Infosec Cloud
Solutions. Services. Training.

July 2015 Update

We aim to provide you with a round-up of our latest offers and essential info to help increase your productivity and keep you secure. This month you can read about:

*  Gartner MQ for Secure Web Gateways
*  Everything You Need to Know About DDoS Attacks
*  A Comparison of SSL Visibility Solutions
*  Report: The State of Data Privacy in 2015
*  Encryption Services Designed for Choice and Control
*  SMB Cyber Defence

As always, if you’d like more information on any of the topics covered, please email: [email protected]

Gartner Magic Quadrant for Secure Web Gateways

28 May 2015

Summary: The market for SWG solutions is still dominated by traditional on-premises appliances. But, the use of cloud-based services is growing rapidly, and advanced threat protection functionality remains an important differentiator.

Market Definition/Description

“Secure Web gateways (SWGs) utilize URL filtering, advanced threat defense, legacy malware protection and application control technologies to defend users from Internet-borne threats and to help enterprises enforce Internet policy compliance. SWGs are implemented as on-premises appliances (hardware and virtual), cloud-based services or in hybrid mode (combined on-premises appliances and cloud-based services). Vendors continue to differ greatly in the maturity and features of their cloud-based services and in their ability to protect enterprises from advanced threats.”

Magic Quadrant for Secure Web Gateways May 2015 image










“Because of the requirement to defend against advanced threats, it is no longer enough for a cloud-based SWG to only offer the traditional SWG services (for example, URL filtering and basic malware detection). Enterprises that connect remote offices (and headquarters offices) directly to the Internet, without backhauling traffic to a centralized data center, will need cloud-based advanced threat services.

Vendors that offer cloud-based SWGs, and only offer on-premises appliance-based advanced threat products, need to quickly port their advanced threat offerings to a cloud platform and deliver this functionality as a service. Vendors such as Blue Coat, Intel Security and others fall into this category.”

To receive a copy of the full report, please email [email protected]

DDoS Handbook

The Ultimate Guide to Everything You Need to Know About DDoS Attacks

DDoS attacks are the most persistent and damaging cyber-attacks. They reflect hackers’ frustratingly high levels of tenacity and creativity – and create complex and dynamic challenges for anyone responsible for cyber security.

While cyber-threats are by nature a moving target, Radware’s DDoS Handbook offers expert advice, actionable tools and tips to help detect and stop DDoS attacks.

Radware DDoS Handbook Cover image








Read the handbook to find out:

*  Brief history of DDoS attacks, plus roundup of recent cyber-attacks
*  Overview of major attack categories, specific attack types and tools
*  What lies ahead: predictions for 2015 and beyond
*  Things to consider when planning for cyber-attacks
*  Protecting enterprise assets in the cloud

Please contact us to receive your free copy of the handbook, email [email protected]

To watch a short video more about the Radware Attack Mitigation Service – please click here>>

Compare SSL Visibility Solutions

Get a side-by-side comparison of SSL visibility solutions.

Multiple solutions have emerged on the market to provide visibility into SSL traffic. But how do the features and functions of these solutions compare, and what makes one technology more effective than another?

ETM Competitive_Matrix image








Get solid answers by requesting the Blue Coat Encrypted Traffic Management comparison chart. You will learn:

*  What types of SSL visibility solutions are available
*  The core features and capabilities of these solutions
*  What sets the Blue Coat Visibility Appliance apart from other solutions

Email [email protected] to request your copy of the comparison chart.

The State of Data Privacy in 2015

Data privacy has evolved to be a top concern. IT professionals are caught in a high-wire act of needing to manage both data privacy and security to deal with changing infrastructure, regulations, and tremendous data growth, while also moving full speed ahead with cloud adoption to gain business efficiencies.

This Dimensional Research study examines the growing importance of data privacy, challenges for IT in managing the privacy of sensitive business and customer data, and the impact of cloud technologies.

Read the report to learn:

*  Why today’s security-first approach often falls short for addressing data privacy concerns.
*  The biggest privacy challenges your peers are facing and how your organization compares. (For instance, 82% of enterprises have employees who do not follow data privacy policies.)
*  The ever-changing regional data privacy requirements and how two thirds of businesses are finding it difficult to keep up.
*  Actionable advice for making privacy-ready decisions, especially when working with cloud vendors.

Email [email protected] if you’d like a copy of the report.

AppRiver: SMB Cyber Defence

The Essential Building Blocks to Protect Infrastructure

Cyber criminals are becoming far more sophisticated as technology evolves and new and better tools become available. Another disturbing trend is that attacks are increasingly more targeted and aimed specifically at smaller organisations. In fact, the threat landscape changes and evolves at such an alarming rate it has become increasingly difficult for SMBs without a dedicated IT staff to stay ahead of the threat curve.

It is an unfortunate coincidence that the mindset of many such companies is helping these cyber criminals do their jobs. Some SMBs believe that they are too small for hackers or data thieves to bother with. Others play the odds, assuming that it can never happen to them. Still others are convinced that a single layer of protection–a firewall, for example–will prevent an attack.

History shows that all of these are dangerous misconceptions. Hartford Steam Boiler (HSB) found more than half of all SMBs have been hacked at some point, and nearly three-quarters weren’t able to restore all the lost data. These small companies often handle large volumes of personally identifiable information that can be very valuable or destructive if it falls into the wrong hands. Therefore, it is crucial for SMBs to take a more intelligent approach to protecting and securing their infrastructure.

Below are seven essential cyber-security building blocks that SMBs should remember when constructing, managing and executing upon security strategies.

1. Be mindful of your digital footprint: In order to protect your business from today’s online threats, it is important to monitor your online actions and never become complacent in day-to-day activities.

2. Only use trusted sites: Stay away from questionable websites, and make smart choices when navigating from search engine results to Web pages. Cybercriminals know how to make their malicious sites appear near the top of your search results and use this tactic more often than you think.

3. Always use complex passwords: This goes without saying, but many people will use simple passwords that can be easily guessed by attackers. Also, do not use the same password across different systems.

4. Protect your personal information: Review financial accounts regularly for suspicious activity. Irregular account transactions are often a key indicator of a cyber-attack.

5. Delete unsolicited email: It is a good standard practice to get in a habit of doing this, especially if you are unfamiliar with the sender or the sender appears to be forged.

6. Make sure all devices are up to date with the latest patches: Make sure your computer’s software always stays up to date, and go ahead and uninstall unused software programs from your computer–all too often they become forgotten, go unpatched and create yet another target option for attackers.

7. Always run antivirus and firewalls: A multilayered approach to security is smart. Use a properly configured firewall, antivirus program, email and Web filtering products from a reputable security company. And, most of all, remain vigilant.

It is important to realise that IT security is very often a game of “cat and mouse,” whereby cybercriminals and security professionals are in constant pursuit of one another.  The “cat” (or security professional) is unable to definitively claim victory over the “mouse” (cybercriminal) who, despite not being able to defeat the cat, is able to avoid capture. Also, today’s threats are not static, predictable or simple, and the models for distribution can vary from cast-net-style malware campaigns to precisely targeted advanced attacks. No industry or business is immune, and that is why all SMBs should take the time to develop a system to protect and secure their business.

Article written by Fred Touchette, manager of security research, AppRiver. This Guest blog was originally published by Talkin’ Cloud.

Egress: Encryption Services Designed for Choice and Control

Whether a government department or multinational enterprise, organisations increasingly demand highly flexible encryption services which integrate with existing infrastructure environments, secures sensitive data that needs to be shared and supports the different ways end users need to access and share information.

Which is why Egress has invested in developing encryption services that offer sophisticated choice and control.

Choice over deployment
Deciding on whether to deploy encryption services locally (on-premise), in the cloud (hosted) or a mixture of both (hybrid) will be decided by a number of factors:

*  The sensitivity of the data that needs to be shared
*  Regulation and compliance rules specific to the organisation and the market sector
*  The organisation’s geographic location
*  The existing mix of IT environment

At Egress we recognise that if an encryption service is going to be successful it needs to offer the flexibility required to give customers choice based on the above factors. Which is why our secure email, file and web form services can be deployed on-premise, in the cloud or in a hybrid version where a customer has a mixed environment, for example on-premise Microsoft Exchange and Office 365.

Control over authentication and federation
Ensuring user adoption and administration is key to the success of any information security solution. If users find systems hard to use, or outside of their existing work processes they will bypass them and find an easier way to share information, regardless of the lack of security.

Which is why Switch provides sophisticated single sign-on integration so that users can seamlessly access the system regardless of where it is deployed or which device it is being accessed via. The Switch Client Applications for desktop and mobile support single sign on via Microsoft Active Directory using ADFS 2 (Active Directory Federation Services). Switch also supports the SAML v2 (Secure Assertion Mark-up Language) protocol which provides simple integration into cloud and third party single sign-on providers for unified identity management.

ADFS and SAML2 make it easy for any organisation to adopt cloud services and unify identity management. Proven integration with third party services include Microsoft Azure and Ping Identity.

Choice of how users access data
Increasingly an organisation’s IT systems need to be able to support a disparate workforce where users work in multiple locations and access information via a varied set of applications and devices.

The Switch platform has been designed to support easy and secure access across all devices, including the desktop client, email clients including Microsoft Outlook, all major mobile devices (IOS, Android, Windows Phone and Blackberry).

Control what recipients do with shared data
In order to ensure the security of ‘shared’ information, senders need to be able to control what recipients do with the data they receive.

Egress Switch leverages a unique combination of on-premise and hosted cloud infrastructure and patented key management to deliver real-time  ‘follow the data’ control to ensure that only authorised recipients access confidential information. This next generation level of control and real-time auditing not only protects our clients from accidental loss, but also prevents third parties mishandling personal or sensitive data. As a result senders can control a recipients ability to print, download, forward and even print screen information.

Click here to read more about Egress Switch Email Encryption>>

  • Employee GDPR Awareness Training

  •  Identity-as-a-Service (IDaaS) solution

  • Tokenless Strong Authentication (MFA)

  • Next Gen Endpoint Security

  • Enquiry LinkedIn Spiceworks