Remove 2011 Remove Big Data Remove Malware Remove Operating Systems
article thumbnail

Invincea Announces 54 New Enterprise Customers for Its Flagship Enterprise Solution, $8.1M in Advanced Research Contracts for Its Labs Division

CTOvision

in new contracts for advanced cybersecurity projects for defense and federal government agencies in the areas of cloud-based advanced malware analysis, spear-phishing attacks against Android, and big data analytics for compromise detection. Invincea’s momentum in this area continues from its previous announcement of a $21.4M

CTO Hire 255
article thumbnail

Security News: @Invincea Raises $16 Million in C-Series Funding Led by Aeris Capital and Dell Ventures

CTOvision

“In June of 2013, we began shipping a solution powered by Invincea — Dell Data Protection | Protected Workspace — to provide our customers with advanced malware protection out of the box. Invincea is the premier innovator in advanced malware threat detection, breach prevention, and forensic threat intelligence.

Dell 249
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Going Mobile - A Screw's Loose

A Screw's Loose

The more ‘enlightened’ of us have started to talk about managing apps instead of devices, and managing data instead of operating systems. We see this as a way to protect our intellectual property and keep our corporate data secure. ©2011-2012 A Screws Loose. Uncategorized. Windows Phone. Tags Applications.

Mobile 73
article thumbnail

Barn Doors - A Screw's Loose

A Screw's Loose

Also, the windows operating system. ©2011-2012 A Screws Loose. Furthermore, IT departments have been locking down and. controlling Windows for two decades. The new mobile platforms are newer and. don’t have the same comprehensive toolset. itself has been “enterprised” over the last decade and a half, while mobile. Uncategorized.

Mobile 60
article thumbnail

Sunburn - A Screw's Loose

A Screw's Loose

The attackers are after enterprise data and infrastructure, the endpoint is not even collateral damage, it’s simply an attack vector – once compromised, it’s actually in the attacker’s best interest to keep the user painlessly unaware of the infection. ©2011-2012 A Screws Loose. No, this is a bottom up problem.

Mobile 59