VMRay Platform v4.2.0 Release Highlights

VMRay Logo 400x120With the release of version 4.0 last year, the VMRay Platform took a huge leap forward and further solidified itself as the preeminent software for SOC and CERT teams that need automated analysis and detection of advanced threats. Version 4.1 further rounded out the offering with incremental yet significant enhancements, and this trend continues with version 4.2, which features a variety of new features and enhancements, the most important of which we highlight below. 


Kein Unternehmen ist zu klein für einen Ransomware-Angriff

Vade Logo RGB HorizontalEin Ransomware-Angriff auf ein großes Unternehmen kann Cyberkriminellen lukrativen Gewinn verschaffen, aber er bringt auch zusätzliche Herausforderungen mit sich. Große Unternehmen sind mit Tools und Ressourcen von hochentwickelter Cybersicherheitssoftware uvm ausgestattet.


Why answering the question of orchestration vs automation will improve your security effectiveness

threatquotient logo 400x160The investment in security operations is at an all-time high. AustCyber’s ‘Australia’s Cyber Security Sector Competitiveness Plan’ shows spend on security operations makes up more than 40% of all cybersecurity spend ($1.58B in 2018), with cyber spending growth outpacing IT spending growth by nearly two to one. The report also highlights Australia’s current cybersecurity skills shortage.


RangeForce Content Rewind | April 2021

rangeforce logoWelcome to the RangeForce Content Rewind. In April, we added 30 modules to the RangeForce platform to continue supporting your cybersecurity training needs.  we wanted to take a moment and highlight some of the new  modules available on the platform.


Phishing Detection and Response: Speed and Automation with Cofense Triage and ServiceNow SIR

cofense logoHow quickly can your security team produce information about the success of phishing incident response capabilities? What if company leadership asks the CISO for data about the number of malicious phish that bypassed the secure email gateway and that employees caught and reported? Is this information available? More importantly, how rapidly does the team remedy employee-reported phishing threats?


Sharing Documents via SharePoint Is Always a Good Idea: Not always…

cofense logoThe Cofense Phishing Defense Center (PDC) has discovered a phishing campaign that targets Office 365 users and includes a convincing SharePoint document claiming to require an email signature…urgently. The campaign was found in an environment protected by Microsoft’s own secure email gateway (SEG). With thousands of individuals still required to telework, this has created a perfect opportunity for hackers to lure their victims with almost picture-perfect sharing themed emails.


MSPs gain expanded protection capabilities, improved UX, and management flexibility

Acronis color 400x120As service providers protect a wide range of machines and environments against an ever-expanding threat landscape, it’s critical that the solutions they use to power their services can keep up. To ensure our partners have the capabilities they need to keep their clients’ endpoints protected, our April 2021 release for Acronis Cyber Protect Cloud incorporates some highly sought-after features.


Data Integrity, and Why It's Important

accessdata site logo neu 600x148When Exterro’s executive team was first considering acquiring digital forensics firm AccessData, we thought a lot about the concept of data integrity and its increasing importance in today’s enterprise data management processes. 


Ectacom HQ München

ectacom GmbH
+49 8102 8952-0
Friedrich-Bergius-Str. 12
D-85662 Hohenbrunn

Ectacom Wien

ectacom GmbH
+43 664 42 20 555
Am Europlatz 2
A-1120 Wien


Ectacom Polen

ectacom Salesbüro
+48 501 295 580
Diese E-Mail-Adresse ist vor Spambots geschützt! Zur Anzeige muss JavaScript eingeschaltet sein!