Satisnet Ltd, Basepoint Innovation Centre, 110 Butterfield Great Marlings, Luton, Bedfordshire, LU2 8DL enquiry@satisnet.co.uk
+44 (0) 1582 434320
Filter posts by solution, product or vendor

What Are Unknown Cyber Threats? (And Are They Really Unknown?)

Unknown and zero-day threats are not the same thing. There are many ways that they are created. Learn about the types, how to turn them into known threats, and protect yourself. Most traditional security products are built to act based on known threats. The moment they see something that is known to be malicious, they block it. To get past security products that successfully block known threats, attackers are forced to create something that is previously unknown. How do they do it, and what can we do to prevent both known and unknown threats?

Read More

FireEye Announces Helix -- the First Intelligence-led Platform to Simplify, Integrate, and Automate Security Operations

FireEye, Inc, the intelligence-led security company, today introduced FireEye® Helix™, a platform to simplify, integrate, and automate security operations for organizations of all sizes and industries. This intelligence-led platform unifies network, endpoint and third-party product visibility with industry leading FireEye iSIGHT® Intelligence and Mandiant® expertise.

Read More

5 Steps For Adopting Privileged Local Account Auditing Best Practices

STEALTHbits has over a decade of experience helping customers understand how administrative access has been granted to their desktop and server infrastructure, and who effectively has these highly privileged access rights. This blog outlines a 5-step process you can follow to bring your systems back under centralized control. It also highlights key reports that provide even deeper insight into critical system-level configurations and conditions that attackers exploit in almost every breach scenario.

Read More

There is No Silver Bullet in Endpoint Security

We would all love to believe there was a technology sophisticated enough to stop every cyber threat in its tracks, but the ‘silver bullet’ is a myth, plain and simple. However, the lack of a perfect weapon doesn’t negate the possibility of an exemplary system of defense. Here at Trend Micro, we’ve spent the past 27 years forging a seamless “coat of arms”—XGen endpoint security.

Read More

Vulnerability Prioritization with Nessus Cloud

If you’re a security professional, vulnerability prioritization is likely something you deal with frequently. Few, if any organizations ever address 100% of discovered vulnerabilities, as new vulnerabilities come out every day and old vulnerabilities can hide out on unknown and shadow assets or simply never make it to the top of the patching priority list.

Read More

Why You Need Multi-layered Security for Maximum Endpoint Protection

Recent headlines have highlighted once again that many organisations are just a click away from a potentially catastrophic malware infection or data breach. See how you can solve this with Trend Micro's XGen™ endpoint security

Read More

Tenable Network Security Integation with McAfee ePolicy Orchestrator Delivers Comprehensive Vulnerability Data To Customers

Industry leader in next-generation vulnerability management helps Intel Security customers fill security gaps and maintain an accurate inventory of assets across the IT environment

Read More

Carbon Black's Cb Defense is the First NGAV To Prove Complete Antivirus Efficacy to Meet PCI DSS Requirement 5

Many organizations are very unhappy with their traditional antivirus (AV) products. At the same time, there’s concern within these organization’s that if they try to replace AV, they will fail to meet compliance requirements. That’s no longer a concern with Cb Defense.

Read More

Tenable Network Security Acquire FlawCheck - Container Security

See what our Tenable Engineer has to say about Tenable Network Security's new acquisition of FlawCheck

Read More

Flowmon ADS and IBM QRadar To Deliver Solution Against Sophisticated Cyber-Threats

Flowmon Networks, a network monitoring and security vendor, announced the cooperation between its network behavior anomaly detection system Flowmon ADS and IBM QRadar, a leading SIEM system. Thanks to this, customers can significantly improve visibility into network traffic, eliminate advanced threats and make it easier to deal with security incidents.

Read More

Pages