WatchGuard

Seattle, WA, USA
1996
  |  By The Editor
Cybersecurity continues to be unfinished business for many companies. In a context where digitalization reigns in almost all areas, cybercriminals have more and more resources to draw on and continue to threaten the cybersecurity of millions of organizations. To guide companies and industry professionals through the ever-changing habits of malware, WatchGuard has released a new edition of our Internet Security Report (ISR).
  |  By Carlos Arnal
Over time, cybercriminals find ways to exploit new cybersecurity breaches, leading to the creation of malware that compromises users' security. Every year, one or more malware variants stand out as new, evasive, or dangerous. According to our Internet Security Report (ISR), last year it was Glupteba.
  |  By Sam Manjarres
In the digital age, where technology has become indispensable, cybersecurity has become a crucial issue for organizations. Investment in security tools to protect digital assets is increasing; however, the biggest threat often lies in an unexpected factor – human error. Phishing campaigns, weak passwords, or accidental data leaks can put even the most fortified network at risk.
  |  By WatchGuard
Analysis shows spike in endpoint malware detections, widespread targeting of Chromium-based browsers to start the year.
  |  By Sam Manjarres
Although SIM swap scams or SIM swapping have been around for a number of years, it’s hard to pinpoint exactly when they first appeared. An ENISA report states that as early as April 2016, the British media reported an incident of bank account theft using this technique. In the United States, the first documented case of large-scale SIM swapping was the Joel Ortiz case in 2018.
  |  By Kirk Jensen
The European Union (EU) is taking a significant step forward in the fight against cybercrime by introducing the Network and Information Systems Directive 2, or NIS 2. This directive represents a major overhaul of cybersecurity regulations across the continent, aiming to bolster defenses against the ever-evolving threats of the digital age. In this first of four blog posts, we will introduce the basics of NIS 2.
  |  By The Editor
The technology landscape is changing rapidly, presenting new challenges for security in the financial services sector. Generative artificial intelligence, automation, data management, and integrated finance are just some of the trends that are transforming this landscape. As the demand for personalized experiences grows, the challenges of ensuring data security and privacy are increasing, among other things, making it harder to manage digital identities.
  |  By Kirk Jensen
In today's digital age, where interconnectivity is the norm, routers act as custodians of business information. These devices, which can sometimes be undervalued, control data traffic between our devices and the global network. However, recent events have highlighted vulnerabilities that may affect a large number of routers, raising concerns about the protection of sensitive information handled by enterprises.
  |  By The Editor
The security habits that companies and employees adopt on a daily basis are almost as important as the cybersecurity solutions they implement. Even if a sophisticated and seemingly robust cybersecurity system is in place, inadequate practices and usage can lead to cybersecurity incidents and breaches that have serious consequences. Failing to cultivate good cybersecurity practices in a company's culture can prove a determining factor when dealing with potential threats.
  |  By The Editor
We’re delighted to share that Cyber Defense Magazine has honored WatchGuard Technologies with three awards in its 2024 Global InfoSec Awards program! The coveted annual awards, now in their 12th year, recognize information security (InfoSec) innovators from around the globe who deliver a unique and compelling value proposition for their product or service. A panel of independent judges selected the winners in each category.
  |  By WatchGuard
This week on the podcast we cover the WatchGuard Threat Lab's Internet Security Report from Q1. In this episode, we discuss the latest trends in malware detections at the network and the endpoint, network attack trends, and malicious domains that targeted WatchGuard customers around the world. The 443 Security Simplified is a weekly podcast that gets inside the minds of leading white-hat hackers and security researchers, covering the latest cybersecurity headlines and trends.
  |  By WatchGuard
If you're protecting the net for an NHL franchise or being the last stop for your IT team, vigilance is key. Join Philipp Grubauer, goaltender for the Seattle Kraken, as he teams up with the Kraken IT team to block cyber threats and keep systems secure. Just like on the ice, when duty calls, you've got to respond fast!
  |  By WatchGuard
We are WatchGuard Technologies, the answer for Managed Service Providers (MSPs) everywhere. WatchGuard’s Unified Security Platform is uniquely designed to support the growing popularity of managed security services in addition to self-managed deployments. It re-envisions security so that it is simplified, powerful, comprehensive, automated, intelligent, transparent, and aligned to today’s service delivery models.
  |  By WatchGuard
Are you struggling with unknown threats? Conventional security measures may not catch everything, leaving gaps for harmful applications. Discover how WatchGuard EDR’s Zero-Trust Application Service uses AI-powered threat detection to ensure every application on your system is classified for comprehensive protection. Take a proactive approach to your cybersecurity and keep your systems safe from unknown threats.
  |  By WatchGuard
This week on the podcast, we discuss a new Microsoft Windows feature that is shaping up to be a security nightmare. Before that, we discuss a new research initiative from the Advanced Research Projects Agency for Health (ARPA-H) that could make big improvements in healthcare cybersecurity. The 443 Security Simplified is a weekly podcast that gets inside the minds of leading white-hat hackers and security researchers, covering the latest cybersecurity headlines and trends.
  |  By WatchGuard
This week on the podcast, we cover a newly disclosed weakness in the 802.11 Wi-Fi standard that affects common enterprise Wi-Fi deployments. Before that, we discuss CISA's Secure by Design Pledge for technology vendors before ending with a Microsoft research post on Quick Assist social engineering. The 443 Security Simplified is a weekly podcast that gets inside the minds of leading white-hat hackers and security researchers, covering the latest cybersecurity headlines and trends.
  |  By WatchGuard
In a very special episode of #the443Podcast, WatchGuard Director of Security Operations, Marc Laliberte sits down with Seattle Kraken Cybersecurity Engineer, Ryan Willgues to discuss how Ryan got his start in IT, what it’s like working for an NHL franchise, how the Kraken have deployed WatchGuard’s Unified Security Platform, and much more. Deep dive into the Kraken deployment of the WatchGuard’s products in this case study.
  |  By WatchGuard
This week on the podcast, we cover guidance from CISA and its international partners that guides organizations on the right questions to ask during the technology procurement process to make sure the products they buy are secure. Before that, we cover Microsoft's research into a common vulnerability impacting over 4 billion Android application installations followed by a discussion on the Tunnel Vision VPN vulnerability.
  |  By WatchGuard
📽️ 🔊 This week on #the443podcast, Corey Nachreiner and Marc Laliberte cover the key takeaways from the 2024 Verizon Data Breach Investigations Report. Before that, they discuss what we learned from United Healthcare CEO Andrew Witty’s congressional testimony on their ransomware attack in February. Corey and Marc end with a discussion on a research article from JFrog on malicious Docker Hub repositories.
  |  By WatchGuard
This video describes how to synchronize, retrieve and import a Feature Key on a Firebox, using the WatchGuard System Manager and the Fireware Web UI.
  |  By WatchGuard
Risk-based authentication both enhances security and user experience by allowing you to rank the resources you want to protect based on risk level and type of user. This gives you the power to create rules that are unique to the security structure in your organization, therefore enabling more flexibility or higher protection only when necessary.
  |  By WatchGuard
Ransomware is one of the most talked about and publicized security threats in the modern era. What started as a few high-profile attacks caused by a handful of malware variants has developed into a virulent threat landscape in which increasingly unskilled attackers are able to execute highly effective ransomware campaigns against organizations of all sizes and levels of complexity. Small-to-midsize businesses disproportionately fall victim to ransomware, as they often lack the technical skills and tools needed to prevent infection.
  |  By WatchGuard
In this eBook we provide you with suggestions on how to start providing some basic but vital security services that will improve the security posture of your customers while increasing your Average Revenue (ARPU), such as endpoint security set-up and monitoring.
  |  By WatchGuard
Cyber attacks grab headlines almost daily. WatchGuard's award-winning network security platform not only provides one of the most complete suites of unified security controls on the market today to detect and prevent these attacks, but our strategy of sourcing the best scanning engines to integrate with our built-in defenses boosts security in critical attack areas. Take a closer look at the WatchGuard security platform's all-star team of best-in-class threat management services.
  |  By WatchGuard
The coronavirus pandemic has exposed business continuity inadequacies at many organizations, and highlighted the slow pace of progress in digital transformation. This new reality necessitates a departure from a traditional network-centric security model that assumes every device and user within the network should be trusted. In this eBook we will explore how the dynamics of COVID-19 have impacted security, outline the importance of a zero-trust approach, and discuss how WatchGuard can help your business deliver the security you need during these trying times.
  |  By WatchGuard
If you are in the retail or hospitality industries, it's important to know exactly how your network security solution maps to PCI DSS standards. This white paper presents a straight-forward review of PCI requirements and how the WatchGuard platform delivers the capabilities you need to ensure mandates are met.
  |  By WatchGuard
The coronavirus pandemic has exposed business continuity inadequacies at many organizations, and highlighted the slow pace of progress in digital transformation. This new reality necessitates a departure from a traditional network-centric security model that assumes every device and user within the network should be trusted.
  |  By WatchGuard
Respected PCI-Qualified Security Assessor Coalfire recently completed a technical assessment of the WatchGuard Threat Detection and Response (TDR) solution, validating it for PCI DSS anti-malware use cases. Download the whitepaper to learn more!

WatchGuard has deployed nearly a million integrated, multi-function threat management appliances worldwide. Our signature red boxes are architected to be the industry's smartest, fastest, and meanest security devices with every scanning engine running at full throttle.

For 25 years, WatchGuard has pioneered cutting-edge cybersecurity technology and delivered it as easy-to-deploy and easy-to-manage solutions. With industry-leading network and endpoint security, secure Wi-Fi, multi-factor authentication, and network intelligence products and services, WatchGuard enables more than 250,000 small and midsize enterprises from around the globe to protect their most important assets including over 10 million endpoints.

The WatchGuard Difference:

  • Intelligent Protection: Effective protection against today’s vast number of evolving threats requires multiple services working intelligently together. Prevent, detect, and instantly respond to cyber attacks with automated policies.
  • Simplified Management: Managing security across your organization has never been simpler. Use out-of-the-box tools to quickly and easily deploy, configure, and maintain your security with the granularity of your choice.
  • Actionable Visiblity: Monitor and report on the health of your IT infrastructure. Actionable visibility tools enable you to proactively identify threats, while providing corrective action against known issues.

In a world where the cybersecurity landscape is constantly evolving, and new threats emerge each day, WatchGuard makes enterprise-grade cybersecurity technology accessible for every company.