Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Customer Stories

Preqin Moves to Secure Cloud File Sharing with Egnyte

London-based Preqin is an industry leading alternative asset research firm. With a dispersed global workforce, Preqin struggled with data access challenges from their aging local file servers. In this video, learn how Preqin leveraged Egnyte to support its new cloud-first strategy. Access from anywhere, backup and restore capabilities, secure file access and auditing were key reasons that Egnyte was selected. The company can now respond easily to Subject Access Requests (SARs) thanks to automated PII detection. Operational overhead for managing servers and manual backups and restores are a thing of the past, resulting in tremendous time savings.

RedAbierta chooses INETCO BullzAI to secure its payment channels

Vancouver, Canada – June 16, 2022 – INETCO Systems Limited, a leader in real-time payment monitoring and fraud prevention, announced today that RedAbierta, a leading fintech company with offices in Honduras, Nicaragua, Guatemala, and El Salvador, has selected INETCO BullzAI® to ensure the integrity of its payment channels.

Royal Flying Doctor Service Queensland Protects The Crown Jewels of Patient & Aviation Data

Royal Flying Doctors Service Queensland has protected business-critical data and ensured its life-saving operations are available 24/7 with Rubrik. As both a healthcare and aviation organisation, it needed to ensure sensitive patient data and key aviation data were protected from the increasing threat of ransomware targeting the healthcare sector.

NJ TRANSIT Protects the Garden State passengers' economic and social well-being from cyber threats

NJ Transit, the nation's third-largest public transportation provider, delivered more than a quarter of a billion annual passenger trips before the pandemic and is responsible for its riders’ safety, mobility, and livelihoods every day. To ensure nothing interrupts the business, NJ TRANSIT, in partnership with Rubrik, prioritizes a strong data security strategy and is committed to the ongoing and necessary work that gives their data resilience and helps to reduce risk as they face ever-evolving, and inevitable, cyber threats.

Case Study: The Compatibility Challenge of Using Outside Software in Product Development

Whoever you are, whether you’re a developer that intends to contribute to a project or a researcher that seeks to reveal how a project works, consider this: When it comes to facing a large codebase, understanding how the project’s package dependency resolution works is one of the most important and underrated actions one can easily skip.

Viking Yachts Protects Intellectual Property From a Departing Employee (Case Study) | CurrentWare

“CurrentWare saved us a lot of time and money; when the employee was questioned about the data transfer they folded. I cannot thank all of you enough for this software. Being able to audit removable drives is invaluable.” A lot has changed in the world since our first case study interview in 2021 with Vincent (Vinny) Pecoreno, the Network Administrator for Viking Yachts.

CyRC Case Study: Securing BIND 9

Learn how you can improve your application security posture by adopting best practices from the BIND 9 team. All application development teams face the same fundamental questions, from the selection of third-party components to the processes and tools that ensure resilience and security. This article describes how the ISC development team addresses security in the BIND 9 application, one of the foundational applications of the modern internet.

Lookout Helps a Leading Financial Technology Company Improve Security and Compliance

When a leading financial technology provider began posting record success and rapid customer growth, it needed a holistic security strategy to protect its customer data and comply with regulations such as the Payment Card Industry Data Security Standard (PCI DSS) and the California Consumer Privacy Act (CCPA).

SurveyMonkey talks with Snyk about developer security during hypergrowth

Many companies look to CISOs or compliance teams to manage security throughout software development. But this practice usually keeps security considerations separate from developers. CISOs can assign security tasks to developers, but if developers aren’t thinking about security regularly, those tasks may be overlooked.