Categories: CloudSecurityCybersecurityFirewallMSPNetworkSecurity
Smart Security. Simply Done.
Likes
35.07K
Website visits
855K /mo.
Mentions
211
Location: United States
Employees: 501-1000
Phone: +1 206-613-6600
Founded date: 1996
Investors 10
Mentions in press and media 211
| Date | Title | Description |
| 25.02.2026 | WatchGuard marks 30 years backing MSP-led security | - |
| 26.01.2026 | SonicWall firewalls strengthen security for IoT era | - |
| 16.01.2026 | WatchGuard launches Open MDR to unify MSP security | - |
| 22.12.2025 | Security Week 2552: что происходит после фишинговой атаки | Свежая публикация экспертов «Лаборатории Касперского» посвящена последствиям успешной фишинговой атаки. В статье подробно раскрывается техническая сторона передачи украденных данных пользователя, а также в общих чертах описывается дальнейши... |
| 21.12.2025 | Релиз OpenWrt 24.10.5 | 19 декабря 2025 года разработчики проекта OpenWrt для сетевых устройств, включая маршрутизаторы, коммутаторы и точки доступа, представили релиз дистрибутива OpenWrt 24.10.5. Выпуск OpenWrt 24.10 состоялся в февраля 2025 года. Стабильный рел... |
| 25.11.2025 | eMazzanti Technologies Achieves Four Microsoft Solutions Partner Designations in AI Cloud Partner Program | , a leading provider of IT services and Cybersecurity solutions, announced that it has attained four Solutions Partner designations in the Microsoft AI Cloud Partner Program. This positions the company — a Microsoft expert and a key Watchgu... |
| 21.10.2025 | Zero-Day Malware Attacks Hit Record High | Cyber-criminals are embracing stealthier tactics to disguise their behaviour and bypass traditional, signature-based detection, with new data showing a spike in evasive malware over the last year. Cyber firm WatchGuard’s latest Internet Sec... |
| 20.10.2025 | WatchGuard VPN Flaw Gives Hackers Full Firewall Control | Image: Unsplash Security researchers just pulled the fire alarm on WatchGuard’s firewall stack. A critical bug in Fireware lets remote attackers execute code without logging in, turning a trusted security appliance into an open door. The fl... |
| 26.09.2025 | WatchGuard launches FireCloud Total Access for Zero Trust SASE | - |
| 11.09.2025 | Girona FC chooses WatchGuard to boost cyber security strategy | - |
| 05.08.2025 | Next-Gen Firebox Tabletop Series from WatchGuard Brings Flexible, Powerful, and Future-Ready Firewalls to MSPs | WatchGuard’s new T Series Fireboxes provide intelligent firewall security, AI-powered threat detection, and eco-conscious hardware, giving managed service providers (MSPs) stronger threat protection with less complexity and waste. WatchGuar... |
| 04.08.2025 | CSN Tech Centre (Tech Centre) Launches Groundbreaking AI-Powered MCP Servers to Revolutionize MSP Operations | Smart Queries. Smart Decisions. Smarter Operations. Tech Centre (http://www.mytechcentre.ca) proudly announces the launch of its new generation of locally engineered MCP (Model Context Protocol) servers—sophisticated AI-driven systems desig... |
| 25.07.2025 | Microsoft SharePoint Hackers Switch Gears to Spread Ransomware | Image: nicescene/Adobe Stock Recent attacks targeting Microsoft SharePoint have escalated, with threat actors now deploying ransomware on vulnerable systems, according to Microsoft. This surge in malicious activity follows the release of mu... |
| 04.06.2025 | Overcoming legacy technology and embracing digital transformation [Q&A] | Legacy technology is quickly becoming the silent killer of business growth. With many IT leaders still relying on outdated systems, companies using legacy tech face mounting security risks, inefficiency, and spiralling costs. We spoke to Al... |
| 11.04.2025 | Ransomware and Malware: The Rising Tide of Cyber Threats in 2025 | The digital landscape is a battlefield. In 2025, the stakes have never been higher. Ransomware attacks are surging. Malware is evolving. The first quarter of 2025 has set alarming records. A report from BlackFog reveals a staggering 45 perc... |
| 10.04.2025 | Report: AI-powered Malware Detection Sees 315% Increase | Cybersecurity firm WatchGuard® Technologies has released the findings of its latest Internet Security Report, a quarterly analysis detailing the top malware, network, and endpoint security threats observed by the WatchGuard Threat Lab resea... |
| 10.04.2025 | Network-based malware detections increase 94 percent | A new report from WatchGuard Technologies shows a 94 percent increase in network-based malware detections in the last quarter of 2024. There’s also been an increase in overall malware detections including a six percent increase in Gateway A... |
| 05.03.2025 | The Future of Education and AI: A Tale of Two Innovations | In the heart of Jaipur, a revolution is brewing. JECRC, a beacon of academic excellence, has shattered placement records, setting a new standard in North India. Meanwhile, across the globe, Chinese firms are pivoting towards responsible art... |
| 05.03.2025 | JECRC Sets New Placement Record | Jaipur, Rajasthan, India Marking 25 years of academic excellence, JECRC has once again surpassed its own benchmarks in placements, reaffirming its dominance in North India’s recruitment landscape. With a thriving student community of 22,000... |
| 20.02.2025 | Hackers Shift Tactics as Endpoint Malware Jumps 300% | Security researchers have detected a 300% increase in endpoint malware as threat actors continue to target legitimate web services and documents, all while using increasingly sophisticated tactics to execute their attacks. Cybersecurity fir... |
| 04.02.2025 | Sophos Acquires Secureworks for $859 Million | Sophos has completed its $859 million acquisition of managed cyber security services provider Secureworks in an all-cash transaction. It now claims to be the “leading pure-play” provider of Managed Detection and Response Services, supportin... |
| 09.01.2025 | Правильная фортификация или как определить роль NGFW в сети | Доброго времени суток, на повестке дня стоит задача выбрать систему межсетевого экранирования для защиты корпоративной сети. Задача является нетривиальной, так как на рынке присутствует большое количество вендоров, рекламирующих свой продук... |
| 08.01.2025 | WatchGuard Acquires ActZero | WatchGuard Technologies, a Seattle, WA-based company which specializes in unified cybersecurity, acquired ActZero, a San Francisco, CA-based provider of MDR services with proactive, rapid and automated threat response and cross-platform AI-... |
| 23.12.2024 | Эволюция NGFW в России на примере UserGate. Интервью с менеджером по развитию UserGate NGFW Кириллом Прямовым | На Хабре уже было интервью про Next Generation Firewall (NGFW) от компании Solar, которое затрагивало технические аспекты разработки таких решений. Также выходил материал про NGFW от Positive Technologies, про стык разработки open source ре... |
| 17.12.2024 | AI's impact on cybersecurity: challenges & strategies | The cybersecurity landscape is set to undergo significant changes in 2025, as experts predict the impact of artificial intelligence (AI) will bring both opportunities and challenges. Industry leaders have shared insights into the evolving r... |
| 29.11.2024 | Africa's Cybersecurity Crisis: A Call to Arms | Africa stands at a crossroads. The continent is rapidly digitalizing, yet it finds itself under siege from cybercriminals. The latest report from Check Point Software Technologies reveals a stark reality: African organizations face cyberatt... |
| 29.11.2024 | The Double-Edged Sword of AI in Cybersecurity | Artificial Intelligence (AI) is a double-edged sword. It can be a powerful ally in cybersecurity, but it also poses significant threats. As we approach 2025, the landscape of cybersecurity is shifting. Experts warn that while AI can enhance... |
| 28.11.2024 | AI's dual role in future cybersecurity: threat & ally | As the world moves towards 2025, experts from various sectors have put forward projections concerning the role of artificial intelligence (AI) in cybersecurity and beyond. These insights, shared by professionals across industries, herald si... |
| 28.11.2024 | Balancing AI advances with cybersecurity risks & caution | As artificial intelligence (AI) continues to make strides, industry leaders express both optimism and caution regarding its integration into the cybersecurity landscape. The potential benefits are significant, yet the risks are equally prof... |
| 28.11.2024 | AI in enterprise shifts focus to practical applications | As 2025 approaches, the landscape of AI in the enterprise is undergoing significant shifts, with a focus on practical applications rather than the grand disruptions once anticipated. Norman Rice, Chief Commercial Officer at Extreme Networks... |
| 10.11.2024 | WatchGuard and Horizons: Titans of Tech Shine Bright in 2024 | In the ever-evolving landscape of technology, two companies have emerged as beacons of excellence in their respective fields: WatchGuard Technologies and Horizons. Both have recently garnered significant accolades, solidifying their positio... |
| 08.11.2024 | WatchGuard wins TrustRadius awards for cybersecurity | WatchGuard Technologies has been awarded the TrustRadius Buyer's Choice and Top Rated Awards across multiple cybersecurity product categories. The accolades from TrustRadius add to the ongoing recognition of WatchGuard's cybersecurity platf... |
| 18.10.2024 | eMazzanti Technologies Presents 23 Years of Learning Conference | No-cost Event for Business Leaders With the focus on AI, Cybersecurity and the impact on SMB's, experienced professionals will deliver a total of 24 action-packed sessions and panel discussions across four tracks. HOBOKEN, N.J., Oct. 18, 20... |
| 11.10.2024 | Cybersecurity Champions: Bay Area Leaders Shine at ORBIE Awards | In the heart of Silicon Valley, where innovation meets vulnerability, the BayAreaCISO ORBIE Awards celebrated the unsung heroes of cybersecurity. On October 10, 2024, the San Jose Marriott buzzed with energy as executives from top tech firm... |
| 08.10.2024 | Cybersecurity month highlights AI & proactive measures | Cybersecurity Awareness Month is shining a spotlight on the importance of cybersecurity in both personal and business environments, with experts sharing their insights on various aspects of the topic. Zak Menegazzi, Cybersecurity Specialist... |
| 06.09.2024 | 6 eDiscovery Best Practices for Effective Data Governance to Implement Now | eDiscovery Best Practices for Effective Data Governance NYC area eDiscovery and data governance expert shares essential eDiscovery best practices for effective data governance to streamline data processes while protecting sensitive data—in ... |
| 29.08.2024 | Complying with CPRA: A Brief Overview for Business Leaders | Complying with CPRA Data privacy expert delivers a guide to complying with CPRA to help organizations understand CPRA requirements and build business strategy accordingly—in a new article from Messaging Architects HOBOKEN, N.J. , Aug. 29, 2... |
| 28.08.2024 | Use of AI in Battling Dark Web Activities Critical for Business Safety | Use of AI in Battling Dark Web Activities NYC area cyber security expert shares how the use of AI in battling dark web activities helps companies gain an edge in the fight against digital foes—in a new article from eMazzanti Technologies HO... |
| 23.08.2024 | Fortifying Digital Fortresses: The Essential Steps to Combat Ransomware and HIPAA Breaches | In today's digital landscape, data is the new gold. Organizations, both large and small, are under constant threat from cybercriminals. Ransomware attacks and HIPAA breaches are two of the most pressing concerns. Understanding how to defend... |
| 21.08.2024 | 7 Vital Steps to Defend Backups from Ransomware Vulnerabilities | Defend Backups from Ransomware NYC area cyber security expert shares best practices to help organizations defend backups from ransomware vulnerabilities—in a new article from eMazzanti Technologies HOBOKEN, N.J., Aug. 21, 2024 /PRNewswire-P... |
| 16.08.2024 | Navigating the Data Privacy Labyrinth: A Business Imperative | In today's digital landscape, data is the new oil. It fuels businesses, drives decisions, and shapes strategies. But with great power comes great responsibility. Data privacy is not just a legal requirement; it’s a cornerstone of trust. Com... |
| 15.08.2024 | Role of Data Privacy in Data Analysis Critical to Proactive Business Strategy | Role of Data Privacy in Data Analysis Data privacy expert explores the role of data privacy in data analysis, including both challenges and best practices—in a new article from Messaging Architects HOBOKEN, N.J., Aug. 15, 2024 /PRNewswire-P... |
| 14.08.2024 | Top 3 Microsoft Edge Copilot Exclusive Capabilities to Drive Creativity and Productivity | Copilot Exclusive Capabilities NYC area Microsoft expert highlights several Microsoft Edge Copilot exclusive capabilities that make Copilot stand out in the AI assistant space—in a new article from eMazzanti Technologies HOBOKEN, N.J., Aug.... |
| 08.08.2024 | Cybersecurity experts praise new Australian Government mandate | The Federal Government’s recent mandate, PSPF Direction 002-2024, aims to significantly bolster cybersecurity measures within Australian Government entities by requiring them to identify and actively manage risks tied to vulnerable technolo... |
| 07.08.2024 | Navigating the Cloud: A Municipal Guide to Success | In the digital age, municipalities are at a crossroads. The cloud looms large, promising efficiency and innovation. Yet, it also casts shadows of uncertainty. As cities grapple with aging infrastructure and tight budgets, the allure of clou... |
| 06.08.2024 | Navigating the Digital Frontier: Building an IT Framework with a Remote CIO | In today’s fast-paced digital landscape, organizations are rethinking their IT strategies. The rise of remote work has transformed the way businesses operate. Enter the remote Chief Information Officer (CIO). This role offers flexibility bu... |
| 02.08.2024 | Data Governance in the Healthcare Sector Critical to Improve Health Outcomes and Compliance | Data Governance in the Healthcare Sector NYC area data governance expert offers essential guidance for organizations seeking to improve data governance in the healthcare sector—in a new article from eMazzanti Technologies HOBOKEN, N.J., Aug... |
| 01.08.2024 | Understanding Access Control: The Keystone of Data Security | Understanding Access Control Understanding access control proves critical for improving data security, according to NYC area data expert—in a new article from Messaging Architects HOBOKEN, N.J., Aug. 1, 2024 /PRNewswire-PRWeb/ -- Messaging ... |
| 31.07.2024 | Key Considerations for Building an IT Framework with a Remote CIO | Building an IT Framework with a Remote CIO NYC area information technology expert offers timely tips for organizations building an IT framework with a remote CIO—in a new article from eMazzanti Technologies HOBOKEN, N.J., July 31, 2024 /PRN... |
| 23.07.2024 | eMazzanti Technologies' Clients Avoid Global Catastrophic CrowdStrike "Blue Screen of Death" Disruptions | Jennifer Mazzanti, CEO, eMazzanti Technologies NYC Area cyber security services firm's clients avoid costly downtime from the global IT outage, continue secure uninterrupted operations HOBOKEN, N.J., July 23, 2024 /PRNewswire-PRWeb/ -- An a... |
| 17.07.2024 | 5 Big Benefits Microsoft Teams Offers that Slack Does Not | Benefits Microsoft Teams Offers that Slack Does Not NYC area Microsoft expert highlights several important benefits Microsoft Teams offers that Slack does not for driving productivity—in a new article from eMazzanti Technologies HOBOKEN, N.... |
| 10.07.2024 | Innovations in Microsoft 365 Support the Modern Workplace and Drive Productivity | Microsoft 365 Supports the Modern Workplace NYC area Microsoft expert shares how four powerful features in Microsoft 365 support the modern workplace with seamless and secure collaboration—in a new article from eMazzanti Technologies HOBOKE... |
| 05.07.2024 | Understand the Stages of a Data Governance Lifecycle to Upgrade Business Data Value | Stages of a Data Governance Lifecycle NYC area information governance expert outlines the stages of a data governance lifecycle to help organizations unlock the power of their business data—in a new article from eMazzanti Technologies HOBOK... |
| 03.07.2024 | Unleash Your Creativity with Microsoft's Copilot Image Creator | Microsoft’s Copilot Image Creator NYC area Microsoft expert delivers a helpful guide empowering users to jumpstart their creativity with Microsoft's Copilot Image Creator—in a new article from eMazzanti Technologies HOBOKEN, N.J., July 3, 2... |
| 27.06.2024 | Australian MSPs to boost cybersecurity investment in 2024 | A recent survey orchestrated by WatchGuard Technologies at the Leader Expo events in Sydney and Melbourne reveals that more than two-thirds (69%) of Australian managed service providers (MSPs) and resellers are forecasting an increase in cy... |
| 26.06.2024 | How to Choose the Right Microsoft Dynamics 365 Sales Partner and Why It Matters | Microsoft Dynamics 365 Sales Partner NYC area Microsoft expert shares benefits of working with a Microsoft reseller and delivers guidelines on how to choose the right Microsoft Dynamics 365 Sales partner—in a new article from eMazzanti Tech... |
| 25.06.2024 | LockBit holds 33TB of stolen data and its ransom deadline is up: What’s next and is it real or hoax? | Don’t miss OpenAI, Chevron, Nvidia, Kaiser Permanente, and Capital One leaders only at VentureBeat Transform 2024. Gain essential insights about GenAI and expand your network at this exclusive three day event. Learn More The notorious — and... |
| 25.06.2024 | WatchGuard makes enterprise-grade threat detection available for all organizations | Smaller businesses are often more at risk of cyberattack simply because they lack the resources of their larger counterparts. WatchGuard Technologies is looking to change that with the launch of an open XDR solution that delivers levels of ... |
| 19.06.2024 | Top Microsoft 365 Copilot Prompts You Have Yet to Discover | Top Microsoft 365 Copilot Prompts NYC area Microsoft expert offers tips for writing effective Copilot prompts and shares top Microsoft 365 Copilot prompts you have yet to discover—in a new article from eMazzanti Technologies HOBOKEN, N.J., ... |
| 13.06.2024 | 4 Ways to Improve Business Operations with a DMS and Drive Data Value | Improve Business Operations with a DMS NYC area records management expert outlines the benefits of a structured approach to document management, sharing critical ways to improve business operations with a DMS—in a new article from Messaging... |
| 12.06.2024 | Proactive Businesses Understand the Importance of Threat Hunting in Cyber Security | Importance of Threat Hunting in Cyber Security NYC area cyber security expert discusses the importance of threat hunting in cyber security as companies navigate an increasingly dangerous digital world—in a new article from eMazzanti Technol... |
| 05.06.2024 | Strategic Reasons a Law Firm Would Use an Outside Technology Support Provider | Reasons a Law Firm Would Use an Outside Technology Support Provider NYC area legal technology expert explores compelling reasons a law firm would use an outside technology support provider to supplement in-house expertise—in a new article f... |
| 30.05.2024 | Best Proven Methods to Repair PST Files in Microsoft Outlook | Proven Methods to Repair PST Files Microsoft partner and email migration expert addresses a common problem experienced by Outlook users, outlining best proven methods to repair PST files and restore productivity—in a new article from Messag... |
| 29.05.2024 | 3 Essential Benefits of Managed IT Services for the Education Sector | Benefits of Managed IT Services for the Education Sector NYC area managed services provider discusses IT challenges facing education and outlines key benefits of managed IT services for the education sector—in a new article from eMazzanti T... |
| 22.05.2024 | Discover What Microsoft Copilot Can Do in Excel to Drive Data Value | What Copilot Can Do in Excel NYC area Microsoft partner offers an overview of what Microsoft Copilot can do in Excel—in a new article from eMazzanti Technologies HOBOKEN, N.J., May 22, 2024 /PRNewswire-PRWeb/ -- A new article by business te... |
| 17.05.2024 | Seattle Kraken Bring on WatchGuard’s Unified Security Platform® | Michelle Welch, CMO and SVP of business strategy at WatchGuard Technologies Comprehensive security and unmatched ease of use help a lean IT team for a global sports franchise shut out online attackers Our goal is to make enterprise-class cy... |
| 15.05.2024 | Impact of AI On Threat Detection Critical in Today's Perilous Cyber Landscape | Impact of AI On Threat Detection NYC area cyber security expert looks at key elements of the impact of AI on threat detection—in a new article from eMazzanti Technologies HOBOKEN, N.J., May 15, 2024 /PRNewswire-PRWeb/ -- A new article by NY... |
| 03.05.2024 | The Ultimate Guide to Cloud Compliance: GDPR, HIPAA, SOX, and More | Ultimate Guide to Cloud Compliance NYC area compliance expert offers best practices for navigating a complex regulatory environment in this ultimate guide to cloud compliance—in a new article from eMazzanti Technologies HOBOKEN, N.J., May 3... |
| 02.05.2024 | Passwords cling on to celebrate another World Password Day | Last year we asked the question whether it was time to make World Password Day a thing of the past. But despite the rollout of passkey technology from giants like Google, passwords are still here a year on. There's no doubt that the use of ... |
| 01.05.2024 | How to Choose an Endpoint Security Solution…and Why It Matters | Choose an Endpoint Security Solution NYC area cyber security expert emphasizes the importance of secure endpoints and offers tips for organizations as they choose an endpoint security solution—in a new article from eMazzanti Technologies HO... |
| 24.04.2024 | Understand the Benefits and Limitations of Automated Tools in Penetration Testing | Benefits and Limitations of Automated Tools in Penetration Testing NYC area cyber security expert explores the benefits and limitations of automated tools in penetration testing and suggests best practices—in a new article from eMazzanti Te... |
| 17.04.2024 | What Is Microsoft's Role in the Shared Responsibility Model for Data Security? | Microsoft's Role in the Shared Responsibility Model NYC area cyber security expert warns organizations of the need to understand their role and Microsoft's role in the shared responsibility model—in a new article from eMazzanti Technologies... |
| 10.04.2024 | Customer Service Stars Shine Bright: 102 Winners Announced in 2024 Excellence Awards | The Business Intelligence Group recognizes the top companies, executives, and products leading the way in customer service excellence in 2024. This year's winners include those who are transforming the customer experience in today's online-... |
| 10.04.2024 | Microsoft Planner vs. Project: 5 Key Differences in 2024 | Microsoft Planner vs. Project: 5 Key Differences in 2024 NYC area Microsoft expert offers an overview of Microsoft Planner vs. Project: 5 key differences in 2024 to help business leaders find the right tool for their needs—in a new article ... |
| 09.04.2024 | Hacker Claims to be Dragonforce Member, Attempts Failed Extortion Call with Victim Company Employee | Joseph Henry, Tech Times 09 April 2024, 12:04 pm In a bizarre twist of events, a hacker claiming to represent the ransomware gang DragonForce attempted to extort a victim company employee via a phone call, resulting in a somewhat comedic ex... |
| 04.04.2024 | Ensuring Success After a Cloud Migration: Your Guide to a Long-term Plan | Cloud Migration: Your Guide to a Long-term Plan Cloud migration expert offers tips for realizing continued gains after a cloud migration: your guide to a long-term plan—in a new article from Messaging Architects HOBOKEN, N.J., April 4, 2024... |
| 03.04.2024 | Exploring the Benefits of AI Copilots: What Are They and How Do They Work? | AI Copilots What Are They and How Do They Work NYC area technology expert untangles the question of AI copilots: what are they and how do they work, providing use cases and tips—in a new article from eMazzanti Technologies HOBOKEN, N.J., Ap... |
| 27.03.2024 | Why is a Third-party Microsoft 365 Backup Crucial for Business Security? | Third-party Microsoft 365 Backup Crucial NYC area technology expert examines what makes a third-party Microsoft 365 backup crucial and explores various backup solutions—in a new article from eMazzanti Technologies HOBOKEN, N.J., March 27, 2... |
| 26.03.2024 | 6 Best Authenticator Apps for 2024 | Best for secure offline authentication: Google Authenticator Best for biometric authentication: Microsoft Authenticator Best for cross-platform compatibility: Twilio Authy Best for robust security features: Cisco Duo Best for hardware-based... |
| 21.03.2024 | What is the Role of Cyber Security in Protecting Personal Data? | Role of Cyber Security in Protecting Personal Data NYC area business information expert discusses the role of cyber security in protecting personal data, including challenges and best practices—in a new article from Messaging Architects HOB... |
| 06.10.2023 | Cybersecurity Awareness Month turns 20 | October, as you might have noticed, is Cybersecurity Awareness Month. Now in its 20th year, this aims to bring the public and private sectors to work together to raise awareness about the importance of cybersecurity. As always industry expe... |
| 21.09.2023 | New Acquisition Powers AI-based Network Detection and Response and Open XDR Capabilities for WatchGuard | Once integrated into the WatchGuard Unified Security Platform architecture, the CyGlass technology will deliver AI- and ML-based detection of network anomalies and accelerate Open XDR capabilities. WatchGuard Technologies, a global leader i... |
| 07.09.2023 | Hiding undetected: Why security teams can no longer overlook HTTPS decryption | Decrypting HTTPS (TLS/SSL) traffic at the network perimeter is a vital step in protecting against malware and other online threats. Most of today’s web traffic is encrypted and presents an obvious hiding place for threat actors to deliver c... |
| 19.04.2023 | New Office and Rapid Expansion Plans in India Accelerate Cybersecurity Innovation for WatchGuard | Noida, Uttar Pradesh, India WatchGuard® Technologies, a global leader in unified cybersecurity, today announced further expansion of its presence in India, with a new office in Noida, capable of supporting the company’s aggressive hiring pl... |
| 05.04.2023 | HoJin Kim Joins WatchGuard as New SVP and Chief Revenue Officer | SEATTLE, April 05, 2023 (GLOBE NEWSWIRE) -- WatchGuard® Technologies, a global leader in unified cybersecurity, today announced it has hired HoJin Kim as the company's new senior vice president and chief revenue officer. In this role, HoJin... |
| 31.03.2023 | Backups are for life, not just World Backup Day | Backups have been an essential part of IT since the days of paper tape and punched cards, but nobody ever said they were exciting. Of all the things that now have a day devoted to them, backups probably deserve one more than most for being ... |
| 29.03.2023 | New Report from the WatchGuard Threat Lab Shows Surge in Endpoint Ransomware, Decline in Network-Detected Malware | Research indicates that encrypted connections have become the preferred method for malware delivery, putting organisations that don’t decrypt traffic at higher risk March 29, 2023 – WatchGuard® Technologies, a global leader in unified cyber... |
| 29.03.2023 | New Report from the WatchGuard Threat Lab Shows Surge in Endpoint Ransomware, Decline in Network-Detected Malware | SEATTLE, March 29, 2023 (GLOBE NEWSWIRE) -- WatchGuard® Technologies, a global leader in unified cybersecurity, today released findings from its most recent Internet Security Report, detailing the top malware trends and network and endpoint... |
| 27.03.2023 | WatchGuard Earns 7th Consecutive 5-Star Rating in 2023 CRN® Partner Program Guide | Seattle, March 27, 2023 (GLOBE NEWSWIRE) -- WatchGuard® Technologies, a global leader in unified cybersecurity, has been recognized by CRN®, a brand of The Channel Company, with a prestigious 5-star rating in its 2023 Partner Program Guide.... |
| 03.03.2023 | WatchGuard’s XDR Solution, ThreatSync, Simplifies Cybersecurity for Incident Responders | WatchGuard Technologies, a global leader in unified cybersecurity, announced the launch of ThreatSync, a comprehensive and simple-to-use XDR solution included as part of WatchGuard’s Unified Security Platform architecture that provides eXte... |
| 02.03.2023 | WatchGuard’s XDR Solution, ThreatSync, Simplifies Cybersecurity for Incident Responders | ThreatSync enables a comprehensive and simple-to-use XDR solution as part of WatchGuard’s Unified Security Platform, accelerating cross-product detections and faster responses to threats from a single pane of glass (March 2, 2023) – WatchGu... |
| 17.02.2023 | WatchGuard Launches New Line of Firewall Products to Enhance Unified Security for Remote and Distributed Businesses | WatchGuard Technologies, a global leader in unified cybersecurity, announced the release of its new Firebox T25/T25-W, T45/T45-POE/T45-W-POE, and T85-POE tabletop firewall appliances. Powered by WatchGuard’s Unified Security Platform archit... |
| 16.02.2023 | WatchGuard Launches New Line of Firewall Products to Enhance Unified Security for Remote and Distributed Businesses | Powered by WatchGuard’s Unified Security Platform® architecture, new Fireboxes deliver enhanced performance and added security capabilities that MSPs and IT admins can easily manage in WatchGuard Cloud SEATTLE – February 16, 2023 – WatchGua... |
| 14.02.2023 | A Cyber Persistence Way to Countermeasures | If international law intends to regulate state behavior to ensure international peace and security, it must reflect the conceptions of security the states employ that threaten the same, such as threats to use force and armed conflict. Conce... |
| 19.01.2023 | Tech Moves: VMware exec joins Darktrace; Zillow hires Twitter marketing leader; Oregon Venture Fund adds partner | Denise Walter. (Darktrace Photo) — Seattle-area tech executive Denise Walter was appointed chief revenue officer at cybersecurity firm Darktrace. Walter will join the company from cloud services giant VMware, where she was most recently a v... |
| 18.01.2023 | WatchGuard names Simon Yeo Senior Vice President of Operations | Industry veteran and former Barracuda executive to lead company’s IT systems and infrastructure, security, and cloud operations WatchGuard® Technologies, announced today it has hired Simon Yeo as the company’s new senior vice president of o... |
| 29.12.2022 | Why next-generation firewalls will be essential to a zero-trust world | Check out all the on-demand sessions from the Intelligent Security Summit here. Next-generation firewalls (NGFWs) are integral to the future of zero-trust security. Gartner defines NGFWs as “deep-packet inspection firewalls that move beyond... |
| 15.12.2022 | WatchGuard Threat Lab Report Finds Top Threat Arriving Exclusively Over Encrypted Connections | New research also analyzes the commoditization of adversary-in-the-middle attacks, JavaScript obfuscation in exploit kits, and a malware family with Gothic Panda ties WatchGuard® Technologies, has released its latest quarterly Internet Secu... |
| 02.11.2022 | Проблема LotL-атак: старый и надежный метод нелегитимного использования легитимного ПО | В последние годы предприятия и корпорации находятся под атакой продвинутых злоумышленников, которые используют все более творческие подходы к компрометации систем безопасности. Одним из наиболее распространенных методов являются LotL-атаки ... |
| 02.11.2022 | WatchGuard Recognized as a Leader in Endpoint Detection and Response in Latest GigaOm Radar Report | SEATTLE – November 2, 2022 – WatchGuard® Technologies, a global leader in unified cybersecurity, today announced that it has been recognized as a leader by GigaOm in its latest Radar Report on the endpoint detection and response (EDR) marke... |
Show more