Satisnet Ltd, Basepoint Innovation Centre, 110 Butterfield Great Marlings, Luton, Bedfordshire, LU2 8DL enquiry@satisnet.co.uk
+44 (0) 1582 434320
Filter posts by solution, product or vendor

Flowmon ADS and IBM QRadar To Deliver Solution Against Sophisticated Cyber-Threats

Flowmon Networks, a network monitoring and security vendor, announced the cooperation between its network behavior anomaly detection system Flowmon ADS and IBM QRadar, a leading SIEM system. Thanks to this, customers can significantly improve visibility into network traffic, eliminate advanced threats and make it easier to deal with security incidents.

Read More

Expanding Vulnerability Management to Container Security: FlawCheck Joins Tenable

Today marked a significant milestone, as Tenable Network Security announced the acquisition of FlawCheck, a company that Sasan Padidar and I founded in early 2015. We built FlawCheck to address the difficulty of detecting security risks, at scale, in the world's largest data centers. As we engaged with some of the largest companies on their next-generation data center security challenges, we honed in on container environments as an area particularly fraught with issues.

Read More

The Top 5 Myths of Next-Gen Endpoint Protection

‘Next-generation’ endpoint protection or next-gen AV has been getting a lot of press recently. But what does the term actually mean? For IT security managers under pressure, the most important thing isn’t the latest buzzword but finding a solution which is effective in protecting their organization from an increasingly agile and determined online

Read More

StealthINTERCEPT v4.0 has arrived!

Active Directory (AD), File Systems, and Exchange are giant figures on any organisation’s threat surface. However, most organisations lack visibility and control over changes and activities taking place in these environments, resulting in major security and operational risks. StealthINTERCEPT provides crystal clear visibility into and control over the changes and activities that violate your security and operational policies, strengthening your organisation’s security from the core and eliminating unnecessary risks.

Read More

Raising the bar with XGen endpoint security - protection exactly when and where you need it

With the launch of XGen endpoint security, Trend Micro leads the industry into a new era of security. XGen security is a cross-generational approach to security that combines proven threat detection techniques to quickly identify known and unknown threats with advanced threat protection techniques, such as application control, exploit prevention and behavioral analysis

Read More

LightCyber Announces New UK Channel Partners, Delivering Behavioural Attack Detection to Organisations to Stop Costly Data Breaches

LONDON, UK – 12 October 2016 – LightCyber, a leading provider of Behavioural Attack Detection solutions, today announced that it has signed a brand new reseller - Satisnet – to deliver its award-winning Magna products to the UK market, with scope to add a few more before the end of the year. LightCyber’s technology combines full network visibility with machine learning, allowing organisations to detect an attacker that might otherwise be invisible to the security team.

Read More

How Ransomware Works

Ransomware is similar to other malware in that it installs itself on a computer and runs in the background without the user’s knowledge. But unlike malware that hides and steals valuable information, ransomware doesn’t hide. As soon as ransomware has locked a user’s machine and/or encrypted files, it notifies the user of its presence to make the ransom demand.

Read More

Frequent & Dangerous: Discover Seven Cyberattacks You Will Face Sooner Or Later

“Cybercriminals to compromise company: business loses $56 million.” Do you find this headline familiar? Such front-page news and analysis of large-scale attacks hit us every day. Read more on why Prevention just isn't enough

Read More

Thycotic Unveils Secret Server Cloud for Priveleged Accounts

Cloud-Based PAM solution helps organisations combat cyberattacks

Read More

Encrypted Flow Forwarding And Other News in Flowmon 8.02

New version of our flag ship product has been released as a Flowmon 8.02. One of the most important feature is reliable and encrypted flow forwarding option. It also brings reinvented view on Active Devices as well as new active device related widgets for Flowmon Dashboard. In addition, Flowmon 8.02 supports IPFIX items with variable length and Cisco AVC HTTP values. Read more about the new features here!

Read More

Pages