Observer Solutions thanks Energy UK for hosting the Israeli Electric Corporation's (IEC) HO Cyber – Yossi Schneck

Observer Solutions thanks Energy UK for hosting the Israeli Electric Corporation's (IEC) HO Cyber – Yossi Schneck

IEC have built a Cyber ARENA that has become the largest federated model globally. They seek a UK partner or partners from the UK Energy sector and in this short presentation he outlines: Why IEC needed to build an ARENA What options / alternatives they considered How the IEC arena has positively delivered in astonishing ways Why they chose to federate as CYBERGYM We close with some direct questions which came from our panel of Energy UK members. For further information on the IEC ARENA (UK) Project please reach us at +44 (0)203 697 1364

Continue reading

Kenna Security Named a Gartner 2018 Cool Vendor in Security Operations and Vulnerability Management

SAN FRANCISCO, June 04, 2018 (GLOBE NEWSWIRE) -- Kenna Security, a leader in predictive cyber risk, today announced it has been selected as one of Gartner’s 2018 Cool Vendors in the Cool Vendors in Security Operations and Vulnerability Management report.

You can download a complimentary copy of the Cool Vendor report here.

“We consider Kenna Security’s inclusion in the Cool Vendor report by Gartner confirmation of our innovative, risk-based approach to proactively address enterprise security,” said Karim Toubba, CEO of Kenna Security. “Being a cyber security professional in today’s environment is challenging – it’s nearly impossible to remediate every vulnerability and ensure 100 percent coverage of an enterprise’s assets. Our predictive approach combines cutting-edge prioritization models with machine learning to deliver huge improvements in effectiveness and efficiency over common vulnerability remediation strategies.”

Continue reading

Welcome Redlock - Advanced security analytics for multi-cloud

On October 3, 2018, we announced the intent to acquire RedLock®, a public cloud security analytics company, which will extend our public cloud security leadership.

Multi-cloud security analytics

The acquisition of RedLock will add critical security analytics capabilities across multi-cloud environments to our extensive cloud security offering. The security analytics capability utilizes an innovative AI-driven approach that correlates disparate security data sets. RedLock provides comprehensive visibility, threat detection and rapid response across an organization’s entire public cloud environment.

Continue reading

Cymulate Named a Gartner “Cool Vendor” in Application and Data Security

RISHON LEZION, Israel--()--Cymulate, the leading provider of a SaaS-based breach & attack simulation (BAS) platform, was named a "Cool Vendor" in Gartner’s May 2018 “Cool Vendors in Application and Data Security” report.

Operating for less than two years with more than 100 customers worldwide, Cymulate’s unique breach & attack simulation (BAS) platform assesses customers’ security posture from an attacker’s perspective using actual attack methods. By exposing hidden vulnerabilities and offering actionable insights, Cymulate helps to identify and resolve security gaps before it is too late. Cymulate provides the industry’ only cloud-based BAS platform.

Continue reading

  • 1
  • 2

OUR FOUNDATIONS

Observer Solutions was founded by business leaders who saw that the fog of cyber security had become so dense that we built a research and consulting team to cut through to provide absolute clarity on the as is situation with clear plain English recommendations on steps to enhance.
Our mantra has become two-fold: Simplify and Automate.

CONTACT

  • +44 (0) 203 697 1364
  • +44 (0) 7767 766653
  • This email address is being protected from spambots. You need JavaScript enabled to view it.

© 2018 Observer Solutions. All Rights Reserved. Created & Designed by Gekkota     | Privacy Policy | Sitemap |  

Account Management

  • Directory Service
  • Identity Governance and Administration
  • Privileged Account Management
  • User Authentication

Malware Defence

  • Endpoint Detection and Response
  • Endpoint Protection
  • Specialized Threat Analysis and Protection
  • Unified Threat Management

Secure Network

  • IPS
  • NAC
  • Network Behaviour Monitoring
  • Network Firewall
  • Network Security Policy Management
  • Secure Remote Access
  • Threat Intelligence

Secure Configuration

  • MDM
  • Security Configuration Management

Data Security

  • Active Breach Detection
  • Database Activity Monitoring
  • DLP
  • Email Security Gateway
  • File Integrity Monitoring
  • Web Security Gateway

Incident Management

  • Cybersecurity Management
  • Incident Response
  • Security Orchestration and Automation
  • SIEM
  • Ticketing System

Security Assessment

  • Database Vulnerability Assessment
  • Policy and Risk Management
  • Vulnerability Scanner
  • Web Application Vulnerability Scanner

Physical Security

  • Physical Access Control
  • Security Cameras

Secure Applications

  • WAP
  • Web Application Security Scanner

This site uses cookies for a better user experience. By continuing on it you accept our privacy policy terms.

Learn more