Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Product Release

Introducing BinLib: Your private binary library

Binary Library, or “BinLib”, is a collection of data and metadata pertaining to executable binaries, such as EXE or ELF files, that have been observed within your organization(s). When enabled, this extension collects observed data into your own private collection of historical executables, then subsequently available for searching, tagging, and analysis.

New DLP Tools, Location Insights, Track Network Drives, and More! (v9.0)

CurrentWare version 9.0 is here! This update introduces Advanced HTTPS transparent packet filtering technology, allowing for significant enhancements to the tracking and restriction capabilities of the CurrentWare Suite. By upgrading to CurrentWare v9.0 you will have greater protection against the data security risks of cloud storage services, potentially malicious file downloads, network share drives, and more!

NEW Release - ionCube Encoder 13 with PHP 8.2 support

29th August Update: We would like to thank everyone for their patience while we finalised the last steps of this release and are pleased to announce that ionCube Encoder 13 is now available. You can upgrade existing version 11/12 licenses to version 13 or purchase new directly at ioncube.com. ionCube Encoder 13 supports PHP 8.2 encoding where it is possibly to run encoded files on PHP 8.2 with the latest v13.0.1 Loader or later. —

Introducing the Next Generation of AI at Egnyte

For nearly a decade, Egnyte has been applying AI to help customers protect and manage large volumes of unstructured data. The outputs of these models were historically focused on a relatively narrow set of IT security, privacy, and compliance applications. Today, we’re announcing the next generation of AI-powered solutions at Egnyte, unleashing content intelligence for every user on our platform!

Elastic Security 8.9: Streamline the analyst experience with GAI and advanced analytics

Elastic 8.9 introduces the generative AI sidekick, enhanced rule tuning, new lateral detection capabilities, and more! These new features provide security practitioners with advanced detection and analytics, easy to access information, more ways to customize your security investigations, and additional deployment options.

Introducing the Zenity Attack Graph: Visualize Low-Code/No-Code Risk with Full Context

On paper, applications are created to be useful tools that solve specific business needs. Think of an application that tracks all ongoing projects for a product manager, an automation that triggers emails to prospective customers when they fill out a marketing form, or a flow that sends aggregated payment information to a finance manager. While all these applications are fairly straightforward, and seemingly used for singular cases, they are anything but.

Greater Detection Accuracy and Faster Time-to-Value with Splunk IT Service Intelligence 4.17

We’re all juggling more complexity than ever before. Chances are you’re being pulled in multiple directions, working across teams and dealing with more tools than you’d like to. We know you want to keep everything running smoothly and don’t want to focus your time on setting things up, especially when you’re probably dealing with other fires.

Explore the ONE Security Platform for MSPs

As cyberattacks and the overall threat landscape grow more complex, managed service providers (MSPs) need to evolve. As an MSP, you must be capable of protecting customers from attacks targeting networks, devices, and users. Finding ways to protect your customers’ expanding threat surface is one thing, but doing so without compromising on operational efficiency or profitability is another. At times this can feel like an insurmountable task.

Defend Your Software Supply Chain by Curating Open-Source Packages Entering Your Organization | Announcing JFrog Curation

Modern organizations are constantly striving to gain a competitive advantage by delivering software solutions at a remarkable pace. To achieve this, they heavily rely on open-source software (OSS) libraries and packages, which constitute a significant portion (80-90%) of their software solution. However, while open-source software offers numerous benefits, it also presents potential security challenges.