DATA SECURITY, PLATFORM SECURITY, SOFTWARE SECURITY
Lookout | January 31, 2023
Lookout, Inc., a business specializing in endpoint-to-cloud security, has announced enhanced capabilities and feature updates to its award-winning Lookout Cloud Security Platform, the only endpoint-to-cloud security solution available on the market. In addition to cloud, internet, and private applications, the cloud-native platform now includes a single policy architecture for administration and enforcement across all mobile devices.
A single agent and a single control plane for mobile and cloud security services are also new platform upgrades, providing IT and security professionals with a cost-effective, streamlined administration experience. In addition, the Lookout Cloud Security Platform combines security service edge (SSE) with endpoint security to secure users and data regardless of location.
It constantly monitors the risk posture of devices and users to provide dynamic and granular zero-trust access based on the sensitivity level of applications and data. As a result, it enables organizations to protect their workers, devices, applications, and data from unauthorized access and modern internet-based threats. In addition, the extended platform enables clients to make more educated choices about cloud security services using threat data from mobile endpoints.
Lookout CEO, Jim Dolce, said, "Digital transformation and the significant adoption of the cloud have accelerated remote work and the use of mobile and unmanaged devices, which in turn exposes organizations to new security gaps that are ripe for exploitation from bad actors." He added, "Lookout's mission is to secure and empower the digital future where mobility and cloud are essential to all that we do for work and play; our endpoint to cloud security platform ensures that your data is protected – regardless of device, user or location."
(Source – PR Newswire)
The Award-Winning Lookout Platform
The Lookout Cloud Security Platform integrates security services based on the company's unique technologies:
Lookout Secure Private Access
Lookout Secure Cloud Access
Lookout Mobile Endpoint Security
Lookout Secure Internet Access
About Lookout, Inc.
Lookout, Inc. is a cybersecurity firm that merges endpoint security with SASE technology to protect data while maintaining user privacy. Its single, cloud-native security platform protects data across devices, applications, networks, and clouds—a solution as fluid and adaptable as the current digital environment. Giving companies and people more control over their data empowers them to maximize its value and flourish. Lookout is trusted by organizations of all sizes, government agencies, and millions of individuals to safeguard sensitive data, allowing them to live, work, and connect freely and securely.
Read More
DATA SECURITY,PLATFORM SECURITY,SOFTWARE SECURITY
Varonis | January 27, 2023
On January 26, 2023, Varonis Systems, Inc., a leader in data security and analytics, announced the availability of automated posture management to assist clients in resolving security and compliance gaps spanning their SaaS and IaaS systems.
Varonis continuously scans, identifies, and ranks cloud security threats, providing CISOs and compliance officers with real-time insight into their data security posture. With this new automation option, users can fix misconfigurations in applications such as Salesforce and AWS with a single click from a unified interface.
According to Gartner, through 2025, 99% of cloud security breaches will be the customer's fault. CIOs can counter this by adopting and enforcing rules for cloud ownership, accountability, and risk acceptance.
Varonis Field CTO, Brian Vecci, said, “Automated posture management takes the burden of understanding and remediating cloud misconfigurations off the customer.” He also said, “We stay on top of the latest configuration risks and best practices, so you don’t have to. Now, we can not only show you exactly how to improve your security posture, but we can also automatically mitigate risk on your behalf.”
(Source – GlobeNewswire)
This release marks a significant advancement in cloud data security. Passive data security posture management (DSPM) solutions need manual operations to generate help desk tickets for a person to review and fix in every cloud application manually. Varonis offers a uniform and automated method for minimizing the attack surface of multi-cloud environments.
Automated posture management is the most recent tool introduced by Varonis to simplify data security outcomes. Varonis introduced least privilege automation for Google Drive, Microsoft 365, and Box, as well as a new data security posture management (DSPM) dashboard early this month.
About Varonis
Varonis is a leader in data security and analytics, waging war differently from typical cybersecurity corporations. Instead, Varonis focuses on protecting business data like:
Sensitive files and emails
Strategic and product plans
Financial records
Confidential customer, patient, and employee data
In addition to data protection, Zero Trust, data governance, compliance, categorization, data privacy, and threat detection and response, Varonis solutions handle various other critical use cases. The company began operations in 2005 and has clients in the financial services, healthcare, industrial, energy and utilities, insurance, technology, media and entertainment, consumer and retail, and education industries, among others.
Read More
ENTERPRISE SECURITY,PLATFORM SECURITY,SOFTWARE SECURITY
Nozomi Networks | January 25, 2023
On January 24, 2023, Nozomi Networks Inc., one of the leaders in OT and IoT security, announced Nozomi ArcTM, the industry's first IoT and OT endpoint security sensor, intended to accelerate time to full operational resilience exponentially. Nozomi Arc is designed to automatically deploy across a large number of locations and devices anywhere a company needs visibility, and it provides vital data and insights about essential assets and network endpoints. This data is utilized to better analyze and prevent attacks, as well as correlate user behavior, without straining existing resources or interrupting mission-critical networks.
Arc is a game-changer in terms of comprehensive asset visibility, deployment speed, and network coverage across complex and remote OT and IT networks. Nozomi Arc is designed to:
Be deployed remotely
Analyze endpoint vulnerabilities
Accelerate monitoring deployments in mission-critical systems; and
Identify compromised hosts
Nozomi Networks Co-founder and CPO, Andrea Carcano, said, "Operational resiliency is the top business priority for critical infrastructure organizations, which can only be achieved by lowering cyber risks and increasing security." He added, "Nozomi Arc accelerates time to resiliency by transforming every computer on the network into an OT security sensor. It quickly extends visibility to attack surfaces and threats inside endpoint hosts and their local networks. With Nozomi Arc, users can quickly corollate more information from more sources for better diagnostics and faster time to response."
(Source – GlobeNewswire)
With Nozomi Arc, users get the following advantages:
Faster time to resiliency: Nozomi Arc removes time, resource, geographic, and internal policy limits from network-based deployments.
Lower cyber risk and increased security: The only OT solution in the market that can identify malicious hardware.
Extended visibility and context: In addition to illuminating additional assets, devices, and possible vulnerabilities, Arc detects process irregularities and questionable user behavior.
Lower operational overhead: Because Arc can be remotely deployed through a software download, Nozomi Arc does not need extensive network adjustments to be implemented anywhere in the world, even in the most remote locations.
About Nozomi Networks
Nozomi Networks, with headquarters in San Francisco, California, accelerates digital transformation by defending the world's critical infrastructure, industrial enterprises, and government enterprises from cyber-attacks. Its technology provides OT and IoT environments with superior network and asset monitoring, threat detection, and analytics. As a result, customers rely on the company's solution to reduce risk and complexity while increasing operational resiliency. In addition, the organization provides zero-trust security by delivering contextual data for policy decisions, such as endpoint posture checks, baseline monitoring, and device role data.
Read More