‘Marketing can be the oxygen to a company’s growth,’ says Shashi Kiran

Multi-cloud Security & Confidential Computing Solutions for Companies
Shashi Kiran has a growth mind-set and enjoy driving results that make an effect, add value, and give people a good time. Integrity, authenticity, and staying away from politics are important parts of my identity. He has worked in marketing, sales, business development, and product management at both big global companies with global teams and multi-billion dollar sales and multi-stage startups. Read more to know his thoughts on role of marketing in IT industry.

Good content can truly unlock and unleash the potential of a product and the company at large.

Media 7: You have 20+ years of experience in business and technology roles. Walk us through your long and inspiring professional journey.
Shashi Kiran: I’ve been fortunate to do something I’ve enjoyed for most of my professional career. While my choice of career was intentional, the journey from one role to another has largely happened serendipitously, with people I know pulling me in into some companies or roles as the case may be. Having a technology background and a good business sense and a broad variety of roles over the past two decades, has allowed me to connect the dots across a variety of functions quite well. I’m quite good at rolling up sleeves and going in which is particularly helpful in startups and as well as navigating large matrixed organizations to drive teams at scale. Being able to go broad or deep as necessary has helped me dissect situations rapidly and drive quick action.

M7: How difficult has it been to balance competing priorities in your role, such as meeting sales targets, launching a new product, or developing strategies for your business?
SK:
I don’t view these as competing priorities. Eventually everything should be aligned towards the growth of the business and in service of customers. Understanding the right dependencies across functions are important when driving rapid execution at scale. Wrong turns mean lost time or missed opportunities. Taking an unbiased view and leaving your ego out the door can be helpful, but it takes discipline.

M7: Can you discuss the key areas of focus for Fortanix currently?
SK:
  Yes, Fortanix has been a rapidly growing company in the data security arena. The company is a pioneer in the confidential computing technology area, and that serves as a huge differentiator. This has allowed it to address a variety of use cases ranging from key management services and tokenization, to secrets management and code signing to name a few.  In today’s environment when data breaches and ransomware have become the norm it is a big deal for companies to have an elegant solution that allows them to simplistically deal with securing data in a manner that allows regulatory compliance as well. While Fortanix has on-premises appliance solutions, the focus is mostly on the growth of our SaaS offering.

Read more: 'Management is the art of getting people to do what they need to do and that's all about leadership,' says Reed Taussig


The sheer volume of data and in particular the growth of regulated data has brought in the need to build our automation as well as Artificial Intelligence based constructs that can model at scale.

M7: Apart from its data security technology, Fortanix is considered a pioneer in confidential computing. How did Fortanix develop itself as a game-changer in this field?
SK:
That’s right. It is amazing how quickly the concept has picked up with a broad industry ecosystem building up around it including cloud service providers, multiple chip vendors and ISVs. Kudos in large part to the founders for their vision.  Our CEO Anand Kashyap deserves credit for crafting the vision and building out a unified data security platform that delivers compelling value to customers across segments and verticals. We have some great engineers on board.

M7: With your extensive experience spanning over two decades in business and technology, could you provide your perspective on the significance of Artificial Intelligence and data management?
SK:
While there appears to be a rapid progress with AI-based approaches, I feel it is early days yet and we’re just scratching the tip of the iceberg. The sheer volume of data and in particular the growth of regulated data has brought in the need to build our automation as well as Artificial Intelligence based constructs that can operate at scale. We are seeing generative AI become a hot topic of discussion and this will be leveraged by both sides of the fence. In the case of encrypted data, AI can be even more useful when we combine it with confidential computing principles. For example, Fortanix has brought out confidential AI solutions that are starting to have mainstream applicability with initial forays into Healthcare. We recently previewed a capability called Confidential Data Search at RSA and HIMSS.

M7: How does Fortanix cater to the diverse needs of its customers, like organizations of all sizes, including some of the biggest global brands and Fortune 50 companies.
SK:
Focus is important. On one hand the concept of a unified data security platform means that the architecture is built to handle diversity and address a variety of use-cases. It has tremendous extensibility. Customers like this approach as it allows them to extend the power of the platform to solve several challenges without needed to revaluate multiple vendors or train their staff or go through operational logistics. The convergence is especially beneficial to drive down costs. Besides, in the case of SaaS, it allows a “scale as you need” model that delivers tremendous flexibility for an organization to grow the solution commensurate with its business growth. Consequently, we see a lot of land and expand deals with our customers. It also reflects in higher retention which is reflected in our low churn as well as high Net Promoter Score of 71.
At the same time, we’re packaging the solution somewhat differently to meet the needs of different customer segments. In this spirit, we’ve also launched a free offering called DSM explorer, that supports popular use-cases entirely for free with the bonus of having support from Fortanix. These efforts will continue. All these offerings are available via our website.

M7: You have partners like Microsoft, AWS, Google, and many more. As the CMO of Fortanix, how do you develop strong strategic partnerships with such well-known firms?
SK:
We have been fortunate to have all the major CSPs as well as several chip vendors partner with us and commit to working closely with us. Partnerships work best when there is bi-directional value and a commitment to work together for the benefit of our mutual customers. In this context, we’ve had great synergy with our solutions and believe these will continue. In addition to the CSPs and chip vendors, we are also partnering actively with other ISVs.

Read more: 'Innovative, strategic marketing that’s well-executed yields substantial ROI,' believes Ann-Strackhouse Miller


Taking an unbiased view and leaving your ego out the door can be helpful, but it takes discipline.

M7: Please shed some light on how does content play a significant part in the marketing of products and services for companies in the IT industry?
SK:
Content is the fuel for driving marketing growth. I’ve seen great products be stifled by poor content, messaging or positioning. Great content can truly unlock and unleash the potential of a product and the company at large. Marketers need to not just build great content that is consumable, but also make it easily accessible. The effort in this direction has to be constant. We’ve won some great customer logos based on searchable content that warmed up the opportunity before the sales process even began!

M7: Please provide an outline of the different network security software’s offered by Fortanix and how they benefit various sectors.
SK:
Our flagship offering is called the Data Security Manager. As I mentioned, this adopts a Unified Data Security platform approach and is powered by confidential computing which serves as the underpinning to all that we do. The platform offers deployment flexibility with on-premises Hardware Security Modules (HSMs) or delivers HSM-as-a-service. Several security services run as part of a SaaS offering including Key Management, Tokenization, Secrets Management, Code signing, etc. to name a few. We also help secure Web3 and blockchain infrastructure for DeFi and emerging use-cases. Our teams are also working on Post Quantum Cryptographic initiatives (PQC), though these are early days yet. In addition to this highly versatile platform, we also have launched a new product called DSM Explorer that is completely free and supported by Fortanix with no credit card requirements. These are for small to medium enterprise or functional workgroups in larger organizations.
Both these can be tried via a 30-day free trial in the case of DSM Enterprise, or it can be deployed in a few minutes directly with the DSM Explorer.

M7:  As someone with significant experience in the marketing industry, what advice would you offer to individuals pursuing a career in this field
SK:
I say go for it. Marketing is a multi-varied function and has a number of sub disciplines that make the job both hard as well as incredibly interesting at times. You can specialize and go deep in a few areas, or you could focus on connecting the dots. That said, my advice is to self-introspect and understand one’s strengths and passion and to choose a career that allows them to play to their strengths. Marketing can be like oxygen to the company. You don’t normally think about it when everything’s going well, but cut off oxygen supply and the rest of the body withers quickly.  Marketing takes a lot of work and I’ve seen finger pointing in organizations where the function is misunderstood. All this comes with the territory. So, develop a thick skin, don’t take things personally, be confident and enjoy the ride!

ABOUT FORTANIX

Fortanix is a leader in Confidential Computing and a multi-cloud security company that puts data first. Today, data is stored in clouds, SaaS, applications, storage systems, data centers, and other places. Fortanix separates security from infrastructure so that it can protect private data no matter where it is or what it is doing, whether it is at rest, in transit, or being used. Some of the biggest global brands and Fortune 50 companies are among the customers of Fortanix, which works with companies of all kinds and in many different industries. Fortanix is a founding member of the Confidential Computing Consortium and has strong strategic partnerships with companies like Intel, Microsoft, AWS, Google, Snowflake, and ServiceNow. Fortanix has won a lot of awards and praise from the business world, including the Gartner Cool Vendor award. To know more please visit https://www.fortanix.com/platform/data-security-manager

More C-Suite on deck

'We measure our success based on customer satisfaction, loyalty and retention,' says Strobes CEO Venu Rao

Media 7 | April 12, 2023

Venu Rao is a successful entrepreneur and cybersecurity professional who excels in developing client relationships by addressing their challenges and providing affordable and convenient validated solutions. With more than 15 years of experience in technology, product development, marketing and sales, he deeply understands the IT industry. As the Co-founder & CEO of Strobes Security, he is helping clients improve their cybersecurity posture by solving significant problems in the vulnerability management space with innovative solutions. Read his interview to know his thoughts about the cybersecurity landscape and the importance of having customer-centric solutions.

Read More

'We should not have data without a story, and not have a story without data,' believes Varun Kohli

Media 7 | April 11, 2023

Advisor, Investor and Category Creating CMO Varun Kohli is a highly accomplished market strategist, who has held leadership positions at large companies as well as startups. He has experience in developing, managing, and promoting solutions for various areas including API Security, financial risk and crime management, governance and compliance, fraud prevention, analytics, cybersecurity, file sharing, mobile threat defence, security information and event management, email, log management, instant messaging management, encryption and anti-spam. He led a team of over 50 marketers at Symantec, responsible for Global Demand, Project Management Office, and Strategic Marketing for their USD 2.4 billion Enterprise Business. He currently serves on the advisory boards of several startups. Read this exclusive interview to learn about his thoughts on the state of cybersecurity.

Read More

'Innovative, strategic marketing that’s well-executed yields substantial ROI,' believes Ann Strackhouse Miller

Media 7 | April 3, 2023

Ann Strackhouse Miller is a strategic marketing leader with 11+ years of experience building pipelines for high-growth companies through various marketing disciplines. Read on to know her perspective on thought leadership in a rapidly changing information security landscape and the importance of robust cybersecurity solutions.

Read More

'We measure our success based on customer satisfaction, loyalty and retention,' says Strobes CEO Venu Rao

Media 7 | April 12, 2023

Venu Rao is a successful entrepreneur and cybersecurity professional who excels in developing client relationships by addressing their challenges and providing affordable and convenient validated solutions. With more than 15 years of experience in technology, product development, marketing and sales, he deeply understands the IT industry. As the Co-founder & CEO of Strobes Security, he is helping clients improve their cybersecurity posture by solving significant problems in the vulnerability management space with innovative solutions. Read his interview to know his thoughts about the cybersecurity landscape and the importance of having customer-centric solutions.

Read More

'We should not have data without a story, and not have a story without data,' believes Varun Kohli

Media 7 | April 11, 2023

Advisor, Investor and Category Creating CMO Varun Kohli is a highly accomplished market strategist, who has held leadership positions at large companies as well as startups. He has experience in developing, managing, and promoting solutions for various areas including API Security, financial risk and crime management, governance and compliance, fraud prevention, analytics, cybersecurity, file sharing, mobile threat defence, security information and event management, email, log management, instant messaging management, encryption and anti-spam. He led a team of over 50 marketers at Symantec, responsible for Global Demand, Project Management Office, and Strategic Marketing for their USD 2.4 billion Enterprise Business. He currently serves on the advisory boards of several startups. Read this exclusive interview to learn about his thoughts on the state of cybersecurity.

Read More

'Innovative, strategic marketing that’s well-executed yields substantial ROI,' believes Ann Strackhouse Miller

Media 7 | April 3, 2023

Ann Strackhouse Miller is a strategic marketing leader with 11+ years of experience building pipelines for high-growth companies through various marketing disciplines. Read on to know her perspective on thought leadership in a rapidly changing information security landscape and the importance of robust cybersecurity solutions.

Read More

Related News

Software Security

Deepwatch Announces New Forensic-Focused Operations Service To Enhance Cyber Resilience

Deepwatch | January 09, 2024

Deepwatch, the leading managed security platform for the cyber resilient enterprise, today announced the launch of Threat Signal, its standalone forensic-focused operations service. Deepwatch designed Threat Signal to enhance companies’ cybersecurity defenses, proactively identify and help mitigate attack vectors, and stay ahead of evolving risks to strengthen cyber resilience. Threat Signal provides protection beyond traditional security measures, finding advanced cyber threats that have bypassed existing controls by leveraging the latest attacker methodologies to stay in tune with the constantly evolving threat landscape. Using an “outside-in” methodology, Threat Signal evaluates an organization’s externally accessible presence from an attacker’s perspective to pinpoint and investigate risky systems and services. This informs the initial investigation and allows Deepwatch Experts to leverage advanced capabilities through organic intelligence, deep forensics, and threat hunting. According to Forrester’s “How to Make Threat Intelligence Actionable” report¹, “Over time, companies need to move beyond tactical use cases. Threat hunting can uncover threats that have bypassed traditional security tools, allowing companies to stop attacks earlier to minimize disruptions. As Forrester’s Threat Hunting 101 report describes, threat intelligence is vital because it provides insights into the TTPs of threat actors and details on how malware behaves. If time, expertise, and resources are constrained, consider leveraging an external service provider to conduct the threat-hunting exercise as an annual consulting engagement.” Threat Signal provides tailored and proactive security measures through customer-specific intelligence that takes an organization's unique attack surface, business risks, and the latest adversary intelligence or "threat cases" into account. Threat Signal’s additional features and capabilities include: Deepwatch Experts - Seasoned forensic security experts perform in-depth investigations, identifying threats before they disrupt an organization. Attack Surface Profiles - These profiles provide a customer actionable report, detailing external opportunity areas that an attacker could leverage against an organization, including high-risk opportunities, mitigation recommendations, and threat hunting leads. Forensic-Agent-Based Threat Hunting Engagements - Deepwatch’s specialists consistently engage in hunting activities to reveal concealed threats within a company’s infrastructure and provide a threat hunt summary report with detailed observations and any actions that the customer took during that hunt cycle. Reporting and Reviews - Deepwatch provides customers with reports, including: Weekly intelligence brief reports on analyzed open-source intelligence with Deepwatch recommendations. Summary presentations on the solution engagement status, including but not limited to hunting reports. Up to two executive reviews of the solution and observables per year. Ad-hoc awareness briefs of security advisories based on Deepwatch threat criteria. Annual intelligence reports on incident lessons learned and predictions. Malware Analysis - Deepwatch’s Adversary Tactics and Intelligence (ATI) team analyze collected malware and provide a report. Enhanced Security - Deepwatch’s MDR customers benefit from cross-collaborative security operations, harnessing advanced threat detection, and hyper-responsive capabilities. “As security professionals, we look to enhance a company’s security readiness. To do that, it’s critical for them to look beyond their existing security controls to ensure they are identifying and proactively protecting the business from external threats,” said Jerrod Barton, VP, Cyber Operations & Intelligence for Deepwatch. “With Threat Signal, we’re able to help our enterprise customers view their security readiness through the lens of the ‘attackers,’ ensuring that they can rapidly respond to any incoming threats, which in turn helps them elevate their cyber resilience.” About Deepwatch Deepwatch is the leading managed security platform for the cyber resilient enterprise. The Deepwatch Managed Security Platform and security experts provide enterprises with 24/7/365 cyber resilience, rapid detections, high fidelity alerts, reduced false positives, and automated actions. We operate as an extension of cybersecurity teams by delivering exceptional security expertise, visibility across your attack surface, precision response to threats, and a compelling return on your security investments. The Deepwatch Managed Security Platform is trusted by many of the world’s leading brands to improve their security posture, cyber resilience, and peace of mind. Learn more at www.deepwatch.com.

Read More

End Point Protection

Malwarebytes Unveils New K-12 ThreatDown Bundle to Defend Schools and Districts from Cyberattacks

Malwarebytes | January 24, 2024

Malwarebytes, a global leader in real-time cyber protection, today announced the availability of ThreatDown K-12 Bundle, combining the cybersecurity technologies and services that K-12 education institutions need into a streamlined, cost-effective bundle. Purpose-built to reduce risk, complexity and costs for districts and schools, the ThreatDown K-12 Bundle delivers unified protection with an intuitive, easy-to-manage design. The ThreatDown K-12 Bundle allows schools to optimize device uptime and improve productivity, while protecting students and staff, devices and data from the latest cyber threats. "Schools are increasingly facing cyber threats with limited IT resources, leading to a rise in ransomware attacks that affect staff, teaching, and student well-being," said Marcin Kleczynski, Founder and CEO of Malwarebytes. "Historically, cost barriers prevented schools from adopting cybersecurity managed services. Our K-12 Bundle packages together everything districts need to reduce risk and comply with regulations within a manageable budget. We're committed to making powerful protection and managed services accessible to vulnerable schools and students." Bridging the Cybersecurity Gap for Resource-constrained K-12 IT Teams Modern K-12 educational institutions have a wide range of school-, staff- and student-owned devices – from traditional laptops, desktops and servers to Chromebooks, iPadOS, iOS, and Android devices. While these devices greatly enrich the student learning experience and streamline operations for staff, they also introduce new risks. Key features of the ThreatDown K-12 Bundle include: Award-winning endpoint security: K-12 Bundle is built on ThreatDown's strongest AI/ML-driven prevention, detection and response technologies fortified by built-in innovations to reduce the attack surface. These technologies simplify the process of finding and patching software vulnerabilities and prevent unauthorized programs from executing. 24x7x365 managed services: The K-12 Bundle combines ThreatDown advanced technologies with Managed Detection and Response (MDR) service of ThreatDown cybersecurity experts to manage security and resolve alerts around the clock, delivered as an affordable, hassle-free bundle. Unified endpoint management: ThreatDown extends powerful endpoint protection across workstations, servers and mobile device to substantially strengthen schools' cybersecurity postures in compliance with new and pending regulations. Quick and easy to deploy, the K-12 Bundle saves time and resources with unified endpoint management for both traditional and mobile devices – all from a single, cloud-native console. Centralized, real-time visibility: K-12 IT teams can easily view activity across all devices in real time. With a unified platform and visibility for traditional and mobile endpoints, teams can monitor and protect devices from a single pane of glass. Teams can understand the threats to devices in their environments and mitigate potential risks. Advanced mobile protection: ThreatDown K-12 Bundle provides effective protection for Chromebooks, iPadOS, iOS, and Android devices, guarding against the latest mobile threats such as ransomware, malicious apps, and potentially unwanted programs (PUPs). With real-time protection, schools can also prevent accidental access to harmful websites, safeguard against malicious apps, block unwanted in-app ads, and enable a secure mobile experience for students. About Malwarebytes Malwarebytes is a global cybersecurity leader delivering award-winning endpoint protection, privacy and threat prevention solutions worldwide. Built on decades of experience as the last resort to find and eradicate the latest malware, Malwarebytes is now trusted by millions of individuals and organizations to stop threats at each stage of the attack lifecycle, secure digital identities and safeguard data and privacy. A world class team of threat researchers and proprietary AI-powered engines provide unmatched threat intelligence to detect and prevent known and unknown threats. The company is headquartered in California with offices in Europe and Asia. For more information and career opportunities, visit https://www.malwarebytes.com.

Read More

Data Security

Boomi Strengthens Commitment to Data Security and Compliance by Achieving StateRAMP Authorization

Boomi | January 12, 2024

Boomi™, the intelligent connectivity and automation leader, today announced that the Boomi platform has achieved StateRAMP Authorization. This achievement reflects Boomi’s unwavering commitment to data security and compliance, and to delivering a secure and reliable solution that government agencies can rely on to safeguard their data and operations. “At Boomi, we are committed to democratizing modernization. Securing StateRAMP authorization for our platform was paramount, enabling public sector organizations to seamlessly and securely integrate and leverage cloud applications,” said Sean Wechter, Chief Information Officer at Boomi. “Through a strategic alliance with StateRAMP, Boomi actively collaborates with its leadership board, facilitating streamlined documentation and audit processes to expedite digital transformation within the public sector." According to the U.S. Government Accountability Office, government agencies plan to spend billions of dollars each year to support their IT and cybersecurity efforts, including transitioning IT resources to secure, cost-effective commercial cloud services.1 However, agencies are challenged to select secure cloud-based solutions, making it difficult for these organizations to modernize and improve constituent experiences. StateRAMP, a nationally recognized risk authorization management program that provides a standardized approach to assessing cloud products, improves security and simplifies procurement by building a pool of pre-authorized Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS) solutions for public sector entities. As organizations more frequently implement cloud-based solutions, they also require validated access to integration platform as a service (iPaaS) to streamline application and resource integration. iPaaS integrates cloud-to-cloud, cloud-to-on premises, and on-premises-to-on-premises platforms, helping public sector organizations break down data silos to enhance information flow, improve citizen services, and increase operational effectiveness. About Boomi Boomi aims to make the world a better place by connecting everyone to everything, anywhere. The pioneer of cloud-based integration platform as a service (iPaaS), and now a category-leading, global software as a service (SaaS) company, Boomi touts the largest customer base among integration platform vendors and a worldwide network of approximately 800 partners – including Accenture, Capgemini, SAP, and Snowflake. Global organizations turn to Boomi’s award-winning platform to discover, manage, and orchestrate data, while connecting applications, processes, and people for better, faster outcomes. For more information, visit boomi.com.

Read More

Software Security

Deepwatch Announces New Forensic-Focused Operations Service To Enhance Cyber Resilience

Deepwatch | January 09, 2024

Deepwatch, the leading managed security platform for the cyber resilient enterprise, today announced the launch of Threat Signal, its standalone forensic-focused operations service. Deepwatch designed Threat Signal to enhance companies’ cybersecurity defenses, proactively identify and help mitigate attack vectors, and stay ahead of evolving risks to strengthen cyber resilience. Threat Signal provides protection beyond traditional security measures, finding advanced cyber threats that have bypassed existing controls by leveraging the latest attacker methodologies to stay in tune with the constantly evolving threat landscape. Using an “outside-in” methodology, Threat Signal evaluates an organization’s externally accessible presence from an attacker’s perspective to pinpoint and investigate risky systems and services. This informs the initial investigation and allows Deepwatch Experts to leverage advanced capabilities through organic intelligence, deep forensics, and threat hunting. According to Forrester’s “How to Make Threat Intelligence Actionable” report¹, “Over time, companies need to move beyond tactical use cases. Threat hunting can uncover threats that have bypassed traditional security tools, allowing companies to stop attacks earlier to minimize disruptions. As Forrester’s Threat Hunting 101 report describes, threat intelligence is vital because it provides insights into the TTPs of threat actors and details on how malware behaves. If time, expertise, and resources are constrained, consider leveraging an external service provider to conduct the threat-hunting exercise as an annual consulting engagement.” Threat Signal provides tailored and proactive security measures through customer-specific intelligence that takes an organization's unique attack surface, business risks, and the latest adversary intelligence or "threat cases" into account. Threat Signal’s additional features and capabilities include: Deepwatch Experts - Seasoned forensic security experts perform in-depth investigations, identifying threats before they disrupt an organization. Attack Surface Profiles - These profiles provide a customer actionable report, detailing external opportunity areas that an attacker could leverage against an organization, including high-risk opportunities, mitigation recommendations, and threat hunting leads. Forensic-Agent-Based Threat Hunting Engagements - Deepwatch’s specialists consistently engage in hunting activities to reveal concealed threats within a company’s infrastructure and provide a threat hunt summary report with detailed observations and any actions that the customer took during that hunt cycle. Reporting and Reviews - Deepwatch provides customers with reports, including: Weekly intelligence brief reports on analyzed open-source intelligence with Deepwatch recommendations. Summary presentations on the solution engagement status, including but not limited to hunting reports. Up to two executive reviews of the solution and observables per year. Ad-hoc awareness briefs of security advisories based on Deepwatch threat criteria. Annual intelligence reports on incident lessons learned and predictions. Malware Analysis - Deepwatch’s Adversary Tactics and Intelligence (ATI) team analyze collected malware and provide a report. Enhanced Security - Deepwatch’s MDR customers benefit from cross-collaborative security operations, harnessing advanced threat detection, and hyper-responsive capabilities. “As security professionals, we look to enhance a company’s security readiness. To do that, it’s critical for them to look beyond their existing security controls to ensure they are identifying and proactively protecting the business from external threats,” said Jerrod Barton, VP, Cyber Operations & Intelligence for Deepwatch. “With Threat Signal, we’re able to help our enterprise customers view their security readiness through the lens of the ‘attackers,’ ensuring that they can rapidly respond to any incoming threats, which in turn helps them elevate their cyber resilience.” About Deepwatch Deepwatch is the leading managed security platform for the cyber resilient enterprise. The Deepwatch Managed Security Platform and security experts provide enterprises with 24/7/365 cyber resilience, rapid detections, high fidelity alerts, reduced false positives, and automated actions. We operate as an extension of cybersecurity teams by delivering exceptional security expertise, visibility across your attack surface, precision response to threats, and a compelling return on your security investments. The Deepwatch Managed Security Platform is trusted by many of the world’s leading brands to improve their security posture, cyber resilience, and peace of mind. Learn more at www.deepwatch.com.

Read More

End Point Protection

Malwarebytes Unveils New K-12 ThreatDown Bundle to Defend Schools and Districts from Cyberattacks

Malwarebytes | January 24, 2024

Malwarebytes, a global leader in real-time cyber protection, today announced the availability of ThreatDown K-12 Bundle, combining the cybersecurity technologies and services that K-12 education institutions need into a streamlined, cost-effective bundle. Purpose-built to reduce risk, complexity and costs for districts and schools, the ThreatDown K-12 Bundle delivers unified protection with an intuitive, easy-to-manage design. The ThreatDown K-12 Bundle allows schools to optimize device uptime and improve productivity, while protecting students and staff, devices and data from the latest cyber threats. "Schools are increasingly facing cyber threats with limited IT resources, leading to a rise in ransomware attacks that affect staff, teaching, and student well-being," said Marcin Kleczynski, Founder and CEO of Malwarebytes. "Historically, cost barriers prevented schools from adopting cybersecurity managed services. Our K-12 Bundle packages together everything districts need to reduce risk and comply with regulations within a manageable budget. We're committed to making powerful protection and managed services accessible to vulnerable schools and students." Bridging the Cybersecurity Gap for Resource-constrained K-12 IT Teams Modern K-12 educational institutions have a wide range of school-, staff- and student-owned devices – from traditional laptops, desktops and servers to Chromebooks, iPadOS, iOS, and Android devices. While these devices greatly enrich the student learning experience and streamline operations for staff, they also introduce new risks. Key features of the ThreatDown K-12 Bundle include: Award-winning endpoint security: K-12 Bundle is built on ThreatDown's strongest AI/ML-driven prevention, detection and response technologies fortified by built-in innovations to reduce the attack surface. These technologies simplify the process of finding and patching software vulnerabilities and prevent unauthorized programs from executing. 24x7x365 managed services: The K-12 Bundle combines ThreatDown advanced technologies with Managed Detection and Response (MDR) service of ThreatDown cybersecurity experts to manage security and resolve alerts around the clock, delivered as an affordable, hassle-free bundle. Unified endpoint management: ThreatDown extends powerful endpoint protection across workstations, servers and mobile device to substantially strengthen schools' cybersecurity postures in compliance with new and pending regulations. Quick and easy to deploy, the K-12 Bundle saves time and resources with unified endpoint management for both traditional and mobile devices – all from a single, cloud-native console. Centralized, real-time visibility: K-12 IT teams can easily view activity across all devices in real time. With a unified platform and visibility for traditional and mobile endpoints, teams can monitor and protect devices from a single pane of glass. Teams can understand the threats to devices in their environments and mitigate potential risks. Advanced mobile protection: ThreatDown K-12 Bundle provides effective protection for Chromebooks, iPadOS, iOS, and Android devices, guarding against the latest mobile threats such as ransomware, malicious apps, and potentially unwanted programs (PUPs). With real-time protection, schools can also prevent accidental access to harmful websites, safeguard against malicious apps, block unwanted in-app ads, and enable a secure mobile experience for students. About Malwarebytes Malwarebytes is a global cybersecurity leader delivering award-winning endpoint protection, privacy and threat prevention solutions worldwide. Built on decades of experience as the last resort to find and eradicate the latest malware, Malwarebytes is now trusted by millions of individuals and organizations to stop threats at each stage of the attack lifecycle, secure digital identities and safeguard data and privacy. A world class team of threat researchers and proprietary AI-powered engines provide unmatched threat intelligence to detect and prevent known and unknown threats. The company is headquartered in California with offices in Europe and Asia. For more information and career opportunities, visit https://www.malwarebytes.com.

Read More

Data Security

Boomi Strengthens Commitment to Data Security and Compliance by Achieving StateRAMP Authorization

Boomi | January 12, 2024

Boomi™, the intelligent connectivity and automation leader, today announced that the Boomi platform has achieved StateRAMP Authorization. This achievement reflects Boomi’s unwavering commitment to data security and compliance, and to delivering a secure and reliable solution that government agencies can rely on to safeguard their data and operations. “At Boomi, we are committed to democratizing modernization. Securing StateRAMP authorization for our platform was paramount, enabling public sector organizations to seamlessly and securely integrate and leverage cloud applications,” said Sean Wechter, Chief Information Officer at Boomi. “Through a strategic alliance with StateRAMP, Boomi actively collaborates with its leadership board, facilitating streamlined documentation and audit processes to expedite digital transformation within the public sector." According to the U.S. Government Accountability Office, government agencies plan to spend billions of dollars each year to support their IT and cybersecurity efforts, including transitioning IT resources to secure, cost-effective commercial cloud services.1 However, agencies are challenged to select secure cloud-based solutions, making it difficult for these organizations to modernize and improve constituent experiences. StateRAMP, a nationally recognized risk authorization management program that provides a standardized approach to assessing cloud products, improves security and simplifies procurement by building a pool of pre-authorized Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS) solutions for public sector entities. As organizations more frequently implement cloud-based solutions, they also require validated access to integration platform as a service (iPaaS) to streamline application and resource integration. iPaaS integrates cloud-to-cloud, cloud-to-on premises, and on-premises-to-on-premises platforms, helping public sector organizations break down data silos to enhance information flow, improve citizen services, and increase operational effectiveness. About Boomi Boomi aims to make the world a better place by connecting everyone to everything, anywhere. The pioneer of cloud-based integration platform as a service (iPaaS), and now a category-leading, global software as a service (SaaS) company, Boomi touts the largest customer base among integration platform vendors and a worldwide network of approximately 800 partners – including Accenture, Capgemini, SAP, and Snowflake. Global organizations turn to Boomi’s award-winning platform to discover, manage, and orchestrate data, while connecting applications, processes, and people for better, faster outcomes. For more information, visit boomi.com.

Read More

Spotlight

Fortanix

Fortanix

Fortanix Self-Defending Key Management Service (SDKMS) is the world’s first cloud service secured with Intel® SGX. With SDKMS, you can securely generate, store, and use cryptographic keys and certificates, as well as secrets, such as passwords, API keys, tokens, or any blob of data. Your business-cr...

Events

Resources