Crowdstrike and SecureAuth are both security vendors and have both recently taken the decision to move away from distribution
One of the most highly populated areas in the market is the security world with established and start-up vendors jostling to be the chosen technology that will help keep customers secure.
The volume of players has put some strain on distribution because it was inundated with potential suppliers and given the task of doing sue diligence on numerous firms claiming to be offering the next big thing.
"I heard on the news about how some sites and mobile apps are vulnerable to Man-in-the-Middle attacks. What is a Man-In-The-Middle Attack, how does it work, and how can I protect myself?"
Man-in-the-Middle (MitM) attacks are basically one website stepping in-between you and a legitimate website so that whatever you do on the legitimate website can be seen and stolen by the attacker who owns the site in the middle. There are two common ways this happens:
SecureAuth and Core Security have been monitoring the evolving situation with “Meltdown” (CVE-2017-5754) and “Spectre” (CVE-2017-5753 and CVE-2017-5715) – the recently disclosed processor (CPU) vulnerabilities. Our team has not detected any current impact to customer implementations at this time. We have already initiated our standard processes to test and apply patches in our hosting environments per vendor recommendations.
Each year, organizations spend millions of dollars on network and endpoint security, yet breaches continue to happen. Across today’s security vendor landscape, there are hundreds of point products that protect against all points of penetration in the attack lifecycle.
While there is no silver bullet when it comes to infrastructure security, aren’t we stronger together? Shouldn’t security products work together to provide the best protection?