Menu

IoT FEATURE NEWS

Resecurity to Introduce Endpoint Protection and Cyber Threat Intelligence in Beijing

By

According to a recent announcement, security company Resecurity has launched its Endpoint Protection Platform (EPP) and CONTEXT, a Cyber Threat Intelligence solution, into the China and Asia-Pacific markets at the Internet Security Conference (ISC) 2018 in Beijing.

ISC is the main cybersecurity event in China and recognized as an influential security gathering in the Asia-Pacific region. China is the second largest economy in the world and is rapidly learning that digitalization, the fourth industrial revolution, is a double-edged sword as a result of the growing security challenge faced by private and government organizations. ISC 2018 will share global industry knowledge on how organizations worldwide can best respond to the constantly evolving threat landscape and to today's increasingly sophisticated threat actors.

Resecurity at ISC will illustrate the vital role of actionable intelligence and data science in next-generation cybersecurity solutions and applicability by cyber security engineers, intelligence officers, investigators and C-level security executives.

Resecurity will introduce the core products from its own portfolio:

  • Resecurity Context Cyber Threat Intelligence Platform: Intelligence platform designed to enable enterprises and governments to accelerate analysis, prevention and investigation workflows with the goal of discovering high-value insights, and supporting better decision-making, using ultra-fast search thorough data science.
  • Resecurity EPP Next-Generation Endpoint Protection Platform: Resecurity combines a multi-layered protection stack to identify security anomalies with investigation and remediation capabilities needed to proactively respond to advanced cyber threats.
  • Resecurity Risk Digital Risk Monitoring: Risk is a digital risk monitoring solution focused on comprehensive security monitoring of the business enterprise ecosystem, measuring digital risks to control the enterprise security posture.

Ken Briodagh is a writer and editor with more than a decade of experience under his belt. He is in love with technology and if he had his druthers would beta test everything from shoe phones to flying cars.

Edited by Ken Briodagh
Get stories like this delivered straight to your inbox. [Free eNews Subscription]

Editorial Director

SHARE THIS ARTICLE
Related Articles

Rising Edge Computing Investments to Reach $350B by 2027, According to IDC

By: Alex Passett    3/27/2024

Worldwide spending on edge computing is expected to surge (and then keep going) for the foreseeable future, according to the International Data Corpor…

Read More

ZEDEDA Adds Lisa Edwards as New Board Member, Seeks Opportunities to Strengthen Operations and Scale

By: Alex Passett    3/26/2024

Earlier this morning, ZEDEDA announced the addition of Lisa Edwards to its board of directors.

Read More

An Existing IoT Collab, Emboldened: Digi International and Telit Cinterion Transform Solutions with 5G RedCap Integration

By: Alex Passett    3/25/2024

The ongoing industry collaboration between Digi International and Telit Cinterion signals strong support for the mainstream showcasing of 5G for IoT a…

Read More

Telit Cinterion's 5G LGA Modules, Powered by Snapdragon from Qualcomm, to Create a Big Leap in IoT Connectivity

By: Alex Passett    3/25/2024

Telit Cinterion recently unveiled its FE990B34/40 LGA family of modules, powered by the Snapdragon X72 5G Modem-RF System from Qualcomm Technologies, …

Read More

Embracing Innovation in Mining: The Role of Network-Aware Applications in the Digital Transformation

By: Special Guest    3/21/2024

Shabodi leverages private 5G network capabilities and enables the development of network-aware applications to enhance operational efficiency, automat…

Read More