Home » Articles posted by Yossi Baruch

Author Archives: Yossi Baruch

Weathermap

IUCC WeatherMap
IUCC WeatherMap

Ixia Traffic Broker

ixia - Copygear-icon

Launch X40 Traffic Broker

Launch X10 Traffic Broker

Ixia provides total visibility across the physical and virtual networks so security teams and tools make exactly the right decisions at exactly the right time.

FireEye NX

fireeyelogogear-icon

Launch FireEye Service

FireEye Network Security (NX) solutions protect against known and unknown advanced attacks with the signature-less Multi-Vector Virtual Execution™ (MVX) engine, conventional intrusion prevention system (IPS)and intelligence-driven detection. This enables faster detection, more accurate alerts and reduced noise. Identifying threats traditional security solutions can’t allows you to focus on alerts that pose a genuine threat and reduce the operational cost of false positives.

SoleGATE Mail Protection

solebitgear-icon

Launch Solebit Service

SoleGATE Email Protector is a virtual appliance, installed on cloud or on-premises, that detects and prevents cyber-attacks over the email attack vector, before they even enter the organization’s internal networks. One of the SoleGATE Protection Platform modules, SoleGATE Email Protector powered is by Solebit DvC Engine, uses patent-pending static analysis technology to inspect the email traffic for hidden code inside data objects, providing a conclusive result for each scanned email.

Solebit SoleGATE platform uses an innovative non-behavioral and conclusive approach to cybersecurity protection.
Solebit’s patent-pending DvC technology detects hidden code within data objects, regardless of the data object type and what the code looks like, then blocks the data object from entering the organization.
If a stream includes code, it stays out.

Checkpoint Intelisys & IPS

chkp

Intelisys & IPS Services

The Check Point Intrusion Prevention System (IPS) Software Blade combines industry-leading IPS protection with breakthrough performance at a lower cost than traditional, stand-alone IPS software solutions. The IPS Software Blade delivers complete and proactive intrusion prevention – all with the deployment and management advantages of a unified and extensible next-generation firewall solution.

In the constant fight against malware, threat intelligence and rapid response capabilities are vital. Check Point helps keep the business up and running with comprehensive intelligence to proactively stop threats, manage security services to monitor network and incident response to quickly respond to and resolve attacks.

 

Verint APT

verintgear-icon

Launch Verint APT Service

Verint, a global leader in Actionable Intelligence® solutions, is transforming the way organizations combat advanced cyber threats. Verint Threat Protection System is the first unified, intelligence-driven platform that detects breaches across the attack chain and automates the complex work of incident investigation. Much like a human analyst, Verint Threat Protection System collects leads, reviews evidence, and uncovers attacks. Through the power of automation, it analyzes thousands of leads per day, providing analysts with clear, visual, incident storylines that slash dwell time and make security operations vastly more efficient.

Hybrid Security

hybrid securitygear-icon

Launch Telepath Service

Hybrid Security‘s mission is to provide one solution to mitigate a wide range of threats undetectable by conventional web security systems such as Intrusion Prevention Systems and Web Application Firewalls.

Telepath uniquely identifies the end users using a mixture of identification points including: cookies, web browser fingerprint, user-names and more. Session history consists of the various web surfing “stories” per user, and is retained in the system allowing real-time and retrospective investigation.

Trustwave Secure Web Gateway & WAF

trustwave2gear-iconLaunch WG1 Service   gear-icon Launch SWG2 Service

Cybercriminals treat the web as their preferred launching pad for data-stealing malware. Users can become infected through malicious links contained in emails or on social networks, through exploits masquerading as software updates or through simply navigating to a website that automatically installs malware.

With Trustwave’s award-winning and industry-leading Secure Web Gateway, organizations can detect malware on the fly without relying on signatures, gain zero-day protection against advanced threats and enable the safe and secure use of applications such as Facebook, Twitter and Gmail — all while minimizing confidential data loss and ensuring productivity and compliance.

With Trustwave’s award-winning Web Application Firewall, you can continuously monitor your applications, instantly detect and prevent threats, mitigate the risk of data breaches, and address compliance requirements, including the PCI DSS (section 6.6).