Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Cloud

11/13/2017
04:00 PM
Jai Vijayan
Jai Vijayan
Slideshows
Connect Directly
Twitter
LinkedIn
RSS
E-Mail

Emerging IT Security Technologies: 13 Categories, 26 Vendors

A rundown of some of the hottest security product areas, and vendors helping to shape them.
14 of 14

Cloud Security Service Providers

Services for protecting enterprise data in the cloud. 

Vendor: Amazon

Services for infrastructure security, DDOS mitigation, encryption, configuration management, monitoring and logging, IAM, and penetration testing.
	
Factors to Watch

- Large suite of security identity and compliance products
- Services for security-regulated workloads
- Largest cloud infrastructure in the world



Key Executives: Jeff Bezos is the founder, chairman, and chief executive officer of Amazon.

Founded: 1994

Vendor: Microsoft Azure

Unified security management and threat protection services for cloud workloads.
	
Factors to Watch

- Monitoring for on-premise and cloud workloads
- Policies for regulatory compliance 
- Advanced analytics and threat intelligence



Key Executives: CEO Satya Nadella replaced Steve Ballmer in 2014.

Founded: 1975

Analyst Commentary: Depending on how you define this category, other big players include Symantec, IBM, and McAfee, Lindstrom notes.

Dickson says he would put Trend Micro on this list.

Image Source: nmedia via Shutterstock

Cloud Security Service Providers

Services for protecting enterprise data in the cloud.

Vendor: Amazon

Services for infrastructure security, DDOS mitigation, encryption, configuration management, monitoring and logging, IAM, and penetration testing.

Factors to Watch

  • Large suite of security identity and compliance products
  • Services for security-regulated workloads
  • Largest cloud infrastructure in the world

Key Executives: Jeff Bezos is the founder, chairman, and chief executive officer of Amazon.

Founded: 1994

Vendor: Microsoft Azure

Unified security management and threat protection services for cloud workloads.

Factors to Watch

  • Monitoring for on-premise and cloud workloads
  • Policies for regulatory compliance
  • Advanced analytics and threat intelligence

Key Executives: CEO Satya Nadella replaced Steve Ballmer in 2014.

Founded: 1975

Analyst Commentary: Depending on how you define this category, other big players include Symantec, IBM, and McAfee, Lindstrom notes.

Dickson says he would put Trend Micro on this list.

Image Source: nmedia via Shutterstock

14 of 14
Comment  | 
Print  | 
Comments
Newest First  |  Oldest First  |  Threaded View
MarkS94105
100%
0%
MarkS94105,
User Rank: Apprentice
12/8/2017 | 2:28:08 PM
Story -> Potentially Valuable; Site -> Problematic Viewing and Printing
This topic and story is presented as a white paper.  To read the story, we must click the next arrow 13 times to see all 14 pages.  This is time consuming as the site loads so many advertisements.  There is no simple way to print the story, as the print function show only 1 of 14, 2 of 14, etc.  This may be by design, but I find it a serious barrier and will seek other sources for this material.  
I 'Hacked' My Accounts Using My Mobile Number: Here's What I Learned
Nicole Sette, Director in the Cyber Risk practice of Kroll, a division of Duff & Phelps,  11/19/2019
6 Top Nontechnical Degrees for Cybersecurity
Curtis Franklin Jr., Senior Editor at Dark Reading,  11/21/2019
DevSecOps: The Answer to the Cloud Security Skills Gap
Lamont Orange, Chief Information Security Officer at Netskope,  11/15/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Navigating the Deluge of Security Data
In this Tech Digest, Dark Reading shares the experiences of some top security practitioners as they navigate volumes of security data. We examine some examples of how enterprises can cull this data to find the clues they need.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-13157
PUBLISHED: 2019-11-22
nsGreen.dll in Naver Vaccine 2.1.4 allows remote attackers to overwrite arbitary files via directory traversal sequences in a filename within nsz archive.
CVE-2012-2079
PUBLISHED: 2019-11-22
A cross-site request forgery (CSRF) vulnerability in the Activity module 6.x-1.x for Drupal.
CVE-2019-11325
PUBLISHED: 2019-11-21
An issue was discovered in Symfony before 4.2.12 and 4.3.x before 4.3.8. The VarExport component incorrectly escapes strings, allowing some specially crafted ones to escalate to execution of arbitrary PHP code. This is related to symfony/var-exporter.
CVE-2019-18887
PUBLISHED: 2019-11-21
An issue was discovered in Symfony 2.8.0 through 2.8.50, 3.4.0 through 3.4.34, 4.2.0 through 4.2.11, and 4.3.0 through 4.3.7. The UriSigner was subject to timing attacks. This is related to symfony/http-kernel.
CVE-2019-18888
PUBLISHED: 2019-11-21
An issue was discovered in Symfony 2.8.0 through 2.8.50, 3.4.0 through 3.4.34, 4.2.0 through 4.2.11, and 4.3.0 through 4.3.7. If an application passes unvalidated user input as the file for which MIME type validation should occur, then arbitrary arguments are passed to the underlying file command. T...