Security


The new Gartner Magic Quadrant for Cloud Access Security Brokers (CASB) was released last month and we were pleased to see several of our partners feature. Netskope was named a leader, positioned furthest to the right for completeness of vision out of the 13 vendors that were evaluated. Palo Alto Networks was named as a … Continued

Read further »

With the holiday season here again, this time of year reminded us of a Corelight customer, an energy company, whose use of Corelight enabled immediate diagnosis of an internal security incident on the eve of a major holiday vacation and allowed security team members to go home to their families. Here’s how it happened. On … Continued

Read further »

The strength of a SIEM or log analytics platform like Splunk revolves around turning the machine data from your enterprise into searchable answers and alerts. When the network data ingested is at a summary L2-L4 level, sampled in the case of Netflow, or only inferred from the logs of end systems, then the network component … Continued

Read further »

This is a historic year for the FIFA World cup, for the first time they’ve implemented VAR (a Video Assistant Referee) at the tournament. VAR is there to intervene when officials have made a clear and obvious error in decisions involving goals, penalties, red cards and mistaken identity. The large number of cameras in the … Continued

Read further »

About a week ago, Palo Alto Networks released a fourth edition – and total rewrite – of their firewall migration tool, now called ‘Expedition’. This should vastly improve migration time and effort and make things a whole lot simpler when moving from another vendor’s firewall to Palo Alto Networks, while automating and implementing as much … Continued

Read further »

This blog is here to provide best practice recommendations with actions that Palo Alto Networks firewall administrators can take to prevent these vulnerabilities. What is Meltdown & Spectre? They are two security vulnerabilities which could allow attackers to abuse ‘speculative memory’ to access privileged memory to steal your passwords, encryption keys and additional private information. … Continued

Read further »

  Speed up your Security Tools – Find threats faster AND save money! Your network is a rich source of massive amounts of data in motion–the data that runs your business. It’s also an ever-expanding source of complexity, risk and cost that can easily overwhelm your security and monitoring tools. Find out how to make … Continued

Read further »

Palo Alto Networks have added support for archive (RAR/7z) & Linux (ELF) binaries to the WildFire public cloud subscription in the Application and Threat Content release version 745 dated 25/10/2017 for PAN-OS versions 8.0 and higher with malicious, benign, or grayware verdicts. The WildFire appliance does not support ELF and archive file analysis. Follow the … Continued

Read further »

Your bank now sends you a text message to validate your login or to get your password reset.  You feel so safe now!  No hacker can get you.  After all, you are now using “two factor” authentication (2FA) and the hacker would have to have both your phone and your password to get in.  Sounds … Continued

Read further »

2017 has been a Busy and exciting year At Teneo! Time flies when you’re invested on providing best in breed next-generation technology to more customers. Teneo kicked off 2017 by expanding our national US presence with our acquisition of MCS LLC. A few short months later, we received Riverbed Technology’s Americas President’s Choice Award which recognizes our best … Continued

Read further »