Your browser is not supported

For the best experience, use Google Chrome or Mozilla Firefox.

globe diagram
bg

2022 Annual Report from CyberRes Galaxy

Cyberthreat trends, insights, and predictions from Galaxy’s threat research team.

2022 Gartner MQ for Application Security Testing
Fortify named a Magic Quadrant Leader for ninth consecutive year.

Why CyberRes?

Accelerating trust, reliability, and survivability during times of adverse conditions, crisis, and business volatility

Protect

Protect across your identities, applications, and data.

Detect

Detect, respond, and recover from advanced threats faster.

Evolve

Evolve your security posture at the speed of change.

bg

CyberRes Galaxy
Boardroom to code threat experience

Galaxy mobile image

CyberRes Galaxy
Boardroom to code threat experience

Financial risk to the business

See impact, threat level, and Annualized Loss Expectancy.

Prioritize for your role

Customize by industry, region, and motivation.

Much more than detail

Guidance provided to boards, CISOs, SOCs, and IT Ops teams.

CyberRes Portfolio

Our customers’ success depends on our hybrid solutions that solve key challenges that span the CISO’s world of concerns.
upper-pattern lower-pattern
upper-pattern lower-pattern
Discover, protect, and secure sensitive and high-value data.
Lock

Pioneering innovations with 80+ patents in privacy by default.

Badge

250+ protection functions out of the box. The leader in dynamic data masking.

Improve efficiency by intelligently reducing the number of incidents for investigation.
90%
Incident Reduction
Build secure software fast with the leading application security platform.
1,051
Vulnerability Categories Detected
Centrally manage all users, devices, things, and services.
Lock

4x leader across KuppingerCole IAM categories.

Badge

Enterprise scale to manage millions of customer identities.

  • "The great integration capabilities demonstrated in the ArcSight toolset have allowed us to create an end-to-end SIEM with MITRE ATT&CK compliance, additional use cases and reporting with ArcSight SOAR, and enhanced overall security with ArcSight Intelligence."

    Cihan Yuceer

    Cyber Defence Center Manager

  • "By implementing the ArcSight SIEM solution, we’ve been able to not only improve operational efficiency, but also reduce our security and situational awareness expenditures by about 85% over the last three years."

    Marwan Bindalmook

    SVP Security and Risk Management

  • "Fortify software is important in realizing our Product Security Strategy because it helps us detect vulnerabilities early in the development lifecycle…I can definitely say that Fortify software has helped SAP in producing more secure code."

    Uwe Sodan

    Security Code Analysis Team Manager

  • "Voltage offers Teradata a very robust, enterprise-grade column level security protection solution through encryption and tokenization. We are seeing the largest customers across the market verticals are looking at the Voltage solution very favorably."

    Jay Irwin

    Director. Enterprise Security

  • "We consider Fortify on Demand a key service for our business. It helps us, and the rest of the organization, understand how applications work in the cloud…we can minimize potential security issues in applications before they are allowed in our environment."

    Jair García Osorio

    CISO

  • "Working with KJR and Micro Focus (CyberRes) ensures we meet the highest global security standards available to always protect our patients’ sensitive data."

    Kirsty Garrett

    CEO

  • "With ArcSight we have a platform to monitor security events and manage incidents. We have seamless data integration and are compliant with relevant security standards and controls. Improved asset visibility ensures 99 percent availability."

    Mr. Jacob Jacob

    Specialist, Cyber Security

  • "HR staff can track all of an employee’s access rights from a single platform and modify them at the push of a button—control and security have never been tighter."

    Xinwen Liu

    Project Manager

  • "Introducing Identity Governance ensures our continued compliance and automates a time consuming and tedious process for us. We enjoy working with PDS and Micro Focus (CyberRes). The partnership between the three of us works extremely well."

    Brad Abbott

    Sr Mgr IT Risk Identity & Access Mgmt

  • "The Micro Focus (CyberRes) identity and access management solutions help us collate the information we need to quickly respond to audit requests and maintain GDPR-compliance (related to EU-DSGVO)."

    Stefan Winterberg

    Head of IT

     

    Where to begin?

    Free trials, training, and connecting with peers.

    What's New

    CyberRes Reveals Digital Value Chain Attacks on a Rapid Rise

    The 2022 CyberRes Galaxy Annual Report details the current state of cyberthreats.

    2022 AppSec Trend Report

    Balancing software security risks with business imperatives that accelerate digital innovation.

    What Is SaaS Security and Why Does it Matter?

    CyberRes recently achieved a certification milestone for its SaaS offerings.

    Fortify Portfolio Recognized in 2022 Gartner Magic Quadrant™

    For the ninth consecutive year, the influential industry report recognizes the portfolio as a Leader.

    CyberRes completes acquisition of Debricked

    Latest acquisition enables customers to accelerate the speed of DevSecOps while ensuring the resilience of their software supply chain investment proposals into two types.

    CyberRes technology helps drive Jaguar TCS toward success

    A case study shows how Fortify on Demand helps Jaguar TCS gain a competitive advantage in Formula E racing.

    Building better application security teams

    Kristen Bell of GuidePoint Security shares her insights on  communication, collaboration, and culture.

    Create a better security business plan by analyzing risk

    Often, writing up business proposals for security projects can be tricky because the value can be elusive; however, you can break security investment proposals into two types.

    Emerging software supply chain security best practices

    The severity and frequency of software supply chain attacks have increased significantly. How should cybersecurity and enterprise risk management teams react to these new threats? Many are establishing or maturing cyber supply chain risk management (C-SCRM) programs

    A data-centric approach to prevent application disruption

    Swiss.com's Voltage-driven data encryption-as-a-service protects 10 million sensitive customer records in a complex environment.

    See All News
    release-rel-2022-8-1-7822 | Wed Aug 3 16:06:55 PDT 2022
    7822
    release/rel-2022-8-1-7822
    Wed Aug 3 16:06:55 PDT 2022
    AWS