Fujitsu | December 2015

Vendor News

Vendor News

Blue Coat

Watch Blue Coat’s latest videocast demo on The SSL Visibility Appliance.


Checkpoint

vSEC for VMware NSX

Check Point vSEC for VMware NSX delivers multi-layered defenses to protect east-west traffic within the VMware-deployed data center. vSEC transparently enforces security at the hypervisor level and between virtual machines, automatically quarantines infected machines for remediation, and provides comprehensive visibility into virtual network traffic trends and threats. For more information: http://www.checkpoint.com/products/vsec/

SandBlast Zero-Day Protection

Hackers constantly modify their strategies and techniques to evade detection and reach corporate resources. Check Point SandBlast Zero-Day Protection, with evasion-resistant malware detection, provides comprehensive protection from even the most dangerous attacks while ensuring quick delivery of safe content to your users. For more information: http://www.checkpoint.com/products-solutions/zero-day-protection/index.html

vSec for VMware NSX Zero-Day Protection

Compliance & Audit-Readiness Season

This winter holiday season, network security professionals are focusing on mitigating cyber threats and maintaining compliance in diverse industries from finance, retail and e-commerce to power utilities. Compliance with industry standards is more crucial than ever – especially the Payment Card Industry Data Security (PCI DSS) Standard Version 3.0 for retail/finance and e-commerce business, and the NERC Critical Infrastructure Protection (CIP) Cyber Security Standards for power grid facilities. And just a few months remain till the new NERC CIP V5 April 2016 mandatory compliance deadline.

The Tufin Orchestration Suite solution enables enterprise IT to achieve continuous compliance with enterprise security policies and regulatory standards such as PCI DSS, SOX, NERC CIP. Tufin allows defining your PCI zones and cyber assets, and to instantly generate compliance reports that map specific network-security requirements to your actual firewall rules, including supporting evidence of secure configurations and business justification. Tufin also provides recommended mitigations and exception management where needed. Full audit readiness with an automated audit trail and customizable workflows enable compliance with change management frameworks, such as ITIL, COBIT and ISO 27001.

Learn More About Tufin’s Compliance & Audit Readiness Solutions for Enterprise Network Security

Learn more

Convince Your Customer: Stop the Noise Campaign

Malware Detection Test:

FireEye has launched a new test that allows organisations to assess the effectiveness of current security controls against a batch of live, up-to-date malware threats. It gives the most realistic possible simulation of a malware attack through the email channel.

The lightweight nature of it means that it can be set-up rapidly and administered via a remote session with limited risk to your customer.

Take advantage of this test in your sales cycle today! For more information, please contact your FireEye Channel Account Manager or Systems Engineer.

Download Stop the Noise Campaign Download Breach Response Study

F5 Networks

Partnership efforts between F5 and VMware support you—our customers—by integrating our technologies, products, and services to meet your business needs from the data center to the cloud. We have done so for close to 10 years—an eternity in the high-tech industry.

While it all started with F5’s BIG-IP load balancing the virtualized resources created and managed by VMware’s vSphere, over the years we have expanded our collaborative efforts. Today, we jointly deliver powerful and integrated solutions that support all elements of the Software-Defined Data Center (SDDC): from network virtualization (NSX) to cloud management (vRealize) and hybrid cloud (vCloud Air) to end user computing or EUC (Horizon and AirWatch).

FIREEYE AND F5 ANNOUNCE GLOBAL PARTNERSHIP

FireEye, the leader in stopping today's advanced cyber-attacks, and F5, this week announced a global partnership to defend against the evolving security threats to the enterprise. Customers will benefit from comprehensive security solutions that integrate application delivery infrastructure from F5 and advanced threat protection from FireEye Network Security. The agreement also includes a unified approach to worldwide sales, deployment and support, thereby helping to ensure the best possible end-to-end experience for your customers.

> FireEye ‒ Technology alliance page

> Advanced Threat Protection with FireEye & F5 ‒ Recommended Practices

> FireEye and F5 Partnership ‒ FireEye video

> FireEye and F5: Uptime, Scale and SSL Visibility ‒ FireEye solution brief

> F5 and FireEye Integrated Security Solutions ‒ FireEye partner page

> SSL Everywhere Reference Architecture ‒ Solution page


F5 A LEADER IN ADC MAGIC QUADRANT FOR 9TH YEAR

F5 this week announced that it has again been positioned by Gartner in the Leaders quadrant of its Magic Quadrant for Application Delivery Controllers (ADCs), for the ninth consecutive year. Software continues to be the growth engine for F5 ADCs, with many customers choosing virtual, cloud, and as-a-service offerings, as well as traditional hardware and hybrid deployments. Read the new Magic Quadrant for ADCs report, published October 6, 2015.


F5 NOW AVAILABLE IN MICROSOFT AZURE

 
F5 is pleased to announce general availability of its BIG-IP Virtual Editions in the Microsoft Azure Marketplace. Now, customers who want to deploy applications across a global network of Microsoft-managed data centers can take advantage of F5’s market-leading application services to make their applications faster, more available, and secure. Organisations can extend F5’s robust security solutions to their Azure cloud environments to protect applications from web attacks and secure access to applications and data.

> F5 Now Available in Microsoft Azure ‒ Article

> F5 Application Services in Microsoft Azure ‒ Solution profile

> The BIG-IP Platform and Microsoft Azure: Application Services in the Cloud ‒ White paper

> F5 BIG-IP ADC: Application and Security Services ‒ Azure Marketplace

> BIG-IP in Azure? Are You Serious? ‒ Article

> F5 BIG-IP and Microsoft Azure ‒ Video

> BIG-IP Azure demo ‒ Video

Read more

Gigamon adds context-aware visibility to standard NetFlow metadata generation

Security has become increasingly complex as the amount of data on the network increases and cyber criminals become more sophisticated.  Often, security appliances on the network are fed too much traffic and this not only reduces their effectiveness, but it also means analysis of the traffic can result in a high number of false positives.  In order to simplify and automate policy enforcement, Gigamon has enhanced the security capabilities of its GigaVUE-OS by providing context-aware metadata information in the NetFlow/IPFIX format.  By generating metadata, Gigamon’s latest functionality ensures security tools on the network are able to perform more efficiently, and also have the potential to detect threats far more quickly through the high-value, contextual data Gigamon can provide.  What’s more, the new metadata record generation now includes HTTP Response Codes that can be used by security tools to detect whether a server has been compromised and is redirecting a user to a malicious website or is unavailable because it is the target of a Distributed Denial of Service attack.

More Information

Raytheon Websense

IF A BREACH IS INEVITABLE, WHAT NOW?

Even with the best cyber defences, thanks to human error, faults and failings it seems reasonable to assume that bad actors may be in your customers’ networks.

The latest thinking on cybersecurity has moved on from a “moat and castle” approach to one that accepts that breaches will occur. The focus has shifted to detecting and minimising the amount of “dwell time” a bad actor has inside networks.

In a new ‘Cyber Dwell Time and Lateral Movement ‘ whitepaper from Raytheon|Websense, you can learn more about this new security hypothesis and how it may be applied to protect your customers against internal and external threats. And, don’t forget to share the whitepaper with your customers!

Be prepared for 2016 by reading THE 2016 WEBSENSE CYBERSECURITY PREDICTIONS REPORT.

Download whitepaper Read report

Skybox Security Receieves Fives out of Five Stars

The Skybox Enterprise Suite has received a five-star review in SC Magazine’s Group Product Tests for Policy and Risk Management. Enterprise Suite includes five deeply integrated solutions on a common platform, giving CISOs and their team's unparalleled visibility and intelligence across their entire attack surface through modelling, simulation, and analytics.

Read more

Symantec

November 5, 2015 – Symantec Corp. (NASDAQ: SYMC) today reported the results of its second quarter of fiscal year 2016, ended October 2, 2015.

Michael A. Brown, president and CEO, said, “With a security-focused Symantec, we continue to increase our momentum as the global leader in cybersecurity. We drove growth in Enterprise Security for the second consecutive quarter, partly due to a 10 percent revenue increase in Information Protection solutions including another record quarter for DLP. To set the stage for continued progress, we will deliver more than a dozen new products and services over the next three quarters.”

October 27, 2015 – Symantec Corp. (NASDAQ: SYMC), the global leader in cyber security, today introduced Symantec Advanced Threat Protection (ATP), the first solution that can detect and remediate advanced threats across control points, from a single console with just a click, all with no new endpoint agents to deploy.

Symantec Reports Symantec ATP

The Internet of Things: It's All About Trust

As billions of devices come online, it will be critical to protect the keys and certificates we use for authentication, validation, and privileged access control.

As technology becomes more interconnected with the Internet of Things, we should expect to see more insidious hacks like those demonstrated at Black Hat USA this past summer that will -- at some point in the near future -- strike close to home. It’s one thing when your company gets hacked and quite another when your pacemaker, commercial airline, or traffic light control and coordination system gets pwned because of security vulnerabilities in IoT devices.

Read the rest of the article on Dark Reading.

Read more