Network as a Security Sensor Threat Defense with Full NetFlow

81 views

Historically IT organizations focused heavily on perimeter network security to protect their networks from cyber attacks. Protection at the perimeter edge works well for data moving toward the protected assets. However, recent breaches have shown that perimeter security alone isn’t sufficient to combat advanced persistent threats. With the advent of bring your own device (BYOD), cloud and the Internet of Things (IoT), data no longer resides only on key servers, and access to the network is no longer granted in a restricted fashion.

Spotlight

Nasdaq Bwise

Nasdaq BWise is a global leader in Enterprise Governance, Risk Management and Compliance (GRC) software. Based on a strong heritage in business process management, the BWise® GRC Platform provides companies with highly-rated, proven software solutions for Risk Management, Internal Control, Internal Audit, Compliance & Policy Management, Information Security and Sustainability Performance Management.

OTHER ARTICLES
ENTERPRISE SECURITY

Why Should Businesses Care About Identity Security?

Article | August 2, 2022

In recent years, several of the world's most technology-savvy businesses have experienced identity-related breaches. These occurrences have emphasized how digital identities have evolved to be both today's largest cybersecurity issue and the foundation of current organizational security. It has become evident that a comprehensive, all-hands-on-deck strategy is essential to keep ahead of attackers and make their success more difficult. Why Should Businesses Care About Identity Security? According to CrowdStrike Overwatch team analysis, eight out of ten (80%) breaches are identity-driven. These contemporary attacks often skip the conventional cyber kill chain by utilizing stolen credentials to perform lateral moves and launch larger, more devastating attacks. Identity-driven attacks, however, are particularly difficult to detect. When a genuine user's credentials have been hacked, and an adversary is posing as that user, traditional security processes and tools might make it impossible to distinguish between the user's regular activity and that of the hacker. Identity security is often seen as an organization's final line of defense. These technologies are designed to combat attackers who have escaped existing security measures like endpoint detection and response tools. Identity Security and Zero Trust: How Are They Related? Zero Trust is a security architecture that needs every user, both within and outside of an organization's network, to be verified, approved, and constantly checked for security configuration and posture before allowing or maintaining access to applications and data. Zero Trust implies that there is no conventional network edge; networks can be local, in the cloud, or a mix or hybrid of the two, with resources and employees located everywhere. Businesses that wish to implement the most robust security defenses should combine an identity security solution with a zero-trust security architecture. They must also make sure that their chosen solution complies with industry standards, such as those specified by NIST. Closing Lines Many changes are in store for 2022. Indeed, we cannot forecast all the critical challenges and subjects that will arise this year. Could you fill in some of the gaps? A robust identity security solution will provide the business with several benefits and expanded capabilities.

Read More
PLATFORM SECURITY

The Reasons Why Cyberattack Surfaces Are Rising

Article | July 11, 2022

Increased cyber assets result in growing attack surfaces. So much so that, according to a recent Gartner analysis, the number one security and risk management trend today is attack surface growth. Businesses and security executives must update security policies and processes to prevent growing dangers when new technologies and cyber environments are adopted. Let's discuss the reasons for attack surface growth and how to rethink cyber asset protection in light of them. Reasons Behind Attack Surface Expansion The Multi-Cloud Trend Is Rapidly Expanding Modern businesses are using the cloud to stay up with digital innovation and meet market expectations. For organizations in many locations, a single public cloud provider is no longer appropriate. Choosing one that satisfies organizational demands is difficult. This simple problem-solution gave many organizations the multi-cloud trend. Gartner found that 81% of respondents use two or more cloud services. Multi-cloud is also used to maintain a vendor-agnostic approach and prevent vendor lock-in. To remain ahead of the competition, numerous vendors provide best-of-breed solutions. This is a huge benefit for multi-cloud adopters. For Ever-Growing SaaS Toolchains, Visibility Is an Issue More than 150 SaaS apps are used by companies with 1,000+ employees. Modern businesses embrace more SaaS apps to speed up their workflows. However, as SaaS adoption expands, so do businesses' attack surfaces. The following are the key reasons for SaaS security: Misconfigurations The absence of robust identity and access management system Inadequate disaster recovery planning Problems with data retention Breach of privacy and data security Inability to satisfy regulatory compliance To keep up with SaaS platforms, businesses must have scalable security and compliance policies. CAASM Automates Security Gap Identification According to Gartner, Cyber Asset Attack Surface Management (CAASM), Digital Risk Protection Services (DRPS), and External Attack Surface Management (EASM) will enable CISOs to safeguard environments against expanding attack surfaces. CAASM will help security teams in particular to: Gain insight over the cloud and SaaS cyber assets Automatically fill security loopholes. Accelerate incident reaction and clean-up Closing Lines As the attack surface rises, so does the amount of cybercrime that occurs. According to the FBI, cyberattacks have risen 400% since the pandemic began, making it essential to detect and minimize cyberthreats for business's health and future. To defend your company from rising dangers, you must detect gaps in time and adapt to the digital world. There are more targets for attackers to strike since organizational attack surfaces are constantly growing.

Read More
ENTERPRISE SECURITY

Cloud Security Threats: 2022 Edition

Article | July 20, 2022

The worldwide cloud services industry is expanding as enterprises around the world continue to embrace cloud technologies. Cloud computing is estimated to reach 947.3 billion by 2026 (Yahoo), growing at a CAGR of 16.3%. But, for all of the advantages the cloud brings, there is a catch: cloud security risks. According to a survey by ISC2, 93% of businesses are concerned about the risks connected to cloud computing. Is this to say that the danger outweighs the reward? No, not at all. Let's look at some cloud security threats to watch out for in 2022, as well as how to develop a cybersecurity policy to safeguard your data while reaping the benefits of cloud computing safely. What Security Issues Can Organizations Deal in 2022? Cloud Strategy One of the most crucial security threats for companies is their ability to design and maintain a cloud strategy plan efficiently. Your business is likely to face fragmentation if cloud and security environments are not aligned with business strategy, which can have a detrimental impact on overall operations and business management. How to Mitigate This Risk: Create a cohesive strategy Concentrate on organizational outcomes Update your cloud security strategy periodically Unauthorized Access Access management is a major challenge to cloud security since it includes private data. Businesses of all sizes are concerned about employees openly sharing data with unauthorized personnel or external third parties, deliberately or accidentally. Additionally, some users with weak passwords or no authentication are more prone to having their data compromised. Ineffective passwords cause almost 80% of data breaches, according to Verizon. How to Mitigate This Risk: Create reasonable policies and processes Implementing multi-factor authentication (MFA) Developing a security model based on zero trust Making use of real-time access data Insecure APIs Many cyberattacks, particularly denial of service (DoS) cyberattacks, are done using application program interfaces (APIs). According to Gartner, API assaults will become the most common attack vector in 2022. How to Mitigate This Risk: Develop an API-specific security strategy Protect your API data using encryption Maintain consistent control over your APIs

Read More
PLATFORM SECURITY

How SD-WAN Can Help Businesses in Boosting ROI?

Article | July 4, 2022

We are surrounded by acronyms and buzzwords in technology. SD-WAN is one that is often used in the industry nowadays. Organizations embrace digital transformation to stay up with market developments, consumer needs, and competitiveness. Traditional network designs weren't meant to manage digital transformation workloads and complexity. Business-critical services are commonly spread over numerous clouds, compromising network performance, particularly at branch sites. Smart network operations teams opt for SD-WAN. SD-WAN reduces overhead and improves network performance. Routing and hardware expenses are saved through SD-WAN solutions while allowing multi-cloud access. SD-WAN also reduces overhead and supports new digital apps and services. This new technology streamlines WAN administration and operation and brings corporate advantages. Business Challenges that SD-WAN Addresses There has been a dramatic increase in the pressure on the network as a result of digitalization. Businesses must now rely on a stable and secure network, which conventional router-based network topologies are incapable of providing. An SD-WAN solution assists businesses in addressing use cases in order to expedite digital transformation efforts, lower cybersecurity risks, and increase revenue. Eases connectivity with far-flung factories and offices. Effectively deploys new sites and minimizes network equipment sprawl. Enhances the speed of file transfer and backups to disaster recovery facilities. Helps in moving applications to the cloud and protecting cloud app. data using Secure Access Service Edge (SASE). Safeguards IoT devices using a zero-trust network Helps in complying with the cybersecurity framework of the National Institute of Standards and Technology (NIST). Ways SD-WAN Can Help Businesses Boost their Bottom Line • Boosts Security Digital transformation is a double-edged sword. It can increase consumer satisfaction and market reach, but can pose security threats. According to the U.S. State of Cybercrime study, 41% of respondents stated more cybersecurity occurrences in 2017. The good news is that many SD-WAN solutions provide built-in security. Most SD-WAN systems only offer basic firewall and VPN functionalities, requiring IT teams to add security to elastic and dynamic SD-WAN connections after the fact. SD-WAN solutions with NGFW, IPS, encryption, AV, and sandboxing can avoid data loss, downtime, regulatory violations, and legal liability. • Enables Cloud Usage Cloud services are rapidly being used by businesses. The great news is that SD-WAN enables direct cloud access at the remote branch, removing backhauling traffic – which routes all cloud and branch office traffic through the data center – allowing workers to directly access cloud applications irrespective of location without burdening the core network with additional traffic to manage and secure. Furthermore, SD-WAN enhances cloud application performance by prioritizing vital business apps and allowing branches to interact directly with the Internet. • Reduces Costs As businesses deploy a growing number of cloud-based services, the volume of data traveling across a WAN rises dramatically, driving up operational expenses. SD-WAN, thankfully, can minimize this cost by utilizing low-cost local Internet connectivity, offering direct cloud access, and lowering traffic via the backbone WAN. According to an IDC poll (prediction), over a quarter of survey respondents anticipate SD-WAN cost reductions of up to 39%, with the other two-thirds anticipating more modest savings of 5–19%. • Improves performance Data transfer over a network isn't created equal. Fortunately, SD-WAN can be set up to prioritize business-critical traffic and real-time services such as Voice over Internet Protocol (VoIP) and then successfully guide it over the most efficient path. IT teams can help decrease packet loss and latency concerns by supporting important applications over dependable, high-performance connections, increasing employee productivity and morale. This is business-impacting performance. Closing Note Indeed, SD-WAN evolved and flourished in the data center over the first few years of development. However, the time has arrived to take it seriously as a tool for managing your wide area network. There are currently several vendors on the market, as well as several mature solutions to choose from. More significantly, the business cases for SD-WAN are expanding on a daily basis.

Read More

Spotlight

Nasdaq Bwise

Nasdaq BWise is a global leader in Enterprise Governance, Risk Management and Compliance (GRC) software. Based on a strong heritage in business process management, the BWise® GRC Platform provides companies with highly-rated, proven software solutions for Risk Management, Internal Control, Internal Audit, Compliance & Policy Management, Information Security and Sustainability Performance Management.

Related News

DATA SECURITY,PLATFORM SECURITY,SOFTWARE SECURITY

Hillstone Networks Targets Cyberattacks at Network Edge with High-End Next Generation Firewall Offerings

Hillstone Networks | August 25, 2022

Hillstone Networks, an innovative and accessible cybersecurity solutions provider, today unveiled new models in the Hillstone Networks A-Series Next Generation Firewalls (NGFW), the A7600 and A6800, to help enterprises secure their expanding network edge, deliver powerful network security capabilities, and drive sustainability with solutions in a compact 1RU form factor. According to IBM’s Cost of a Breach 2022 report, 83% of organizations studied have had more than one breach. Cyberattacks are not abating, and the cost, damages and recovery from a single breach continue to rise. Against an aggressive cyberattack backdrop, the volume and complexity of traffic in today’s IT environments continue to exponentially increase due to the expansion of different services such as videos, apps, and cloud-based-everything. With increased connectivity to services comes an increased complexity of vulnerabilities to secure against. Secure An Expanded Network Edge with Hillstone A-Series Next Generation Firewalls Enterprises need high-performing next-generation firewalls to meet today’s bandwidth requirements, service levels, and defend against more advanced threats. As the network edge expands from the traditional on-premises network perimeter, IT teams now must secure unforeseen levels of depth, as all layers of the IT stack must be secured at the edge. Minimize the Speed versus Security Trade-off with Proprietary Hardware Acceleration Engine IT teams regularly compromise one need over another, based on budget or resources. Hillstone’s proprietary Hardware (HW) Acceleration Engine offloads network traffic from the processor, allowing more resources to be dedicated for comprehensive security services, bringing streamlined threat detection and prevention capabilities to high-traffic applications and scenarios. The HW Acceleration Engine delivers ultra-low latency in network packet forwarding, allowing the NGFW to sift through and secure even the most latency-sensitive applications, including multimedia streaming, broker services, and other high-volume transactions. Native Cyberresilience Combined with High Throughput/Low Latency Deliver on App and Customer Experience Raw processing speed, with throughputs of 200 Gbps and 280 Gbps, allow for packet forwarding within a few microseconds, delivering quality of service across networks. Enterprise-grade security features come native with these offerings, including comprehensive and advanced threat protection for known and unknown malware with multiple security services, including Intrusion Prevention, IP Reputation, URL Filtering, Anti-Spam, Anti-Virus, Cloud Sandbox, Botnet C2, among others. “Because today’s network traffic across all applications and services is increasing both in complexity, and in volume across hybrid and multi-cloud deployments, a high performing NGFW is no longer optional – it is now mandatory. “Today’s data centers, edge locations, service providers are looking for a powerful solution that delivers on multiple fronts – security, performance, and customer experience. The new NGFW offerings deliver the on the needs of our customers today with the flexibility of multiple deployment models.” Tim Liu, co-founder & CTO, Hillstone Networks The A-Series NGFW is a solid platform for enterprise customers to enable an SD-WAN solution to bridge connectivity and security needs. The integration consolidates network VPN and security in one device or client, allowing for a faster, lower-cost and more secure local internet connection at remote locations. In addition, customers can also unlock a Zero Trust Network Access (ZTNA) solution, to meet remote access security requirements, including identity-based, least-privileged secure access, as well as context-aware, adaptive access control, enhancing both security and effectiveness for the remote connections. About Hillstone Networks Hillstone Networks’ innovative and accessible cybersecurity solutions reshape enterprise and service provider security, enabling cyber resilience while lowering TCO. Providing comprehensive visibility, superior intelligence, and rapid protection to see, understand, and act against cyberthreats from edge to cloud, Hillstone is favorably rated by leading analysts and trusted by global companies.

Read More

DATA SECURITY,PLATFORM SECURITY,SOFTWARE SECURITY

SonicWall Earns Prestigious 2022 CRN Annual Report Card Award for Enterprise Network Security

SonicWall | August 22, 2022

SonicWall today announced that CRN, a brand of The Channel Company, named the cybersecurity leader as one of the winners in the Enterprise Network Security category of the 2022 CRN Annual Report Card (ARC) Awards. This award honors the industry's top technology vendors for success in providing high levels of satisfaction for channel partners through innovative products, services and partner programs. "As a 100% channel company, we remain completely committed to delivering our partners and customers with the absolute best products and support to face today's increasingly complicated security challenges," said SonicWall President and CEO Bob VanKirk. "We're excited to be recognized by CRN, especially knowing that they celebrate best-in-class vendors that are committed to driving partner growth and demonstrating outstanding channel performance. SonicWall is uniquely positioned to help partners, including MSSPs, evolve and help facilitate their growth." With 37 years of history, CRN's ARC Awards recognize best-in-class vendors devoted to boosting IT channel growth through innovation in technology and partner strategy. Through the ARC Awards — known as one of the most prestigious honors in the IT industry — solution providers offer key feedback that commends technology manufacturers for designing channel-friendly product offerings, developing strong partner programs, and building long-term successful relationships with solution providers. SonicWall's SecureFirst Partner Program and its industry-leading security products help partners and MSSPs exceed customer demands. More than 17,000 active SonicWall partners help protect our customers every day, and because of them SonicWall is one of the unquestioned leaders in the cybersecurity space. The ARC Awards are based on an invitation-only research survey conducted by The Channel Company. Responses from 3,000 solution providers across North America were evaluated in this year's survey, rating 82 vendor partners across four criteria: product innovation, support, partnership, and managed cloud services. Scores were awarded in 25 major product categories in technology areas that are critical to channel partner success. "It's our pleasure to honor vendors that consistently deliver top-performing products and services to establish and foster successful channel partner relationships. "In addition to highlighting our winners, CRN's Annual Report Card Awards provide vendors with actionable feedback and insight into their current standing with partners that can be incorporated into their channel strategies in the future." Blaine Raddon, CEO, The Channel Company Winners will be featured throughout The Channel Company's XChange 2022 conference, taking place August 21-23 in Denver, Colorado. Coverage of the CRN 2022 ARC results can be found online at www.CRN.com/ARC and will be featured in the October 2022 issue of CRN Magazine. About SonicWall SonicWall delivers Boundless Cybersecurity for the hyper-distributed era in a work reality where everyone is remote, mobile and unsecure. SonicWall safeguards organizations mobilizing for their new business normal with seamless protection that stops the most evasive cyberattacks across boundless exposure points and increasingly remote, mobile and cloud-enabled workforces. By knowing the unknown, providing real-time visibility and enabling breakthrough economics, SonicWall closes the cybersecurity business gap for enterprises, governments and SMBs worldwide. For more information, visit www.sonicwall.com or follow us on Twitter, LinkedIn, Facebook and Instagram. About The Channel Company The Channel Company enables breakthrough IT channel performance with our dominant media, engaging events, expert consulting and education, and innovative marketing services and platforms. As the channel catalyst, we connect and empower technology suppliers, solution providers and end users. Backed by more than 30 years of unequalled channel experience, we draw from our deep knowledge to envision innovative new solutions for ever-evolving challenges in the technology marketplace.

Read More

SOFTWARE SECURITY

Palo Alto Networks Unit 42 Helps Customers Better Address Cybersecurity Threats Through New Managed Detection and Response Service

Palo Alto Networks | August 05, 2022

The need for managed detection and response (MDR) is soaring as attack surfaces grow, cloud usage skyrockets and the cybersecurity skills gap widens. Palo Alto Networks, the global cybersecurity leader, today introduced Unit 42 Managed Detection and Response (Unit 42 MDR) to address this need with a new service that can offer continuous 24/7 threat detection, investigation and response. This offering brings together Palo Alto Networks acclaimed Cortex XDR with Unit 42's industry-leading threat intelligence, which includes insights from incident response cases. Because Unit 42 MDR is built on Cortex XDR, it is optimized to not just prioritize alerts but also to massively reduce the number of alerts customers receive. This helps customers detect more suspicious activity than they would have otherwise. "As cyberattacks continue to rise, many organizations are being asked to handle advanced threats with limited resources and without the right expertise. This will not lead to good results. "Palo Alto Networks Unit 42 brings a unique combination of innovative cybersecurity technologies and a world-class threat intelligence team which allows us to provide customers with rapid detection and response to critical cyberthreats." Wendi Whitmore, senior vice president, Palo Alto Networks Unit 42 The new Unit 42 MDR service offers customers cybersecurity experts to help identify and respond to security alerts and potential threats in real time, enabling businesses to focus security operations (SecOps) personnel on other organizational security priorities. The service provides organizations with monitoring, threat hunting and response/remediation capabilities, including: Continuous Monitoring & Response: Security experts monitor alerts, events and indicators 24x7x365. The Unit 42 MDR team uses a mix of proprietary processes, infrastructure and enrichment to accelerate detection, response and threat hunting to help quickly stop malicious activity most likely to impact your organization. Proactive Threat Hunting: World-class threat hunters search environments for complex attacks using deep knowledge of XDR data sources and the latest threat intelligence from Palo Alto Networks. This helps organizations stay ahead of emerging attack campaigns, malware and vulnerabilities. Security Posture Optimization: Experts provide periodic health checks of an organization's posture and detailed recommendations on policy changes to help facilitate addressing risks before they become issues. "Cyberattacks are emerging and evolving faster than ever," said Tom Osteen, CIO, Enloe Medical Center. "Intervening and addressing threats at the earliest stage is crucial. With Unit 42 MDR we have confidence that we can quickly identify and stop malicious activity to help keep our organization safe and secure." In a recent report, IDC said, "It is not a surprise to state that organizations continue to struggle with persistent security talent shortages and the rising costs to retain these scarce security resources. Security teams with already limited resources are overwhelmed by the heavy workload and responsibility." The report also stated, "Organizations are analyzing their current risks and accelerating their security services investments to ease pressure on their teams and strengthen their overall security posture to meet the growing cyberthreats."* About Cortex XDR Cortex XDR® is the world's first detection and response solution that natively integrates network, endpoint and cloud data to stop sophisticated attacks. It is designed to stop attacks with the power of AI and comprehensive data. XDR is critical to effective security. The latest Palo Alto Networks 2022 Unit 42 Incident Response Report highlights that when a breach occurs, 44% of the cases involved a business that did not have or did not fully deploy an endpoint detection and response or XDR security solution. About Palo Alto Networks Palo Alto Networks is the world's cybersecurity leader. We innovate to outpace cyberthreats, so organizations can embrace technology with confidence. We provide next-gen cybersecurity to thousands of customers globally, across all sectors. Our best-in-class cybersecurity platforms and services are backed by industry-leading threat intelligence and strengthened by state-of-the-art automation. Whether deploying our products to enable the Zero Trust Enterprise, responding to a security incident, or partnering to deliver better security outcomes through a world-class partner ecosystem, we're committed to helping ensure each day is safer than the one before. It's what makes us the cybersecurity partner of choice.

Read More

DATA SECURITY,PLATFORM SECURITY,SOFTWARE SECURITY

Hillstone Networks Targets Cyberattacks at Network Edge with High-End Next Generation Firewall Offerings

Hillstone Networks | August 25, 2022

Hillstone Networks, an innovative and accessible cybersecurity solutions provider, today unveiled new models in the Hillstone Networks A-Series Next Generation Firewalls (NGFW), the A7600 and A6800, to help enterprises secure their expanding network edge, deliver powerful network security capabilities, and drive sustainability with solutions in a compact 1RU form factor. According to IBM’s Cost of a Breach 2022 report, 83% of organizations studied have had more than one breach. Cyberattacks are not abating, and the cost, damages and recovery from a single breach continue to rise. Against an aggressive cyberattack backdrop, the volume and complexity of traffic in today’s IT environments continue to exponentially increase due to the expansion of different services such as videos, apps, and cloud-based-everything. With increased connectivity to services comes an increased complexity of vulnerabilities to secure against. Secure An Expanded Network Edge with Hillstone A-Series Next Generation Firewalls Enterprises need high-performing next-generation firewalls to meet today’s bandwidth requirements, service levels, and defend against more advanced threats. As the network edge expands from the traditional on-premises network perimeter, IT teams now must secure unforeseen levels of depth, as all layers of the IT stack must be secured at the edge. Minimize the Speed versus Security Trade-off with Proprietary Hardware Acceleration Engine IT teams regularly compromise one need over another, based on budget or resources. Hillstone’s proprietary Hardware (HW) Acceleration Engine offloads network traffic from the processor, allowing more resources to be dedicated for comprehensive security services, bringing streamlined threat detection and prevention capabilities to high-traffic applications and scenarios. The HW Acceleration Engine delivers ultra-low latency in network packet forwarding, allowing the NGFW to sift through and secure even the most latency-sensitive applications, including multimedia streaming, broker services, and other high-volume transactions. Native Cyberresilience Combined with High Throughput/Low Latency Deliver on App and Customer Experience Raw processing speed, with throughputs of 200 Gbps and 280 Gbps, allow for packet forwarding within a few microseconds, delivering quality of service across networks. Enterprise-grade security features come native with these offerings, including comprehensive and advanced threat protection for known and unknown malware with multiple security services, including Intrusion Prevention, IP Reputation, URL Filtering, Anti-Spam, Anti-Virus, Cloud Sandbox, Botnet C2, among others. “Because today’s network traffic across all applications and services is increasing both in complexity, and in volume across hybrid and multi-cloud deployments, a high performing NGFW is no longer optional – it is now mandatory. “Today’s data centers, edge locations, service providers are looking for a powerful solution that delivers on multiple fronts – security, performance, and customer experience. The new NGFW offerings deliver the on the needs of our customers today with the flexibility of multiple deployment models.” Tim Liu, co-founder & CTO, Hillstone Networks The A-Series NGFW is a solid platform for enterprise customers to enable an SD-WAN solution to bridge connectivity and security needs. The integration consolidates network VPN and security in one device or client, allowing for a faster, lower-cost and more secure local internet connection at remote locations. In addition, customers can also unlock a Zero Trust Network Access (ZTNA) solution, to meet remote access security requirements, including identity-based, least-privileged secure access, as well as context-aware, adaptive access control, enhancing both security and effectiveness for the remote connections. About Hillstone Networks Hillstone Networks’ innovative and accessible cybersecurity solutions reshape enterprise and service provider security, enabling cyber resilience while lowering TCO. Providing comprehensive visibility, superior intelligence, and rapid protection to see, understand, and act against cyberthreats from edge to cloud, Hillstone is favorably rated by leading analysts and trusted by global companies.

Read More

DATA SECURITY,PLATFORM SECURITY,SOFTWARE SECURITY

SonicWall Earns Prestigious 2022 CRN Annual Report Card Award for Enterprise Network Security

SonicWall | August 22, 2022

SonicWall today announced that CRN, a brand of The Channel Company, named the cybersecurity leader as one of the winners in the Enterprise Network Security category of the 2022 CRN Annual Report Card (ARC) Awards. This award honors the industry's top technology vendors for success in providing high levels of satisfaction for channel partners through innovative products, services and partner programs. "As a 100% channel company, we remain completely committed to delivering our partners and customers with the absolute best products and support to face today's increasingly complicated security challenges," said SonicWall President and CEO Bob VanKirk. "We're excited to be recognized by CRN, especially knowing that they celebrate best-in-class vendors that are committed to driving partner growth and demonstrating outstanding channel performance. SonicWall is uniquely positioned to help partners, including MSSPs, evolve and help facilitate their growth." With 37 years of history, CRN's ARC Awards recognize best-in-class vendors devoted to boosting IT channel growth through innovation in technology and partner strategy. Through the ARC Awards — known as one of the most prestigious honors in the IT industry — solution providers offer key feedback that commends technology manufacturers for designing channel-friendly product offerings, developing strong partner programs, and building long-term successful relationships with solution providers. SonicWall's SecureFirst Partner Program and its industry-leading security products help partners and MSSPs exceed customer demands. More than 17,000 active SonicWall partners help protect our customers every day, and because of them SonicWall is one of the unquestioned leaders in the cybersecurity space. The ARC Awards are based on an invitation-only research survey conducted by The Channel Company. Responses from 3,000 solution providers across North America were evaluated in this year's survey, rating 82 vendor partners across four criteria: product innovation, support, partnership, and managed cloud services. Scores were awarded in 25 major product categories in technology areas that are critical to channel partner success. "It's our pleasure to honor vendors that consistently deliver top-performing products and services to establish and foster successful channel partner relationships. "In addition to highlighting our winners, CRN's Annual Report Card Awards provide vendors with actionable feedback and insight into their current standing with partners that can be incorporated into their channel strategies in the future." Blaine Raddon, CEO, The Channel Company Winners will be featured throughout The Channel Company's XChange 2022 conference, taking place August 21-23 in Denver, Colorado. Coverage of the CRN 2022 ARC results can be found online at www.CRN.com/ARC and will be featured in the October 2022 issue of CRN Magazine. About SonicWall SonicWall delivers Boundless Cybersecurity for the hyper-distributed era in a work reality where everyone is remote, mobile and unsecure. SonicWall safeguards organizations mobilizing for their new business normal with seamless protection that stops the most evasive cyberattacks across boundless exposure points and increasingly remote, mobile and cloud-enabled workforces. By knowing the unknown, providing real-time visibility and enabling breakthrough economics, SonicWall closes the cybersecurity business gap for enterprises, governments and SMBs worldwide. For more information, visit www.sonicwall.com or follow us on Twitter, LinkedIn, Facebook and Instagram. About The Channel Company The Channel Company enables breakthrough IT channel performance with our dominant media, engaging events, expert consulting and education, and innovative marketing services and platforms. As the channel catalyst, we connect and empower technology suppliers, solution providers and end users. Backed by more than 30 years of unequalled channel experience, we draw from our deep knowledge to envision innovative new solutions for ever-evolving challenges in the technology marketplace.

Read More

SOFTWARE SECURITY

Palo Alto Networks Unit 42 Helps Customers Better Address Cybersecurity Threats Through New Managed Detection and Response Service

Palo Alto Networks | August 05, 2022

The need for managed detection and response (MDR) is soaring as attack surfaces grow, cloud usage skyrockets and the cybersecurity skills gap widens. Palo Alto Networks, the global cybersecurity leader, today introduced Unit 42 Managed Detection and Response (Unit 42 MDR) to address this need with a new service that can offer continuous 24/7 threat detection, investigation and response. This offering brings together Palo Alto Networks acclaimed Cortex XDR with Unit 42's industry-leading threat intelligence, which includes insights from incident response cases. Because Unit 42 MDR is built on Cortex XDR, it is optimized to not just prioritize alerts but also to massively reduce the number of alerts customers receive. This helps customers detect more suspicious activity than they would have otherwise. "As cyberattacks continue to rise, many organizations are being asked to handle advanced threats with limited resources and without the right expertise. This will not lead to good results. "Palo Alto Networks Unit 42 brings a unique combination of innovative cybersecurity technologies and a world-class threat intelligence team which allows us to provide customers with rapid detection and response to critical cyberthreats." Wendi Whitmore, senior vice president, Palo Alto Networks Unit 42 The new Unit 42 MDR service offers customers cybersecurity experts to help identify and respond to security alerts and potential threats in real time, enabling businesses to focus security operations (SecOps) personnel on other organizational security priorities. The service provides organizations with monitoring, threat hunting and response/remediation capabilities, including: Continuous Monitoring & Response: Security experts monitor alerts, events and indicators 24x7x365. The Unit 42 MDR team uses a mix of proprietary processes, infrastructure and enrichment to accelerate detection, response and threat hunting to help quickly stop malicious activity most likely to impact your organization. Proactive Threat Hunting: World-class threat hunters search environments for complex attacks using deep knowledge of XDR data sources and the latest threat intelligence from Palo Alto Networks. This helps organizations stay ahead of emerging attack campaigns, malware and vulnerabilities. Security Posture Optimization: Experts provide periodic health checks of an organization's posture and detailed recommendations on policy changes to help facilitate addressing risks before they become issues. "Cyberattacks are emerging and evolving faster than ever," said Tom Osteen, CIO, Enloe Medical Center. "Intervening and addressing threats at the earliest stage is crucial. With Unit 42 MDR we have confidence that we can quickly identify and stop malicious activity to help keep our organization safe and secure." In a recent report, IDC said, "It is not a surprise to state that organizations continue to struggle with persistent security talent shortages and the rising costs to retain these scarce security resources. Security teams with already limited resources are overwhelmed by the heavy workload and responsibility." The report also stated, "Organizations are analyzing their current risks and accelerating their security services investments to ease pressure on their teams and strengthen their overall security posture to meet the growing cyberthreats."* About Cortex XDR Cortex XDR® is the world's first detection and response solution that natively integrates network, endpoint and cloud data to stop sophisticated attacks. It is designed to stop attacks with the power of AI and comprehensive data. XDR is critical to effective security. The latest Palo Alto Networks 2022 Unit 42 Incident Response Report highlights that when a breach occurs, 44% of the cases involved a business that did not have or did not fully deploy an endpoint detection and response or XDR security solution. About Palo Alto Networks Palo Alto Networks is the world's cybersecurity leader. We innovate to outpace cyberthreats, so organizations can embrace technology with confidence. We provide next-gen cybersecurity to thousands of customers globally, across all sectors. Our best-in-class cybersecurity platforms and services are backed by industry-leading threat intelligence and strengthened by state-of-the-art automation. Whether deploying our products to enable the Zero Trust Enterprise, responding to a security incident, or partnering to deliver better security outcomes through a world-class partner ecosystem, we're committed to helping ensure each day is safer than the one before. It's what makes us the cybersecurity partner of choice.

Read More

Events