Symtrex Inc.

Cyber Security Specialist

Call - 866-431-8972 | Send an Email | Request a Quote
Visit Us On FacebookVisit Us On TwitterVisit Us On Linkedin
  • Home
  • Profile
    • Contact Us
    • Security News
    • White Papers
  • Services
    • Compliance Regulations
      • PCI DSS Suite of Products
      • HIPAA/Hitech
      • SOX – Sarbanes Oxley
      • DCID 6/3/NISPOM Chapter 8/JAFAN DoD
      • NERC/FERC
    • Industry Consulting and Implementation
      • Banking and Financial
      • Energy/Utilities
      • Healthcare
      • Retail/Hospitality
    • Security Assessment
  • Security Solutions
    • Sophos
    • Endpoint Security Solutions
      • Bitdefender Business Solutions
      • Sophos Endpoint Protection
    • Forensic Solution – Threat Hunter
    • Network Access Control
      • NetShield
        • NetShield
    • NGFW – UTM – Perimeter Security
      • Sophos Network Protection
    • Security Awareness Training
      • KnowBe4 – Security Awareness Training
      • Sophos Phish Threat
  • White Papers
    • Sophos Webinar Series
  • Security News
    • Blog
    • Sophos Webinar Series
  • Free Security Tools

Log Management Tightens Data Security, Performance

2013/04/24 by admin

eBook sponsored by SearchCompliance.com

For many, collecting and maintaining logs is a compliance requirement. But IT leaders will soon discover that there are many other practical reasons for maintaining logs. Access today’s resource to uncover ways in which log management can tighten data security and boost overall IT performance.

[Download the ebook]

Filed Under: antivirus, compliance, industry, Log Management, PCI, Products, Security News, Snare, Snare Agents

Malware hits businesses 20 to 60 times an hour, say researchers

2013/04/19 by admin

ComputerWeekly News - by Warwick Ashford

Advanced cyber attacks hit businesses 20 times an hour on average, according to researchers at security firm FireEye.

This indicates just how pervasive advanced malware capable of evading traditional security defences has become, according to the firm’s latest advanced threat report.

Data gathered from 89 million malware events, along with direct intelligence uncovered by the research team, shows that many cyber attacks routinely bypass traditional defences such as firewalls, intrusion prevention systems, anti-virus and security gateways.

While enterprises experience a malware event up to once every three minutes on average, the report said the rate of malware activity varies acrossindustries, with technology companies experiencing the highest volume at up to one event a minute.

[Read Entire Article]

Filed Under: antivirus, byod, compliance, endpoint, industry, Security News, Unified Threat Management

Striking majority of endpoints vulnerable to Java exploits

2013/04/17 by admin

From Secur-it.ca

By Kevin Piddle

New focus is being paid to security concerns in Oracle’s widely used Java platform. Discoveries of new vulnerabilities, the proliferation of exploit kits and recent high-profile incidents, like the sophisticated zero-day attack against Facebook in February, have signalled a growing trend that isn’t slowing down.

In an effort to gain a deeper understanding of how widespread the current Java vulnerability landscape truly is, web security solutions provider Websense used its ThreatSeeker network to assess which versions of Java were actively being used across millions of customer endpoints.

Websense published the research findings at the end of March and in a recent interview with The Standard, Charles Renert, VP of research and development for Websense Labs, called the results “surprising”.

To read the full article - Striking majority of endpoints vulnerable to Java exploits

Filed Under: antivirus, byod, endpoint, PCI, Security News, Unified Threat Management

Ransomware: Hijacking Your Data - Sophos

2013/04/09 by admin

By Richard Wang and Anand Ajjan, SophosLabs

For the last two years users have increasingly been faced with messages like this and demands for money in exchange for access to their PCs. But these are not the actions of law enforcement, quite the opposite—it’s an example of ransomware. This paper looks in depth at ransomware variants and delivery mechanisms, and how you can protect your data with a complete security strategy.

Please Click here for Whitepaper

Filed Under: antivirus, endpoint, PCI, Security News, Unified Threat Management

Sharpening Endpoint Security

2013/04/08 by admin

Information Week Reports
John Sawyer | 03/04/13

With the perimeter of your organization expanding to include laptops, smartphones, and more, this article provides some very useful and timely information.

Sharpening Endpoint Security

Filed Under: antivirus, byod, Cloud, compliance, endpoint, industry, Log Management, PCI, Products, profile, Security News, Snare, Snare Agents, Unified Threat Management

  • « Previous Page
  • 1
  • …
  • 20
  • 21
  • 22
  • 23
  • 24
  • Next Page »

Let us help answer any questions you may have

requestmoreinformation.fw

Security News and Updates

  • Was my information part of a breach?
  • Phishing and stolen credentials
  • Ransomware is the Biggest Threat for Small to Medium Businesses

RSS SecurityWeek

  • Colorado City Pays $45,000 Ransom After Cyber-Attack
  • Vulnerabilities in Protocol Gateways Can Facilitate Attacks on Industrial Systems
  • Federal Program Offers New Cybersecurity Tool for Elections

Contact

  • Contact Us

Request More Info

  • Request Quote

Site Map

  • Site Map

© Copyright 2016 Symtrex Inc. ; All Rights Reserved · Privacy Statement