Democratizing User Activity Monitoring

Democratizing User Activity Monitoring

Today, we’re launching Dynamic User Protection, a product that redefines modern user activity monitoring and insider threat protection. Dynamic User Protection represents a critical component of our converged cloud security platform portfolio moving forward. With...
Protecting Your Business Data with Encryption

Protecting Your Business Data with Encryption

Protecting sensitive data has become a requirement for most organizations around the world as data breaches have become increasingly common, and legislation spearheaded by the EU’s General Data Protection Regulation has made companies liable for security incidents in...
Why Your Industry Can Benefit From Secure SD-WAN Too

Why Your Industry Can Benefit From Secure SD-WAN Too

SD-WAN has been one of the most rapidly adopted technologies of the past decade, with the market expected to increase by 168% between now and 2024. The earliest adopters of SD-WAN were retailers, and for good reason. Retail chains have a critical need to maintain...
MontysThree: Industrial cyberspy

MontysThree: Industrial cyberspy

Cybercriminals are using steganography to hide their code and seek industrial data. Our experts have found traces of activity of a new cybercriminal group that spies on industrial enterprises. The crooks are carrying out targeted attacks, using a tool that our...