Security Concept for Software Supply Chain (Part 1) — Transparency of Software Supply Chain Compositions
December 2, 2022
Software supply chain security covers the whole software life cycle. In terms of software product complexity alone, apart from the software itself, it is necessary to ensure the security of the dependencies and transitive dependencies of software, as well as the security of the software ecosystem composed of these dependency chains. Especially regarding the issue […]
New Feature – Protection Group-Specific ACL Rules in ADS R90F04
December 2, 2022
Function Description This function will be released on ADS Version 4.5R90F04 in Q1 2023. As global ACL rules may not be suitable for some scenarios, ADS R90F04 supports custom access control rules for a protection group for more refined control. The underlying implementation of ACL rules in ADS R90F04 is refactored, significantly improving the performance. […]
NSFOCUS WAF IP Reputation Introduction
November 24, 2022
NSFOCUS WAF obtains IP Reputation Data Feed from NSFOCUS Threat Intelligence (NTI). NSFOCUS WAF IP Reputation can get the list of IP addresses that have earned a negative reputation through involvement in suspicious activity, including phishing attacks, spam, botnets, DDoS attacks, APT attacks, and more. NSFOCUS WAF will filter high-risk IP addresses from IP Reputation […]
The Increasingly Complex and Varied Vectors to Attack Software Supply Chain
November 23, 2022
Unlike vulnerability exploitation in products, attack vectors and implementation channels targeting the supply chain in the real environment are more diverse. Due to the advantages of low development cost, the widespread use of open-source components in projects has become the mainstream development method. The conflict between a rule-relaxed open community and limited maintenance resources provides […]
API Protection: The New Focus in the Web Application Firewall Market
November 21, 2022
Application programming interfaces (APIs) have become a role that can’t be ignored in digital transformation, whether in application modernization or agile business strategies. At the application development stage, APIs are standard service interfaces. When it comes to interfacing with third-party services, APIs are a common choice. In the microservice architecture, APIs are an integral part […]
NSFOCUS Named a Representative Vendor by Gartner® in the Report of Tool: Vendor Identification for Data Loss Prevention 2022
November 18, 2022
NSFOCUS has been recognized as one of the Representative Vendors in the Report of Tool: Vendor Identification for Data Loss Prevention 2022 1. The COVID-19 pandemic has accelerated the process of digital transformation. With the vigorous development of digital economy and information industry, the rapid implementation and application of 5G, zero trust, AI, and blockchain […]
NSFOCUS Recognized by Gartner in Hype Cycle for Security in China, 2022
November 17, 2022
Gartner® recently published the report of Hype Cycle™ for Security in China, 2022. NSFOCUS has been named a Sample Vendor for situational awareness and 7 other technologies, which NSFOCUS believes validates its innovation and latest practice in security management and situational awareness. According to the report, “situational awareness (SA) technologies in China “are modern, centralized […]
Detection of Constituent Proportions of Outbound Traffic for DDoS Attacks
November 15, 2022
Function Description This function will be released on NTA Version 4.5R90F04 in Q1 2023. In the earlier versions, the NTA identifies outbound DDoS attacks by traffic thresholds set for region IP addresses. Some customers with small-traffic businesses hope the NTA can detect constituent proportions of outbound traffic for DDoS attacks. If the outbound traffic of […]
NSFOCUS Gains CREST Accreditation for Penetration Test Service
November 10, 2022
Santa Clara, Calif. November 10, 2022 – NSFOCUS, a global provider of intelligent hybrid security solutions, today announced it has received CREST’s internationally recognized accreditation for its Penetration Test services, an addition to its existing accreditation for the vulnerability assessment service. CREST uses a rigorous quality assurance process to ensure its member companies are accredited and quality […]