'Content is a crucial aspect of your online presence as it essentially represents your brand,' says Michael Cichon

Content Syndication
Michael Cichon is a seasoned B2B marketer specializing in digital and content marketing for identity-based online fraud detection and advanced email security solutions. With an expertise in product and digital marketing, he excels in developing brand narratives, driving integrated demand generation campaigns, and connecting with customers on a personal level to inspire action.
Read on to know his ideas on the importance of content syndication practices in information security industry.

Messaging and the content that brings it to life is the genesis of a startup's marketing and go-to-market strategy.

Media 7: Hi Michael, thank you for your time. Please provide us an overview of your professional journey and how you arrived at your current position as the CMO of 1Kosmos.
Michael Cichon:
  I am a career marketer based in Silicon Valley for the past 25 plus years. I've primarily worked with business-to-business software application companies. Since 2008, I've focused on digital marketing with hands-on experience managing paid, earned and owned channels, so I consider myself a digital-first marketing leader. In the last six years, I've exclusively been involved with cyber security, specifically in digital identity, AI / ML and authentication.

M7: How do you leverage thought leadership and industry expertise as part of 1Kosmos marketing strategy to build credibility and differentiate your company from competitors in the information security industry?
MC
: Right. So, first, let's discuss what thought leadership is and what it's not. From my perspective, thought leadership is a new or advanced idea. It's something unique, novel, and sometimes controversial, but always supported by defensible facts.

In high-tech marketing, it represents an intersection between advancing technology and business value, and it has the utility to accelerate a business toward their goals. It's not just an idea and certainly not a way to spin an application. Importantly, it leads the conversation so if it’s rife with buzzwords you know it’s not leading, but following or imitating others. Thought leadership is usually specific, clear, and focused.

In B2B, thought leadership shares a perspective and involves teaching our target audience exactly what they need to know to become an active buyer. It’s persuasive, strategic and packaged in a way that’s suitable to the attention spans at different stages of awareness. You’ll find different mediums such as webinars, blogs, white papers, video logs, and more all geared to reach professionals where they are online and in a way that’s digestible.

M7: What role does market research and competitive analysis play in shaping your company’s marketing strategy within the information security industry?
MC:
At its core, having a clear understanding of what I would refer to as unique enabling-capabilities and the value they bring to an organization is crucial. That's where it all begins. To understand your unique values, you must also be familiar with competitive approaches, which necessitates a thorough understanding of alternate solutions and narratives. Therefore, market research and competitive analysis play an absolutely critical role.

Read more: ‘The toughest part is making the content both timely and relevant,’ says Stel Valavanis


Thought leadership plays a vital role in expanding and increasing the distribution of products and ideas.

M7: Please brief us about services and products of 1Kosmos.
MC:
When it comes to 1Kosmos, we are the only company that has unified identity proofing and authentication. This is important when you realize that onboarding users to business infrastructure is a mission-critical activity. This is true for all users – workers accessing corporate infrastructure, customers logging into services and even residents requesting government services. In each case, missidentifying the user or granting them access to systems for which they shouldn’t have access can have devastating consequences to any business. We see this virtually every day in fraud, data breach and ransomware attacks reported in the news.

At 1Kosmos, we bring our solutions to the market through three distinct products. One product focuses on workforce authentication, another caters to business-to-consumer use cases, and the third product revolves around self-service identity proofing. These give organizations the ability to remotely verify an identity on the web with a high level of assurance, and then verify that identity at every access attempt. To provide such an assurance, our platform has undergone rigorous certifications. We are the only platform certified to industry standards, specifically known as FIDO2, NIST 800-63-3, iBeta PAD2, SOC2 and ISO27001.

M7: Can you provide examples of some successful content campaigns or initiatives that have helped elevate your brand’s visibility and recognition?
MC:
You will find multiple examples on the 1Kosmos website, including several white papers, webinars, vlogs, infographics, meme’s (which help break through the noise on social media), and more.

The grandfather of them all – white papers – are essentially a narrative that contain supporting ideas typically found in its chapters. These chapters represent significant concepts, and you can also find them promoted independently in different forms. Let me provide a specific example: a white paper we recently published addresses the challenge of implementing password-less authentication. While there is a technical capability known as password-less authentication, this white paper focuses on technology-enabled business transformation, so it addresses the many challenges in controlling an enterprise-wide project and gracefully migrating users from traditional passwords, which many of us have been using for decades, to biometric authentication.

The white paper serves as the foundation for the narrative and is accompanied by other forms of content such as blogs, webinars, and contributed articles, furthering the discussion and building the narrative. Our intention is to promote this content across all our digital channels and in particular to organizations we identify as having an active interest in this domain.

M7: What prompted your company to explore publishing of content as part of your marketing efforts and what benefits do you anticipate from such initiatives?
MC:
1kosmos is an early stage, high growth company, so our initial focus started like others through our network of executives, leveraging their contacts and affiliations. The sales journey started with selling to a few individuals, then to dozens and eventually reaching hundreds and thousands of target prospects.

Along this path, thought leadership plays a vital role in expanding and increasing the distribution of products and ideas. However, unless you are fortunate enough to launch with a hyper-ready audience, it primarily involves explaining what you do and how you do it clearly, enabling people to understand it. While paid advertising can help attract attention at some point, the ideal journey begins with valuable ideas that have the potential to gain momentum by earning attention and gaining validation over time.

The substance of ideas is crucial. Looking back at the dot-com burst 20+ years ago, it serves as an example when ideas spiraled out of control.There was a lot of talk about new ideas overtaking the old and completely transforming the world, but not all of them materialized as expected.

Messaging and the content that brings it to life is the genesis of a startup's marketing and go-to-market strategy. The desired outcome is to gain awareness and, more importantly, credibility with each person who consumes the content. At 1Kosmos, we anticipate and have observed the benefits of increased credibility. Our fan base on social media, especially LinkedIn, has shown exponential growth, serving as a form of public validation. Additionally, we have seen significant increases across various metrics such as website traffic, content engagement, form conversions, leads generated, and closed deals, all resulting from our content-led efforts.

Read more:‘Marketing can be the oxygen to a company’s growth,’ says Shashi Kiran


White paper serves as the foundation for the narrative and is accompanied by other forms of content such as blogs, webinars, and contributed articles, furthering the discussion and building the narrative.

M7: How do you pursue leadership, and what fundamental values have influenced your style of leadership?
MC:
When people think of leadership, they often associate it with what happens at the top of an organization. However, I don't view it that way. While we do have leaders at various levels, I believe leaders can make a difference throughout the entire organization.

An analogy if you will – a sports team, for instance, has a head coach, other coaches, captains, and players. But in any given play or situation, one or more individuals have to step up and demonstrate leadership. They need to take charge, create an advantage, and be proactive. This is at the core of how I perceive leadership and how I've approached it.

Leaders possess certain characteristics. They are often independent thinkers, self-sufficient, and sometimes unconventional. You can think of them as thought hackers - smart, critical thinkers who thrive on curiosity and are not afraid to take calculated risks. Good leaders also care about people and approach leadership with a human touch. They are not proponents of aggressive tactics, but rather focus on making progressive changes. Regardless of whether they hold a formal title or not, if they can drive progressive change, they are leaders. That's generally the style I adopt.

M7: What challenges and developments do you anticipate in the marketing aspects of companies servicing the IT industry?
MC: 
In healthy and thriving markets, challenges always exist in terms of being heard amidst the noise. This is exactly what we discussed earlier regarding thought leadership. Thought leadership can effectively address this challenge by providing valuable and supported ideas that can help overcome the noise, as opposed to vague notions or hyped up promises.

Now, let's consider the challenges that IT marketing anticipates. One prominent challenge I've observed is the constant advancement of digital channels. If we look at the evolution of paid advertising, for example, over the past decade and a half, it is truly remarkable to see the capabilities we have now compared to what we had 10 to 15 years ago. SEO has evolved as a discipline. Social media has crept up in significance over the years. Keeping up with these changes is crucial. An example of the latest innovation that is transforming the way IT companies go to market is generative AI. It is changing how these services are utilized and the level of sophistication involved.

Reaching your target audience will likely remain a key challenge, and capturing their attention is always a struggle. Compelling them to take action requires strategic and impactful approaches.

M7: What marketing strategies do you believe the IT industry lacks when promoting their services and products and how does content play a significant role in brand building?
MC:
Content is a crucial aspect of your online presence as it essentially represents your brand. Everything you publish online communicates your brand attributes and shapes how it is perceived. This encompasses various elements, from design to the language and tone you use when describing capabilities.

Frankly, not all companies bring to market groundbreaking capabilities, but all companies aim to present their products as delivering exceptional value. This creates an echo chamber of sorts where the followers claim to be leaders. This is the challenge of breaking through the noise and misinformation.

Too often advertisers saturate the market with generic and “me-too” messages, leading to frustration when we all get inundated with irrelevant messages and content. Ideas need to be refined and targeted at people who genuinely care about them.

M7: As the CMO of your company, what advice would you give to entrepreneurs who are just entering the market with their own startup?
MC:
As a startup, it is essential to have laser focus. You cannot aim to educate the entire world or cater to everyone's needs. It is crucial to clearly identify your core values and maintain discipline by staying in your sweet spot. This approach ensures that you conserve your resources and allocate them for maximum value. While being a startup, it can be challenging when customers approach you and request additional features or functionalities. Sometimes these don’t fit into the strategic roadmap, and you have to make difficult decisions.

Having discipline means understanding and effectively communicating your core values and then appropriately directing your resources where they make the most sense. Sometimes, it may require walking away from a customer who may not ultimately be a good fit for your business. Prioritizing a strategy that you believe will serve you best in the long run is more important than pursuing early customer wins.

M7: When it comes to online advertising, what are the main drawbacks or challenges you have encountered? In your opinion, what strategies or approaches should be adopted for B2B advertising to achieve optimal results?
MC:
Advertising is primarily about broadening reach by delivering the right message to the right audience. The challenge lies in accurately segmenting and targeting the audience when paying to promote the messages.

Recently, there have been advancements in targeting messages based on observed intent, such as research activity. Additionally, targeting by persona or role has surpassed previous methods that relied on advertising based on keywords alone. Various innovations have emerged, like displaying ads to individuals who have visited specific websites. However, these capabilities are often diluted by the platform, meaning they don't constitute highly focused audiences.

To achieve a return on investment from advertising, it is crucial to deliver the appropriate message to the right people and inspire them to take action. This involves identifying the target audience, conveying a targeted message, and ensuring that the message is so compelling and well supported that individuals willingly provide their personal information, such as their name and contact details.

This enables further personalized marketing through channels like email and phone calls. The latest capabilities in advertising allow for precise narrowing down of geographical areas, specific accounts, titles, roles, and even individual contacts. This enables advertisers to target their campaigns more effectively. Understanding and correctly utilizing these targeting options are vital for advertisers.

ABOUT 1KOSMOS

1Kosmos automates identity verification by identifying stolen and synthetic identities prior to the creation of new accounts. Our non-phishable, password-free MFA solutions make logins enjoyable and secure, protecting employees from password-based attacks and eliminating customer account usurpation and financial fraud. To know more, please visit https://www.1kosmos.com/. 

More C-Suite on deck

'AI & ML algorithms will play a critical role in identifying cyber threats,' asserts Trishneet Arora

Media 7 | July 28, 2023

Trishneet Arora, a self-made individual, demonstrated remarkable vision, intellect, and competence when he established a startup at the young age of 19. Under his guidance, the flagship venture has expanded into both the entertainment and educational sectors. With Trishneet at the helm, the potential for growth and success knows no bounds. Let's delve into his insights on securing UPI-based applications.

Read More

‘In the industry, we've observed fragmentation, especially among larger organizations,’ says Chris Fisher

Media 7 | October 16, 2023

Chris Fisher is a seasoned marketing professional who specializes in digital marketing and demand generation to fuel business growth. I integrate product messaging and innovative strategies with data-driven marketing to achieve quantifiable outcomes. Read on to know his thoughts about safeguarding the layers of Cyber-security.

Read More

‘Security solutions need to be consistent, regardless of geography or technical stack,’ emphasizes Nishant Kaushik

Media 7 | June 16, 2023

Nishant Kaushik is an excellent technologist with strategic foresight and tactical know-how to manage technology-driven businesses and security expansion plans. He has successfully led cross-functional and highly focused teams to achieve business objectives that align with customer needs. Read this interview to discover Nishant’s expertise and unique perspective on omnichannel security and risk management.

Read More

'AI & ML algorithms will play a critical role in identifying cyber threats,' asserts Trishneet Arora

Media 7 | July 28, 2023

Trishneet Arora, a self-made individual, demonstrated remarkable vision, intellect, and competence when he established a startup at the young age of 19. Under his guidance, the flagship venture has expanded into both the entertainment and educational sectors. With Trishneet at the helm, the potential for growth and success knows no bounds. Let's delve into his insights on securing UPI-based applications.

Read More

‘In the industry, we've observed fragmentation, especially among larger organizations,’ says Chris Fisher

Media 7 | October 16, 2023

Chris Fisher is a seasoned marketing professional who specializes in digital marketing and demand generation to fuel business growth. I integrate product messaging and innovative strategies with data-driven marketing to achieve quantifiable outcomes. Read on to know his thoughts about safeguarding the layers of Cyber-security.

Read More

‘Security solutions need to be consistent, regardless of geography or technical stack,’ emphasizes Nishant Kaushik

Media 7 | June 16, 2023

Nishant Kaushik is an excellent technologist with strategic foresight and tactical know-how to manage technology-driven businesses and security expansion plans. He has successfully led cross-functional and highly focused teams to achieve business objectives that align with customer needs. Read this interview to discover Nishant’s expertise and unique perspective on omnichannel security and risk management.

Read More

Related News

Software Security

Keeper Streamlines Compliance Processes With Granular Sharing Enforcements

Keeper Security, Inc. | January 11, 2024

Keeper Security, the leading provider of zero-trust and zero-knowledge cybersecurity software protecting passwords, passkeys, privileged access, secrets and remote connections, announces Granular Sharing Enforcements will soon be available for all products in the Keeper® platform. Granular Sharing enables administrators to enforce detailed creating and sharing permissions at the user level. By implementing these permissions, organizations can ensure employees only have access to the resources necessary for their roles, minimizing the risk of unauthorized access, data breaches and lateral movement within a network. "It's critical for organizations to have security solutions that help them adhere to increasing regulations and compliance requirements," said Craig Lurey, CTO and Co-founder of Keeper Security. "Granular permission control helps organizations enhance their security posture by restricting access to sensitive information and systems. With Granular Sharing Enforcements, it's easier than ever for IT administrators to better control the principle of least privilege and streamline operations within their organizations." Keeper's added Granular Sharing Enforcement policies provide more detailed restrictions that administrators can apply to users for both creating and sharing records. Most employees do not need access to all of the data or functionalities within an organization, and many industries and geographical regions have specific regulations and compliance requirements regarding data protection and privacy, including HIPAA, GDPR, PCI DSS and SOX. Granular permission controls enable organizations to align with local and industry regulations by allowing them to define and enforce access policies. This helps in ensuring the organization is compliant with industry standards and legal requirements. Key features of Keeper's Granular Sharing Enforcements include: Auditing: Keeper provides clear alerting and reporting on over 100 different event types. Version control: Only a small subset of users have permissions to update or share records, helping teams ensure information is consistent and accurate. Seamless access on any device: Keeper provides the same user experience across platforms, ensuring cross functionality and ease of use, whether on web, desktop or mobile. Encryption: Keeper provides secure sharing with elliptic curve encryption, ensuring cybercriminals cannot intercept passwords or other shared records in transit. Keeper Administrators can easily customize permissions to best suit the compliance needs of their organization. Administrators modify permissions in the Enforcement Policies section of the Admin Console for the chosen role by selecting Creating and Sharing. Most permissions are activated by default for maximum security. Enforcements have been designed to be simple and powerful, allowing admins to choose the appropriate settings for their unique needs. Granular Sharing Enforcements will be available for all sharing needs within Keeper's Enterprise Password Manager, Keeper Secrets Manager and KeeperPAM. With Keeper's zero-knowledge password management and security platform, IT administrators have complete visibility into employee password practices, enabling them to monitor password use and enforce password security policies, including strong, unique passwords, Multi-Factor Authentication (MFA), Role-Based Access Control (RBAC), and other security policies. Keeper Secrets Manager® is a fully managed cloud-based, zero-knowledge platform for securing infrastructure secrets such as API keys, database passwords, access keys, certificates and any type of confidential data. Its latest offering, KeeperPAM™, provides next-generation Privileged Access Management (PAM) that is disrupting the traditional PAM market. KeeperPAM delivers enterprise-grade password, secrets and privileged connection management within a unified SaaS platform that is cost-effective, easy to use and simple to deploy. KeeperPAM enables least-privilege access with zero-trust and zero-knowledge security. Enterprises select Keeper because of its strong security architecture, ability to support federated and passwordless authentication with any identity provider, seamless integration into on-premises, cloud or hybrid environments and ease of use across desktop and mobile devices. About Keeper Security Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper's affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance. Trusted by millions of individuals and thousands of organizations, Keeper is the leader for best-in-class password and passkey management, secrets management, privileged access, secure remote access and encrypted messaging.

Read More

Software Security

Trellix and One Source Deliver Industry-Leading Managed Detection and Response Security Services

Trellix | January 22, 2024

Trellix, the cybersecurity company delivering the future of extended detection and response (XDR), today announced an expanded strategic partnership with One Source, a Managed Security Services Provider (MSSP) and technology delivery partner. Customers benefit from a Fortune 500 SOC capability built on the Trellix XDR Platform with AI-guided intelligence, enabling faster detection, investigation, and remediation. Trellix, the cybersecurity company delivering the future of extended detection and response (XDR), today announced an expanded strategic partnership with One Source, a Managed Security Services Provider (MSSP) and technology delivery partner. Customers benefit from a Fortune 500 SOC capability built on the Trellix XDR Platform with AI-guided intelligence, enabling faster detection, investigation, and remediation. “The partnership aligns with Trellix’s ongoing commitment to secure organizations from advanced cyber threats,” says Sean Morton, SVP of Professional Services at Trellix. “Leveraging One Source’s MDR capabilities and expanded footprint, we enable more businesses to build cyber resilience, with continued innovation in our combined products and solution offerings to stay ahead of bad actors.” One Source has multiple SOCs leveraging Trellix’s technology, staffed by the industry’s top experts to provide Managed Detection and Response (MDR) capabilities. Their team implements a proactive cyber strategy for customers specific to industry, technology environment, and vulnerabilities, built on the Trellix XDR Platform with 24x7 monitoring. The partnership and combined expertise benefits customers with enhanced services like managed threat detection and response, incident response, security operations and analytics, threat intelligence, threat hunting and forensics, and training and enablement. “The Trellix and One Source partnership is extremely powerful; the former offers an incredible set of security solutions, and the latter excels at personalized deployment and execution,” said Paul Moline, Chief Information Officer, Lindsay Automotive Group. “I never anticipated we could protect our environment with the same security solutions used by government agencies and Fortune 50 companies: I can now sleep at night.” The Trellix XDR Platform’s open architecture and broad set of native security controls across endpoint, email, network, cloud, and data security integrates with over 500 third-party tools to create multi-vector, multi-vendor event correlation and context to speed up investigations. The Trellix Advanced Research Center provides an additional layer of protection by continuously informing the platform with information from millions of global sensors on the latest threat vectors, tactics, and recommendations. One Source experts apply these insights to stay ahead of the constantly evolving threat landscape. “The collaboration with Trellix is a game-changer in reshaping the cybersecurity landscape,” says Eric Gressel, Executive Vice President of Sales, One Source. “Thanks to our partnership, we have access to the highest level of cyber intelligence to fend off newly-revealed hackers and their means of attack, enabling our customers with the most comprehensive offering of enhanced Managed Security Services to protect their businesses.” One Source has a proven track record supporting global businesses spanning retail, restaurant, automotive, healthcare, financial, and manufacturing industries. Trellix customers can rely on One Source's leading Managed Security Services to optimize technology expenses while enhancing telecom connectivity, IT infrastructure, and cybersecurity strategies. About Trellix Trellix is a global company redefining the future of cybersecurity and soulful work. The company’s open and native extended detection and response (XDR) platform helps organizations confronted by today’s most advanced threats gain confidence in the protection and resilience of their operations. Trellix, along with an extensive partner ecosystem, accelerates technology innovation through machine learning and automation to empower over 40,000 business and government customers with living security. More at https://trellix.com. About One Source One Source helps businesses simplify a complex technology world. One Source is the leading provider of Technology and Managed Security Services for enterprises. Today, One Source manages more than 2,500 customers, 45,000 business locations, and over one million assets throughout North America. In addition to Managed Security Services, One Source provides Managed Technology Expense Management, 24 / 7 local helpdesk, procures and provisions telecom & IT solutions, and manages customer service requests. One Source frequently generates triple-digit ROI for customers through contract negotiation, portfolio optimization, and ongoing expense management. In addition, One Source leverages partnerships with industry leaders, including Trellix to bring Fortune 500 security solutions and fully managed services to the mid-market. One Source's approach empowers businesses to focus on customers and revenue-generating activities. Learn more at https://www.onesource.net/.

Read More

Platform Security

Stellar Cyber and Proofpoint Strategic Alliance to Deliver Comprehensive Email Security Solution For SecOps Teams

Stellar Cyber | January 23, 2024

Stellar Cyber, the innovator of Open XDR, announced a new partnership with Proofpoint, a leading cybersecurity and compliance company. Through this alliance, Proofpoint and Stellar Cyber customers benefit from an out-of-the-box integration enabling swift email investigations and real-time response actions to email-driven attacks. Proofpoint Targeted Attack Protection monitors emails to identify suspicious emails and potentially malicious attachments and URLs. Once identified, the findings are shared with Stellar Cyber automatically. Stellar Cyber’s Open XDR platform ingests, normalizes, and analyzes Proofpoint findings and other collected data to deliver a comprehensive threat picture. As security analysts conduct investigations, they can instruct integrated third-party products – including Proofpoint – on corrective actions. “Protecting organizations against email-borne attacks is a top priority, and security teams need a way to automatically correlate threat telemetry across the entire attack surface in order to quickly remediate threats,” said Andrew Homer, VP of Strategic Alliances, Stellar Cyber. “This new partnership with Proofpoint is the latest example of Stellar Cyber delivering on its Open XDR strategy to provide customers turn-key integrations that improve productivity and threat detection.” “Email attacks remain the number one entry point into an organization, and the level of sophistication of these attacks continues to grow exponentially,” said D.J. Long, Vice President, Strategic Alliances & Business Development, Proofpoint. “We’re thrilled to work with Stellar Cyber on this strategic alliance to help customers protect against advanced email-based threats and unify their cybersecurity defense.” Through this alliance, Stellar Cyber and Proofpoint give security teams an advantage over attackers, resulting in the following: Real-time threat signals exchanged for proactive detection Correlation of Proofpoint alerts across the entire attack surface Automated response actions for immediate threat containment About Stellar Cyber Stellar Cyber’s Open XDR Platform delivers comprehensive, unified security without complexity, empowering lean security teams of any skill level to secure their environments successfully. With Stellar Cyber, organizations reduce risk with early and precise identification and remediation of threats while slashing costs, retaining investments in existing tools, and improving analyst productivity, delivering an 8X improvement in MTTD and a 20X improvement in MTTR. The company is based in Silicon Valley.

Read More

Software Security

Keeper Streamlines Compliance Processes With Granular Sharing Enforcements

Keeper Security, Inc. | January 11, 2024

Keeper Security, the leading provider of zero-trust and zero-knowledge cybersecurity software protecting passwords, passkeys, privileged access, secrets and remote connections, announces Granular Sharing Enforcements will soon be available for all products in the Keeper® platform. Granular Sharing enables administrators to enforce detailed creating and sharing permissions at the user level. By implementing these permissions, organizations can ensure employees only have access to the resources necessary for their roles, minimizing the risk of unauthorized access, data breaches and lateral movement within a network. "It's critical for organizations to have security solutions that help them adhere to increasing regulations and compliance requirements," said Craig Lurey, CTO and Co-founder of Keeper Security. "Granular permission control helps organizations enhance their security posture by restricting access to sensitive information and systems. With Granular Sharing Enforcements, it's easier than ever for IT administrators to better control the principle of least privilege and streamline operations within their organizations." Keeper's added Granular Sharing Enforcement policies provide more detailed restrictions that administrators can apply to users for both creating and sharing records. Most employees do not need access to all of the data or functionalities within an organization, and many industries and geographical regions have specific regulations and compliance requirements regarding data protection and privacy, including HIPAA, GDPR, PCI DSS and SOX. Granular permission controls enable organizations to align with local and industry regulations by allowing them to define and enforce access policies. This helps in ensuring the organization is compliant with industry standards and legal requirements. Key features of Keeper's Granular Sharing Enforcements include: Auditing: Keeper provides clear alerting and reporting on over 100 different event types. Version control: Only a small subset of users have permissions to update or share records, helping teams ensure information is consistent and accurate. Seamless access on any device: Keeper provides the same user experience across platforms, ensuring cross functionality and ease of use, whether on web, desktop or mobile. Encryption: Keeper provides secure sharing with elliptic curve encryption, ensuring cybercriminals cannot intercept passwords or other shared records in transit. Keeper Administrators can easily customize permissions to best suit the compliance needs of their organization. Administrators modify permissions in the Enforcement Policies section of the Admin Console for the chosen role by selecting Creating and Sharing. Most permissions are activated by default for maximum security. Enforcements have been designed to be simple and powerful, allowing admins to choose the appropriate settings for their unique needs. Granular Sharing Enforcements will be available for all sharing needs within Keeper's Enterprise Password Manager, Keeper Secrets Manager and KeeperPAM. With Keeper's zero-knowledge password management and security platform, IT administrators have complete visibility into employee password practices, enabling them to monitor password use and enforce password security policies, including strong, unique passwords, Multi-Factor Authentication (MFA), Role-Based Access Control (RBAC), and other security policies. Keeper Secrets Manager® is a fully managed cloud-based, zero-knowledge platform for securing infrastructure secrets such as API keys, database passwords, access keys, certificates and any type of confidential data. Its latest offering, KeeperPAM™, provides next-generation Privileged Access Management (PAM) that is disrupting the traditional PAM market. KeeperPAM delivers enterprise-grade password, secrets and privileged connection management within a unified SaaS platform that is cost-effective, easy to use and simple to deploy. KeeperPAM enables least-privilege access with zero-trust and zero-knowledge security. Enterprises select Keeper because of its strong security architecture, ability to support federated and passwordless authentication with any identity provider, seamless integration into on-premises, cloud or hybrid environments and ease of use across desktop and mobile devices. About Keeper Security Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper's affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance. Trusted by millions of individuals and thousands of organizations, Keeper is the leader for best-in-class password and passkey management, secrets management, privileged access, secure remote access and encrypted messaging.

Read More

Software Security

Trellix and One Source Deliver Industry-Leading Managed Detection and Response Security Services

Trellix | January 22, 2024

Trellix, the cybersecurity company delivering the future of extended detection and response (XDR), today announced an expanded strategic partnership with One Source, a Managed Security Services Provider (MSSP) and technology delivery partner. Customers benefit from a Fortune 500 SOC capability built on the Trellix XDR Platform with AI-guided intelligence, enabling faster detection, investigation, and remediation. Trellix, the cybersecurity company delivering the future of extended detection and response (XDR), today announced an expanded strategic partnership with One Source, a Managed Security Services Provider (MSSP) and technology delivery partner. Customers benefit from a Fortune 500 SOC capability built on the Trellix XDR Platform with AI-guided intelligence, enabling faster detection, investigation, and remediation. “The partnership aligns with Trellix’s ongoing commitment to secure organizations from advanced cyber threats,” says Sean Morton, SVP of Professional Services at Trellix. “Leveraging One Source’s MDR capabilities and expanded footprint, we enable more businesses to build cyber resilience, with continued innovation in our combined products and solution offerings to stay ahead of bad actors.” One Source has multiple SOCs leveraging Trellix’s technology, staffed by the industry’s top experts to provide Managed Detection and Response (MDR) capabilities. Their team implements a proactive cyber strategy for customers specific to industry, technology environment, and vulnerabilities, built on the Trellix XDR Platform with 24x7 monitoring. The partnership and combined expertise benefits customers with enhanced services like managed threat detection and response, incident response, security operations and analytics, threat intelligence, threat hunting and forensics, and training and enablement. “The Trellix and One Source partnership is extremely powerful; the former offers an incredible set of security solutions, and the latter excels at personalized deployment and execution,” said Paul Moline, Chief Information Officer, Lindsay Automotive Group. “I never anticipated we could protect our environment with the same security solutions used by government agencies and Fortune 50 companies: I can now sleep at night.” The Trellix XDR Platform’s open architecture and broad set of native security controls across endpoint, email, network, cloud, and data security integrates with over 500 third-party tools to create multi-vector, multi-vendor event correlation and context to speed up investigations. The Trellix Advanced Research Center provides an additional layer of protection by continuously informing the platform with information from millions of global sensors on the latest threat vectors, tactics, and recommendations. One Source experts apply these insights to stay ahead of the constantly evolving threat landscape. “The collaboration with Trellix is a game-changer in reshaping the cybersecurity landscape,” says Eric Gressel, Executive Vice President of Sales, One Source. “Thanks to our partnership, we have access to the highest level of cyber intelligence to fend off newly-revealed hackers and their means of attack, enabling our customers with the most comprehensive offering of enhanced Managed Security Services to protect their businesses.” One Source has a proven track record supporting global businesses spanning retail, restaurant, automotive, healthcare, financial, and manufacturing industries. Trellix customers can rely on One Source's leading Managed Security Services to optimize technology expenses while enhancing telecom connectivity, IT infrastructure, and cybersecurity strategies. About Trellix Trellix is a global company redefining the future of cybersecurity and soulful work. The company’s open and native extended detection and response (XDR) platform helps organizations confronted by today’s most advanced threats gain confidence in the protection and resilience of their operations. Trellix, along with an extensive partner ecosystem, accelerates technology innovation through machine learning and automation to empower over 40,000 business and government customers with living security. More at https://trellix.com. About One Source One Source helps businesses simplify a complex technology world. One Source is the leading provider of Technology and Managed Security Services for enterprises. Today, One Source manages more than 2,500 customers, 45,000 business locations, and over one million assets throughout North America. In addition to Managed Security Services, One Source provides Managed Technology Expense Management, 24 / 7 local helpdesk, procures and provisions telecom & IT solutions, and manages customer service requests. One Source frequently generates triple-digit ROI for customers through contract negotiation, portfolio optimization, and ongoing expense management. In addition, One Source leverages partnerships with industry leaders, including Trellix to bring Fortune 500 security solutions and fully managed services to the mid-market. One Source's approach empowers businesses to focus on customers and revenue-generating activities. Learn more at https://www.onesource.net/.

Read More

Platform Security

Stellar Cyber and Proofpoint Strategic Alliance to Deliver Comprehensive Email Security Solution For SecOps Teams

Stellar Cyber | January 23, 2024

Stellar Cyber, the innovator of Open XDR, announced a new partnership with Proofpoint, a leading cybersecurity and compliance company. Through this alliance, Proofpoint and Stellar Cyber customers benefit from an out-of-the-box integration enabling swift email investigations and real-time response actions to email-driven attacks. Proofpoint Targeted Attack Protection monitors emails to identify suspicious emails and potentially malicious attachments and URLs. Once identified, the findings are shared with Stellar Cyber automatically. Stellar Cyber’s Open XDR platform ingests, normalizes, and analyzes Proofpoint findings and other collected data to deliver a comprehensive threat picture. As security analysts conduct investigations, they can instruct integrated third-party products – including Proofpoint – on corrective actions. “Protecting organizations against email-borne attacks is a top priority, and security teams need a way to automatically correlate threat telemetry across the entire attack surface in order to quickly remediate threats,” said Andrew Homer, VP of Strategic Alliances, Stellar Cyber. “This new partnership with Proofpoint is the latest example of Stellar Cyber delivering on its Open XDR strategy to provide customers turn-key integrations that improve productivity and threat detection.” “Email attacks remain the number one entry point into an organization, and the level of sophistication of these attacks continues to grow exponentially,” said D.J. Long, Vice President, Strategic Alliances & Business Development, Proofpoint. “We’re thrilled to work with Stellar Cyber on this strategic alliance to help customers protect against advanced email-based threats and unify their cybersecurity defense.” Through this alliance, Stellar Cyber and Proofpoint give security teams an advantage over attackers, resulting in the following: Real-time threat signals exchanged for proactive detection Correlation of Proofpoint alerts across the entire attack surface Automated response actions for immediate threat containment About Stellar Cyber Stellar Cyber’s Open XDR Platform delivers comprehensive, unified security without complexity, empowering lean security teams of any skill level to secure their environments successfully. With Stellar Cyber, organizations reduce risk with early and precise identification and remediation of threats while slashing costs, retaining investments in existing tools, and improving analyst productivity, delivering an 8X improvement in MTTD and a 20X improvement in MTTR. The company is based in Silicon Valley.

Read More

Spotlight

1Kosmos

1Kosmos

1Kosmos automates identity verification by detecting stolen and synthetic identities before new account origination. Our non-phishable, passwordless MFA solutions make logins fun and secure, protecting workers from password-based attacks and eliminating account takeover and financial fraud targeting...

Events

Resources