X


    X


      VIEW OUR TECHNOLOGY PARTNERS

      INDUSTRY INSIGHTS

      INDUSTRY INSIGHTS

      Ava Reveal’s brand-new investigation, inspection, and blocking functionalities

      This new search tool extends Reveal’s data protection into a new dimension – forensics – beyond user education and proactive prevention. Investigate displays global search results signaling relevant information from numerous event streams generated by user activity, entity data, and Reveal’s sensors and alerts. It also highlights the most pertinent event streams for your search, directing you to threats so you know where to focus your attention.

      From a new Investigate page, you can view events from across your organization, access a guided search to uncover threats, and search within and across event streams and related events using common properties. Tooltips and other helpful hints are provided to ease query building.

      Browser Download Blocking



      See and stop dangerous and unauthorized browser downloads.

      By blocking users from downloading malicious executables and scripts, files containing sensitive or prohibited content, files from unauthorized URLs, and more, the latest Reveal update is even more effective in preventing threats or reputational damage and protecting data assets.

      Reveal comes with out-of-the-box definitions for sensitive information types. You can use these in-built definitions to create your own custom identifiers for sensitive information or use classification labels provided by Microsoft Information Protection to inspect files in real-time and alert on sensitive content found.

      Reveal's new block download feature provides the ability to further protect this information by blocking sensitive documents’ download to prevent data exfiltration. Blocking can be done based on sensitive information found or based on the download location.

      The inclusion of additional sensitive content patterns and matching rules in policy pack 3.0.7 helps users expand data protection for more sensitive data types to adhere to various compliance regulations or organizational policies.

      New security policies and compressed files inspection



      Reveal Configurable Policy Templates V3.0.8 are now available.

      Track movement of ZIP files, protect against cryptocurrency scams and detect tampering of the Reveal Browser Extension with our latest templates and content inspection patterns. This release also includes tighter controls over prohibited web requests, sensitive file downloads, and unauthorized logins.

      For full details, refer to the Reveal Configurable Policy Templates Reference Guide.

      Malicious users may attempt to exfiltrate large amounts of data inside ZIP files. They may even try to conceal sensitive data inside compressed archives. Reveal’s latest policy updates allow tracking movement of ZIP files across USB, email, or web for increased visibility.


      ------------------------------

      About Ava: Ava's vision as a unified security provider is to help organizations monitor, understand, and act on threats in real-time across both cyber and physical domains. The company offers best-in-class insider threat detection cybersecurity solutions and intelligent, end-to-end video security solutions to protect people, assets, and data. Security professionals leverage embedded machine learning to help recognize and investigate patterns, accurately see the whole threat picture, and respond quickly.

      Check out Ava Security's website here

      This content was originally published on TechCentral, 25 June 2021. It has been republished here by the permission of the parties concerned.

      Latest News

      Cybersecurity risk underestimated by operational technology organizations

      Read More

      Saviynt 2021 Enterprise Identity Cloud Release with Microsoft Integrations

      Read More

      Skybox Case Study : Improving the SOC Through Visibility and Automation

      Read More

      Skybox Security delivers new prescriptive vulnerability remediation solution

      Read More

      Ava Reveal’s brand-new investigation, inspection, and blocking functionalities

      Read More

      Gartner report: Top Security and Risk Management Trends for 2021

      Read More

      Facts about POPIA

      Read More

      South Africa’s Fireside Chat Roundtable with IronNet Security

      Read More

      How to mature your cybersecurity program with Skybox Security

      Read More

      A human-centric approach to protect against cyber security threats

      Read More

      Breach and Attack Simulation vs Pen Testing

      How easy is it for a malicious actor to get into your network? Cyber attacks are growing steadily in number, strength, and variety. In parallel, even the most sophisticated adversaries are using surprisingly unsophisticated means to wreak damage. Top-notch hackers can mimic legitimate user actions and go under the radar of protective measures. They can move laterally from hole to hole and reach what matters most to you – your crown jewels.

      Read More

      Remote workforce security solution ensuring business continuity

      As businesses send their employees to work from home, it’s imperative for security professionals to provide guidance so remote workers can do their part to help you keep your organization secure and protected from breaches. With Ava Reveal, organizations get visibility of their data and endpoints outside of the office.

      Read More

      BECOME A PARTNER

      TECHNOLOGY RESELLERS AND SYSTEMS INTEGRATORS

      AltronBCXBlue TurtleClyroforDatacentrix
      DIMENSION DATA SECURITYDRSINFORMATION SECURITY ARCHITECTSPERFORMANTAREDBRIDGE