butterfield Great Marlings, Luton, Bedfordshire, LU2 8DL enquiry@satisnet.co.uk
+44 (0) 1582 434320
Filter posts by solution, product or vendor

The Top 5 Myths of Next-Gen Endpoint Protection

‘Next-generation’ endpoint protection or next-gen AV has been getting a lot of press recently. But what does the term actually mean? For IT security managers under pressure, the most important thing isn’t the latest buzzword but finding a solution which is effective in protecting their organization from an increasingly agile and determined online

Read More

StealthINTERCEPT v4.0 has arrived!

Active Directory (AD), File Systems, and Exchange are giant figures on any organisation’s threat surface. However, most organisations lack visibility and control over changes and activities taking place in these environments, resulting in major security and operational risks. StealthINTERCEPT provides crystal clear visibility into and control over the changes and activities that violate your security and operational policies, strengthening your organisation’s security from the core and eliminating unnecessary risks.

Read More

Raising the bar with XGen endpoint security - protection exactly when and where you need it

With the launch of XGen endpoint security, Trend Micro leads the industry into a new era of security. XGen security is a cross-generational approach to security that combines proven threat detection techniques to quickly identify known and unknown threats with advanced threat protection techniques, such as application control, exploit prevention and behavioral analysis

Read More

LightCyber Announces New UK Channel Partners, Delivering Behavioural Attack Detection to Organisations to Stop Costly Data Breaches

LONDON, UK – 12 October 2016 – LightCyber, a leading provider of Behavioural Attack Detection solutions, today announced that it has signed a brand new reseller - Satisnet – to deliver its award-winning Magna products to the UK market, with scope to add a few more before the end of the year. LightCyber’s technology combines full network visibility with machine learning, allowing organisations to detect an attacker that might otherwise be invisible to the security team.

Read More

How Ransomware Works

Ransomware is similar to other malware in that it installs itself on a computer and runs in the background without the user’s knowledge. But unlike malware that hides and steals valuable information, ransomware doesn’t hide. As soon as ransomware has locked a user’s machine and/or encrypted files, it notifies the user of its presence to make the ransom demand.

Read More

Frequent & Dangerous: Discover Seven Cyberattacks You Will Face Sooner Or Later

“Cybercriminals to compromise company: business loses $56 million.” Do you find this headline familiar? Such front-page news and analysis of large-scale attacks hit us every day. Read more on why Prevention just isn't enough

Read More

Thycotic Unveils Secret Server Cloud for Priveleged Accounts

Cloud-Based PAM solution helps organisations combat cyberattacks

Read More

Encrypted Flow Forwarding And Other News in Flowmon 8.02

New version of our flag ship product has been released as a Flowmon 8.02. One of the most important feature is reliable and encrypted flow forwarding option. It also brings reinvented view on Active Devices as well as new active device related widgets for Flowmon Dashboard. In addition, Flowmon 8.02 supports IPFIX items with variable length and Cisco AVC HTTP values. Read more about the new features here!

Read More

Forbes Ranks Carbon Black As a Top Cloud Company

Forbes recently announced its inaugural Cloud 100 list, a full ranking of the world’s top privately-held cloud companies. Carbon Black are proud be named No. 26 on the list alongside such innovators as Slack, Dropbox, DocuSign, Stripe, Cloudera and others.

Read More

Cybersecurity Self-Esteem: 4 Things Confident Teams Are Doing

Security teams need to hear a public service announcement. “Believe in yourself. Have confidence. You can do it!” It may sound corny, but it’s true. I’ve spoken to more than 600 organisations — from mature businesses to entry-level startups. What I’m noticing is that many of these cybersecurity teams — from Singapore to Silicon Valley – do not have good self-esteem right now.

Read More

Pages