Comprehensive software reviews to make better IT decisions
Zecurion DLP 10 New Features: User Behavior Analytics
Among the full set of features available in Zecurion’s new data loss prevention (DLP) product is the ability to perform user behavior analytics (UBA) to help spot data loss events before they occur.
Zecurion DLP 10’s UBA module categorizes users’ behavior into eight different reaction types and creates a visual diagram showing employees’ insider-threat risk.
This use of UBA technology follows a growing trend in which data loss prevention software is merging with other forms of data protection software, such data discovery and classification options. UBA repositions DLP software as a frontline option in helping to reduce the number of data loss-related events, from its previous position as the last line of defense that attempts to stop inappropriate data exchange at the time of the event.
Source: SoftwareReviews, Accessed May 22, 2020
Including UBA within a DLP platform boosts the software’s capacity to do its job. This is a step forward as DLP software is notoriously difficult to deploy because it hinges on an operational data classification program and supporting apparatuses and, even then, acts as a last line of defense. UBA helps to create a more holistic, software-based DLP strategy by positioning that technology to intervene in the both the early and late stages. However, users should be mindful that this earlier intervention, like the latter one, is not immune to false positives and has several issues around privacy and employee morale that should be considered in the process of selecting and moving to implement the software solution.
Want to Know More?
Zecurion has one of the most robust DLP products on the market and this fact was recently recognized by SC Magazine, who placed the product in its “pick-of-the-litter" category for DLP.
Kenna Security deployed their new data driven vulnerability management program, Kenna.VM and accessory program, Kenna.VI. Released on April 28th, Kenna.VM was created with the purpose to set service-level agreements (SLAs) with risk tolerance in mind.
We often hear that businesses are continually cyber insecure or under attack. However, recent penetration testing from Rapid7 shows that businesses are getting better at securing their networks against cyberattacks. While organizations continue to have exploitable weaknesses, attackers are having greater difficulty penetrating deeper into businesses’ networks.
Four zero-day vulnerabilities were discovered in IBM’s Data Risk Manager. While the vulnerabilities are concerning, more so is IBM’s response when addressed. The company simply stated, “It’s out of scope.” – meaning it had no intention to rectify or address the issue.
Will New IoT Security Frameworks Push Compliance Obligations to the Forefront of Security Discussions?
The Internet of Things is increasingly embedded with our daily lives. While these devices make life more accessible, for every new device, a new attack vector for cyberattackers is created.
Qualys VMDR Is Now Live: Increasing Security Threats Requires Strong Vulnerability Management Software
Qualys VMDR has hit the live market. Originally unveiled in February 2020 at Qualys Security Conference, VMDR is now publicly available as of April 16, 2020. Partnering with both large and small MSSPs, VMDR is designed to be scalable to any business enterprise and to automate the entire management cycle on all endpoints.
GTB Technologies has been recognized as “Best Data Loss Prevention Solutions Provider for 2020.” With organizations addressing digital transformation and a growing remote workforce, the risk of data breaches is increased from both insider and outsider perspectives.
Microsoft’s end-of-life support for Windows 7 has run into its first set of issues with its extended security updates (ESUs). Administrators who paid for the ESU found out their downloads are not applying.
Qualys’ newest product, VMDR (Vulnerability Management, Detection, and Response), will be available in March and will provide an all-in-one cloud-based solution for vulnerability management. VMDR will automate the entire management cycle on all endpoints.