General

Home|General

OpenPMF 4.0 Virtual Reality Support

Walk virtually through your information flows! ObjectSecurity OpenPMF 4.0 now supports virtual reality and 3D (beta version)  The product automatically creates a graph (nodes + edges) visualization of the imported information about your systems and applications alongside the "drag and drop" visualization that has been supported for several years.   [...]

By |October 20th, 2017|

Dynamic whitelisting and security policy automation.

Many Cybersecurity experts have said for years that we need to do better whitelisting, and that relying on blacklisting and anomaly detection is not good enough anymore. Unfortunately, organizations often cannot technically implement the comprehensive security policies they want to (or should want to). This is because there are too many overlapping technical configs [...]

By |August 14th, 2017|

What is Security Policy Automation?

Today’s information age would have felt like out of a sci-fi movie to someone 20 years ago. More data has been created in the past two years than in the entire previous history of the human race. 1.7MB of data is created for every human per second. Within 4 years, we will have generated [...]

By |March 30th, 2017|

OpenPMF v4.0 Launch Events

ObjectSecurity is proud to release OpenPMF 4.0, a major new product version in mid-February 2017. ObjectSecurity invites you to the OpenPMF 4.0 launch events during RSA Expo week (Feb 13 & 14, 2017) and to our virtual online launch event. ObjectSecurity invites you to the OpenPMF 4.0 launch events, which will be held at Elan Event Venue [...]

By |January 22nd, 2017|

The Need for Better Cybersecurity Prioritization Metrics

Most organizations are overwhelmed, understaffed, and/or underfunded when it comes to cybersecurity. These constraints create a critical need to prioritize on the most critical cybersecurity measures. However, often these priorities are unclear or hard to determine, leading to less-than-optimal cybersecurity product purchases and/or activities. This is because the metrics about which overarching cybersecurity priorities matter [...]

By |January 10th, 2017|

Hackers Attack Every 39 Seconds

A Clark School study at the University of Maryland is one of the first to quantify the near-constant rate of hacker attacks of computers with Internet access. Source: Securitymagazine.com The study, conducted by Michel Cukier, Clark School assistant professor of mechanical engineering and affiliate of the Clark School's Center for Risk and Reliability and [...]

By |January 7th, 2017|

OpenPMF 4.0 Explainer & Demo Videos

In this video, ObjectSecurity founder & CEO Dr. Ulrich Lang explains and showcases the major new release 4.0 of our OpenPMF product.  OpenPMF™ makes security policy manageable through automation. It gives you powerful security policy implementation that is also effortless to manage. It allows you to improve protection, monitoring, testing, and documenting – for your information, [...]

By |December 14th, 2016|

What is Attribute Based Access Control (ABAC)?

Attribute based access control (ABAC) is a different approach to access control in which access rights are granted through the use of policies made up of attributes working together. ABAC uses attributes as the building blocks to define feature-rich access control rules and access requests. An example standard to do ABAC is the eXtensible Access Control Markup Language (XACML). [...]

By |November 25th, 2016|