Veea Brings Enterprise-Grade Security to SMB/SMEs and IoT with New vTPN Security Edge Service

Veea, Inc. | June 26, 2020

Veea Brings Enterprise-Grade Security to SMB/SMEs and IoT with New vTPN Security Edge Service
Veea Inc., a pioneer in smart edge connectivity and computing, today announced the availability of their Virtual Trusted Private Network (vTPN) Security as a Service (SaaS) solution, secured by Privafy™.  The vTPN solution provides enterprise-grade security in a highly integrated package that uniquely meets the needs of the SMB/SME customer. vTPN integrates Privafy's carrier-grade data-in-motion security software with VeeaHub Smart Edge Nodes (SENs) to offer a full spectrum of protection against cyberattacks, unauthorized access and intrusion, malware, DOS/DDOS attacks, malicious service interruption, ransomware, and botnets.

Spotlight

In today’s highly competitive environment, cost containment has become paramount within enterprise business circles. The search for automation and the related demand on IT resources, can many times be at odds with IT budgets. Corporate leadership realizes that vast IT infrastructures and associated operating costs (utilities, personnel, support, upgrades,etc.) are becoming more difficult to justify. As a result, enterprises seeking to maximize their operating budgets must now find new ways to do more with less.

Related News

Corsa Security Expands its Global Presence by Signing FVC

Corsa | August 20, 2020

Corsa Security, leaders in scaling network security, today announced it has signed FVC as a global distributor. By adding the turnkey Corsa Network Security Virtualization Platform to its offering, FVC can enable customers to scale traffic inspection to meet increasing bandwidth demand, making it possible to examine 100% of their traffic, even when encrypted. FVC is an award-winning value-added distributor of enterprise computing solutions, representing both well-established and emerging technology providers. With over 500 transacting partners and particular strength in the Middle East and Africa, FVC is well-positioned to expand the presence of Corsa Security globally.

Read More

CLOUD

SonicWall Returning Choice to Customers by Securing Any Mix of Cloud, Hybrid and Traditional Networks

SonicWall | October 13, 2021

SonicWall, a global leader in physical, virtual and cloud-focused cybersecurity solutions, is emphasizing the return of customer choice for securing and scaling a mix of cloud, hybrid and traditional environments. "Too many times organizations have been forced to change the way they operate in order to secure access to their networks, data, devices and people. We've been busy innovating cloud and virtual solutions that help organizations secure complex blends of networks, including virtual, hybrid, cloud and on-premises deployments." Bill Conner, SonicWall President and CEO SonicWall's growing virtual, cloud and hybrid offerings leverage the best of the company's Boundless Cybersecurity approach to return deployment choices to the customer while solving real-world use cases faced by SMBs, enterprises, governments and MSSPs. SonicWall's core cloud solution offerings: Solve security and connectivity challenges for cloud-native and hybrid environments. Secure access to cloud and on-premises applications and virtualized workloads through modern zero-trust capabilities. Protect increasingly distributed and remote workforces through powerful virtualized security layers and zero-touch capabilities. Simplify threat detection and response by unifying security events and analytics in a single cloud-based dashboard, allowing easy visualization and management of high-risk alerts. "The modern IT environment is rife with complexity that drives security and connectivity challenges, which can be further complicated when organizations require hybrid environments comprised of physical, virtual and SaaS offerings, and private and public cloud solutions," said IDC Research Director Chris Rodriguez. "Cybersecurity vendors that support these deployment options add tremendous financial and operational flexibility for their customers, and are also well suited for organizations that are in different stages of their cloud journey." SonicWall Solves Today's Complex Security, Connectivity Challenges SonicWall's cloud innovation is driven by the need to solve complex security and connectivity challenges by delivering power, flexibility and choice to customers and partners. SonicWall has collaborated with organizations worldwide to build some of the most secure and robust hybrid networks. "The University of Pisa connects and secures a wide and distributed network of systems, users, applications and services to ensure our institution can provide the highest levels of on-campus and remote learning," said University of Pisa CIO Antonio Cisternino. "It's imperative that we're able to use the same trusted security controls, regardless of how we deploy them. Through their growing range of virtual, cloud and hybrid offerings, SonicWall gives us that choice and flexibility without sacrificing the security standards we require to protect and enable students, faculty and staff." SonicWall ensures organizations are able to set their own deployment paths and cloud migration timelines — not forcing them into a rigid vendor-first approach. By providing cloud-based (e.g., virtual firewall and VPN), as-a-service (e.g., ZTNA, FWaaS) and on-premises (e.g., firewalls, VPN) options, SonicWall empowers customers to deploy what works for their architecture — and adopt cloud transformation at their pace. These real-world hybrid environments are secured using a cohesive mix of virtual, cloud and on-premises offerings, including SonicWall NSv virtual firewalls, Cloud Edge Secure Access zero-trust security, appliance-free SMA virtual private networks (VPN), and Cloud App Security to protect SaaS applications. Organizations are able to further scale and extend distributed environments by simultaneously deploying security across multiple locations — with minimal IT support — using Zero-Touch Deployment capabilities. Implement Zero-Trust Security in as Few '15 Minutes' With the influx of work-from-home access, companies require a simple and secure way of connecting their workforce to resources they need — wherever they're located. SonicWall embraces zero-trust security as a tenet of cybersecurity in a perimeter-less, cloud-first reality. SonicWall helps organizations easily and quickly connect remote users to on-premises resources, cloud-hosted applications, branch offices and public clouds. In as few as 15 minutes, SonicWall Cloud Edge Secure Access — the company's zero-trust network access (ZTNA) offering — quickly scales security beyond the perimeter through modern zero-trust principles. This results in logical trust zones that authenticate every user, device and location for secure access to only the specific services and resources they require. Simplify Threat Detection, Visibility & Response New in SonicWall Capture Security Center 3.0, Unified Insights brings analytics from across SonicWall products, including physical and virtual firewalls, wireless access points, switches and endpoint security products into a single, customizable dashboard. This provides a central, easy-to-use location for monitoring environments and troubleshooting incidents, eliminating the need to multi-task across different consoles. Paired with SonicWall Analytics, Capture Security Center 3.0 can transform large volumes of data (spanning tens of thousands of firewall nodes) into actionable insights and defensive actions against hidden risks across networks, applications and users — all with the visibility, precision, speed and scale of the cloud. Integrate Cloud-delivered Threat Protection Across Hybrid Environments Regardless of deployment strategy, SonicWall ensures organizations can identify and block both known and unknown cyberattacks across traditional networks, public and private cloud infrastructure, and virtual environments by seamlessly integrating SonicWall physical and virtual firewalls when and where it makes sense for your business. The foundation of this ecosystem integrates with SonicWall's cloud-based Advanced Threat Protection (ATP) multi-engine sandbox service to stop advanced cyberattacks, including never-before-seen malware and ransomware. About SonicWall SonicWall delivers Boundless Cybersecurity for the hyper-distributed era in a work reality where everyone is remote, mobile and unsecure. SonicWall safeguards organizations mobilizing for their new business normal with seamless protection that stops the most evasive cyberattacks across boundless exposure points and increasingly remote, mobile and cloud-enabled workforces. By knowing the unknown, providing real-time visibility and enabling breakthrough economics, SonicWall closes the cybersecurity business gap for enterprises, governments and SMBs worldwide.

Read More

VIRTUAL SERVER INFRASTRUCTURE

Binance Smart Chain trials community-governance voting mechanism to provide grants to Top BSC projects

Binance Smart Chain | November 30, 2021

Binance Smart Chain, the leading Defi, NFT and Infra platform, has completed the first community-voting mechanism pilot for its Most Valuable Builder Program that selected top ten projects from a pool of industry-leading BSC projects. The process of selecting the winners was on a decentralized-based voting mechanism where key members of the BSC community participated and voted. With Gelato Network, Radio Caca, Deri Protocol, Thetan Arena, MCDEX, Qubit, Biconomy, Zoo Crypto World, DeBank and Venly.io being chosen as the top winners eligible for $10,000 grants and investment opportunities under the $1B BSC Fund. In total, 245 BSC startups participated, a multitude of which grew by ~5X on average across the different metrics (users, transactions, volume, etc.). MVB BUIDL Rewards (Gas rebate program to builders) distributed over 2,800 BNB in October to more than 100 projects. That equals $1.82 million returned in transaction fees to projects building on BSC. The finale was also one of the first pilots of BSC's public voting mechanism to increase the smart chain's transparency and community governance. The voting started on November 18 at 13:00 UTC and ended on November 25 at 13:00 UTC. We're looking to onboard the next billion users in the crypto ecosystem. This requires participation from multiple stakeholders, including the ever-evolving crypto startups. By providing exposure and investment opportunities to the MVB III winners, we are fueling high potential projects to drive mass adoption." Gwendolyn Regina, Investment Director at BSC Accelerator Fund The members eligible to cast their ballot were part of BSC's voting committee who utilized NFT badges to select potential projects. The committee members were selected based on their contribution to the BSC ecosystem to improve the progressive decentralization goal. Members were distributed into five categories with various voting powers including BSC's core team, VCs/mentors, universities, KOLs/Media and previous MVB winners. That ensured unbiased and objecting voting. The governance mechanism was based on a weighted voting model. A total of 30 voting badges were distributed amongst 30 committee members and received 23 valid votes (effective votes accounted for 76.66%). At the end of the voting process, all voting power was accounted for and projects with the highest votes were announced as the Top MVB III winners. About Binance Smart Chain Binance Smart Chain (BSC) is a sovereign smart contract blockchain delivering Ethereum Virtual Machine (EVM) compatible programmability. Designed for a lightning speed and low transaction fees while adding Smart Contracts functionality for dApps - BSC tops in infrastructure performance as the biggest DeFi blockchain with 100M+ users in its ecosystem.

Read More

Spotlight

In today’s highly competitive environment, cost containment has become paramount within enterprise business circles. The search for automation and the related demand on IT resources, can many times be at odds with IT budgets. Corporate leadership realizes that vast IT infrastructures and associated operating costs (utilities, personnel, support, upgrades,etc.) are becoming more difficult to justify. As a result, enterprises seeking to maximize their operating budgets must now find new ways to do more with less.