Corsa Security
Corsa Security enables MSSPs and SPs to offer a virtualized Firewall as a Service
Corsa Security announced that it has expanded its network security virtualization platform to automate Firewall-as-a-Service (FWaaS). The new solution means that Managed …

New infosec products of the week: April 17, 2020
NeuVector adds to container security platform, automates end-to-end vulnerability management The platform additions include the new Vulnerability and Compliance Explorer for …

Corsa Security Orchestrator: Intelligent orchestration and management of virtual NGFW arrays
Corsa Security announced their Corsa Security Orchestrator, a virtual infrastructure manager for operating virtual machines (VMs) and the infrastructure to virtualize Next …
Corsa Security encourages an open and collaborative approach to scaling network security
Corsa Security, leaders in scaling network security, has launched a Network Security Ecosystem program to foster an open and collaborative approach between like-minded …

New infosec products of the week: July 12, 2019
Exostar launches new SaaS-based policy management solution Exostar PolicyPro extends the company’s risk management suite by allowing organizations throughout the DoD supply …
Corsa unveils new network security virtualization platform to scale traffic inspection to 100%
Corsa Security, formerly Corsa Technology, launched Corsa Red Armor, a turnkey network security virtualization platform which scales traffic inspection to 100%, without …
Featured news
Resources
Don't miss
- Mastering the cybersecurity tightrope of protection, detection, and response
- PRevent: Open-source tool to detect malicious code in pull requests
- Darcula allows tech-illiterate crooks to create, deploy DIY phishing kits targeting any brand
- Hackers pose as employers to steal crypto, login credentials
- Unknown and unsecured: The risks of poor asset visibility