Network monitoring and security provider Plixer today announced that they are introducing multi-vendor SD-WAN monitoring support for their network security and intelligence platform Scrutinizer. These additions expand Scrutinizer’s visibility and support for SD-WAN networks, making it easier for network administrators to track SD-WAN deployments regardless of the hardware. With Scrutinizer, users can observe every piece of their SD-WAN network, in addition to their LAN and cloud from a single-pane management system.
Scrutinizer is the first solution to deliver multi-vendor SD-WAN monitoring for true end-to-end visibility across the LAN, SD-WAN, and cloud
That the security industry is cripplingly understaffed is not a new revelation. Since 2015, the number of organizations reporting a “problematic shortage” increases year over year, with 53% of organizations reporting this gap in 2018-2019. This is a pervasive, global problem and one that shows no signs of slowing as the cybersecurity sector grows and plays an ever more important role in day-to-day business functions. What does represent a new revelation is that in many cases, the answer to this skills shortage is already on the payroll.
Your business networks generate a ton of data every day. That data can be analyzed to provide insights into how your network is operating or to find security threats. Network traffic analysis (NTA) solutions allow network administrators to collect data on the traffic that flows through a network. These tools are typically used for identifying performance problems and/or for discovering security problems. An NTA solution is no doubt useful, but it can be difficult to determine the best network traffic analysis solutions for your enterprise.
A privilege escalation vulnerability discovered in Forcepoint VPN Client for Windowsdiscovered by Security Researcher Peleg Hadar of SafeBreach Labs can be used by attackers to evade detection and achieve persistence.
With cloud misconfigurations rampant in cloud storage and IaaS environments, adding security layers to identify them is crucial for securing sensitive data.
A phishing campaign targeting utility grid operators uses a PDF attachment to deliver spyware.
Solutions Review have compiled a list of the best 32 network monitoring tools. These solutions include both software and hardware that help IT teams monitor and manage their network performance. We’ve listed the major features of each solution and the approach they bring to network performance monitoring and management. These tools should definitely be considered by any enterprise looking for a solution to improve or manage the performance of their network infrastructure.
Earlier this week, Capital One became the latest financial institution to fall victim to a data breach as it was discovered that a hacker illicitly gained access to data on 100 million customers. The data reportedly consisted of consumer and small business credit card applications filed between 2005 and 2019 and included applicants’ names, addresses, phone numbers, dates of birth, and other sensitive information. About 140,000 Social Security numbers and 80,000 bank account numbers were also accessed, although the bank said no credit card numbers or log-in credentials were compromised.
At least 62 colleges were affected by a software vulnerability in a program called Banner, operated by Ellucian, that allows threat actors to infiltrate colleges’ private records.