comparemela.com

Latest Breaking News On - சிஸ்கோ பாதுகாப்பானது - Page 7 : comparemela.com

Cisco strikes again grabbing threat assessment tool Kenna Security as third acquisition this week – TechCrunch

Cisco strikes again grabbing threat assessment tool Kenna Security as third acquisition this week Cisco has been busy on the acquisition front this week, and today the company announced it was buying threat assessment platform Kenna Security, the third company it has purchased this week. The two companies did not disclose the purchase price. With Kenna, Cisco gets a startup that uses machine learning to sort through the massive pile of threat data that comes into a security system on a daily basis and prioritizes the threats most likely to do the most damage. That could be a very useful tool these days when threats abound and it’s not always easy to know where to put your limited security resources. Cisco plans to take that technology and integrate into its SecureX platform.

Cisco To Buy Vulnerability Management Vendor Kenna Security

End-to-End Security Starts at the Endpoint

The massive growth in endpoints requires a baseline security strategy for cohesive visibility and unified protection. iStock Given the widely dispersed workforce, and the likelihood of a hybrid workspace going forward, it’s not surprising that endpoint security is a top priority among CSOs, according to the IDG 2020 Security Priorities Study. Wrapped into the remote work security challenge is the need to speed detection and remediation of threats that target devices and endpoint systems. The faster cyber issues can be discovered, the less probability of larger problems. Obvious, yes? However, endpoint security can be daunting task. Most organizations are using a multitude of tools for monitoring, detection, threat hunting, and more. Some of these technologies may be integrated, others have been bolted on and require finessing for analytics programs or reporting. So, from the get-go, there’s often a lack of comprehensive visibility into issues that may be occur

Automated, Orchestrated, and Integrated: The Open Platform Approach

Automated, Orchestrated, and Integrated: The Open Platform Approach Security teams have enough on their plates without having to stitch together multiple tools for holistic visibility, context and response. iStock As organizations increasingly shift to cloud, the IT infrastructure becomes riddled with complexity. SecOps, NetOps, and ITOps teams have their hands full using multiple tools to manage data and applications across the distributed environment. For SecOps in particular, tying these pieces together is a must-have. They require as close to real-time visibility as possible to quickly detect then remediate potential threats. The longer it takes to identify an incident, the greater the potential damage.

© 2024 Vimarsana

vimarsana © 2020. All Rights Reserved.