'Content is a crucial aspect of your online presence as it essentially represents your brand,' says Michael Cichon

Content Syndication
Michael Cichon is a seasoned B2B marketer specializing in digital and content marketing for identity-based online fraud detection and advanced email security solutions. With an expertise in product and digital marketing, he excels in developing brand narratives, driving integrated demand generation campaigns, and connecting with customers on a personal level to inspire action.
Read on to know his ideas on the importance of content syndication practices in information security industry.

Messaging and the content that brings it to life is the genesis of a startup's marketing and go-to-market strategy.

Media 7: Hi Michael, thank you for your time. Please provide us an overview of your professional journey and how you arrived at your current position as the CMO of 1Kosmos.
Michael Cichon:
  I am a career marketer based in Silicon Valley for the past 25 plus years. I've primarily worked with business-to-business software application companies. Since 2008, I've focused on digital marketing with hands-on experience managing paid, earned and owned channels, so I consider myself a digital-first marketing leader. In the last six years, I've exclusively been involved with cyber security, specifically in digital identity, AI / ML and authentication.

M7: How do you leverage thought leadership and industry expertise as part of 1Kosmos marketing strategy to build credibility and differentiate your company from competitors in the information security industry?
MC
: Right. So, first, let's discuss what thought leadership is and what it's not. From my perspective, thought leadership is a new or advanced idea. It's something unique, novel, and sometimes controversial, but always supported by defensible facts.

In high-tech marketing, it represents an intersection between advancing technology and business value, and it has the utility to accelerate a business toward their goals. It's not just an idea and certainly not a way to spin an application. Importantly, it leads the conversation so if it’s rife with buzzwords you know it’s not leading, but following or imitating others. Thought leadership is usually specific, clear, and focused.

In B2B, thought leadership shares a perspective and involves teaching our target audience exactly what they need to know to become an active buyer. It’s persuasive, strategic and packaged in a way that’s suitable to the attention spans at different stages of awareness. You’ll find different mediums such as webinars, blogs, white papers, video logs, and more all geared to reach professionals where they are online and in a way that’s digestible.

M7: What role does market research and competitive analysis play in shaping your company’s marketing strategy within the information security industry?
MC:
At its core, having a clear understanding of what I would refer to as unique enabling-capabilities and the value they bring to an organization is crucial. That's where it all begins. To understand your unique values, you must also be familiar with competitive approaches, which necessitates a thorough understanding of alternate solutions and narratives. Therefore, market research and competitive analysis play an absolutely critical role.

Read more: ‘The toughest part is making the content both timely and relevant,’ says Stel Valavanis


Thought leadership plays a vital role in expanding and increasing the distribution of products and ideas.

M7: Please brief us about services and products of 1Kosmos.
MC:
When it comes to 1Kosmos, we are the only company that has unified identity proofing and authentication. This is important when you realize that onboarding users to business infrastructure is a mission-critical activity. This is true for all users – workers accessing corporate infrastructure, customers logging into services and even residents requesting government services. In each case, missidentifying the user or granting them access to systems for which they shouldn’t have access can have devastating consequences to any business. We see this virtually every day in fraud, data breach and ransomware attacks reported in the news.

At 1Kosmos, we bring our solutions to the market through three distinct products. One product focuses on workforce authentication, another caters to business-to-consumer use cases, and the third product revolves around self-service identity proofing. These give organizations the ability to remotely verify an identity on the web with a high level of assurance, and then verify that identity at every access attempt. To provide such an assurance, our platform has undergone rigorous certifications. We are the only platform certified to industry standards, specifically known as FIDO2, NIST 800-63-3, iBeta PAD2, SOC2 and ISO27001.

M7: Can you provide examples of some successful content campaigns or initiatives that have helped elevate your brand’s visibility and recognition?
MC:
You will find multiple examples on the 1Kosmos website, including several white papers, webinars, vlogs, infographics, meme’s (which help break through the noise on social media), and more.

The grandfather of them all – white papers – are essentially a narrative that contain supporting ideas typically found in its chapters. These chapters represent significant concepts, and you can also find them promoted independently in different forms. Let me provide a specific example: a white paper we recently published addresses the challenge of implementing password-less authentication. While there is a technical capability known as password-less authentication, this white paper focuses on technology-enabled business transformation, so it addresses the many challenges in controlling an enterprise-wide project and gracefully migrating users from traditional passwords, which many of us have been using for decades, to biometric authentication.

The white paper serves as the foundation for the narrative and is accompanied by other forms of content such as blogs, webinars, and contributed articles, furthering the discussion and building the narrative. Our intention is to promote this content across all our digital channels and in particular to organizations we identify as having an active interest in this domain.

M7: What prompted your company to explore publishing of content as part of your marketing efforts and what benefits do you anticipate from such initiatives?
MC:
1kosmos is an early stage, high growth company, so our initial focus started like others through our network of executives, leveraging their contacts and affiliations. The sales journey started with selling to a few individuals, then to dozens and eventually reaching hundreds and thousands of target prospects.

Along this path, thought leadership plays a vital role in expanding and increasing the distribution of products and ideas. However, unless you are fortunate enough to launch with a hyper-ready audience, it primarily involves explaining what you do and how you do it clearly, enabling people to understand it. While paid advertising can help attract attention at some point, the ideal journey begins with valuable ideas that have the potential to gain momentum by earning attention and gaining validation over time.

The substance of ideas is crucial. Looking back at the dot-com burst 20+ years ago, it serves as an example when ideas spiraled out of control.There was a lot of talk about new ideas overtaking the old and completely transforming the world, but not all of them materialized as expected.

Messaging and the content that brings it to life is the genesis of a startup's marketing and go-to-market strategy. The desired outcome is to gain awareness and, more importantly, credibility with each person who consumes the content. At 1Kosmos, we anticipate and have observed the benefits of increased credibility. Our fan base on social media, especially LinkedIn, has shown exponential growth, serving as a form of public validation. Additionally, we have seen significant increases across various metrics such as website traffic, content engagement, form conversions, leads generated, and closed deals, all resulting from our content-led efforts.

Read more:‘Marketing can be the oxygen to a company’s growth,’ says Shashi Kiran


White paper serves as the foundation for the narrative and is accompanied by other forms of content such as blogs, webinars, and contributed articles, furthering the discussion and building the narrative.

M7: How do you pursue leadership, and what fundamental values have influenced your style of leadership?
MC:
When people think of leadership, they often associate it with what happens at the top of an organization. However, I don't view it that way. While we do have leaders at various levels, I believe leaders can make a difference throughout the entire organization.

An analogy if you will – a sports team, for instance, has a head coach, other coaches, captains, and players. But in any given play or situation, one or more individuals have to step up and demonstrate leadership. They need to take charge, create an advantage, and be proactive. This is at the core of how I perceive leadership and how I've approached it.

Leaders possess certain characteristics. They are often independent thinkers, self-sufficient, and sometimes unconventional. You can think of them as thought hackers - smart, critical thinkers who thrive on curiosity and are not afraid to take calculated risks. Good leaders also care about people and approach leadership with a human touch. They are not proponents of aggressive tactics, but rather focus on making progressive changes. Regardless of whether they hold a formal title or not, if they can drive progressive change, they are leaders. That's generally the style I adopt.

M7: What challenges and developments do you anticipate in the marketing aspects of companies servicing the IT industry?
MC: 
In healthy and thriving markets, challenges always exist in terms of being heard amidst the noise. This is exactly what we discussed earlier regarding thought leadership. Thought leadership can effectively address this challenge by providing valuable and supported ideas that can help overcome the noise, as opposed to vague notions or hyped up promises.

Now, let's consider the challenges that IT marketing anticipates. One prominent challenge I've observed is the constant advancement of digital channels. If we look at the evolution of paid advertising, for example, over the past decade and a half, it is truly remarkable to see the capabilities we have now compared to what we had 10 to 15 years ago. SEO has evolved as a discipline. Social media has crept up in significance over the years. Keeping up with these changes is crucial. An example of the latest innovation that is transforming the way IT companies go to market is generative AI. It is changing how these services are utilized and the level of sophistication involved.

Reaching your target audience will likely remain a key challenge, and capturing their attention is always a struggle. Compelling them to take action requires strategic and impactful approaches.

M7: What marketing strategies do you believe the IT industry lacks when promoting their services and products and how does content play a significant role in brand building?
MC:
Content is a crucial aspect of your online presence as it essentially represents your brand. Everything you publish online communicates your brand attributes and shapes how it is perceived. This encompasses various elements, from design to the language and tone you use when describing capabilities.

Frankly, not all companies bring to market groundbreaking capabilities, but all companies aim to present their products as delivering exceptional value. This creates an echo chamber of sorts where the followers claim to be leaders. This is the challenge of breaking through the noise and misinformation.

Too often advertisers saturate the market with generic and “me-too” messages, leading to frustration when we all get inundated with irrelevant messages and content. Ideas need to be refined and targeted at people who genuinely care about them.

M7: As the CMO of your company, what advice would you give to entrepreneurs who are just entering the market with their own startup?
MC:
As a startup, it is essential to have laser focus. You cannot aim to educate the entire world or cater to everyone's needs. It is crucial to clearly identify your core values and maintain discipline by staying in your sweet spot. This approach ensures that you conserve your resources and allocate them for maximum value. While being a startup, it can be challenging when customers approach you and request additional features or functionalities. Sometimes these don’t fit into the strategic roadmap, and you have to make difficult decisions.

Having discipline means understanding and effectively communicating your core values and then appropriately directing your resources where they make the most sense. Sometimes, it may require walking away from a customer who may not ultimately be a good fit for your business. Prioritizing a strategy that you believe will serve you best in the long run is more important than pursuing early customer wins.

M7: When it comes to online advertising, what are the main drawbacks or challenges you have encountered? In your opinion, what strategies or approaches should be adopted for B2B advertising to achieve optimal results?
MC:
Advertising is primarily about broadening reach by delivering the right message to the right audience. The challenge lies in accurately segmenting and targeting the audience when paying to promote the messages.

Recently, there have been advancements in targeting messages based on observed intent, such as research activity. Additionally, targeting by persona or role has surpassed previous methods that relied on advertising based on keywords alone. Various innovations have emerged, like displaying ads to individuals who have visited specific websites. However, these capabilities are often diluted by the platform, meaning they don't constitute highly focused audiences.

To achieve a return on investment from advertising, it is crucial to deliver the appropriate message to the right people and inspire them to take action. This involves identifying the target audience, conveying a targeted message, and ensuring that the message is so compelling and well supported that individuals willingly provide their personal information, such as their name and contact details.

This enables further personalized marketing through channels like email and phone calls. The latest capabilities in advertising allow for precise narrowing down of geographical areas, specific accounts, titles, roles, and even individual contacts. This enables advertisers to target their campaigns more effectively. Understanding and correctly utilizing these targeting options are vital for advertisers.

ABOUT 1KOSMOS

1Kosmos automates identity verification by identifying stolen and synthetic identities prior to the creation of new accounts. Our non-phishable, password-free MFA solutions make logins enjoyable and secure, protecting employees from password-based attacks and eliminating customer account usurpation and financial fraud. To know more, please visit https://www.1kosmos.com/. 

More C-Suite on deck

‘Data and analytics play a crucial role in shaping our advertising strategies,' asserts Aleksander Groshev

Media 7 | June 28, 2023

Aleksander Groshev is the CEO and Co-Founder of Autobahn Security. Previously he was Vice President of Product responsible for the product development of the SaaS platform. Before joining Autobahn Security he held the position of Head of Product at Fincite, a wealth management B2B platform.

Read More

‘Security solutions need to be consistent, regardless of geography or technical stack,’ emphasizes Nishant Kaushik

Media 7 | June 16, 2023

Nishant Kaushik is an excellent technologist with strategic foresight and tactical know-how to manage technology-driven businesses and security expansion plans. He has successfully led cross-functional and highly focused teams to achieve business objectives that align with customer needs. Read this interview to discover Nishant’s expertise and unique perspective on omnichannel security and risk management.

Read More

‘In the industry, we've observed fragmentation, especially among larger organizations,’ says Chris Fisher

Media 7 | October 16, 2023

Chris Fisher is a seasoned marketing professional who specializes in digital marketing and demand generation to fuel business growth. I integrate product messaging and innovative strategies with data-driven marketing to achieve quantifiable outcomes. Read on to know his thoughts about safeguarding the layers of Cyber-security.

Read More

‘Data and analytics play a crucial role in shaping our advertising strategies,' asserts Aleksander Groshev

Media 7 | June 28, 2023

Aleksander Groshev is the CEO and Co-Founder of Autobahn Security. Previously he was Vice President of Product responsible for the product development of the SaaS platform. Before joining Autobahn Security he held the position of Head of Product at Fincite, a wealth management B2B platform.

Read More

‘Security solutions need to be consistent, regardless of geography or technical stack,’ emphasizes Nishant Kaushik

Media 7 | June 16, 2023

Nishant Kaushik is an excellent technologist with strategic foresight and tactical know-how to manage technology-driven businesses and security expansion plans. He has successfully led cross-functional and highly focused teams to achieve business objectives that align with customer needs. Read this interview to discover Nishant’s expertise and unique perspective on omnichannel security and risk management.

Read More

‘In the industry, we've observed fragmentation, especially among larger organizations,’ says Chris Fisher

Media 7 | October 16, 2023

Chris Fisher is a seasoned marketing professional who specializes in digital marketing and demand generation to fuel business growth. I integrate product messaging and innovative strategies with data-driven marketing to achieve quantifiable outcomes. Read on to know his thoughts about safeguarding the layers of Cyber-security.

Read More

Related News

Cloud Security

Palo Alto Networks Announces Intent to Acquire Cloud Security Start-up Dig Security

PR Newswire | November 01, 2023

Palo Alto Networks (NASDAQ: PANW), the global cybersecurity leader, today announced that it has entered into a definitive agreement to acquire cloud security start-up Dig Security, an innovative provider of Data Security Posture Management (DSPM). Today, almost 70% of organizations already have data stored in the public cloud1. With increased interest and adoption of generative AI, sensitive data is often even more spread out across cloud services, including distributed databases, vector databases, PaaS services, and more. Organizations need help identifying sensitive data, effectively managing user access, and implementing robust security measures to protect against internal and external threats. Simultaneously, the relentless surge in the volume and impact of cloud data breaches persists2, causing significant damage to enterprises. This underscores the critical role that DSPM will play within a comprehensive cloud security strategy. Dig's DSPM solution enables organizations to discover, classify, monitor, and protect sensitive data across all cloud data stores, which will give Palo Alto Networks' customers visibility into and control of their multi-cloud data estate. After the close of the proposed acquisition, Dig's capabilities will be seamlessly integrated into the Prisma® Cloud platform to provide near real-time data protection from code to cloud. Dig was founded by entrepreneurs Dan Benjamin, Ido Azran, and Gad Akuka. They will continue leading their teams in joining the Prisma Cloud team at Palo Alto Networks after closing. Lee Klarich, Chief Product Officer for Palo Alto Networks: "As companies build AI-enabled applications, there will be a substantial increase in the amount of data transferred to the cloud. Dig's highly innovative DSPM technology helps safely enable this shift, and its dedicated team will complement and help advance Palo Alto Networks' strengths across cloud security. The announcement of our intent to join forces with Dig reinforces our longstanding commitment to our team in Israel and to continue growing our footprint with its talented and dedicated cybersecurity professionals." Ankur Shah, SVP Products, Prisma Cloud for Palo Alto Networks: "Data protection was the top priority for cloud security cited in the 2023 The State of Cloud-Native Security Report. Upwards of 75% of respondents noted that the number of point tools they use creates blind spots. Dig lets security teams see and secure their data across multi-cloud environments. This visibility and security is becoming increasingly important in the age of generative AI. Dig's innovation, coupled with Prisma Cloud's leading code-to-cloud intelligence highlighted in the recent Darwin release, will create what CISOs need to drive complete cloud security and data protection with a single, integrated, cloud-native platform." Dan Benjamin, Co-Founder & CEO, Dig Security: "Modern cloud applications leverage a broad set of data stores to meet the complex needs of businesses. We developed an award-winning DSPM solution to alleviate this strain by providing a centralized offering to monitor and manage the security of these cloud data stores. Integrating Dig's technology with Prisma Cloud will enable customers to effectively manage the security of their diverse data stores in modern cloud applications and reduce the risk of data breaches. My co-founders and I look forward to continuing our innovation journey with Palo Alto Networks to make the world safer."

Read More

Software Security

Palo Alto Networks Intends to Acquire Talon Cyber Security

Palo Alto Networks | November 08, 2023

Palo Alto Networks plans to acquire Talon Cyber Security to enhance its Secure Access Service Edge (SASE) solution. Talon's Enterprise Browser technology, when integrated with Prisma SASE, will provide secure access to business applications. The acquisition reflects the importance of adapting SASE solutions to ensure consistent security for unmanaged devices. Palo Alto Networks, a global cybersecurity leader, has announced its intent to acquire Talon Cyber Security, an enterprise browser technology pioneer, to enhance its Secure Access Service Edge (SASE) solution and provide comprehensive protection for managed and unmanaged devices. In today's digital landscape, unmanaged devices often connect to enterprise applications without adequate security measures, making them susceptible entry points for attackers seeking to access sensitive information. Lee Klarich, Chief Product Officer of Palo Alto Networks, emphasized the importance of securing all work activity through an Enterprise Browser without compromising device privacy to protect users and applications effectively. He continued that the integration of Talon's technology with Prisma SASE aims to provide consistent security for all users and devices. Anand Oswal, SVP and GM at Palo Alto Networks highlighted the significance of securing unmanaged devices with the same robust security as managed devices, especially in today's dynamic threat landscape. HE further stated that the combination of Prisma SASE and Talon's Enterprise Browser is poised to revolutionize security measures in modern digital environments. Talon Cyber Security's Enterprise Browser technology offers an innovative solution that, when integrated with Prisma SASE, will enable users to securely access business applications from any device, including non-corporate devices, while ensuring a seamless user experience. This strategic move by Palo Alto Networks addresses the evolving security challenges in a connected world. Talon's Co-Founder and CEO, Ofer Ben-Noon, acknowledged the shifting work models and user preferences and the need for powerful last-mile security solutions. Talon's Enterprise Browser is designed to offer familiar user experiences with enterprise-grade protection. Ben emphasized that partnership with Palo Alto Networks is seen as a catalyst to accelerate its mission of delivering superior outcomes for customers. Talon, founded by Ofer Ben-Noon and Ohad Bobrov, secured the RSA Conference's Innovation Sandbox contest in 2022. The co-founders will continue to lead their teams within the Prisma SASE team at Palo Alto Networks upon the completion of the acquisition. Anand Oswal, Senior Vice President and General Manager at Palo Alto Networks, highlighted the advantages and security risks associated with Bring Your Own Device (BYOD) policies. He noted that Talon's Enterprise Browser provided security teams enhanced visibility and control over work-related Software as a Service (SaaS) and web activity across all devices, including personal and unmanaged endpoints. Anand emphasized the need for Secure Access Service Edge (SASE) solutions to adapt in order to secure unmanaged devices with the same consistent security measures applied to managed devices. This would enable users to access business applications securely from any device and location.

Read More

Network Threat Detection

Fortinet expands its Universal SASE offering to securely connect any user to any application

iTWire | October 30, 2023

Fortinet, the global cybersecurity leader driving the convergence of networking and security, has announced the expansion of its Universal SASE offering to empower today’s hybrid workforce with FortiOS everywhere. Ken Xie, founder, chairman of the board, and chief executive officer, said, The Fortinet operating system, FortiOS, is the industry’s only enterprise-grade converged operating system able to support all secure access service edge (SASE) functions, including firewall, software-defined wide area network (SD-WAN), secure web gateway, encryption/decryption, cloud access security broker (CASB), data loss prevention (DLP), and zero trust network access (ZTNA), whether deployed in an appliance or cloud-delivered from Fortinet. “This approach enables over 30 converged networking and security functions to be managed through a single console. Fourteen of these functions are accelerated when deployed on our new FortiASIC Security Processor 5-based FortiGate 120G SASE appliance.” Expanding Fortinet Universal SASE Single-vendor SASE provides flexible access to critical resources and applications for users and devices. However, most enterprises rely on different vendors for each SASE function, which introduces significant challenges of controlling different operating system functionality and management consoles. Fortinet Universal SASE takes traditional single-vendor SASE one step further, providing consistent policies and controls on-prem and in the cloud while delivering seamless integration across all functions and deployments to better support today’s hybrid workforce while reducing information technology (IT) overhead. FortiOS runs the full SASE stack, including a bi-directional firewall, SD-WAN, secure web gateway, encryption/decryption, CASB, DLP, and ZTNA. It also has the flexibility to run on an appliance in accelerated mode as well as in the FortiSASE cloud, providing consistent networking, security, and policy management for every edge. This is further enhanced by FortiGuard artificial intelligence (AI)-powered security services, such as intrusion prevention system (IPS), domain name system (DNS) filtering, URL filtering, anti-malware, sandboxing, and more. This news expands Fortinet’s investment in Universal SASE by expanding the reach of its SASE stack in three key areas of the portfolio: Worldwide coverage of FortiSASE cloud locations FortiSASE, built on a global, scalable cloud network, delivers the same SASE stack as FortiGate appliances through its regional FortiSASE cloud locations. To deliver the best user experience and higher service availability, Fortinet now delivers over 100 FortiSASE cloud locations globally. Bringing accelerated SASE to the campus and branch To bring the full SASE stack to campus and branch locations, Fortinet is announcing the new FortiGate 120G SASE appliance. Because it is powered by Fortinet’s patented security processor 5 (SP5) custom application-specific integrated circuit (ASIC), it can accelerate many elements of the SASE stack, such as delivering three gigabits per second (Gbps) of secure sockets layer (SSL) inspection—an average of six times faster than the industry average—for visibility into encrypted traffic at scale. The following Secure Compute Rating table provides a comparison between equivalent solutions: Flexible consumption extended to Universal SASE FortiFlex, Fortinet’s flexible consumption program, has now been extended to Fortinet Universal SASE solutions. The entire SASE stack from Fortinet can be consumed as part of FortiFlex, whether customers want to use on-prem or FortiSASE cloud-based services. FortiFlex offers usage-based licensing across cloud, hybrid cloud, and on-premises deployments to give IT teams the flexibility to continually right-size their deployments, reduce excessive procurement cycles for new security solutions, simplify the deployment and provisioning of new services, and maximise budget and return on investment by enabling IT teams to scale down or pause services as needed.

Read More

Cloud Security

Palo Alto Networks Announces Intent to Acquire Cloud Security Start-up Dig Security

PR Newswire | November 01, 2023

Palo Alto Networks (NASDAQ: PANW), the global cybersecurity leader, today announced that it has entered into a definitive agreement to acquire cloud security start-up Dig Security, an innovative provider of Data Security Posture Management (DSPM). Today, almost 70% of organizations already have data stored in the public cloud1. With increased interest and adoption of generative AI, sensitive data is often even more spread out across cloud services, including distributed databases, vector databases, PaaS services, and more. Organizations need help identifying sensitive data, effectively managing user access, and implementing robust security measures to protect against internal and external threats. Simultaneously, the relentless surge in the volume and impact of cloud data breaches persists2, causing significant damage to enterprises. This underscores the critical role that DSPM will play within a comprehensive cloud security strategy. Dig's DSPM solution enables organizations to discover, classify, monitor, and protect sensitive data across all cloud data stores, which will give Palo Alto Networks' customers visibility into and control of their multi-cloud data estate. After the close of the proposed acquisition, Dig's capabilities will be seamlessly integrated into the Prisma® Cloud platform to provide near real-time data protection from code to cloud. Dig was founded by entrepreneurs Dan Benjamin, Ido Azran, and Gad Akuka. They will continue leading their teams in joining the Prisma Cloud team at Palo Alto Networks after closing. Lee Klarich, Chief Product Officer for Palo Alto Networks: "As companies build AI-enabled applications, there will be a substantial increase in the amount of data transferred to the cloud. Dig's highly innovative DSPM technology helps safely enable this shift, and its dedicated team will complement and help advance Palo Alto Networks' strengths across cloud security. The announcement of our intent to join forces with Dig reinforces our longstanding commitment to our team in Israel and to continue growing our footprint with its talented and dedicated cybersecurity professionals." Ankur Shah, SVP Products, Prisma Cloud for Palo Alto Networks: "Data protection was the top priority for cloud security cited in the 2023 The State of Cloud-Native Security Report. Upwards of 75% of respondents noted that the number of point tools they use creates blind spots. Dig lets security teams see and secure their data across multi-cloud environments. This visibility and security is becoming increasingly important in the age of generative AI. Dig's innovation, coupled with Prisma Cloud's leading code-to-cloud intelligence highlighted in the recent Darwin release, will create what CISOs need to drive complete cloud security and data protection with a single, integrated, cloud-native platform." Dan Benjamin, Co-Founder & CEO, Dig Security: "Modern cloud applications leverage a broad set of data stores to meet the complex needs of businesses. We developed an award-winning DSPM solution to alleviate this strain by providing a centralized offering to monitor and manage the security of these cloud data stores. Integrating Dig's technology with Prisma Cloud will enable customers to effectively manage the security of their diverse data stores in modern cloud applications and reduce the risk of data breaches. My co-founders and I look forward to continuing our innovation journey with Palo Alto Networks to make the world safer."

Read More

Software Security

Palo Alto Networks Intends to Acquire Talon Cyber Security

Palo Alto Networks | November 08, 2023

Palo Alto Networks plans to acquire Talon Cyber Security to enhance its Secure Access Service Edge (SASE) solution. Talon's Enterprise Browser technology, when integrated with Prisma SASE, will provide secure access to business applications. The acquisition reflects the importance of adapting SASE solutions to ensure consistent security for unmanaged devices. Palo Alto Networks, a global cybersecurity leader, has announced its intent to acquire Talon Cyber Security, an enterprise browser technology pioneer, to enhance its Secure Access Service Edge (SASE) solution and provide comprehensive protection for managed and unmanaged devices. In today's digital landscape, unmanaged devices often connect to enterprise applications without adequate security measures, making them susceptible entry points for attackers seeking to access sensitive information. Lee Klarich, Chief Product Officer of Palo Alto Networks, emphasized the importance of securing all work activity through an Enterprise Browser without compromising device privacy to protect users and applications effectively. He continued that the integration of Talon's technology with Prisma SASE aims to provide consistent security for all users and devices. Anand Oswal, SVP and GM at Palo Alto Networks highlighted the significance of securing unmanaged devices with the same robust security as managed devices, especially in today's dynamic threat landscape. HE further stated that the combination of Prisma SASE and Talon's Enterprise Browser is poised to revolutionize security measures in modern digital environments. Talon Cyber Security's Enterprise Browser technology offers an innovative solution that, when integrated with Prisma SASE, will enable users to securely access business applications from any device, including non-corporate devices, while ensuring a seamless user experience. This strategic move by Palo Alto Networks addresses the evolving security challenges in a connected world. Talon's Co-Founder and CEO, Ofer Ben-Noon, acknowledged the shifting work models and user preferences and the need for powerful last-mile security solutions. Talon's Enterprise Browser is designed to offer familiar user experiences with enterprise-grade protection. Ben emphasized that partnership with Palo Alto Networks is seen as a catalyst to accelerate its mission of delivering superior outcomes for customers. Talon, founded by Ofer Ben-Noon and Ohad Bobrov, secured the RSA Conference's Innovation Sandbox contest in 2022. The co-founders will continue to lead their teams within the Prisma SASE team at Palo Alto Networks upon the completion of the acquisition. Anand Oswal, Senior Vice President and General Manager at Palo Alto Networks, highlighted the advantages and security risks associated with Bring Your Own Device (BYOD) policies. He noted that Talon's Enterprise Browser provided security teams enhanced visibility and control over work-related Software as a Service (SaaS) and web activity across all devices, including personal and unmanaged endpoints. Anand emphasized the need for Secure Access Service Edge (SASE) solutions to adapt in order to secure unmanaged devices with the same consistent security measures applied to managed devices. This would enable users to access business applications securely from any device and location.

Read More

Network Threat Detection

Fortinet expands its Universal SASE offering to securely connect any user to any application

iTWire | October 30, 2023

Fortinet, the global cybersecurity leader driving the convergence of networking and security, has announced the expansion of its Universal SASE offering to empower today’s hybrid workforce with FortiOS everywhere. Ken Xie, founder, chairman of the board, and chief executive officer, said, The Fortinet operating system, FortiOS, is the industry’s only enterprise-grade converged operating system able to support all secure access service edge (SASE) functions, including firewall, software-defined wide area network (SD-WAN), secure web gateway, encryption/decryption, cloud access security broker (CASB), data loss prevention (DLP), and zero trust network access (ZTNA), whether deployed in an appliance or cloud-delivered from Fortinet. “This approach enables over 30 converged networking and security functions to be managed through a single console. Fourteen of these functions are accelerated when deployed on our new FortiASIC Security Processor 5-based FortiGate 120G SASE appliance.” Expanding Fortinet Universal SASE Single-vendor SASE provides flexible access to critical resources and applications for users and devices. However, most enterprises rely on different vendors for each SASE function, which introduces significant challenges of controlling different operating system functionality and management consoles. Fortinet Universal SASE takes traditional single-vendor SASE one step further, providing consistent policies and controls on-prem and in the cloud while delivering seamless integration across all functions and deployments to better support today’s hybrid workforce while reducing information technology (IT) overhead. FortiOS runs the full SASE stack, including a bi-directional firewall, SD-WAN, secure web gateway, encryption/decryption, CASB, DLP, and ZTNA. It also has the flexibility to run on an appliance in accelerated mode as well as in the FortiSASE cloud, providing consistent networking, security, and policy management for every edge. This is further enhanced by FortiGuard artificial intelligence (AI)-powered security services, such as intrusion prevention system (IPS), domain name system (DNS) filtering, URL filtering, anti-malware, sandboxing, and more. This news expands Fortinet’s investment in Universal SASE by expanding the reach of its SASE stack in three key areas of the portfolio: Worldwide coverage of FortiSASE cloud locations FortiSASE, built on a global, scalable cloud network, delivers the same SASE stack as FortiGate appliances through its regional FortiSASE cloud locations. To deliver the best user experience and higher service availability, Fortinet now delivers over 100 FortiSASE cloud locations globally. Bringing accelerated SASE to the campus and branch To bring the full SASE stack to campus and branch locations, Fortinet is announcing the new FortiGate 120G SASE appliance. Because it is powered by Fortinet’s patented security processor 5 (SP5) custom application-specific integrated circuit (ASIC), it can accelerate many elements of the SASE stack, such as delivering three gigabits per second (Gbps) of secure sockets layer (SSL) inspection—an average of six times faster than the industry average—for visibility into encrypted traffic at scale. The following Secure Compute Rating table provides a comparison between equivalent solutions: Flexible consumption extended to Universal SASE FortiFlex, Fortinet’s flexible consumption program, has now been extended to Fortinet Universal SASE solutions. The entire SASE stack from Fortinet can be consumed as part of FortiFlex, whether customers want to use on-prem or FortiSASE cloud-based services. FortiFlex offers usage-based licensing across cloud, hybrid cloud, and on-premises deployments to give IT teams the flexibility to continually right-size their deployments, reduce excessive procurement cycles for new security solutions, simplify the deployment and provisioning of new services, and maximise budget and return on investment by enabling IT teams to scale down or pause services as needed.

Read More

Spotlight

1Kosmos

1Kosmos

1Kosmos automates identity verification by detecting stolen and synthetic identities before new account origination. Our non-phishable, passwordless MFA solutions make logins fun and secure, protecting workers from password-based attacks and eliminating account takeover and financial fraud targeting...

Events

Resources