Calgary’s Wedge Networks Looks to Channel for Enterprise Push with Malware-Blocking Product

No Gravatar

– By Mark Cox, published on, October 11, 2016.

Wedge has partnered with Cylance to bring its AI-based technology into Wedge’s new enterprise product, which also marks the first time Cylance’s technology will be used beyond the endpoint

Wedge Networks has been making Web security solutions, mainly for telcos, since 2002. Now the Calgary based company is making a major move into the enterprise with WedgeAMB, a new advanced malware blocking product which brings Cylance’s technology onto their platform. While Wedge’s telco business is overwhelmingly direct, the plan is to go after the enterprise through channel partners.

“Our cloud-based security platform is used by multiple telcos,” said Frank Wiener, Wedge’s Vice President Marketing. “Our technology allows us to reconstruct entire files and scan it as low as the individual packet, while doing this at scale and at very low latency. Our world class inspection engine also lets us plug in security technologies from other vendors, and bring it all together. That’s a big part of our core competency.”
Wiener said that with WedgeAMB, Wedge is repackaging its technology in a form more suitable to sell through channel partners to enterprise customers.

“Historically, we worked with partners but primarily sold direct, because it was not a transactional sale, and it required a fair amount of integration,” Wiener said. “The enterprise market, unlike the telco market, is all about channel partners. So we will approach it with an offering that can be packaged up as a VM or appliance and bring it to market that way.”

Wiener said that because the enterprise market is very crowded, Wedge needed something very different and very compelling to differentiate itself. They are looking to Cylance to provide that differentiation.

“As we talked to enterprise customers, they said new advanced threats routinely get past their next generation firewalls,” Wiener said. “As a result, they are using sandboxes more and more. Some potential threats can be handled in a sandbox in milliseconds, but others may have to be evaluated for several minutes. So the usual procedure is to let it though, and if it is found to be malware, shut it down and begin remediation. We wanted the effectiveness of a Sandbox, but to do it in real time.”
Wiener said that is what brought Wedge to the conclusion that they needed to do this with better artificial intelligence, which in turn brought them to Cylance, whose Infinity Advanced Threat Engine is AI-based.

“Cylance has some very interesting technology, and as we looked at what they were doing, and that they could up the game in terms of our ability to detect more malware, we saw an opportunity to bring their technology into our platform,” Wiener said. The Cylance AI enables threats to be blocked in real time, rather than after they have penetrated the network.

“Cylance’s model has been about the endpoint, but they recognized customers also want a network solution that protect some things that aren’t at the endpoint, so they saw this as complementary,” Wiener said. The WedgeAMB solution is the first to bring the Cylance AI to the network level, combining it with Wedge’s patented hyper-inspection technology and their threat analytics.

“The solution provides the customer with actionable threat intelligence, so they can figure out what they need to do,” Wiener said.

While Wedge as a company has limited contacts with the kind of top-drawer reseller partners that they want, they do have senior execs with those contacts.

“Wedge is currently led by CEO James Hamilton who led Tipping Point before, and our sales head was also head of sales for Tipping Point, Riverbed and others,” Wiener said. Both have a history of selling through distributors and resellers. Both have a deep rolodex of partners in the space. We know security is very crowded and partners get besieged every week by vendors, but their contacts have got us an audience, and that audience has been showing some interest.”

Wedge is starting its new initiative with a relatively small channel, but plan to expand that, although never to volume channel dimensions.

“Out of the gate, we have announced a whole new series of products, and as we round out the portfolio, we will likely expand more aggressively through a broader set of distribution and resellers,” Wiener said.

Like many successful Canadian companies, Wedge’s Canadian business is disproportionately small compared to its total business, but they believe the enterprise market will open up more home-grown opportunities for them.

“The Canadian market is limited in revenue right now, although the backing of the Canadian government and trade commission has opened a lot of doors for us to reach out on the global frontier,” Wiener said. “We do see some Canadian opportunities in the enterprise. There will be Canadian partners as part of the initial rollout.”

For the original article please see


Posted in Industry News, Latest Security News, Wedge Channel Partner Forum, Wedge News | Tagged , , , | Leave a comment

Milliseconds Versus Minutes – The Difference Between Prevention and Remediation

No Gravatar

The announcement last week about Wedge Networks’ integration and orchestration of Cylance’s artificial intelligence (AI) technology to improve real-time detection of advanced threats has big implications for enterprises and the industry. For enterprises, the first order implication is the ability to detect and therefore block advanced threats in milliseconds that would otherwise require minutes to tens of minutes or longer to detect. That difference in time equates to the difference between preventing threats from entering the network, versus the embarrassment, disruption and expense of remediating threats that have entered the network and infected one or more devices.

It has become an accepted fact that new advanced and frequently customized threats can and will pass through even the highest performing firewalls and IPSs without detection. Sandboxing provides a more effective detection layer of defense, however executable files running never before seen code can require the sandbox to fully detonate and simulate the sequence of events including the acceleration of time to detect delay oriented threats. This sandbox process may range from minutes, to tens of minutes, and potentially even hours for some threats. Ultimately the sandbox will issue a verdict and detect these threats with a high degree of accuracy. However, by the time the sandbox has issued a malware verdict, the file has been delivered to the end user who has very likely opened it and activated the malware, infecting at least one machine and possibly many more.

Detection and remediation will always be an important capability, however preventing threats from entering the network in real-time is clearly a less disruptive, lower cost, and lower risk security model. Wedge’s integration and orchestration of Cylance’s AI predictive malware prevention technology in combination with multiple other patented technologies and processing techniques is demonstrating the ability to block both conventional and new advanced threats, with unrivaled accuracy, and just milliseconds of latency. This is enabled through the same technology concepts that are driving rapid innovation in a variety of markets. A recent article on improving the safety of air travel though the use of AI is just one example. For cybersecurity, the net result is the ability to block these threats, including those that would otherwise require a lengthy sandbox evaluation, in real-time. Thus blocking the threat before it even enters the enterprise network. The benefits of real-time detection and prevention to the enterprise are obvious. The implications to the industry are far reaching and will be the subject of a future blog.

Posted in Industry News, Latest Security News, Wedge News | Tagged , , , , , | Leave a comment

Wedge Networks to Provide Massively Scaled Cylance AI Security Solution

No Gravatar

-By Sean Mitchell, Published on DataCenterNews.Asia on September 23, 2016.

Wedge Networks is a successful start-up that has traditionally focused on security for telcos. More precisely it produced highly scalable tools that enabled huge amounts of network data traffic to be scrubbed clean. This enables telco service providers to offer clean internet connectivity to their clients with virus and malware threats already removed.

Their key advantage in this space has been the throughput. No competitors match the massive amount of data traffic that could be screened by their ‘Cloud Network Defense’ product range. It stands alone with throughput up to 10GB per second.

They don’t produce the anti-virus or anti-malware technology themselves but focused on the massively scalable, elastic, virtualised platform. They then partnered with brands like Kaspersky and McAfee.

Today Wedge Networks has added up and coming anti-virus and anti-malware vendor Cylance to its solutions.

Cylance is a security vendor focused on protecting endpoint devices. Their approach is non-traditional and doesn’t involve signatures. Instead of the old-fashioned signature database approach, Cylance uses Artificial Intelligence (AI) to identify threats. The advantage of their approach is that a new threat doesn’t need to be identified in a research facility and then added to the signature database, which gets downloaded to clients. Cylance’s solution can catch previously unknown threats, using its incredible AI approach.

Incorporating Cylance into its solutions enables the same advantages that Cylance is providing the end point, at the network level.

Because of the different approach by Cylance, Wedge has had to make significant architectural changes.

The new product is being called Wedge Advanced Malware Blocker (WedgeAMB) and fits into a whole new family of products called Wedge Absolute Real-time Protection (WedgeARP).

“We live in an age where collaboration and embracing the innovation of others is key to providing the best possible security solutions available,” said James Hamilton, CEO of Wedge Networks. “We’ve developed the industry’s highest performing real-time hyper-inspection and orchestration engine. Orchestrating that functionality in concert with other best-in-class technologies enables the most effective threat prevention available, with superior performance and scale. That’s what the WedgeARP series is all about – orchestrating the industry’s best security technologies and joining forces in the fight against cybercrime.”

“Security teams worldwide need integrated tools to provide next-generation protection from today’s ever-increasing cyber attacks,” said Stuart McClure, president and CEO at Cylance Inc. “Together, WedgeAMB with the Cylance machine-learning engine delivers a one-two punch, intercepting malware at the perimeter as well as on the endpoint.”

The new product is available in 100 Mbps, 1 Gbps, and 10 Gbps versions. It can be deployed as a virtual machine (VM) or as a pre-configures X86-based appliance

For the original article, please visit DataCenterNews.Asia.


Posted in Industry News, Latest Security News, Wedge News | Tagged , , , , , | Leave a comment

Wedge Adds AI for Better Malware Blocking

No Gravatar

-By Carol Wilson, Editor-at-Large, Published on, September 22, 2016.

Wedge Networks today introduced what it is calling an entirely new approach to blocking malware that is yielding strong results in stopping zero-day attacks and other malware in real time.

The new Wedge Networks Advanced Malware Blocker uses artificial intelligence from Cylance to detect and block advanced threats such as ransomware at the network level and prevent them from ever entering the enterprise. It is the first in a series of products that Wedge is introducing as part of a new product family, the Wedge Absolute Real-Time Production Series, that packages capabilities it has been delivering from a cloud-based service into products that can be sold through the channel to the enterprise.

“Advanced threats — both zero-day and targeted threats — are getting through the best available next-gen firewalls and intrusion prevention systems,” says Frank Wiener, vice president of marketing for Wedge. “They are blocking most of the threats, but I can demonstrate all day long the ability to pass malware through those systems. The bad guys know how to do that.”

Industry experts on a recent security panel at Light Reading’s NFV and Carrier SDN event agreed with that statement, and the pressure now on service providers to help block those threats. (See Security & Virtualization: ‘We Are All Screwed’.)

That is why Wedge is bringing artificial intelligence to the network layer, licensing technology from Cylance that was previously used at end points, Wiener says. In the process, Wedge is addressing the enterprise challenge of having to constantly upgrade firewall and intrusion protection system (IPS) capacity to match network traffic.

“They can offload those requirements onto our box, and when they do so, the throughput of their next-gen firewall will basically double in capacity,” he comments. Removing anti-malware protection from the firewall can increase its performance by 50%, he claims.

The new Wedge product also automates the analysis of the data flood through a centralized data analytics engine and generates understandable intelligence on which security personnel can act, Wiener says. “Today, they are all complaining about the same thing: they get hundreds of thousands of alerts every day, and they have a small team of security experts, who have no idea which ones are the important ones,” he comments.

There are actually four different processes at work within the WedgeAMB: First, traffic goes through an IPS system which blocks worms and passes traffic to a Data Content Inspection engine where content is examined by type and policies are applied that allow some traffic (voice, video) to bypass further scans; signature scans and heuristic scans are then applied to block known threats and polymorphic viruses and malware; finally, the remaining traffic goes through the Cylance AI engine for detection based on patterns and other intelligence.

All of that happens in 20 milliseconds or less.

Wedge is excited about the way the system is already performing in its earliest deployments, Wiener says.

“With only a couple of weeks of hands on testing with WedgeAMB in our labs, the initial results far and away exceed the real-time malware blocking ability that we’ve seen with traditional network based solutions,” Jason Robohm, cybersecurity practice manager and solutions architect for Computex, a national IT service provider, said via a Wedge-provided email. “WedgeAMB has all the ingredients to be a disruptive force for network malware prevention.”
Computex had been working with Cylance on its customer endpoints in the past and views Wedge Networks’ addition of the AI technology at the network layer as a major step forward, he said.

For the original article, please visit

LightReading logo

Posted in Industry News, Latest Security News, Wedge News | Tagged , , , , , | Leave a comment

Wedge Networks Orchestrates AI at the Network Level to Revolutionize Malware Prevention

No Gravatar

Breakthrough innovation from Wedge blocks advanced threats in real-time that other systems do not, and provides actionable threat intelligence

CALGARY Sept. 22, 2016—Wedge Networks, the leader in real-time network threat prevention, today announced a disruptive new weapon in the battle to prevent ransomware, zero day attacks and other advanced threats from entering networks, with actionable threat intelligence to maximize threat mitigation.

The newly released Wedge Advanced Malware Blocker™ (WedgeAMB™) is the first product in the Wedge Absolute Real-time Protection™(WedgeARP) series of enterprise solutions. The WedgeARP™ series provides fully self-contained, security platforms in the form of virtual machines or appliances that orchestrate Wedge’s industry leading real-time hyper-inspection engines in concert with the best available security technologies to provide superior security solutions.

WedgeAMB illustrates this model by orchestrating Cylance’s artificial intelligence (AI) technology and other technologies to detect and block viruses and advanced malware, such as ransomware, at the network level, to prevent them from entering enterprise networks. Orchestrating Wedge’s patented hyper-inspection technology with Cylance’s machine-learning engine and WedgeIQ™ threat analytics, WedgeAMB provides a critically needed break-through in malware prevention.

Threats are blocked in real-time, eliminating the cost, disruption, effort and embarrassment associated with tackling threats after they’ve penetrated the network. It also provides real-time visibility of the network-wide threat landscape, empowering security personnel to identify and focus on the most critical risks first.

According to the Federal Bureau of Investigation, ransomware is on the rise in 2016. Advanced malware and ransomware attacks account for millions of dollars in lost productivity and theft by cybercriminals operating on a global basis to exploit endpoint devices with increasing levels of sophistication.

“We live in an age where collaboration and embracing the innovation of others is key to providing the best possible security solutions available,” said James Hamilton, CEO of Wedge Networks. “We’ve developed the industry’s highest performing real-time hyper-inspection and orchestration engine. Orchestrating that functionality in concert with other best-in-class technologies enables the most effective threat prevention available, with superior performance and scale. That’s what the WedgeARP series is all about – orchestrating the industry’s best security technologies and joining forces in the fight against cybercrime.”

WedgeAMB Customer Benefits:

  • Proven reduction of business disruption, dollar losses, and reputation damage by blocking threats in real-time that other systems do not
  • Protecting all network connected endpoints automatically, without configuration
  • Reducing restrictions on BYOD and IoT devices for improved productivity
  • Providing security personnel with clear and actionable network-wide threat intelligence to prioritize resources on the most critical threats

“Security teams worldwide need integrated tools to provide next-generation protection from today’s ever-increasing cyber attacks,” said Stuart McClure, president and CEO at Cylance Inc. “Together, WedgeAMB with the Cylance machine-learning engine delivers a one-two punch, intercepting malware at the perimeter as well as on the endpoint.”

WedgeAMB bundles in WedgeIQ, an automated threat intelligence engine that rolls up threat event data from enterprise-wide AMB systems to characterize, correlate, analyze and visualize the network-wide threat landscape. This comprehensive, yet intuitive threat analytics resource provides actionable threat intelligence to further mitigate evolving threats in real-time.

The WedgeARP series repackages Wedge’s highly successful Cloud Network Defense™ (WedgeCND) cloud-based systems into application specific virtual machine or appliance-based solutions for distribution through channel partners, focused on enterprise customers.

More About WedgeAMB

  • Quad-Scan™ anti-malware engines conduct IPS, signature, heuristic, and AI-based scans provide the highest real-time threat detection accuracy in the industry
  • The first in the WedgeARP series, championing a collaborative approach to cyber security by combining the industry’s leading security solutions
  • Patented WedgeSO™ hyper-inspection and orchestration engine facilitates these scans with SSL inspection, at line rate speeds, with imperceptible latency
  • WedgeIQ™ analyzes threat data to create intuitive visualizations for actionable threat intelligence
  • Available in 100 Mbps, 1 Gbps, and 10 Gbps versions
  • Deployed as a virtual machine (VM) or as a pre-configures X86-based appliance

For more information please visit:



About Wedge

Wedge Networks™ is revolutionizing real-time network security with cutting edge innovation, performance, and scale. Embracing global innovation, Wedge’s Cloud Network Defense™ (WedgeCND™) and Absolute Real-Time Protection (WedgeARP™) Series of products integrate and orchestrate the industry’s highest performance security inspection and mediation engines with best-in-class security technologies developed by Wedge and third parties. Purpose-built as fully virtualized security systems, these products can be deployed in the form of x86 appliances, virtual machines, or cloud application software. Today, these industry-leading solutions block security threats for tens of millions of end users in enterprise, service provider, government agency, and security-as-a-service networks spanning more than 17 countries.

Wedge Networks is headquartered in Calgary, Canada with international offices in Dallas, USA; and Manama, Bahrain. Visit for more information

Media Contacts:
USA & International PR contact:
Hannah Whitrow
Zonic Group PR

Posted in Industry News, Latest Security News, Wedge News | Tagged , , , , , , | Leave a comment

What We Can Do About Ransomware – Today and Tomorrow

No Gravatar

By Alan Zeichick, Principal Analyst, Camden Associates, Published on, May 31, 2016.

Ransomware is a huge problem that’s causing real harm to businesses and individuals. Technology service providers are gearing up to fight these cyberattacks – and that’s coming none too soon.

In March 2016, Methodist Hospital reported that it was operating in an internal state of emergency after a ransomware attack encrypted files on its file servers. The data on those servers was inaccessible to the Kentucky-based hospital’s doctors and administrators unless the hackers received about $1,600 in Bitcoins.

A month earlier, a hospital in Los Angeles paid about $17,000 in ransom money to recover its data after a similar hack attack. According to the CEO of Hollywood Presbyterian Medical Center, Allen Stefanek, “The quickest and most efficient way to restore our systems and administrative functions was to pay the ransom and obtain the decryption key.”

As far as we know, no lives have been lost due to ransomware, but the attacks keep coming – and consumers and businesses are often left with no choice but to pay the ransom, usually in untraceable Bitcoins.

The culprit in many of the attacks — but not all of them — is a sophisticated trojan called Locky. First appearing in 2013, Locky is described by Avast as using top-class features, “such as a domain generation algorithm, custom encrypted communication, TOR/BitCoin payment, strong RSA-2048+AES-128 file encryption and can encrypt over 160 different file types, including virtual disks, source codes and databases.” Multiple versions of Locky are on the Internet today, which makes fighting it particularly frustrating. Another virulent ransomware trojan is called CryptoLocker, which works in a similar way.

Ransomware is a type of cyberattack where bad actors gain access to a system, such as a consumer’s desktop or a corporate server. The attack vector might be provided by downloading a piece of malware attached to an email, visiting a corrupted website that runs a script that installs the malware or by opening a document that contains a malicious macro that downloads the malware. In most ransomware attacks, the malware encrypts the user’s data and then demands an untraceable ransom in order to either decrypt the data or provide the user with a key to decrypt it. Because the data is encrypted, even removing the malware from the computer will not restore system functionality; typically, the victim has to restore the entire system from a backup or pay the ransom and hope for the best.

As cyberattacks go, ransomware has proven to be extremely effective at both frustrating users and obtaining ransom money for the attackers.

Beyond the ransom demands, of course, there are other concerns. Once the malware has access to the user or server data… what’s to prevent it from scanning for passwords, bank account information, or other types of sensitive intellectual property? Or deleting files in a way where they can’t be retrieved? Nothing. Nothing at all. And even if you pay the ransom, there’s no guarantee that you’ll get your files back. The only true solution to ransomware is prevention.


The U.S. Federal Bureau of Investigation received 2,453 complaints about ransomware cyberattacks in 2015, which the FBI says cost the victims more than $24 million dollars in ransom. Who knows how many people quietly paid and didn’t tell anyone, because of shame, perhaps, or lack of knowledge about who to tell?

One top network security vendor, Wedge Networks, has seen huge growth on the carrier networks that its service monitors. “On those networks”, says CEO James Hamilton, “We saw a 100% increase in the observed number of ransomware attacks detected in 2015 verses 2014, and a 50% increase in mobile ransomware from Q4 2015 to Q1 2016.”

Wedge Networks is an Alberta, Canada-based company with extensive customer deployments across Canada, the United States and Asia Pacific. Mr. Hamilton explains that “Last year, our customers in Canada reported more ransomware attacks (as a percentage) than we observed in the U.S. In APAC, Japan and Taiwan are experiencing a slower increase in ransomware than we’re seeing in Southeast Asia, possibly due to more mature and advanced security practices in those markets.”

Mr. Hamilton continues, “Just last week I was discussing ransomware with a service provider planning to roll out Security-as-a-Service in a major Southeast Asia market and they stated that ransomware has become more widely active in their country over the past 12 months. Previously it was very infrequent, but they are seeing it spread rapidly.”

Jason Steer, EMEA Solutions Architect for Menlo Security, based in Menlo Park, Calif., explained that while consumers can lose important files, especially irreplaceable financial documents and personal photos, ransomware can be devastating for businesses.

“For enterprises, ransomware is a major pain and slows them down from getting on with their key IT-related business functions,” Mr. Steer explains, adding that Menlo Security focuses on malware prevention. “We have met many customers where every local file and central server stored file has been encrypted by ransomware. This impacts every user accessing any central file on the network and for any user impacted it encrypts every local file on their PC as well.”

The impact? “You are dependent on the age of the most recent backup and may not be able to restore every file. The cost of losing that data may be minimal or large depending on the importance of the file.”

Cylance has seen some pretty devastating ransomware damage recently. A cybersecurity firm based in Irvine, Calif., the company is spending a lot of time helping its customers prevent ransomware attacks, as well as helping new victims recover from trojans. Andy Solterbeck, Regional Director APAC for Cylance, explained about Angler, a cyberattack exploit toolkit that hackers can use to customize their own attacks – kind of a do-it-yourself starter kit. The damage from Angler: “It’s currently causing 90,000 infections per day, and bringing in at least $60 million dollars per year.”

There are so many attack vectors, it’s virtually impossible for a consumer – or an IT professional – to keep track of them all. Jayendra Pathak, Chief Architect at NSS Labs, a top tech security analyst firm based in Austin, Tex., says “Adobe Flash is becoming an extremely troublesome vector towards delivering ransomware. Microsoft Word attacks are also on the rise, exploiting human weaknesses in opening email attachments.”

The days of paying a few hundred dollars as ransom may be over, as cyberattackers target businesses, Mr. Pathak adds. “On top of that, ransomware authors are moving to more targeted campaigns aimed at the enterprise. Asking ransom for hundreds of thousands of dollars is on the near horizon. NSS Labs has tracked thousands of infections primarily coming from drive-by campaigns.” He adds that while ransomware is a problem all over the world, it is more prevalent in areas where online payment systems are extremely common. “The United States and Europe are primarily targeted. Japan, Korea, China, and Singapore’s ransomware infection rates are relatively less in comparison to Europe and the U.S. However, APAC countries must take note of the prevalence of ransomware attacks in the U.S. and Europe. Now is the time to be embracing preventative cybersecurity measures.”


For consumers, the best way to prevent a ransomware attack is to be proactive. Backup often, and maintain many backups so that recovery can pre-date the infection. Don’t click on email attachments. Use up-to-date anti-virus and anti-malware tools and services. Don’t use old versions of Web browsers that lack current protections. Disable macros in Microsoft Word and Microsoft Excel, and consider uninstalling Adobe Flash. Even then, however, there is no guarantee that systems will be protected against ransomware.

In the enterprise, and on carrier networks, there are larger-scale tools that can be more effective. For example, Menlo Security offers an isolation platform that ensures that malware cannot touch the end user’s laptop, desktop or mobile computer, or infect a corporate server, explains Mr. Steer. It’s ideal for implementation by enterprise IT and security professionals.

“Isolation is a new concept on the block to help organizations become more resilient to attacks. Enabling endpoints to be more secure and robust ensures they get hacked less and the fallout of data and intellectual property loss is reduced,” he says. “Gartner considers isolation as key in the malware prevention capability: It’s what administrators can do to prevent their users running into bad things through no fault of their own.”

Mr. Steer continues, “The Menlo Technology eliminates the possibility of malware reaching user devices via compromised or malicious websites or documents. The user’s web session and all active content (e.g. video, JavaScript or Flash), whether good or bad, is fully executed and contained in the Isolation Platform. Only safe, malware-free rendering information is delivered to the user’s endpoint. No active content – including any potential malware – leaves the platform. So malware has no path to reach an endpoint, and legitimate content needn’t be blocked in the interest of security and all done without changing the enduser’s surfing experience.”

Wedge Networks’ customers are carriers and cloud service providers, who want to detect and block malware – including ransomware – before it ever gets close to the end-customer’s network or devices. Its technology is based in the cloud, and that’s where Mr. Hamilton says security like this belongs.

“One of the biggest breakthroughs is the realization that security needs to evolve from an endpoint and perimeter paradigm to a cloud-based connectivity paradigm in order to close gaps with today’s IT model,” he explains. “The network, the users, and their devices are no longer static. They are dynamic and constantly moving and changing. As a result, the only way to secure the network is to secure the connections for everything connecting to that network. This can only be achieved by moving security to the cloud-layer of the network, which has visibility of everything connecting to the network.”

How does Wedge Networks’ technology protect against ransomware? “Our Wedge Cloud Network Defense was purpose-built to run in the cloud to support virtually unlimited scale, and to support the multi-tenancy operational requirements of service providers that want to offer Security-as-a-Service to their customers,” Mr. Hamilton describes. “Cloud Network Defense dynamically scales up or down cloud-compute resources to support the widely varying security workloads of their customers with efficiency and sustained performance.” In other words – it blocks ransomware trojans and related threats without affecting network performance or application response time.

Cylance’s Mr. Solterbeck explains how his company addresses ransomware: Artificial Intelligence. “We apply the power of Machine Learning and Artificial Intelligence to the problem of malware detection,” so that even if the attack has never been seen before, Cylance’s technology can successfully block it. “CylancePROTECT predicts cyberattacks and blocks them on the endpoint in real-time before they ever execute – and that includes malware like ransomware, memory attacks, unauthorized scripts and privilege escalations that can give hackers complete access to your systems.”


The bad news is that malware, including ransomware, is on the rise. The good news is that the cybersecurity industry is responding with tools and services that can help protect businesses and consumers. Don’t get complacent, however: There will always be malware, and ransomware isn’t going away. “There is no magic fairy dust to solve this problem on the near horizon/in the near future, says NSS Lab’s Mr. Pathak. “The effective solution to combat this threat is keeping applications up to date, not putting implicit trust on anything that is received via email, disabling macros altogether, and keeping backups regularly.”

Have you done your backups? If not… now is the time.

For the original article, please visit


Posted in Industry News, Latest Security News, Wedge News | Tagged , , | Leave a comment

Wedge Networks Highlights Security Service Orchestration as Key Enabler of Cyber Security Innovation

No Gravatar

Orchestration from the Cloud that Mitigates Risk for Service Providers and Enterprises Proves to be a Winning Combination in Asia Pacific Region

By APSM, published on May 27, 2016 in Asia Pacific Security, Cyber Resilience, Security Products

Wedge Networks has announced business acceleration in Asia Pacific, fueled in part by leveraging the cloud to mitigate business risk for service providers launching cloud-based cyber security services, and for enterprises adopting new services. Wedge Cloud Network Defense (CND) is now featured in a growing number of Proof of Concept (PoC) deployments of Tier One service providers planning to launch Security-as-a-Service from the cloud, throughout the APAC region.

Rapidly changing cyber threats and the dissolution of the traditional enterprise network make it virtually impossible for small and medium sized businesses to sustain robust cyber security on their own. Security operating at the cloud-layer of the network is essential, but most businesses lack the skilled resources, cloud infrastructure and capital budget to implement this layer of security on their own. Fortunately, new cloud-based Security-as-a-Service initiatives by communications service providers (CSPs) promise to address this market need in a way that minimizes risk and enhances the business case for service providers.

“Wedge Cloud Network Defense is a software-defined, virtualized, security platform that runs in the cloud,” said James Hamilton, CEO for Wedge Networks. “For Service Providers, the ability to deliver a set of standardized, best-in-class security services to their customers – all software enabled and delivered from their cloud infrastructure – is a winning business case.”

Just last week, StarHub announced Wedge Networks as one of the founding ecosystem partners with the launch of the Cyber Security Centre of Excellence (COE) in Singapore. The StarHub COE serves as a hub for the cyber security ecosystem, bringing together the intelligence and expertise to tackle cyber threats presenting serious risks to enterprises and the economy.

“We believe cloud-based security, and delivering the benefits of Security-as-a-Service to our customers will be crucial as StarHub establishes Singapore’s Cyber Security Center of Excellence,” said Dr. Woo Lip Lim, Vice President of Analytics and Cyber Security, StarHub. “Working with industry leaders like Wedge Networks amplifies our ability to deliver excellence in cybercrime prevention and provide valuable services to our customers.”

Gary Tate, Managing Director for Asia Pacific at Wedge Networks highlights the growing regional importance of Wedge CND as a cloud-based platform to support the scale and appetite for innovation in APAC: “Nearly every major service provider in the region is evaluating or planning to offer cloud-based Security-as-a-Service to their customers. Leveraging cloud infrastructure to deliver security with performance, scale and efficiency, without requiring dedicated hardware, is a huge asset. The cloud-based approach reduces investment risk, which ultimately allows them to accelerate new and dynamic services.”

About Wedge
Wedge Networks is transforming the way security is delivered. Powered by the innovative WedgeOS, Wedge Networks’ Cloud Network Defense is an orchestrated threat management platform designed to enforce security at the cloud-layer of the network to combat the shifting threat landscape associated with cloud, mobility, bring your own device, Internet of Things and consumerization of IT. By applying security policies at the cloud-layer, enterprises and network operators offering security-as-a-service can achieve more effective security, using best-in-class, continuously updated multi-vendor technologies for EverGreen Security, with greater efficiency and scale. Wedge Networks’ CSP Security and the Wedge Platform, has won more than a dozen awards, is deployed globally, delivering security protection for tens of millions of users in Fortune 500 companies, government agencies, internet and broadband service providers, and across all industry verticals. Wedge Networks is headquartered in Calgary, Canada and has international offices in Dallas, USA; Beijing, China; and Manama, Bahrain. For further information visit:

For the original article, please see


Posted in Industry News, Latest Security News, Wedge News | Tagged , , , , | Leave a comment

Clever Security Offering Making Money For Telco Service Providers

No Gravatar

By Sean Mitchell, Published on on May 27, 2016.

Let’s face it, the telecommunications industry is very competitive. Most monopolies have been broken up, services are commoditised and most operators are struggling to find key points of differentiation.

It’s difficult to make money out of just the connectivity business these days. The real profits come from the over the top services.

The struggle for these over the top services like cloud and data centre is that they’re also commoditised and it’s difficult to compete with global pure-play providers like Amazon Web Services.

One of the last areas that service providers can differentiate themselves and achieve high margins is in security-as-a-service.

Wedge Networks is a global leader in this specific niche.

They believe antivirus, web and malware security shouldn’t be done on the device, but at the service provider end, with a clean pipe provided to the client.

This can then be charged by the service provider in many different ways, although typically on a per pipe per month basis.

Wedge actually doesn’t develop its own security architecture, instead it develops a clever scalable platform and then plugs in specialist security vendors like McAfee, BitDefender and Kaspersky for the scrubbing tools.

The magic Wedge offers is that its platform is telco grade, can cope with massive volumes of traffic and it easily connects to billing applications, and services can be applied per customer.

There are a number of advantages of this approach for the customer as well. Not only do they not need to license antivirus themselves but not having these security solutions on each device can save serious processing power.

This in turn can allow a large enterprise to sweat the asset a little longer before replacing it.

If you take this Capex saving and multiply it up across large enterprises, this can be a ROI bonanza.

Finally the service provider sales and marketing departments might have a ROI calculation that really is compelling, especially to enterprise customers.

This approach has clearly got the attention of service providers, with Wedge Networks booking more revenue in the last quarter than the prior 18 months. That’s an enviable growth curve for any business.

For the original article, please see


Posted in Industry News, Latest Security News, Wedge News | Tagged , , , | Leave a comment

StarHub, Partners Invest S$200M to Support Singapore’s Cybersecurity Sector

No Gravatar

As it launches its Cyber Security Centre of Excellence, the local telco also touts its “first-of-its-kind” approach to scan threats before they even enter an organisation’s firewall

By Leong Wai Kit, Published on, May 18, 2016.

SINGAPORE: Telco StarHub, together with industry partners, will invest S$200 million over the next five years to support a sustainable cybersecurity ecosystem in Singapore.

This amount will help foster industry partnerships and talent development, with the local telco hoping to train at least 300 experts in this field over the same period of time, the company said during the launch of its Cyber Security Centre of Excellence on Wednesday (May 18).

The Centre’s industry partners include Blue Coat, Cyberbit, EY, Fortinet and Wedge Networks, and it is also working with Institutes of Higher Learning such as Nanyang Polytechnic, Republic Polytechnic, Temasek Polytechnic and Singapore University of Technology and Design.

The Centre is also supported by the Singapore Economic Development Board.


During the launch of its Centre, StarHub touted a “first-of-its-kind” approach towards fending off online attacks. The Centre taps on the ability of a telco to monitor and deal with threats before they even enter an organisation’s security system, it said.

This is because the Centre can see Internet traffic entering the country and spot anomalies proactively. “We are not aware of any telco in the world that provides cybersecurity services before the firewall,” StarHub CEO Tan Tong Hai said.

Using water treatment in Singapore as an analogy to describe cyber defence, Mr Tan added: “Today, we have clean, high-quality water because we have an effective utilities company that ensures that the water at the source is filtered and cleansed even before it is delivered to our taps.

“Applying the water treatment analogy to security means we have a central system that monitors, analyses, and cleanses Internet traffic at the source. In this way, enterprises do not need to invest a lot of resources and efforts on buying and implementing their own security appliances.”

For the original article, please visit


Posted in Industry News, Latest Security News, Wedge News | Tagged , , | Leave a comment

StarHub to Grow Singapore’s Cyber Security Ecosystem

No Gravatar

Collaborates with industry partners, academia and public-sector organisations to strengthen Singapore’s capabilities in cyber security

Singapore, 18 May 2016 – StarHub today announced plans to grow the local cyber security ecosystem at the launch of its Cyber Security Centre of Excellence (COE). Minister for Trade and Industry (Industry), Mr S Iswaran graced the COE launch as Guest-of-Honour.

The COE established by StarHub, is supported by the Economic Development Board (EDB). It serves as a hub for the cyber security ecosystem, bringing together the best of brains and expertise to tackle cyber threats, which are among other serious risks affecting economies globally today.

Internationally renowned security expert Professor Yitzhak Ben-Israel has been appointed as the Advisor to the COE, and he provides strategic advice and recommendations to the body. Professor Ben-Israel is a member of Singapore’s Research, Innovation and Enterprise Council as well as the International Advisory Panel for Singapore’s National Cybersecurity Research and Development Programme. He also sits on the board of Singapore’s Agency for Science, Technology & Research, and heads the Security Studies programme at Tel Aviv University.

Five industry partners, namely Blue Coat, Cyberbit, EY, Fortinet and Wedge Networks as well as four institutes of higher learning (IHL), including Nanyang Polytechnic (NYP), Republic Polytechnic, Temasek Polytechnic and Singapore University of Technology and Design have joined the COE to-date. Together with StarHub, the partners will undertake various initiatives to strengthen Singapore’s capabilities in cyber security, focusing on talent development, innovation and industry partnerships. Going forward, StarHub plans to rope in more industry and IHL partners to the COE to drive value and results.

To help cyber security professionals enhance their knowledge and career development, StarHub plans to work with leading centres for professional development in cyber security to design and offer relevant training courses. StarHub is also committed to addressing the shortage of cyber security talent in Singapore by training at least 300 specialists on different cyber related capabilities and skill sets over the next five years. It is teaming up with the four IHLs and the Cyber Security Agency of Singapore (CSA) to enhance cyber security training curriculum and programmes, and to collaborate on research and development.

As a first step, StarHub and NYP have jointly established a lab on NYP campus to provide hands-on training for students of Cyber Security & Forensics. These students will subsequently have the opportunity to learn directly from experienced cyber security professionals during their internship placements at StarHub or its industry partners.

The COE’s first commercial initiative is the first-of-its-kind Security Operations Centre at StarHub (named StarHub Security Operations Centre), whereby StarHub’s core infrastructure is integrated with round-the-clock proactive cyber threat detection capabilities. Cyber-attacks come through wired and wireless networks; being a telco, StarHub’s core networks are thus a strategic location to monitor and detect potential malicious data traffic early and perform mitigation. In addition, cyber security solutions to protect industrial control systems and cloud-based cyber security solutions currently being developed, will be ready for the in the second half of the year.

“Cyber security is a top national and commercial security priority for Singapore as our Smart Nation vision takes shape, touching many aspects of our personal and business lives. StarHub is proud to work with top-notch partners to bolster the cyber security sector, which is important for a sustainable digital economy,” said Mr Tan Tong Hai, StarHub Chief Executive Officer. “A telco plays a unique role in this ecosystem, building cyber security capabilities on the telco infrastructure which helps accelerate the development of a new generation of cyber security solutions that can better address market needs.”

“StarHub’s investments in cyber security are closely aligned with our vision for Singapore to be the cyber security hub for innovation and mission critical operations. In particular, StarHub’s initiatives to foster collaboration with leading cyber security companies, catalyse innovation and build deep cyber security talent are critical to build a vibrant cyber security industry in Singapore,” said Ms Thien Kwee Eng, Assistant Managing Director, Singapore Economic Development Board.

Mr David Koh, Chief Executive of CSA, said, “To ensure the holistic development of Singapore’s cyber security landscape, CSA is working closely with major industry partners to build local capabilities as well as develop advanced cyber security capabilities. StarHub’s Centre is built upon the foundation of strong partnerships with global leading industry players for innovations and with local Institutes of Higher Learning for talent development. We applaud StarHub’s efforts to strengthen cyber security capabilities which will allow us to better secure Singapore’s cyber space.”

StarHub and the COE partners will jointly invest S$200 million over the next five years to support a sustainable cyber security ecosystem.

For the original press release, please visit


Posted in Industry News, Latest Security News, Wedge News | Tagged , , , | Leave a comment