phone number

Archive for the ‘Articles ’ Category

MOJO Barriers designs new High Fence product for the G20 Summit

Posted on: November 25th, 2014 by webprese

By ASM

Mojo Barriers

A brand new reinforced barrier system was designed by Mojo Barriers to help keep politicians, dignitaries and heads of state including Barack Obama and David Cameron safe during the G20 Leaders’ Summit in Brisbane, Australia from 15-16 November 2014.

With over 4,000 delegates and 3,000 media descending on Brisbane to discuss a wide range of global economic issues, the system was required to create restricted zones across the city and form protective walls around the event’s venues, including the Brisbane Convention and Exhibition Centre.

Coates Hire contracted Mojo Barriers to supply and install a unique barrier solution as specified by police and government officials. The resulting product, High Fence, consists of 1m wide and 2.4m high sections of reinforced aluminium barrier – the standard crowd control equipment from Mojo’s product range – with a see-through Polycarbonate upper, which is a durable and high impact resistance material, easily withstanding destructive attacks.

Over 2,000m of the product was installed across the city by the company’s Australian team. Doors and gates were also manufactured which integrated into the barrier line, to ensure fire safety and access and egress regulations could be met.

Cees Muurling, managing director at Mojo Barriers, explains: “The brief was to create a product to act as a deterrent and keep the public out of restricted areas. High Fence is quick and simple to install, exceptionally strong and durable and the clear upper section gives security personnel uninterrupted views of the surrounding areas. Its unique aspect is that it is not weighted or pinned to the ground, therefore is completely self supporting, and can withstand significant crowd pressure and deliberate attempts to breach the barrier line.

“It underwent extreme testing against pressure and targeted attacks. It was proven to be extremely strong and is the ideal solution for events and occasions where crowd and building segregation is an integral part of the security process.”

The installation for the G20 was one of the toughest on Mojo’s records, with limited overnight shifts to install all barriers and transparent panels, snaking in a complex grid across the city.

Craig Edwards, Mojo Barriers’ Australian operations and account manager, explains: “The tough timeframe and sheer scale of the operation meant it was the most complex and challenging project the Australian Mojo office has faced to date. We assembled a skilled team of nine local and international supervisors, managed over fifty truck movements and directed a crew of over one-hundred hands. Coordinating simultaneous legs of the installation required accurate planning.”

Over 2,500m of the product is now available to the international event, security and police industries. Cees Muurling expresses the importance the product will play in opening up a new market sector for the company, which was established 25 years ago and is a global leader in the supply of state of the art crowd control solutions to festivals, tours, concerts and live events.

He says: “Post event, we will have 2,500 metres of High Fence available across all of Mojo Barriers’ offices; UK, Europe, Australia and the USA. It’s ideal for the police, security and protection industries as well as future political, government and cultural events. We’ve already had interest from parties across these sectors.”

High Fence is aesthetically attractive compared to the usual perimeter fencing used at major events and this was essential considering the media and broadcast attention garnered by the Summit.

The post MOJO Barriers designs new High Fence product for the G20 Summit appeared first on Australian Security Magazine | Australian Security News | Security Products |Asia Pacific Security News.

…read more

Source: Australian Security Magazine

  

Counting the costs of crime in Australia: A 2011 estimate

Posted on: November 25th, 2014 by webprese

The Minister for Justice, Mr Michael Keenan MP, has released Counting the costs of crime in Australia: A 2011 estimate, the fifth in a series by the AIC on the cost of crime to our community.

In 2011, the most costly crimes to the community were:

  • Fraud ($6b)
  • Drug Abuse ($3b)
  • Assault ($3b)
  • Criminal Damage (vandalism and graffiti) ($2.7b)
  • Arson ($2.2b)

The estimated total cost of crime in 2011 was $47.6b or 3.4 percent of national GDP, this represents a 49% increase since 2001.

…read more

Source: Australian Institute of Criminology

  

New Generation of WatchGuard Firewalls Enable Mid-Size Enterprises to Keep Pace with Explosive Growth in Encrypted Traffic

Posted on: November 24th, 2014 by webprese

By APSM

watchguard-logo

WatchGuard® Technologies, a leader in multi-function firewalls, has announced next-generation firewall (NGFW) and unified threat management (UTM) appliances specifically engineered for mid-size and distributed enterprises, which are struggling to effectively and affordably secure networks in the face of explosive growth in bandwidth rates, connection speeds and encrypted traffic. The WatchGuard Firebox® M400 and M500 appliances, based on the latest Intel Pentium and Intel Celeron Processors, are up to 61 percent faster than competing solutions with all layers of the company’s award winning defense-in-depth solutions turned on and up to 149 percent faster performing HTTPS inspection, ensuring enterprises never have to compromise network security for performance.

Recent industry reports focus on the rise of encrypted traffic and the importance of addressing threats within those encrypted streams. According to a Gartner report entitled Security Leaders Must Address Threats from Rising SSL Traffic: “With more and more encrypted traffic, this trend is likely to expand rapidly. Gartner believes that, in 2017, more than half of the network attacks targeting enterprises will use encrypted traffic to bypass controls, up from less than five percent today.”

“The demands facing mid-size and distributed enterprise networks are the same as those faced by large enterprise networks just a few years ago,” said Dave R. Taylor, vice president of corporate strategy and product management for WatchGuard Technologies. “With the growth in encrypted traffic, combined with Internet traffic increasing at 21 percent and connection speeds climbing at 42 percent, businesses are demanding firewalls that can keep pace. Our customers do not want to be forced to choose between protecting their networks and ensuring their end-users have the performance needed to do their jobs and with our new Firebox solutions, they don’t have to.”

All WatchGuard NGFW and UTM appliances run on WatchGuard’s Fireware OS, which is built on the latest Intel Pentium and Intel Celeton Processors allowing WatchGuard’s firewall performance to continually scale. “Intel’s processors give our firewall solutions the power needed to run all of their engines in parallel without causing a bottleneck in performance. Plus, it gives us ‘head room’ to add future engines as security trends demand,” said Sin-Yaw Wang, WatchGuard’s global vice president of engineering. “Our operating system is uniquely architected for speed.”

“WatchGuard Firebox M400 and M500 appliances that utilise the latest generation of Intel® Core™ Processors for inspecting network traffic take advantage of new Intel® QuickAssist technology, which instantly provides a performance boost,”  said Steve Price, general manager of Intel’s Communications Infrastructure Division. “Customers now have the ability to run their security systems at full throttle without sacrificing performance.”

The WatchGuard Firebox M400 and M500 also provide the flexibility of two SFP (small form-factor pluggable) ports that can feature either 1 Gb copper or 1 Gb fiber connections, ensuring that firewalls can adapt to end-user environments. SFP transceivers are available as optional accessories. Both models feature the WatchGuard Fireware OS, v.11.9.4. This software version includes new features to simplify deep inspection of HTTPS traffic, allowing users to include names instead of numbers in their policy definitions. Click here to find out more.

…read more

Source: Asia Pacific Security Magazine

  

Thales helps secure Brisbane G20 Summit

Posted on: November 21st, 2014 by webprese

By ASM

Thales logo

Sophisticated Event Management Systems delivered by Thales Australia have secured important world leaders and supported a successful G20 Summit in Brisbane, Australia.

A global leader in security, Thales’s solutions are trusted by hundreds of companies in 50 countries worldwide.

At the G20 Summit held in Brisbane on 15-16 November, the Thales Event Management System (EMS) secured meeting venues with a minimum of fuss and inconvenience to G20 delegates. Specifically, the EMS comprised registration, accreditation, physical security access control and event information management.

“Access control is becoming a major concern for operators of sensitive sites and events, and as critical as physical protection,” Thales Australia CEO Chris Jenkins said.

“Thales is proud to have contributed to a successful event that showcased Australian capabilities to a global audience, and played host to world leaders such as US President Barack Obama, French President François Hollande, UK Prime Minister David Cameron and German Chancellor Angela Merkel.”

Thales drew upon its cyber security expertise to manage the security risks and implement safeguards in the IT infrastructure underpinning the EMS. It was critical to implement a robust security management program to maintain operational continuity and protect the private information stored in the EMS database.

For the G20, Thales also leveraged its experience implementing an EMS for APEC 2007 and experience delivering similar capabilities at other high-profile events hosted by the Federal Government. Key subcontractors included Centium Software, Touchpoint Meeting Services, ID Warehouse, BCDS Group and Macquarie Telecom.

Thales solutions protect the four key domains considered vital to modern societies:

  • Government: Border surveillance, homeland security, identity management, etc.
  • Cities: Urban security
  • Critical infrastructures: Government sites, oil and gas infrastructure, nuclear power stations, airports, sensitive sites including museums, mosques, prisons, metro stations, etc.
  • Cyberspace

The post Thales helps secure Brisbane G20 Summit appeared first on Australian Security Magazine | Australian Security News | Security Products |Asia Pacific Security News.

…read more

Source: Australian Security Magazine

  

Telstra Cyber Security Report 2014 – Join the conversation now!

Posted on: November 21st, 2014 by webprese

By ASM

Telstra Logo

 Join Telstra specialists as they discuss findings from the recently published Telstra Cyber Security Report including key trends within SMB and Mid-Market. There will be an opportunity to ask questions, have your say in a live poll and take back recommendations to help you keep your business secure and avoid becoming a statistic.

Technology driven trends like Cloud, Mobile, and BYO Device mean organizations are more open and inter-connected than ever before – and that’s great for business. Unfortunately, they can also leave organisations open to an increasing number of security threats. In recent months reported data breaches at organizations of various size have highlighted vulnerabilities in a variety of systems and confirmed again that cyber events can impact your bottom line, damage your brand, affect customer confidence and hinder your ability to do your job.

Register your interest here

The post Telstra Cyber Security Report 2014 – Join the conversation now! appeared first on Australian Security Magazine | Australian Security News | Security Products |Asia Pacific Security News.

…read more

Source: Australian Security Magazine

  

Louis Tetu to Keynote GovInnovate Summit

Posted on: November 21st, 2014 by webprese

By ASM

Coveo Logo

Coveo announced that Chairman & CEO Louis Tetu will present a keynote session on Tuesday, November 25 at the 2014 GovInnovate Summit on “How Search & Relevance is Driving Real-Time Insight for Government Organizations & Citizens Alike.”

From call centers to self-service portals and Web-based interactions, citizens now expect the same seamless service experience with government organizations that they have with businesses. Tetu will discuss how government agencies must provide citizens with more seamless, personalized experiences across all channels of interaction, while empowering and “upskilling” knowledge workers with a solution that improves proficiency and productivity.

The problem stems from IT complexity. Customer data now resides across a diverse array of data sources, legacy systems and newer, cloud-based applications. This creates silos of information that contain content, structured and unstructured data that is difficult to access. Due to this complexity, organizations often adopt platform-specific search tools that are associated with physical infrastructure deployments.

Tetu will explain how government agencies must instead embrace this complexity and enable unified search platforms that index and consolidate information from across the “ecosystem of record.” Organizations that use this approach are able to present highly relevant content and experts within the context of the user, whether via self-service or employee-assisted service, for a more personalized interaction. Customer centricity is the new imperative.

“GovInnovate is one of the premier conferences of its kind,” said Tetu. “I’m looking forward to talking about how enterprise search solutions can transform government organizations with the right information presented in the right context, at the right time—to personalize engagements with the 21st century citizen and to help government employees upskill on-demand.”

In addition to Tetu’s keynote presentation, Coveo executives will participate in two roundtable sessions later that day alongside executives from Coveo’s regional partner, HyperInsight:

  • Tetu will participate in a round table discussion on Day 1 of the conference entitled “Enterprise Search: Tapping the Power of the Knowledge Network” with HyperInsight Director Ron Wheeldon.
  • Coveo’s Senior Vice President of Global Sales, Benoit Leclerc, will participate in a round table panel on Day 1, entitled “Effortless Self-Service for Today’s Connected Citizens” alongside HyperInsight Technical Manager Alex Cherney.

For additional information regarding the full conference agenda, click here.

The 2014 GovInnovate Summit, located in Canberra, brings together hundreds of senior public servants over two days from Australia and overseas, from all three tiers of government. GovInnovate is where the leading minds in government converge to map out the future of government. Coveo and HyperInsight are the two platinum sponsors of GovInnovate.

The post Louis Tetu to Keynote GovInnovate Summit appeared first on Australian Security Magazine | Australian Security News | Security Products |Asia Pacific Security News.

…read more

Source: Australian Security Magazine

  

Elastica Appoints Former Palo Alto Networks, Qualys and Bromium Executives to Lead Sales and Channels

Posted on: November 21st, 2014 by webprese

By ASM

Elastica Logo

Elastica, the leader in Data Science Powered™ Cloud Application Security, has announced rapid expansion of its go-to-market leadership team. These additions come at the heels of significant market momentum and successes for the Elastica CloudSOC™ platform. The following security industry veterans from Palo Alto Networks, Qualys, FireEye, Shape Security and Bromium recently joined Elastica:

Mark Rotolo, vice president of sales:
With over 25 years experience in technology sales, Mark has a strong track record of successfully establishing emerging startups in the security space. As vice president of sales – West at Palo Alto Networks, he helped grow revenues from zero to over $350 million per year. Most recently, Mark was vice president of worldwide sales at Shape Security. At Elastica, he will define and execute the overall enterprise sales strategy.

“Palo Alto Networks rose to the top due to its ability to solve major security problems for the world’s leading global enterprises,” said Rotolo. “Likewise, Elastica is providing innovative technology for the next wave of security solutions needed in the cloud-first and mobile-first era. Its CloudSOC platform is poised for explosive growth as organizations are rapidly adopting cloud apps and need comprehensive security and compliance.”

John Cunningham, managing director of APAC:
Cunningham brings over 23 years of security experience to Elastica. Previously, he served as managing director of Qualys where he built and led the APAC sales team and grew the region’s customers and revenue by more than 300 percent. At Elastica, John will leverage his deep understanding of the APAC market to drive new market opportunities and establish the company’s presence within the region.

“The threat landscape changes rapidly and the only way to stay ahead is with innovative, cloud-based solutions that are engineered to adapt quickly,” said Cunningham. “I’m pleased to be joining a team with a deep vision for cloud security and was impressed with Elastica’s machine-learning based CloudSOC technology, as well as its resonance with APAC customers.”

Jarrett Miller, vice president of channels:
An expert in global channel sales, Jarrett has a proven track record of expanding sales presence for major players in the IT industry, both domestically and internationally, including Cisco, Verizon, eSoft, AT&T, NTT Group Security Company Solutionary and, most recently, Bromium. At Elastica, Jarrett will lead the channel sales team to develop channel programs that bring Elastica solutions to a wider range of enterprises in multiple industries.

“Channel partners are constantly on the lookout for significant growth opportunities,” said Miller. “I joined Elastica because their visionary CloudSOC platform allows channel partners to grow their business in the fast growing market of cloud app security.”

Sriram Puthucode, vice president of customer excellence:
With 10 years of broad experience in sales, product management, alliances and engineering, Sriram most recently managed partnerships and major systems integrators for Qualys. At Elastica, Sriram will drive customer success and adoption.

“Cloud and SaaS services are disrupting the way people collaborate and do business,” said Puthucode. “I’m excited to be joining a company that is at the forefront of delivering security solutions that truly enable enterprises to confidently adopt these services.”

In addition, the following people also recently joined Elastica’s sales and systems engineering team:

  • Kelly Brazil, director of systems engineering – Kelly has 15 years of enterprise security experience and has held senior positions at Palo Alto Networks, Shape Security and Juniper Networks.
  • Harold Hilderbrand, enterprise sales executive – Harold has 15 years of sales experience in the security space and has previously held positions at Palo Alto Networks, Juniper Networks and NetScreen.
  • Ben DiCicco, director of sales western region – Ben has 15 years of sales experience in the networking and security markets, holding titles at Palo Alto Networks, Arista, AT&T and IBM.
  • Mary Farrelly, regional sales manager – Mary has 15 years of sales experience at leading companies such as Palo Alto Networks, Juniper Networks and Redline Networks.
  • Chris Hill, director of sales southeastern region – Chris has 15 years of IT and security sales experience at companies such as NetIQ, Tripwire, Varonis and Qualys.

“We are very pleased to swiftly expand an already stellar team of security leaders and visionaries,” said Rehan Jalil, president and CEO of Elastica. “The new team members have helped drive success for some of the world’s most high-profile security organizations. They are joining at an opportune time of major market momentum for Elastica.”

Elastica has gained significant traction in the enterprise market. To date, organizations of all sizes have adopted the Elastica CloudSOC solution. Customers are using a mix of Elastica applications (Audit, Detect, Protect and Investigate), as well as Securlets designed for specific SaaS apps such as Google Drive, Office 365, Box and Salesforce. The company has seen rapid adoption of its service across all segments, in particular large and mid-size enterprise companies.

The post Elastica Appoints Former Palo Alto Networks, Qualys and Bromium Executives to Lead Sales and Channels appeared first on Australian Security Magazine | Australian Security News | Security Products |Asia Pacific Security News.

…read more

Source: Australian Security Magazine

  

Akamai Warns of Yummba Webinject Tools and Banking Fraud

Posted on: November 21st, 2014 by webprese

By ASM

Akamai Logo

Akamai Technologies, Inc, the leading provider of cloud services for delivering, optimizing and securing online content and business applications, has released, through the company’s Prolexic Security Engineering & Response Team (PLXsert), a new cybersecurity threat advisory. The advisory alerts banks and enterprises to the use of Yummba webinject tools in banking fraud. The advisory is available for download at www.stateoftheinternet.com/yummba.

Zeus crimeware has a history of being used to control compromised hosts (zombies) for many types of cybercrime, including the harvesting of banking credentials, building botnets for distributed denial of service (DDoS) attacks, and targeting platform-as-a-service (PaaS) and software-as-a-service (SaaS) infrastructures. Now, the added capabilities of Yummba custom webinjects make the malware even more dangerous.  Webinject attacks available for sale in the wild vary in sophistication from simple attacks that report account information and credential theft to highly advanced webinjects that utilise ATSEngine for automated fund transfers to attacker-controlled accounts.

Each Yummba webinject is customised to match the look-and-feel of a website of a specific financial institution to fool the user into entering banking credentials. What’s more, the Yummba webinjects work with the malicious Automatic Transfer System (ATSEngine), streamlining the process of wiring a victim’s funds to a third-party account. As a result, a malicious actor using Yummba webinjects can inject dynamic content into a web display when a customer visits an online banking site, steal information from the user’s session, and immediately and automatically transfer funds out of the victim’s accounts.

“PLXsert has identified more than 100 financial institutions for which active webinjects are available in the wild. Most are mid-size and large financial institutions in North America and Europe,” said Stuart Scholly, senior vice president and general manager, Security Business Unit, Akamai. “Preventing these attacks requires user education, improved security and system hardening, and international cooperation and community cleanup.”

PLXsert anticipates the underground crimeware ecosystem will continue to produce new and more powerful tools like Yummba webinjects to take advantage of the massive number of exploited devices on the Internet.

Get the Yummba Webinject Tools Threat Advisory to learn more

In the advisory, PLXsert shares its analysis and details, including:

  • How webinjects work
  • Co-resident malware, such as Zeus and ATSengine
  • Potential banking targets
  • Analysis of the code
  • Types of data stolen
  • Vulnerability mitigation

A complimentary copy of the threat advisory is available for download at www.stateoftheinternet.com/yummba.

The post Akamai Warns of Yummba Webinject Tools and Banking Fraud appeared first on Australian Security Magazine | Australian Security News | Security Products |Asia Pacific Security News.

…read more

Source: Australian Security Magazine

  

CyberArk Releases Report Identifying New Patterns in Advanced Targeted Attacks

Posted on: November 20th, 2014 by webprese

By ASM

Cyberark Logo

CyberArk, the company that protects organisations from cyber attacks that have made their way inside the network perimeter, has released a new report identifying the compromise and misuse of privileged accounts as a key signature common among advanced targeted cyber attacks. Privileged Account Exploits Shift the Front Lines of Security, provides an expert’s vantage point into emerging patterns in targeted attacks by analysing the experiences of the world’s most renowned threat investigators in remediating the most devastating breaches.

Participants include:

·        Cisco Talos Security Intelligence and Research Group
·        Deloitte Financial Advisory Service LLP – Computer and Cyber Forensics Team
·        Deloitte & Touche LLP – Cyber Risk Services
·        Mandiant, a FireEye company
·        RSA, The Security Division of EMC
·        The Verizon RISK Team

“This coalition represents some of the smartest, most experienced and knowledgeable threat investigators in the world. By understanding the commonalities they’re discovering across their investigations, we’re gaining significant insights into attack patterns for targeted attacks,” said Udi Mokady, CEO, CyberArk. “What the research discovered was the exploitation of privileged accounts occurs in almost every targeted attack, and is the primary reason why attacks are so hard to discover and stop. These accounts empower attackers to access secure networks and databases, destroy breach evidence, avoid detection and establish backdoors that make it nearly impossible to dislodge them from networks. Securing privileged accounts represents the new first line of defence in the on-going cyber-battle companies are fighting.”

Privileged accounts which consist of IT administrative credentials, default and hardcoded passwords, application backdoors and more, provide attackers with an ‘all access pass’, enabling them to go where they want, traversing a network without hindrances. These accounts are also critical for attackers to hide their tracks and to exfiltrate data. Once attackers gain privileged access to critical applications and systems, they become exponentially more difficult to stop, heightening the risk of data loss and business damage.

Key findings of the report include:

·        Every Industry, Every Company is now a Target:
Cyber-attackers have broadened their targets, pursuing companies of all sizes, in all industries.  This is often a means to an end: attackers are frequently after their supply chain partners.   Threat investigators have traced attacks to non-traditional targets such trucking companies and all types of professional services firms, from management consultants and auditors to litigation attorneys, frequently as a key step in an attack on a business partner.

·        Perimeter Resistance is Futile:
Attackers will get inside of perimeter security and the most likely infection point is employees. Phishing attacks are the most common vector and are growing in sophistication, making employee log-ins far easier points of infiltration than network or software exploits.

·        Attackers Stay Hidden for Months or Years:
Most attacks have been ongoing for 200 days or more before initial detection. Monetary attacks have a much shorter time to detection – typically less than 30 days. Attackers can cover their tracks using privileged accounts to delete log data and other evidence.

·        Attackers Covet Privileged Access:
Privileged accounts are exploited in almost every targeted cyber attack. The threat investigators claim that between 80-100 per cent of all serious security incidents they’ve investigated featured the “signature” of compromised and exploited privileged accounts in the attack process.

·        Privileged Accounts Threat Vastly Underestimated:
The risk and security vulnerabilities presented by privileged accounts are much greater than most companies realise. Companies underestimate how many privileged accounts they have and on what systems they reside. CyberArk’s research demonstrates that organisations today have at least three-to-four times as many privileged accounts as employees.

·        Attackers’ Exploits of Privileged Accounts Increasingly  Sophisticated:
Security investigators report a range of privileged account exploits – including repeated exploits in service accounts, to embedded devices in the Internet of Things to establishing multiple identities in Microsoft Active Directory to ensure redundant access points and backdoors.

To download a free copy of the report and accompanying infographic, please visit: http://www.cyberark.com/threat-report and http://www.cyberark.com/blog/cyber-threat-investigators-identify-signature-dangerous-cyber-attacks

The post CyberArk Releases Report Identifying New Patterns in Advanced Targeted Attacks appeared first on Australian Security Magazine | Australian Security News | Security Products |Asia Pacific Security News.

…read more

Source: Australian Security Magazine

  

Tenable Network Security’s Nessus v6 Enhances Advanced System Hardening, Malware Detection and Mobility Support to Reduce the Attack Surface

Posted on: November 20th, 2014 by webprese

By APSM

Tenable Logo

Tenable Network Security®, Inc., the leader in continuous network monitoring, has announced the release of Nessus® v6, reducing customer exposure to security risks through advanced malware detection, compliance with system hardening policies, and enhanced security for mobile, virtualised and cloud environments.

Many detection and remediation strategies are limited in their effectiveness because of poor or hasty system configurations, often caused by a lack of implementation of best practices. For Nessus v6, Tenable built in a dozen ready-made scanning templates and more than 100 system hardening guidelines to help Nessus v6 identify more vulnerabilities and malware right out of the box than any other scanning product or service across the industry landscape These out-of-the-box templates allow users to easily implement best practices and remove the guess work to enable them to quickly achieve and maintain a state of continuous security and compliance.

“Nessus v6 protects your attack surface by enforcing system hardening policies and delivering an integrated approach to vulnerability, configuration and patch management across the dynamic IT infrastructure,” said Ron Gula, CEO of Tenable Network Security. “This means you reduce the risk to all of your network resources—including mobile devices, BYOD, virtual systems and cloud applications—and your security team is also notified immediately of any indicators of compromise.”

Nessus v6 offers the most comprehensive mobility support in the vulnerability management market, empowering organisations to address one of the fastest growing attack target segments and secure their mobile workforce. Integrating with leading Enterprise Mobility Management (EMM) solutions, Nessus v6 enables users to identify and scan all authorised devices as they connect to the network. It then goes a step further to detect traffic from unauthorised devices, so that security teams can identify risks and take immediate action.

Nessus v6 helps customers in all sectors enhance their cyber defenses by simplifying, automating and extending their active scanning capabilities. Protecting against advanced malware, Nessus v6 combines the direct scanning of endpoints for known malware with the ability to monitor network activity for indicators of compromise (IoCs) and other anomalous activity, which could indicate the presence of an advanced threat.

“Faced with sophisticated attacks that often take the path of least resistance, leveraging both known and unknown vulnerabilities, enterprises often feel they are constantly reacting against the threat of the day,” said Renaud Deraison, chief product officer, Tenable Network Security.  “Nessus v6 is designed to help them take back some control. The combined power of our leading scanning capabilities with the new antimalware, system hardening templates and mobility support empower users to identify the latest vulnerabilities, threats and risk across all vectors, so that they can better protect the entire organisation.”

Additional Nessus v6 features include a new Scan Policy Editor to easily fine-tune policies to match internal compliance standards, a brand new History tab for preserving and managing previous scan versions, and a RESTful API that makes it easy to integrate Nessus v6 into a wider variety and more dynamic IT landscape.

For more information about Nessus v6, please visit the links below:

What’s New in Nessus v6?

Nessus v6 FAQ

Reducing Your Attack Surface webcast

Nessus Discussion Forum

…read more

Source: Asia Pacific Security Magazine