What threats are you missing?

Are traditional security methods enough?

Stay up to date with the SecureValue Blog

Most Recent Articles

Identifying file manipulation in system files

Sometimes people send files to us that seem to be legitimate Microsoft system files at first glance, yet closer inspection reveals, that they have in fact been modified. Are those manipulations always malicious? And how can file manipulations be identi…

Control Panel Version 6.30.1.0

Enhancements In the “Deny & Allow Lists” module, it is now possible to enter subdomains in order to bypass the URL Rewriting filter. As a security measure against possible user errors, the user must now enter the name of the customer or partner to be deleted in a confirmation window in the “Service Dasboard” module. […]

Der Beitrag Control Panel Version 6.30.1.0 erschien zuerst auf Hornetsecurity.

Control Panel Version 6.30.0.0 (upcoming release)

Enhancements In the “LDAP Connection” tab of the “Service Dashboard” module, customers can now add multiple LDAP connections for different directory services to the Control Panel. In the “Advanced Threat Protection” module, administrators can now enter different recipients for Real-Time Alert and Ex Post Alert. In the “Authentication Policies and IPs” module, it is possible […]

Der Beitrag Control Panel Version 6.30.0.0 (upcoming release) erschien zuerst auf Hornetsecurity.