News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Security Cloud Enterprise Edition as a managed service

“Cyber ​​Resilience as a Service” enables companies of all sizes to obtain Rubrik’s portfolio for more data security from the MSP SVA. Rubrik Security Cloud Enterprise Edition includes features for increasing cyber resilience as well as proactive threat detection and risk mitigation. Rubrik, the Zero Trust Data Security company and the IT service provider SVA System Vertriebs Alexander GmbH are deepening their partnership. As the first Managed Services Provider (MSP) in Germany, SVA now offers customers the Security Cloud (RSC) Enterprise Edition as a managed service. With this offer, the partners help…

Read more

Secure AWS
B2B Cyber ​​Security ShortNews

Securing software development and operational processes has become increasingly difficult over the last decade. The majority of workloads have moved to the cloud and a greater number of IT professionals are working remotely. Since many companies access Amazon Web Services (AWS), it is important for security experts to know how they can make the infrastructure as secure as possible, because if companies use a cloud-native architecture, it is conceivable that this spanning both cloud and on-premises resources, increasing the attack surface. The demand for a product for…

Read more

Encryption tools for Microsoft 365 Cloud
Encryption tools for Microsoft 365 Cloud - KI MS

More encryption options for data in the Microsoft 365 Cloud: eperi is expanding its eperi for Microsoft 365 product with additional useful tools with Microsoft 365 encryption for Planner and To Do to protect plan names, tasks and files from unauthorized access. For companies that use Microsoft 365, eperi now also offers functional encryption of Microsoft Planner and Microsoft To Do in the cloud. The new encryption options complement eperi's previous data protection-compliant encryption for Microsoft 365 core applications such as Exchange, SharePoint or OneDrive. With the new function, companies protect, for example…

Read more

File encryption protects critical data
File encryption protects critical data

Ransomware attacks are currently the number 1 threat in cyberspace for companies. That's why protecting sensitive and business-critical data is becoming increasingly important. A file encryption solution can help with this. With u.trust LAN Crypt Cloud, Utimaco presents a new, easy-to-use as-a-service solution to protect sensitive and business-critical data from unauthorized access. Client-side encryption ensures that data remains protected regardless of where it is stored - whether on premises or in the cloud. Ransomware attacks on over 70 percent of companies According to recent publications from Europol and Statista, ransomware attacks continue to…

Read more

Zero-trust remote access solution for secure hybrid working
Zero-trust remote access solution for secure hybrid working - image by Franz Bachinger on Pixabay

The new LANCOM Trusted Access Client enables secure and scalable network access for employees in the office, at home or on the go, thereby protecting modern hybrid working from anywhere and at any time. Through complete integration into the LANCOM Management Cloud, commissioning and configuration are “zero-touch” for easy and quick rollout of new remote access connections. The LANCOM Trusted Access solution dynamically adapts to increasing security requirements. Zero trust from SMEs to enterprises LANCOM Trusted Access supports both classic full network access as a VPN client as well as the migration to a zero trust security architecture with...

Read more

Secure access to cloud workloads
Secure access to cloud workloads

A leading identity security company announces new capabilities to secure access to cloud services and workloads, powered by the company's risk-based intelligent authorization controls. This includes enhancements to the CyberArk Secure Cloud Access solution, which enables secure, just-in-time access with zero standing privileges to cloud management consoles and services in multi-cloud environments. Research shows that 85 percent of organizations will use three or more public cloud providers in the next 12 months, but only 9 percent are taking an agile, holistic approach to securing identities across all environments. This makes them…

Read more

Wi-Fi 6 access points for hybrid wireless environments
SophosNews

AP6 Series Access Points: With the new generation of remotely managed Wi-Fi 6 access points, Sophos supports the transition to hybrid environments. The series complements the existing Sophos Secure Access portfolio, which also includes Sophos firewalls and Sophos switches. With cloud-managed Wi-Fi, Sophos addresses the need for scalable, remotely manageable Wi-Fi solutions to accommodate the increasing number of connected devices and the proliferation of IoT systems. The combination of the Sophos AP6 Series with Sophos Switches offers channel partners a consolidated single-vendor access solution strategy that reduces the effort and…

Read more

SASE solutions to combat staff shortages in IT
SASE solutions to combat staff shortages in IT

The German IT sector suffers from a shortage of personnel and is chronically understaffed. According to Bitkom, there was a shortage of around 137.000 IT specialists in Germany last year - the highest level of a deficit that has persisted for years. On average, an open position remained vacant for over seven months with employers and, due to demographic change, more IT staff are leaving the labor market for retirement than newly trained experts are joining. At a global level, things aren't looking rosy either: According to cybersecurityventures.com, the number of unfilled IT security positions will rise to 2023 million in 3,5. The consequences:…

Read more

Firewall as a Service
B2B Cyber ​​Security ShortNews

Configuration errors in the cloud are dangerous. This applies all the more when security solutions such as firewalls are affected. With a managed "Firewall-as-a-Service" many problems can be avoided from the outset. Attacks on cloud environments are becoming more frequent and more sophisticated, as evidenced by Aqua Security's latest Cloud Native Threat Report. Even small configuration errors can open the door to attackers. It is not for nothing that the Cloud Security Alliance ranks misconfigurations among the top 3 risks in cloud computing. In order to minimize errors during installation and commissioning, close coordination between the cloud provider and the manufacturer is of great importance. The…

Read more

Microsoft Azure DevOps: New backup and recovery service 
B2B Cyber ​​Security ShortNews

Keepit already protects cloud data in software-as-a-service (SaaS) services with a blockchain-verified solution. The Azure DevOps service now complements the coverage of Microsoft's cloud services such as Office 365. DevOps is the umbrella term for practices that combine software development (Dev) and IT operations (Ops). They feature fast and continuous delivery, workflow automation, and fast feedback. The aim of the processes is to increase effectiveness and efficiency in software development in order to deliver products quickly and with high quality. Azure DevOps: New backup and recovery service Azure DevOps (ADO) is Microsoft's solution for implementing DevOps...

Read more