Symtrex Inc.

Cyber Security Specialist

Call - 866-431-8972 | Send an Email | Request a Quote
Visit Us On FacebookVisit Us On TwitterVisit Us On Linkedin
  • Home
  • Profile
    • Contact Us
    • Security News
    • White Papers
  • Services
    • Compliance Regulations
      • PCI DSS Suite of Products
      • HIPAA/Hitech
      • SOX – Sarbanes Oxley
      • DCID 6/3/NISPOM Chapter 8/JAFAN DoD
      • NERC/FERC
    • Industry Consulting and Implementation
      • Banking and Financial
      • Energy/Utilities
      • Healthcare
      • Retail/Hospitality
    • Security Assessment
  • Security Solutions
    • Sophos
    • Endpoint Security Solutions
      • Bitdefender Business Solutions
      • Sophos Endpoint Protection
    • Forensic Solution – Threat Hunter
    • Network Access Control
      • NetShield
        • NetShield
    • NGFW – UTM – Perimeter Security
      • Sophos Network Protection
    • Security Awareness Training
      • KnowBe4 – Security Awareness Training
      • Sophos Phish Threat
  • White Papers
    • Sophos Webinar Series
  • Security News
    • Blog
    • Sophos Webinar Series
  • Free Security Tools

Sophos XG Firewall

2015/11/10 by admin

We’re excited to announce the launch of Sophos XG Firewall with Sophos Security Heartbeat™. They are a compelling reason to add network security to your Sophos portfolio.

Sophos XG Firewall - the new Next-Gen Firewall and UTM solution from Sophos provides unmatches ease of use and revolutionary new protection technology to give you an unbeatable offering for organizations of all sizes:

Hightlights Include:

Network Security Control Center - an innovative interface that delivers instant network and threat intelligence so users can take-action fast.

XG Series Appliance - comprehensive range - including a new entry-level - XG 85(w) and XG 750 for larger implementations

Security Heatbeat - a unique capility that links the firewall and the cloud endpoint for the very first time allowing them to share intelligence and enchance protection against advanced threats.

Take a tour of the Sophos XG Firewall

See Security Heartbeat in Action

Contact us for more information

Filed Under: Uncategorized

Anatomy of a Hack Disrupted

2015/10/16 by admin

How one of SIEM’s out-of-the-box rules caught an intrusion and beyond

Blog by Randy Smith

Every year, organizations spend millions of frustrating hours and countless sums of money trying to reverse the damage done by malware attacks. The harm caused by malware can be astronomical, going well beyond intellectual property loss and huge fines levied for non-compliance. In 2014, the cost of malware attacks and resulting breaches was estimated at $491 billion. And these costs include more than just the money spent trying to directly respond to security breaches. Productivity, long-term profitability, and brand reputation are often severely impacted as well.

The malware threat is growing larger and becoming more challenging to respond to every year. It seems like every month there are more major breaches. Target, Neiman Marcus, and UPS have all been victims of costly breaches in the past couple years, with each event showing signs that the breaches could have been prevented. Phishing-based malware was the starting point 95 percent of the time in state-sponsored attacks, and 67 percent of the time in cyber-espionage attacks.

Can it happen to you?

It’s easy to shrug off the threat of malware and believe that the target will always be a retail organization or a huge brand name, that it will never be your organization. However, according to a 2015 Ponemon study, 80 percent of all organizations experience some form of Web-borne malware. So don’t be lulled into a false sense of security: All industries are at risk, including the financial, health care, and government sectors you hear about in the news.

See entire blog

 

Filed Under: Uncategorized

Sophos Hardware Refresh Offer

2015/10/16 by admin

Sophos has announced a hardware refresh for all existing Sophos UTM Customers. This is an awesome opportunity to upgrade to the new SG unit, and be able to enjoy the broader functionality in the latest software releases.

To find out more about the SG units, you can view our SG Series Appliances - Datasheet or give us a call.

 

As a reminder the UTM Series will be EOF June 2018 (Security Subscriptions)

The hardware promotion is only valid until December 31, 2015.

 

Filed Under: Uncategorized

HawkEye G for Next Generation Threat Detection and Response

2015/10/02 by admin

Leading U.S. Energy Company Selects HawkEye G for Next Generation Threat Detection and Response

Customer to be One of the Company’s Largest Deployments and Validates Comprehensive Approach to Securing Endpoints and Network

HANOVER, Md., Oct. 01, 2015 (GLOBE NEWSWIRE) — Hexis Cyber Solutions Inc. (Hexis), a wholly-owned subsidiary of The KEYW Holding Corporation (NASDAQ:KEYW), and a provider of advanced cybersecurity solutions for commercial companies and government agencies, today announced that one of the nation’s leading energy providers has selected HawkEye G for next generation threat detection and response. HawkEye G will be deployed across tens of thousands of endpoints in the customer’s environment. This represents the first seven-figure deal for the recently released HawkEye G 3.0.

While companies across all verticals are susceptible to cyber-attacks, concern among energy companies is elevated considering the widespread implications a breach could have on critical infrastructure. Security teams increasingly understand that many traditional, signature-based security solutions are ineffective at stopping today’s stealthy attacks and many organizations continue to struggle with alert overload. Additionally, relying solely on manual response is no longer adequate and challenging to scale given the velocity of attacks combined with the security skills shortage.

“We know organizations are looking for increased enterprise visibility into advanced threats and incident response, and security teams are looking for better, faster ways to remove threats and reduce alert fatigue, not more manual tools,” said Chris Fedde, president, Hexis Cyber Solutions. “Companies need an integrated cyber defense solution that will protect endpoints and the network by delivering evidence-based detection, threat verification and automated response capabilities. The selection of HawkEye G by one of the largest energy companies in the U.S. is the latest validation of our HawkEye G 3.0 solution and our approach of integrated detection & automated response.”

The latest version for HawkEye G, released in April, includes improved behavior-based endpoint detection, proprietary technology called ThreatSyncTM for threat verification, and integration with leading third-party security technologies such as Palo Alto Networks and FireEye for detection and Splunk for increased threat intelligence. Increased confidence in detecting, verifying, and responding to threat alerts using HawkEye G empowers security teams to quickly and confidently defend themselves at machine speeds before damage is done.

Read more ->

Filed Under: Uncategorized

List of data breaches and cyber attacks in March

2015/03/30 by admin

itGovernance Blog - March 30, 2015 by Lewis Morgan

March has been an interesting month. There haven’t been any major data breaches like last month’s incident at Anthem Inc., but a number of data breaches across the globe may have gone unnoticed.

As always, this list is incomplete owing to the vast number of breaches and how easily things are hidden. Please leave a comment if you have a story that you believe should be in this list.

Payment card information

Bulk Reef Supply website compromised, credit cards at risk

Malware installed at California burger joint, payment cards at risk

Hilton HHonors Awards accounts exposed by security flaw

New health care data breaches: another 11 million customer records exposed

Mandarin Oriental Hotel Group confirms credit card breach

Point-of-sale provider NEXTEP in the soup over data breach

Natural Grocers investigates payment card data breach

Data breach

Amazon’s Twitch game-streaming service hacked

Health Care Breach Watch: Indiana State Medical Association

Credit reporting company Equifax suffers old-fashioned data breach

Unbanked lender Kreditech suffers insider data breach

British Airways Executive Club members warned of hacked accounts

Xtube porn website spreads malware, after being compromised by hackers

Point-of-Sale Vendor NEXTEP Probes Breach

North Carolina credit union notification says laptop containing data missing

Chip equipment manufacturing giant announces breach

Cyber attack

Yet another Philippine government website hacked by Anonymous

Toys“R”Us resets user passwords following third-party attempts to gain access

Jamie Oliver’s website found spreading malware… again

Run WordPress SEO by Yoast on your website? You need to update it

DDoS attack on feminist blog backfires on International Women’s Day

Other

Gamers warned of Counter-Strike: Global Offensive (CS:GO) phishing site

Internet service providers distribute 700,000 routers vulnerable to remote hacking

Bank of America phishing scam alert

Dark web Evolution marketplace vanishes overnight – Evo dealers hit by $12 million “exit scam”

Apple and Android devices vulnerable to FREAK attack – patches on the way

Puush accidentally infects Windows users with password-stealing malware

Thousands of popular iOS and Android apps hit by FREAK flaw

 

Filed Under: Uncategorized

  • « Previous Page
  • 1
  • 2
  • 3
  • 4
  • Next Page »

Let us help answer any questions you may have

requestmoreinformation.fw

Security News and Updates

  • Was my information part of a breach?
  • Phishing and stolen credentials
  • Ransomware is the Biggest Threat for Small to Medium Businesses

RSS SecurityWeek

  • 'Critical Severity' Warning for Malware Embedded in Popular JavaScript Library
  • REvil Ransomware Gang Hit by Law Enforcement Hack-Back Operation
  • Microsoft Introduces Security Program for Non-Profits

Contact

  • Contact Us

Request More Info

  • Request Quote

Site Map

  • Site Map

© Copyright 2016 Symtrex Inc. ; All Rights Reserved · Privacy Statement