Our latest newsletter illustrates just how powerful the Cloud has become in the global business community. It is no longer a question whether a business should utilize the Cloud, those days are over… Now we are calculating how much money an organization will save. Teknas is in the forefront of building new Cloud solutions and
Securolytics offers multiple integrated security services. Recently we extended our portfolio with a new advanced add-on to our Web Security called- Advanced Threat Defense. This service allows us to detect and stop zero-day exploits and Advanced Persistent Threats (APTs) while users are surfing the Internet through our cloud infrastructure.
The Internet Content Adaptation Protocol was first proposed in 1999, however it’s perhaps one of the lesser known protocols on the Internet. ICAP is defined in RFC 3507 whose basic premise is to provide sideband content filtering/modification of HTTP requests. It would normally be used in conjunction with a web proxy/cache. Its most common use would perhaps be to
The Advanced Threat Defense engine in Securolytics Web Security recently detected and blocked downloads of an executable file that we found very interesting. The blocked file was the installer for a program called ReimagePlus. We thought it would be useful to provide some analysis of this program to illustrate how Securolytics Web Filtering is able to
On October 07, 2015 our platform monitoring systems detected a new wave of spam emails with malicious doc files. The decoy, which purported to be an Amazon invoice, was directly attached to an email targeting small businesses. The originator field was firstname.lastname@example.org and each email had an attachment with name like amazon_invoice.doc.