Search
Homepage This page's url is: -crn- Rankings and Research Companies Channelcast Marketing Matters CRNtv Events WOTC Jobs HPE Discover 2019 News Cisco Partner Summit 2019 News Cisco Wi-Fi 6 Newsroom Dell Technologies Newsroom Hitachi Vantara Newsroom HP Reinvent Newsroom IBM Newsroom Juniper NXTWORK 2019 News Lenovo Newsroom NetApp Insight 2019 News Nutanix Newsroom Cisco Live Newsroom HPE Zone Tech Provider Zone

20 Hot Cybersecurity Products Announced At Black Hat 2018

From securing large print fleets to using AI to assess suspicious emails to derailing attacks targeting nontraditional surfaces, here's a look at 20 hot cybersecurity products unveiled at Black Hat 2018.

Back 1 ... 18   19   20   21   Next

photo

Signal Sciences Power Rules

Power Rules provides a flexible and easy-to-use platform for achieving business logic protection, negating the need for point security offerings around account takeover, fraud, bots and others.

With Power Rules, security and DevOps teams can start by defining signals using the intuitive user interface in the console to gain greater visibility. From there, they can trigger automated actions using those signals, and then augment agent detections with customer-sourced lists of IPs, user agents, and other useful sources.

The tool helps broaden the capabilities for enterprises to see and stop attacks beyond OWASP injection, which has been the focus of legacy Web Application Firewall (WAF) and Runtime Application Self Protection (RASP) tools. Power Rules doesn't require users to learn or manage any complicated rules or scripting language.

 
 
Back 1 ... 18   19   20   21   Next

sponsored resources