Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Security

Become an Email Security MSP or VAR - IT Channel Transition

In late 2016 the Spambrella partner program evolved to better fit the demand of managed security service providers (MSSP’s) and value add resellers (VAR’s) in transition. This is largely due to the broad and varied territories our partners are located. Spambrella now have partner program options available for all eventualities in all continents.

SecureAge Security Suite - SecureEmail (Policy-based End-to-End Email Encryption)

SecureEmail is an ideal solution for ensuring authenticity and privacy without changing the way you send and receive email. It combines the industry’s best encryption technologies with invisible, non-intrusive key management that just works with your preferred email client software. We protect your data Every File | Every Place | Every Time

With Forseti, Spotify and Google release GCP security tools to open source community

Being able to secure your cloud resources at scale is important for all Google Cloud Platform users. To help ensure the security of GCP resources, you need to have the right tools and processes in place. Spotify and Google Cloud worked together to develop innovative security tools that help organizations protect GCP projects, and have made them available in an open source community called Forseti Security. Forseti is now open to all GCP users!

Petya ransomware outbreak: Here's what you need to know...

A new strain of the Petya ransomware started propagating on June 27, 2017, infecting many organizations. Similar to WannaCry, Petya Ransomware uses the Eternal Blue exploit to propagate itself. Petya is taking down corporate networks that run mainly on Microsoft Windows software. It has already hit most Government applications in Ukraine as well as major companies in Europe including advertising agency WPP and law firm DLA Piper.

How User & Entity Behavior Analytics Reduces the Threat of Insider Data Leakage

Most IT systems are protected by defensive technologies which present a significant hurdle to unauthenticated outsiders. However, the company insiders have authentication credentials that allow them past the defensive technologies and provide them with access to the company’s intellectual property.