The Centripetal Blog

Network Security-as-a-Service: A Perfect Solution If You Have Limited Cyber Staff

May 17, 2018 | Robert Anderson
Common security team challenges: Not enough Staff. Lack of the right Skills. Limited IT Budget. Too much Noise. Are you one of the many companies challenged with a limited security staff, you don’t have the right skillsets in house, you’re faced with a high turnover of technical talent, to...
Read More

Artificial Intelligence: Centripetal Demonstrates AI-Analyst Embedded Within CleanINTERNET Service

April 11, 2018 | Robert Anderson
Centripetal will be demonstrating Artificial Intelligence AI-Analyst™ at the RSA 2018 Conference, which is an advanced technology embedded within our CleanINTERNET® service.  See “AI-Analyst” threat profiling in action! Centripetal has integrated advanced AI-Analyst functionality into our ...
Read More

Centripetal’s QuickThreat App for Splunk:  Powerful Visibility

March 4, 2018 | Robert Anderson
Centripetal hit another major product milestone and successfully released a QuickThreat® dashboard built natively for Splunk. The release of QuickThreat for Splunk, an industry standard SIEM platform, enables any Centripetal user to integrate their intelligence workflow directly in their S...
Read More

CleanINTERNET: A Security Service Engagement That Delivers Rapid Time-to-Value

February 14, 2018 | Robert Anderson
We all want CleanINTERNET. A connection to and from the outside world that is free of all known viruses, phishing schemes, malicious attacks, cyber exploits and the like. A clean connection that keeps the bad actors away from our sensitive data and important applications, so that an organi...
Read More

Centripetal + ThreatSTOP: Weaponizing Threat Intelligence for the Most Dangerous Threats

December 14, 2017 | Centripetal Networks Inc.
Centripetal has long taken a stance that its not good enough just to HAVE threat intelligence – you need to be able to actually do something with it. And by actually doing something with it, we leverage key partners we work with to deliver different types of intelligence to customers that ...
Read More

Threat Intelligence Gateways: The Emergence of Truly Advanced Prevention

December 7, 2017 | Centripetal Networks Inc.
If you don’t know what a Threat Intelligence Gateway (TIG) is, and you are in the cybersecurity industry, you should. It’s a new class of solutions solving a substantial delta between actually leveraging threat intelligence for a real-time defense, and network security. New and emerging. N...
Read More

Baiting the Phisherman

May 20, 2016 | Steven Rogers
A Centripetal Network sales person recently received an email that appeared to be from me, CEO Steven Rogers, requesting an immediate wire transfer in the amount of $32,780. Upon closer examination, the email originated from a similar domain, with one spelling change, centripAtalnetworks.c...
Read More

Zero Days and Cyber Threat Intelligence

April 11, 2016 | Jess Parnell
While there is no silver bullet for zero day detection, threat intelligence can help in reducing the opportunities for exposure. The RuleGate® appliance using Cyber Threat Intelligence can detect/block the exploit from reaching the client, as well as detect/block its command and control co...
Read More

Ransomware on the Rise

March 31, 2016 | Suzanne McGhee
The use of ransomware is a disturbing trend on the rise among cyber hackers. Ransomware is sent to a company, or to an individual user, through an email phishing method. This email method has recently been successful in tricking unsuspecting individuals to open emails that appear trustwort...
Read More