Technology Lifecycle Management Assessment for security

Technology Lifecycle Management Assessment for security

No image available.

NEW YORK – June 4, 2013 – Dimension Data, the $5.8 billion global ICT solutions and services provider, today announced the availability of its Technology Lifecycle Management Assessment for Security. The assessment helps organizations determine which devices on their corporate network require immediate attention over other devices, based on the network location and severity.

According to Dimension Data’s 2012 Network Barometer Report, two-thirds of all corporate network devices analyzed in 2011 were carrying at least one known security vulnerability. Of the known security vulnerabilities discovered, four of the top 10 most prevalent were new, three of which had a high-severity rating.

“These statistics should be a reminder to those in IT security to identify and apply security controls consistently across their organization, or run the risk of security breaches that can severely impact business and damage brand reputation if made public,” says Matt Gyde, Dimension Data’s group general manager, security solutions.

“In some countries, non-IT executives could even be held personally liable for security breaches. Today, barely a week goes by without a global headline featuring cybercrime, data theft or information leakage. In fact, data leaks and non-compliance now rank right up there with market crashes and natural disasters on a board of directors’ typical priority risk list. In 2011, there were 14,215 regulatory announcements affecting businesses across all industries,” Gyde adds.

As an example, Gyde cites the Sony PlayStation Network incident – dubbed the “data breach of all time” – where over 77 million PlayStation Network accounts were hacked. “What’s more startling is the fact that, of the 77 million accounts affected, 12 million had unencrypted credit card numbers. Not to mention the millions lost while the site was down for a month,” says Gyde. “And while the hacker – Cody Kretsinger – was earlier this month sentenced to one year in prison, plus house arrest and a thousand hours of community work, the damage to the Sony brand was massive, and the harsh criticism of its faulty security continues.”

While every organization aims to achieve a high standard of security compliance and adaptive firewall policies that best protect their IT infrastructure from insider and outsider threats, this is often difficult for clients to achieve due to the proliferation of threats in the modern-day security landscape and increased pressure around compliance.

“With this Assessment, we can help organizations to proactively plan, design, and build security architectures based on changing business demands and their appetite for risk. This will in turn provide reduced operational costs, better budget planning and a more predictable operational expenditure,” says Gyde.
If organizations answer “yes” to one of the statements below, their business is vulnerable to the ever-growing number of security threats:

• Your organization has little visibility into the security configuration of network devices
• Your organization is concerned about the state of its firewall infrastructure
• Your organization has widely distributed geographic locations
• Your organization has recently experienced a security breach or data loss

 

Expand for more details on this Product

CyberVigil

Product From Senstar Inc.

CyberVigil is an industrial cyber security switch providing unique protection for physical security networks and Industrial Control Systems (ICS) against cyber-attacks. With autonomous  and embedded cyber security for all network layers (physical to application), CyberVigil is a unique combination of top-notch industrial switch (which is the core of every network) and a cyber security engine that monitors all the traffic in the network and isolates “infected” network areas. CyberVigil is easy to, configure and operate.  It provides ironclad security together with full featured networking capabilities, optimized for physical security networks, SCADA systems and utility control networks.

Get Info Now

KMICE0x adaptive module for Edge Security Suite

Product From Milton Security Group Inc.

FULLERTON, Calif., Feb. 6, 2014 /PRNewswire/ -- In the wake of the rampant spread of the Kaptoxa Malware, Milton Security Group is unveiling a breakthrough evolution of its Edge Security suite of products aimed at thwarting the threat known to have affected numerous retail giants such as Target Stores, Neiman Marcus, Michaels and countless other organizations.

Get Info Now

Raytheon's SureView Insider Threat and Privileged User Abuse Detection Software

Product From Raytheon

DULLES, Va., (April 25, 2014) — Raytheon Company today announced the latest developments found in their new SureView release, which include new policy support features that enhance product capability for continuous monitoring and network auditing against insider threat and privileged user abuse.

Get Info Now

IDS-6300 intelligent security appliance

Product From DB Networks

 

SAN DIEGO – Oct. 23, 2013 -- DB Networks, an innovator of behavioral analysis in database security, today introduced the IDS-6300 intelligent security appliance, the industry’s first next-generation

Get Info Now

LocJack keystone security jacks

Product From Quest Technology International Inc.

Quest Technology now offers a new patented technology for the securing of both data and voice using standard patch cables and our award winning LocJack keystone security jacks. This innovative technology is available in RJ12 and RJ45 versions and requires nothing more than a LocJack keystone security jack and its proprietary security key.

Get Info Now

Secure Global Solutions’ Network Navigator

Product From Secure Global Solutions

Secure Global Solutions announces the release of the Network Navigator, a plug-and-play solution for creating secure remote access and monitoring network performance and devices.

Less than 10% of the 15 trillion IP devices installed on networks are monitored. At a fraction of the cost of competing monitoring systems, the Network Navigator is an affordable solution to all network monitoring needs. The Network Navigator will monitor and send notifications of network anomalies before minor problems become disasters. A Navigator Controller head-end appliance or VMware solution acts as the connector for users and field Network Navigators.

Get Info Now

Emsisoft Emergency Kit 4.0 released

Product From Emsisoft

Salzburg, July 11th, 2013 –As of today, the fourth version of Emsisoft Emergency Kit is available. Popular amongst home users and security professionals alike, the Austrian security specialist‘s powerful software package is freely available to the general public and includes the multi-award winning scanning technology of Emsisoft Anti-Malware. The following features were improved in Emsisoft Emergency Kit 4.0:

Get Info Now

Prolexic releases DDoS protection planning tool

Product From Prolexic


HOLLYWOOD, FL – (June 4, 2013) – Prolexic, the global leader in Distributed Denial of Service (DDoS) protection services, announced today that it has released a role-based version of PLXplanner, the company’s free, online DDoS protection planning tool. PLXplanner is a strategic risk assessment and planning tool to help IT and security professionals build a better defense against increasingly powerful and sophisticated DDoS attacks. Based on answers entered in a role-based quiz, PLXplanner delivers strategic recommendations for improving business, technology or operational strategies to fight DDoS attacks.

Get Info Now

ISD-1000 series data line surge protectors

Product From Moxa

BREA, CA, JUNE 5, 2013 -- Moxa, a provider of hardened networking, communication and computing solutions, today announced the new ISD-1000 Series of data line surge protectors engineered to guard data and hardware from harmful transient energies resulting from the "switching" of nearby equipment.

Get Info Now

EventTracker Log Manager

Product From EventTracker

COLUMBIA, MD July 01, 2013
EventTracker, a leading provider of comprehensive SIEM solutions, announced today the general availability of EventTracker Log Manager, a robust log management solution designed to provide significant business value through proactive monitoring and real-time alerting for network and system administrators.

Get Info Now