Articles, trends, and advice on cloud security without compromise. Keep up with the latest blog insights on web isolation, network cybersecurity, malware, and more.

Menlo Security Collaborates with Fujitsu on Global Managed Security Service

Posted by Peter Lunk on May 26, 2016

I am extremely pleased to report that we have entered into a partnership with Fujitsu, providing  an enhancement to their Global Managed Security Service. The Menlo Security Isolation Platform (MSIP) will be used to bolster the Risk Reduction capabilities of the managed service offering to automatically eliminate the risk of malware from Web, documents and email.

This partnership expands the market reach for the Menlo Security Isolation Platform (MSIP) as we make this breakthrough security solution available as a cloud software service to the Fujitsu GMSS installed base. 

Read More

Tags: malware, vulnerability, isolation, security, webinar, top-sites, global managed security service

Security That's Imperceptible - Gartner's Take on Choosing the Right Isolation Provider

Posted by Peter Lunk on May 23, 2016

With Web and email continuing as primary malware vectors, companies are increasingly adopting isolation technology to contain and prevent risky content. However, Gartner points out that an isolation solution must deliver a high-quality end user experience to keep up with enterprise productivity needs.

This Menlo Security webinar, featuring Gartner, recommends you ensure your isolation technology solution provides a positive user experience, especially full fidelity and rich media support. If a solution reduces performance, your employees will find a way to work around your security measures, defeating your entire purpose of eliminating malware. 

Read More

Tags: malware, vulnerability, isolation, security, webinar, top-sites

Don't Forget About Prevention: Gartner's Views on Security Strategy

Posted by Peter Lunk on Mar 30, 2016

With hundreds of security companies offering a diverse and innovative set of solutions, prioritizing your security efforts is getting harder all the time. Presenting the most important strategies in a visual model is even harder, and thankfully we can count on the folks at Gartner to put a lot of horsepower behind creating something simple yet compelling and actionable.

Where I find Gartner’s Adaptive Security Architecture to be especially relevant, in terms of handling today’s emerging digital enterprise behaviors, is that it brings threat prevention back to the forefront. The Gartner architecture takes the broad universe of possible security approaches and distills them down into four general categories: predictive, preventive, detection and response capabilities. To lower IT risk, their model describes a continuous response approach instead of an incident response method – developing comprehensive protection by integrating predictive, preventive, detection and response capabilities.

Read More

Tags: malware, vulnerability, isolation, security, webinar, top-sites

March Madness, With Or Without The Malware?

Posted by Kowsik Guruswamy on Mar 23, 2016

If you are not familiar with March Madness, it's the single-elimination basketball tournament played each spring in the United States, currently featuring 68 college teams. It's one of THE most famous sporting events in the United States. As we head into the Sweet Sixteen bracket, we thought it might be prudent to analyze the Top 10 sports sites in the U.S. based on the Alexa ranking. These sites are the most visited around this time with sports fan checking out the bracket to see if their favorite team is advancing to the next stage. The real question is, can these sites be a prime target for malware and ransomware?

Read More

Tags: malware, vulnerability, top-sites

Connect with us

Lists by Topic

see all

Recent Posts