IT Brief Australia logo
Technology news for Australia's largest enterprises

Visibility news stories - Page 1

Story image
BYOD / Bring Your Own Device
How zero trust can lead the battle against ransomware
SecOps teams champion a zero trust strategy to support the fight against the escalating risk of cybercrime and help monitor threat actors across a network.
Story image
Let’s clear the cloud visibility haze with app awareness
Increasingly, organisations are heading for the cloud, initiating new born-in-the-cloud architectures and migrating existing applications via ‘lift and shift’ or refactoring.
Story image
Fortinet's Security Fabric hits new record for integrations
The Fortinet Security Fabric has surpassed 500 technology integrations with more than 300 Fabric-Ready Technology Alliance Partners.
Story image
CloudBolt advanced capabilities aim to solve persistent problems
CloudBolt Software has announced advanced capabilities designed to overcome critical roadblocks many of the world's largest organisations are experiencing.
Story image
Are you leveraging the full potential of SD-WAN?
The evolution of SD-WAN technology means it's now much more than it was originally sold to be, but do customers really understand the expanded value proposition?
Story image
How free migration tools compare with paid solutions
The road to the cloud follows two common paths: via economic first-party migration tools from public cloud providers or third-party solutions from specialist vendors.
Story image
Check Point
Check Point recognised for leading threat detection solution
"The latest ATT&CK Evaluations results highlight Check Point Harmony Endpoint’s leadership for the second consecutive year."
Story image
Amazon Web Services / AWS
ExtraHop brings greater security to cloud environments
ExtraHop has extended the power of Reveal(x) 360 to provide frictionless threat visibility for Amazon Web Services (AWS).
Story image
Imperva releases API security solution as threats ramp up
Imperva has launched Imperva API Security with continuous API discovery and data classification, a product that can be deployed in any environment.
Story image
Why doubling down on corporate defence works so well
The security operations centre has come a long way since the early 2000s. It wasn’t even called a SOC in those days.
Story image
How to make a business ‘invisible’ to hackers
Critical to every organisation is how to stop a cyber-security breach AND the damage it causes and do so within available budgets.
Story image
Axonius launches first SaaS risk management product
SaaS management tools typically cater to the business side or the security posture management side, but each side is still prone to visibility gaps and information siloes.
Story image
BYOD / Bring Your Own Device
Is BYOD the final mile to Digital Transformation success?
The concept of bring your own device (BYOD) has been around for years, but since the shift to more remote and hybrid working around the world, its popularity has reached bold new heights.
Story image
Endpoint detection and response / EDR
CrowdStrike expands CrowdXDR Alliance with three new partners
"We established this community-driven approach to further extend partner value and deliver customers a holistic and simpler view of threats across the entire technology landscape."
Story image
LOGIQ.AI advances machine data management with DPaaS offering
"LogFlow enables our customers to take a whole new approach to observability data; one that helps regain control and unblock vendor or cost limitation."
Story image
Google Cloud
CrowdStrike extends Falcon Horizon support for Google Cloud
"This extended support from CrowdStrike Falcon Horizon for Google Cloud will give our joint customers the visibility and protection needed to stay ahead of the adversaries.”
Story image
Cloud Security
Imperva launches free security assessment service for Amazon RDS
"This should help practitioners through their cloud migration journey, to get full visibility on which data they hold and its true data-aware security posture.”
Story image
ReliaQuest launches capabilities for better risk metrics and verification
“Now within the ReliaQuest GreyMatter platform, security teams can measure, test and report on the health of their program, and see the specific steps they can take to operationalise these insights to improve their security."
Story image
Risk management
AttackIQ launches security validation service for better visibility and control
"We launched AttackIQ Vanguard to democratise advanced cybersecurity control validation and close the gap left by ad hoc testing approaches, so customers have greater visibility into the effectiveness of their security.”
Story image
Lack of visibility cited as number one roadblock to robust security, report finds
“While it’s positive to see more leaders engaging in strategic approaches to securing their organisation, it’s important to keep their energy focused on the fundamentals of cybersecurity."
Story image
Virsec hits $137 million investment milestone after latest round
Virsec has received a $100 million Series C investment from a community of industry players and company builders. The completion of the round brings total funding in the company to $137 million.
Story image
Latest Secureworks integration protects against high-risk vulnerabilities
To enhance vulnerability detection and response, Secureworks has completed the integration of threat intelligence feeds from Secureworks Counter Threat Unit into Secureworks Taegis VDR.
Story image
Pallas Capital advances operations with Nintex Promapp
Pallas Capital selected Nintex Promapp and deployed the process management tool in April 2021, which has resulted in the mapping of more than 100 processes, with an additional 100 processes scheduled for completion within two months.
Story image
Top tips for successful change management
Business intelligence comes from activating all possible data sources and making informed decisions based upon the facts presented.