Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
ManagementPhysicalTechnologies & SolutionsCyber ProductsNew Security TechnologySecurity Leadership and ManagementSecurity & Business ResilienceSecurity Education & TrainingFire & Life SafetyPhysical Security

Cybersecurity solutions roundup 2021

By Madeline Lauver
cyber security roundup
December 17, 2021

Security magazine spotlights cybersecurity solutions released in 2021, covering everything from insider risk mitigation to improved threat monitoring.



Aqua Security

Protects Cloud Native Security Goals

Aqua Security.pngThe Aqua Platform is a unified console that can help organizations transition from scanning and visibility to workload protection in cloud-native environments. The platform allows security teams to start with scanning and cloud security posture management (CSPM) capabilities and then add in sandboxing capabilities and workload protection as needed. The Aqua Platform is scalable and available in a Software as a Service or self-hosted deployment format. Image courtesy of Aqua Security

Find out more at www.aquasecurity.com


BitTrap

Uses Cryptocurrency to Identify CyberattackersBitTrap.jpeg

BitTrap employs a blockchain-based cybersecurity solution that leverages attackers’ motivations to provide singular detection capabilities. The BitTrap solution deploys a network of wallets in every endpoint or cloud instance. Each wallet contains a risk-adjusted bounty of cryptocurrency assets, the amounts of which are calibrated based on research from the BitTrap Attacker Behavioral Labs aiming to ensure the wallet will capture an attacker’s attention. Collecting the bounty triggers an incident-response operation that alerts the organization of the breach, allowing them to mitigate damage or loss. Image courtesy of BitTrap

Find out more at www.bittrap.com


BlackBerry Limited

Protects Businesses From Mobile Cyberattacks

BlackBerry.jpg

BlackBerry Limited has updated its BlackBerry Guard 2.0 solution, a managed detection and response service, to include artificial intelligence (AI)-powered mobile threat defense, user behavior risk analytics and network analytics technology. BlackBerry Guard 2.0 is a subscription-based managed service that leverages security experts and the Cylance AI platform for threat protection, detection and response. The BlackBerry Guard 2.0 includes a user and analyst portal, multi-regional support and data insights gathered from BlackBerry Protect Mobile, BlackBerry Gateway and BlackBerry Persona for visibility across an organization’s endpoint ecosystem. Image courtesy of BlackBerry

Find out more at www.blackberry.com



Code42

Educates Security Teams and Organizations on Insider Risk

Code42

Code42 Instructor is an insider risk education solution that focuses on the creation of holistic, security-oriented cultures. The solution delivers actionable, hyper-targeted lessons on insider risk to end users. Code42 Instructor can be used directly with Code42 Incydr to decrease accidental risk with situational guidance relevant to specific end users at the moment of impact. The education solution builds upon the principle that every organization has a different risk tolerance. By aligning security teams’ responses to risky employee behavior with organizational risk tolerance, Code42 can help reduce alert fatigue and improve the scalability of automated responses. Image courtesy of Code42

Find out more at www.code42.com 


Gigamon

Focuses Threat Intelligence in SOCs

Gigamon.PNGThreatINSIGHT Guided-SaaS NDR (network detection and response) aims to improve security operations center (SOC) effectiveness and reduce analyst burnout. ThreatINSIGHT can increase network visibility, aid with tool maintenance, and provide user support to information technology (IT) and security practitioners in SOCs. The network detection and response technology aims to deliver guided visibility to adversary network activity not observable by EDRs and SIEMs via the Security as a Service software. Image courtesy of Gigamon

Find out more at www.gigamon.com 



Jamf

Notifies Apple Users of Threats to Devices

Jamf.pngJamf Threat Defense is a mobile security solution that can protect endpoints from being compromised through mobile threat detection and zero-day phishing prevention with a web-based dashboard for real-time notifications and remediation. Threat Defense includes in-network protection, aiming to block phishing sites and malicious domains before devices are impacted. The security solution is compatible with any device or workplace ownership model, including BYOD. Image courtesy of Jamf

Find out more at www.jamf.com 


Quantum

Stores Inactive Data 

Quantum.png

ActiveScale Cold Storage combines object storage software with two-dimensional erasure coding and Quantum Scalar tape storage. ActiveScale Cold Storage introduces patent-pending two-dimensional erasure coding (2D EC) software, which encodes data within and across tapes, tape drives, tape libraries and geo-dispersed data centers and can improve data access performance, durability and storage efficiency. The software can be deployed as a fully managed service at the customer’s data center, a third-party data center or at a combination of the two to build geo-dispersed, hybrid cloud archive storage. Image courtesy of Quantum

Find out more at www.quantum.com


NTT Ltd.

Monitors Threats to AWS Applicationsntt

NTT Ltd.’s Cyber Threat Sensor AI (CTS-AI) ensures scalable security for user applications and workloads hosted on Amazon Web Services (AWS) through a mobile application. CTS-AI is an NDR solution developed to protect AWS applications and data directly in the cloud. The solution includes human-validated threat intelligence scanning internet traffic and curating threat data from over 100 intelligence and 50 partner feeds. Image courtesy of NTT Ltd.

Find out more at hello.global.ntt


Orion Labs

Adapts Monitoring and Communication Platform to Many Deployment Methods

Orion Labs.pngOrion Labs’ voice-first monitoring and collaboration platform is available with three deployment methods to fit each user’s business needs. The first method, Orion-Hosted Deployment, uses Orion’s Engineering and Product teams to manage the hosting, maintenance and implementation of Orion software via AWS so organizations can scale the solution quickly with minimal friction. The second method, Private SaaS Deployment, allows enterprises to integrate Orion software with different cloud environments and still receive support from Orion’s Engineering and Product teams. Orion’s private SaaS deployment aims to allow organizations to meet logging, audit or regulatory compliance requirements. The third method, On-Premise Deployment, uses local servers and air-gapped options with support from Orion. The on-premise deployment supports organizations with limited connectivity or a requirement for complete control of all aspects of their Orion deployment. Image courtesy of Orion Labs

Find out more at orionlabs.io


Salt Security

Secures GraphQL APIs Using AI and Machine Learning

Salt Security.pngSalt Security has updated its API Protection Platform to secure GraphQL (application program interfaces) APIs. This update can enable users of GraphQL, an open-source query language used to build APIs, to 

mitigate data exposure and eliminate vulnerabilities at their source. Utilizing its patented AI- and machine learning-based big data engine, the platform baselines legitimate system behavior while aiming to effectively identify attackers in real time, stopping bad actors while they are still performing reconnaissance. The Salt Security API Protection Platform integrates with DevOps and SecOps tools such as Slack and SIEM platforms to ensure that remediation details are routed to the right development team. Image courtesy of Salt Security

Find out more at salt.security

KEYWORDS: artificial intelligence (AI) cloud security cryptocurrency cyber security education cyber security products data protection mobile security Security Operations Center (SOC) theft

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Madeline Lauver is a former Editor in Chief at Security magazine. Within her role at Security, Lauver focused on news articles, web exclusives, features and several departments for Security’s monthly digital edition, as well as managing social media and multimedia content.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Leadership and Management
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Logical Security
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity Education & Training
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

Person working on laptop

Governance in the Age of Citizen Developers and AI

patient at healthcare reception desk

Almost Half of Healthcare Breaches Involved Microsoft 365

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • best of 2021 products

    Security solutions roundup 2021

    See More
  • pan

    Women in Security 2022: Diana Pan, The Museum of Modern Art (MoMA)

    See More
  • Security Metrics

    The value-add of security metrics

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!