Fortscale Insider Blog

15 Aug Fortscale for Secure Web Gateways

What is a Secure Web Gateway? A secure Web gateway is a type of security solution that prevents unsecured traffic from entering an internal network of an organization. It is used by enterprises to protect their employees/users from accessing and being infected by malicious Web traffic, websites and virus/malware.[1] We are proud to announce the addition of Secure Web Gateways to the...

Read More

15 Aug Fortscale for TACACS & RADIUS

What is TACACS? TACACS (Terminal Access Controller Access Control System) is an older authentication protocol common to UNIX networks that allows a remote access server to forward a user's logon password to an authentication server to determine whether access can be allowed to a given system.[1] What is Radius? Remote Authentication Dial-In User Service (RADIUS) is a client/server protocol and software that enables...

Read More

15 Aug Fortscale 2.7 Released!

With so much happening at Fortscale, it seems like every single day marks some special event. But today, with the release of Fortscale 2.7, we are celebrating a particularly momentous day. As I reflect on the last few years and how we got to this point with the product, I find the evolution that’s taken place in the security analytics space...

Read More
SWIFT bank heist money

10 Aug Cost of a Data Breach Hits $4 Million Dollars

New study shows the cost of a data breach to be $4 million dollars on average, increasing 29 percent during the last 2 years. IBM Security’s recent report on the cost of a data breach shows that costs continue to rise. Getting hacked has always been expensive, but this report shows the average price is now around $4 million dollars for...

Read More

03 Aug What’s Going on at Black Hat? Or Are You Incommunicado?

In Dark Reading, I enjoyed Lysa Myers’ entertaining and useful tips for surviving Black Hat. Next year, I’ll need to be certain to take these tech precautions, in particular she wrote: Update your security Take some time before you leave to beef up your security. Update your software, especially the operating system, browser, and plugins. Block all incoming ports and require outgoing apps...

Read More

02 Aug Learning From the Healthcare Industry

I just read a report that 81% of the hospitals and health care insurance companies in the United States experienced a significant data breach during the last two years. That’s a staggering statistic. For the uninformed, here’s a quick recap. It’s estimated that one in 10 U.S. residents were affected by a recent medical data breach. Here’s a list of just...

Read More

26 Jul Detecting Anomalies in a SMART Way – Part 1

Detecting anomalous user behavior is hard. Really hard. Here at Fortscale we show that with the right tools, it’s doable. Our data science team has developed a set of self tuning machine learning based algorithms that aim at doing exactly that. Although the algorithms may be complicated to comprehend, their basic mechanism is easy to understand. The fortscale product contains many...

Read More

21 Jun 201 Days to Identify Data Breach

New study finds that on average it takes 201 days to detect a data breach and 70 additional days to contain it. But advanced technologies can significantly reduce these times. During recent years, numerous reports have shown that in general, it takes an enterprise a number of months to detect that they’ve had a data breach. That’s if they detect it...

Read More
Top 3 cyber security services that even an ostrich would want

15 Jun Top 3 Considerations for Cyber Security Services

There are many organizations out there that provide onsite cyber security assessments as well as remote penetration testing services. Before you select your future cyber security services provider, here are a few things you may want to consider. Cyber Security Services Provider: Top 3 Considerations #1 – Clearly understand what the you want from the cyber security assessment When an organization solicits input...

Read More
User Behavior Analytics real keys

14 Jun The Real Key To User Behavior Analytics

User Behavior Analytics (UBA) uses and benefits from a number of different technologies. But knowing which technologies and data need to be analyzed for any given situation and context, and applying the correct weight for the many variables is the real key. User Behavior Analytics Of necessity UBA utilizes a large number of highly sophisticated technologies, including managing and interoperating with numerous...

Read More