Network Security

Tuesday, May 17th, 2016

Network Security: Three Keys to Effective Network Segmentation in a World of Targeted Cyber-Attacks

Network segmentation is providing a critical network security defense against increasingly sophisticated cyber-threats Years ago, many IT departments weren’t focusing network security efforts on the “inside” of the network.  Rather than layering security solutions or leveraging security automation, the firewall was the singular line of defense against cyber-threats. Read More »

Topic: , , , , , , ,

Future of Cyber Security at Ignite 2016

Thursday, April 21st, 2016

The Future of Cyber Security & Preventing Attacks: Ignite Insights

We returned back energized from Palo Alto Networks’ Ignite 2016 annual user and partner conference with a better understanding of how the next generation cyber security solutions are keeping up with the “new generation” of adversaries that exploit secular trends such as mobility, social media adoption and expansion, and Internet of Things (IoT) to breach an organization’s network. Read More »

Topic: , , , , , ,

Western Michigan University

Tuesday, April 5th, 2016

WMU: Threat Containment in Seconds

Complete Picture of Network Threats from a Single Pane of Glass Western Michigan University (WMU) is one of the country’s leading research universities — and also a tempting target for cyber criminals. WMU needed to prevent inevitable cyber attacks within a university network used by thousands of students, contain a threat detected by the firewall before it can spread, and quickly access multiple systems to assemble the information needed to contain a threat. Read More »

Topic: , , , , , , , ,

Ignite 2016

Wednesday, March 30th, 2016

Security Automation and Driverless Cars?

JR Reagan, global chief information security officer, Deloitte, recently posted an article suggesting that human error is a major impediment to the effectiveness of cyber security programs today. If driverless cars could prevent accidents, could security automation and orchestration minimize the damage resulting from cyber attacks? Read More »

Topic: , ,

Securing the Internet of Things

Monday, November 9th, 2015

Securing the Internet of Things

Forrester Research predicts by the year 2020 there will be 70 devices for every person on earth.1 That’s a difficult number to fathom! As the Internet of Things (IoT) grows, it will pose a challenge for CISOs unlike any other. Read More »

Topic: , , ,

Wednesday, May 13th, 2015

FishNet Security and Shifra Awarded Partner of the Year

Global Distribution Helps Drive Record Revenues for Bradford Networks Boston, Mass. – March 12, 2015 — Bradford Networks, the leading provider of continuous incident response solutions, today announced that Fishnet Security is the 2015 North American Partner of the Year, and Shifra is the International Partner of the Year. Read More »


Friday, May 8th, 2015

Union College Selects Bradford Networks’ Rapid Threat Response Solution to Contain Cyber Threats in Real Time

Organization Graduates from Incident Response to Continuous Response Minimizing the Impact of Advanced Cyber Threats Boston, MA, Jan 12, 2015 — Bradford Networks™, the leading provider of rapid threat response solutions, today announced that Union College, one of the oldest and highest-ranked institutions of higher learning in the United States, has selected Network Sentry/RTR to enable a rapid threat response to cyber threats. Read More »

FireEye on 60 Minutes

Tuesday, December 9th, 2014

FireEye on 60 Minutes — and Why They Partner with Bradford Networks

If you watch 60 Minutes, you may have seen “What Happens When You Swipe Your Card” that aired on November 26. The piece examined recent security breaches where cybercriminals stole tens of millions of customer credit card numbers from major retailers including Target, Home Depot and Michaels Stores. Read More »

Topic: , , , , ,


Tuesday, June 10th, 2014

New Whitepaper from ESG Highlights Need to Shift from Prevention to Detection and Remediation to Improve Cyber Security

According to ESG, after years of settling for “good enough” IT security, enterprise organizations are now finally realizing that this is no longer an adequate approach. This change of heart is directly linked to the recent wave of sophisticated malware, targeted attacks, advanced persistent threats (APTs), and visible security breaches occurring over the last few years. Read More »

Topic: , , ,