Vicarius and DigiSec360 - Protecting Indian Businesses

53,000 security incidents were reported to CERT-In, the Indian Computer Emergency Response Team, in 2017 alone. There was a cyber-security incident in India every 10 minutes. Nevertheless, an economy that grows between 7-8 percent a year (from 2016 to 2018) tends to focus on keeping up the momentum, putting security concerns aside. However, the business sector in India is coming to realize that operating under a continuous and growing cyber threat is simply not feasible, and this is where
- Vicarius and DigiSec360 - Protecting Indian Businesses

Read more

Vicarius and Infinyt - The New Mayan Revolution

While most archaeological finds can be explained, the bridges, water systems and roads of the Mayan tribe remain a mystery. It's hard to know how Mayan engineers constructed tall buildings that were not exceeded in height until the first skyscraper was built in the US in 1885, how they invented the blast furnace 2,000 years before it was patented in England, and vulcanized rubber more than 2,600 years before Goodyear. Today, Mexico is following suit in the cyber-security
- Vicarius and Infinyt - The New Mayan Revolution

Read more

Vicarius and AMATAS - The Force Multipliers

Few people know that Bulgaria is the only country in Europe that hasn't changed its name since the day it was established. Not only that, the Bulgarian army has never lost a battle since its inception in 681 AD. Fast forward more than 1,300 years, and wars are mostly taking place in cyberspace. In this modern battlefield, the elite Bulgarian cyber-security unit AMATAS likewise remains undefeated. To continue this illustrious winning tradition, Vicarius was enlisted to introduce a new
- Vicarius and AMATAS - The Force Multipliers

Read more

Vicarius? What Do You Guys Even Disrupt?

TL;DR - The Next-Gen cyber-security revolution left one important field behind: Vulnerability Assessment. Vicarius is here to make things right The Security World Is Moving Forward The first Anti Virus (AV) software that incorporated a signature-based approach to security was introduced back in 1987 by G Data Software. Deterred, but only for a bit, hackers went on to develop on-the-fly malleable malware types that made signature-based detection obsolete. The good guys went back to the drawing board, and Next-Gen
- Vicarius? What Do You Guys Even Disrupt?

Read more

Agent VS Agentless, Why Not Both? The Story Behind Topia 3.5

TL;DR - A month ago we've felt that there is a significant amount of companies who would deploy Vicarius's Topia if we also had an agentless version, so we've done it. How It All Started? "I Like your technology, but I cannot afford to deploy another agent...". Boy, we had LOADS of these calls lately. As a small vendor, it's very hard to disrupt an industry that goes through the same path for the last 15 years. Another Agent?
- Agent VS Agentless, Why Not Both? The Story Behind Topia 3.5

Read more