Panzura's Glen Shok explains why file security and military-grade encryption should be applied to all data stored in the cloud

Media 7 | March 11, 2022

Panzura's Glen Shok explains
Glen Shok, CTO and VP Cloud Architects at Panzura, looks into his crystal ball and shares with us his predictions of the developments in the cybersecurity space. In this interview, we had the opportunity to explore novel malware tactics like ransomware and data wiper exploits, and the different solutions Panzura offers enterprises to improve their security measures. Read on to learn more about upticks in this cybersecurity landscape, and how Panzura can get businesses battle-ready against these attacks.


Ransomware encrypts files so quickly that entire file systems can be compromised before organizations are even aware of a problem.

MEDIA 7: You have had an expansive career in diverse fields ranging from operations management, business development, sales and marketing, to process improvements. How has all this experience helped in your current role at Panzura?
GLEN SHOK:
I’ve been in the enterprise and software sectors for more than two decades, working at companies like Oracle, EMC, and Cisco to build industry partnerships and define market strategies for software-defined storage, data networking, data centers, and of course the cloud. I’ve seen a lot of change but when it comes to using and consuming data, the enterprise has always been moving towards less cost, more availability, and more agility, and all of this with less risk.

For my role at Panzura, this experience has given me a perspective on how business has accelerated towards the cloud. It’s about delivering on-demand IT services that are elastic and able to scale up and down when needed. I know that the cloud can do a lot of things, but without the driving forces of data management and data security, none of that is possible. As I see it, success will come from helping the enterprise simultaneously address both the IT imperative of hybrid-cloud, and the business imperative of multi-cloud, and doing it in a way that keeps data safe.

Panzura makes data available so it can be used securely, and at a much lower cost. We also increase the value of that data by enabling real-time collaboration, integrating data from many different silos, and making it easy to analyze and manage, all on a shared common platform. Getting back to the main drivers of the move to the cloud–elasticity, simplicity and security–we’re seeing that any interface for cloud storage needs to support these things for a multitude of diverse business cases. That includes banking and financial markets, healthcare and hospitals, construction, engineering, manufacturing–the list goes on.

The natural evolution of that is taking shape with Panzura, where organizations with people all around the world will be able to utilize any kind of storage, and the data that is placed in them as if it’s a single data center. As a part of that, they’ll also be able to discover the capabilities of the cloud and use this interface to manage that, too. They’ll do all of this with complete confidence that their data is protected, secure, and resilient to any type of failure. It’s that evolution and innovation that has me most excited, and it’s why Panzura is a natural fit for my experience.


M7:  How does Panzura’s immutable data architecture offer a solution to ransomware attacks?
GS:
Great question! I mentioned the fact that the enterprise has always been moving toward less risk, and the cloud has made that far more complicated. Legacy file systems were already inherently vulnerable to ransomware and other types of malware because the data held in them needs to be editable. When attacked, they do exactly what they are designed to do, which is to allow files to be changed.

Ransomware, once inside the network, can gain access to these systems and change or encrypt data making it inaccessible. Everything grinds to a halt until a ransom is paid. When you get hit, recovering “clean” files after an attack is exceptionally difficult and time-consuming. Traditional backup processes tend to run on a scheduled basis, so there is almost always a time gap that results in data loss, and restoring from a backup is time and labor-intensive.

Panzura CloudFS global file system is built in a way that makes it impossible for attackers to alter or change data. Data is resistant to attack altogether. Instead of fighting off intruders at the castle wall, it reduces the impact and recovery time after an attack by keeping data unaffected.

Read More: 'Make the customer the hero,' says Chris Kim, Director of Social Media at Airtable

M7:  How does Panzura CloudFS improve data security and backup processes?
GS:
From the attacker’s point of view, the success or failure of an attack depends on your ability to restore access to your data, unless the ransom is paid. That’s why they often go after backups first, to limit your recovery options. This leaves you with nothing but offsite backups to restore your data, and as I mentioned, that is a very slow and costly process. While all of this is happening, users are locked out of their files. Each hour that goes by is lost time and money. But our approach to data immutability, and the ability of our hybrid-cloud solution to encrypt data and make it completely useless to attackers, means Panzura CloudFS users don’t worry about downtime and never pay ransoms.

Let me explain! Panzura CloudFS stores file data as blocks in cloud object storage, as a single authoritative data set that every user in the organization works from. It makes no difference how many people, or how far apart they are. Every user gets what feels like a local file experience, even though the data itself is stored hundreds, if not thousands of miles away. Those data blocks are immutable, stored in a ‘Write Once, Read Many’ form, so that once stored, they cannot be changed, edited, or overwritten. That makes them impervious to all forms of malware.

Metadata pointers are used to record which blocks comprise a file at any given time. As users create or edit files, changed data chunks are moved to object storage every 60 seconds, and are stored as new data blocks. At the same time, those pointers are updated to reflect any new blocks that form the file. For example, if a file is composed of blocks A, B, C and D, and it is edited today, it might now be composed of blocks A, B, C and E. The new block E is moved to the object store, and the pointers record that A, B, C and E are required to open the current version of that file.

These immutable data blocks are further protected by system-wide read-only snapshots. These are essentially exact replicas of the data and are taken at configurable intervals–typically no more than every 60 minutes. They keep files consistent while they’re being worked on. For backup purposes, additional read-only snapshots are taken every 60 seconds, and these are used to transfer changed data to the object-store. As these are read-only, snapshots, they are impervious to ransomware, and they provide a way to restore data to any previous version in a very precise way.




Legacy file systems were already inherently vulnerable to ransomware and other types of malware because the data held in them needs to be editable.



M7: How does Panzura enable quick progress towards realistic digital transformations for organizations using AI and data analytics?
GS:
Panzura CloudFS has a built-in SaaS-based data analytics layer called Panzura Data Services. It allows users to apply cloud-based AI and ML analytics across many types of unstructured data. We partner with the leading cloud and managed service providers to deliver optimized, fit-for-purpose solutions that make it faster and more efficient to handle massive volumes of data files. These files can be stored, retrieved, searched, and analyzed using AI in compliance with the specific regulatory requirements of financial institutions, healthcare, and other key sectors.

Panzura allows organizations to migrate or re-platform data, workloads, and applications to the cloud, and to consolidate data across multiple on-premises servers and the cloud, without having to refresh existing infrastructure. Applications and data can be moved as-is to a public cloud, while enhancing or replacing some components to take advantage of cloud services, which are becoming more driven by AI, without rewrite or workflow changes.

As I mentioned before, the Panzura global file system is built on a unique immutable architecture that delivers the highest level of data protection and recovery of any solution in its category. Granular recovery capabilities are augmented by the powerful analytics of Panzura Data Services–which is also becoming more AI-driven–to identify and restore files near-instantaneously in the event of data loss, damage, or ransomware attack.

Read More: 'Enterprises that don't leverage AI and ML is likely at a disadvantage,' believes Miquido's Jerzy Biernacki

M7: What makes Panzura’s cloud data management platform stand out among its competitors?
GS:
While there are similar solutions out there, they are better for small implementations across just a few sites. None achieve real-time global file consistency or anything close to it. Those solutions typically sync data to central storage. Local filers then pull data from that storage, once it is available. The time to achieve file consistency is therefore dependent on the time taken for each location to sync changes to the cloud store, and for the querying location to retrieve it. While lower-level solutions are often good for legacy storage, they still leave users waiting on data. This significantly impacts productivity and produces data bloat with multiple, redundant but still out-of-sync file versions that make data difficult to manage. 

Panzura moves data in real-time, as it is created and when it is required. All locations in the Panzura global file system sync changed data to the cloud simultaneously, every 60 seconds. Should another location need to open a file before this occurs, a peer-to-peer connection handles the change in file ownership, as well as any changed data blocks which make the file consistent. This happens in milliseconds in the background.
No other solution provides built-in analytics for integrated search, audit, and file network analysis over an entire cloud storage infrastructure. Some even require indexing to be switched off, making it painfully slow to find files. This also means they cannot offer AI- and ML-based performance and activity alerts, and they generally don’t have tools for admins to fully diagnose and troubleshoot their environment.


M7: What do you consider to be the best practices for streamlining data infrastructure?
GS:
We come at this from a couple of angles. Panzura’s hybrid-cloud approach makes files immediately consistent across sites and provides enterprise-grade durability without replicating files for backup and disaster recovery. Legacy approaches house user files and replicate them to a secondary site, so users from both sites have access to the same files. In this scenario, the company investment is already twice the original storage investment to satisfy the RPO and remote collaboration requirements.

Instead of replicating files across locations, Panzura uses public, private or dark cloud storage as a single authoritative data source. Virtual machines at the edge, on-premises, or in cloud regions, overcome latency by holding the file system’s metadata as well as intelligently caching the most frequently used files to achieve local-feeling performance.
Much has been written about the exponential growth of unstructured data. Much less has been said about how legacy approaches to file systems and data management contribute to that increase.

Cloud providers automatically create redundant copies of data across different repositories and locations by building durability into their service. When you consider that unstructured data is already growing at an incredible pace, adding more storage to compensate is not only complicated and costly but doesn’t solve the real problem. Under the strain of this load, most organizations quickly find that their existing storage systems are cumbersome at best. Traditional network-attached storage–or NAS–is plagued by insufficient workflows and performance, not to mention security risks.

The inefficiency and inflexibility create delays in access to files which makes it impossible to work productively, and that problem is even worse when multiple people in different locations collaborate on files. Along with delays, people may end up editing files that are already being edited by another employee. These legacy NAS systems may have virtually no backend tech managing file edits, leaving duplicate files to run rampant.
As a result, each site is sharing with the wider enterprise their mess of siloed, redundant data. The spread of mismanaged data amounts to a stockpile of badly maintained clutter. It’s a lot of work to navigate, consolidate, and tolerate these flaws.

Panzura CloudFS uses a single, authoritative data set as the “golden copy” of each file. Dynamic caching based on usage patterns keeps duplicates at bay. What’s more, it uses file sync methods alongside intelligent and conservative file locking, to keep the storage space tidy and duplicate-free.

Read More: 'No company operating in the cloud should ever lose data' says Sam Gutmann, CEO and Co-Founder at OwnBackup




Traditional network-attached storage–or NAS–is plagued by insufficient workflows and performance, not to mention security risks.



M7: Panzura CloudFS is set to replace legacy solutions. How do you see this segment growing as the threat from ransomware increases?
GS:
Well, I think the threat of ransomware is going to continue to grow alongside other novel malware tactics like data wiper exploits. We’re already seeing this unfold in very disturbing ways with state-sponsored cyber-crime now emerging as a threat that could easily dwarf rogue criminals out to make a profit from holding data ransom. In many ways, I see this as the final nail in the coffin for legacy solutions. The need for more and better data management solutions to contain these threats has shifted the landscape, which was already moving toward the cloud as we discussed.

For one thing, we’re seeing demand for self-service ransomware recovery capabilities that make it easier for organizations to take data recovery and restoration into their own hands when an attack happens. One way we’re addressing this is to roll out self-managed snapshot recovery that lets IT teams revert files or directories to a pre-ransomware state without the need for external support. If we can trim downtime by shaving off minutes with these types of capabilities, there’s the potential to save entire industries billions of dollars in lost time due to delayed work, and millions of IT man-hours.


M7:  Few years down the line, how do you see AI changing the world around us?
GS:
Looking into my crystal ball, in a few years, I’m certain we’ll begin to see AI algorithms that are self-learning and when unleashed on an organization’s data network, will quickly learn data usage patterns, and begin shifting cloud capacity around automatically to make the entire network move faster. We’ll also see predictive AI serving up data and files to the right people, when and where it’s needed, anticipating the workflows of an organization in real-time.

But I think of this in terms of how ransomware and cyberwarfare are compressing timelines and bringing innovations that would have otherwise taken years to happen. Ransomware encrypts files so quickly that entire file systems can be compromised before organizations are even aware of a problem. Solving this problem is an area where Panzura is breaking new ground right now. We’re getting ready to introduce new AI-powered features that provide early detection and confirmation of ransomware attacks, and then send notifications via text and emails.

That way, administrators will be alerted to ransomware attacks in near real-time so they can organize a quick response, cutting down on downtime and disruption, and even reducing recovery efforts. So, in many ways, the future is now, and that’s very exciting. But what comes next, for example, is self-healing cloud data management systems with AI at the helm, and the ability to connect entire industries into living data ecosystems–that’s even more incredible.

ABOUT PANZURA

Panzura makes hybrid multi-cloud data management seem easy. Panzura’s data management platform is a single, unified data engine designed to securely power the most rigorous, large-scale multi-site enterprise data workflows across the globe. Intelligent edge technologies enable LAN performance with cloud economics together with simplified data management, advanced analytics, reduced operational complexity, and improved security. Find out more at panzura.com.

More C-Suite on deck

Arkose Labs's Vanita Pandey believes ‘Online account is going to be the currency that people will trade on’

Media 7 | December 13, 2021

Vanita Pandey, CMO - Arkose Labs, speaks about the role that Innovative Payment Models play in the changing dynamics of purchase and shopping. Read on to know her thoughts about how necessary is content for attracting consumers in this age and much more.

Read More

'TeleSign embeds trust at every touchpoint,' assures Joseph Burton

Media 7 | December 8, 2021

Joseph Burton, Chief Executive Officer at TeleSign elaborates on Promotion Abuse, Communication Fraud, and Buy Now Pay Later Fraud. Read on to know about the biggest online financial threat for consumers and much more.

Read More

Cryptix AG’s Alexandre Horvath wants users to adopt a Zero Trust policy to secure their digital footprint

Media 7 | November 12, 2021

Alexandre Horvath, Chief Information Security & Data Protection Officer at Cryptix AG sheds light on the importance of cybersecurity in the ever-growing landscape of DLT and blockchain. Read on as he elaborates the importance of Zero Trust for data privacy and the struggle of keeping pace with GDPR compliance.

Read More

Arkose Labs's Vanita Pandey believes ‘Online account is going to be the currency that people will trade on’

Media 7 | December 13, 2021

Vanita Pandey, CMO - Arkose Labs, speaks about the role that Innovative Payment Models play in the changing dynamics of purchase and shopping. Read on to know her thoughts about how necessary is content for attracting consumers in this age and much more.

Read More

'TeleSign embeds trust at every touchpoint,' assures Joseph Burton

Media 7 | December 8, 2021

Joseph Burton, Chief Executive Officer at TeleSign elaborates on Promotion Abuse, Communication Fraud, and Buy Now Pay Later Fraud. Read on to know about the biggest online financial threat for consumers and much more.

Read More

Cryptix AG’s Alexandre Horvath wants users to adopt a Zero Trust policy to secure their digital footprint

Media 7 | November 12, 2021

Alexandre Horvath, Chief Information Security & Data Protection Officer at Cryptix AG sheds light on the importance of cybersecurity in the ever-growing landscape of DLT and blockchain. Read on as he elaborates the importance of Zero Trust for data privacy and the struggle of keeping pace with GDPR compliance.

Read More

Related News

DATA SECURITY,PLATFORM SECURITY,SOFTWARE SECURITY

KnowBe4 Launches New Mobile Learner App for Anytime, Anywhere Cybersecurity Learning

KnowBe4 | November 29, 2022

KnowBe4, the provider of the world's largest security awareness training and simulated phishing platform, today announced it is launching the new KnowBe4 Mobile Learner App to empower end users by introducing security awareness and compliance training on the go at no additional cost to customers, improving user engagement and strengthening security culture. With a large majority of the world's population using smartphones today, mobile training revolutionizes the way people learn. This new app will enable end users to complete their security awareness and compliance training conveniently from their tablets or smartphones, giving them 24/7/365 access. "The KnowBe4 Mobile Learner App is the first of its kind to launch in the security awareness and compliance training space, making it easier than ever to train users while subsequently strengthening an organization's security culture. "This new app will enable IT and security teams to improve engagement and completion rates for required training thanks to a seamless user experience. This will also help users to associate security with their personal devices, keeping it top of mind all the time rather than only when they are at work on their computers. We are making this substantial new capability available at no additional cost to all subscription levels as a show of our commitment to supporting our customers' security and human risk management objectives." Stu Sjouwerman, CEO, KnowBe4 Based on subscription levels, KnowBe4 offers 100+ Mobile-First training modules that were designed specifically for mobile. The KnowBe4 Learner App supports push notifications for custom announcements, updates on assigned training as well as KnowBe4 newsletters. About KnowBe4 KnowBe4, the provider of the world's largest security awareness training and simulated phishing platform, is used by more than 54,000 organizations around the globe. Founded by IT and data security specialist Stu Sjouwerman, KnowBe4 helps organizations address the human element of security by raising awareness about ransomware, CEO fraud and other social engineering tactics through a new-school approach to awareness training on security. Kevin Mitnick, an internationally recognized cybersecurity specialist and KnowBe4's Chief Hacking Officer, helped design the KnowBe4 training based on his well-documented social engineering tactics. Tens of thousands of organizations rely on KnowBe4 to mobilize their end users as their last line of defense.

Read More

DATA SECURITY,PLATFORM SECURITY,SOFTWARE SECURITY

Datadog Announces Integration with Amazon Security Lake

Datadog | November 30, 2022

Datadog, Inc., the monitoring and security platform for cloud applications, today announced a new integration with Amazon Security Lake. The integration, announced during AWS re:Invent, makes it easy for Amazon Security Lake users to send cloud security logs to Datadog in a standard format. Building data pipelines in order to aggregate and route security logs to various security analytics solutions can be a cumbersome and time-consuming process. For Amazon Security Lake customers, Datadog's integration provides an easy way to send security logs to Datadog with minimal configuration required. Once security logs are ingested into Datadog, customers can analyze and identify threats through out-of-the-box detection rules or by writing custom security rules. They can also do deeper investigations using Datadog's log management tools. "Amazon Security Lake makes it easier for teams to manage their cloud security data and analyze it with partner solutions of their choice," said Rod Wallace, General Manager for Amazon Security Lake. "Datadog's integration with Amazon Security Lake will allow customers to collect their security logs to improve their cybersecurity posture and send them to Datadog for analysis leveraging an open source schema." "Security threat detection and investigation is dependent on an effective logging strategy that ensures critical logs are being properly analyzed. However, managing dozens of log integrations from cloud-hosted accounts and entities can be cumbersome and lead to gaps in visibility. "Amazon Security Lake and Datadog are working together to provide an easy way to set up and manage important log integrations for Datadog Cloud SIEM, giving customers deep visibility into their most critical infrastructure." Pierre Betouin, SVP of Security Products at Datadog About Datadog Datadog is the monitoring and security platform for cloud applications. Our SaaS platform integrates and automates infrastructure monitoring, application performance monitoring and log management to provide unified, real-time observability of our customers' entire technology stack. Datadog is used by organizations of all sizes and across a wide range of industries to enable digital transformation and cloud migration, drive collaboration among development, operations, security and business teams, accelerate time to market for applications, reduce time to problem resolution, secure applications and infrastructure, understand user behavior and track key business metrics.

Read More

DATA SECURITY,PLATFORM SECURITY,SOFTWARE SECURITY

Malwarebytes and Stellar Cyber Partner to Investigate and Mitigate Cyber Threats

Malwarebytes | November 28, 2022

Malwarebytes, a global leader in real-time cyber protection, today announced a new partnership with Stellar Cyber, an industry-leading Open XDR platform that delivers comprehensive, unified security without complexity. The partnership helps resource-constrained teams produce consistent security outcomes across all environments; on-premises, cloud and anything in between. The partnership comes at a critical time in the cybersecurity landscape, as security products become more complex and IT teams spend more time maintaining their security controls, instead of investigating and mitigating cyber threats. According to a 2020 report from Palo Alto Networks, only 46 percent of security operations decision makers are satisfied with their current ability to detect threats. "They point to wasted time chasing false leads, poorly integrated security tools, and a large learning curve for effectively using those tools," according to the report. "Every security team should be able to deliver continuous, consistent security regardless of their skills or experience. "By tightly integrating Malwarebytes' cutting-edge EDR technology with the Stellar Cyber Open XDR platform, IT teams are able to close the gaps between security controls that attackers exploit." Andrew Homer, Vice-President of Technology Alliances at Stellar Cyber The integration pairs Malwarebytes' EDR solution–which collects detailed threat information for analysis and investigation–with the Stellar Cyber Open XDR Platform that ingests, normalizes, and enriches security data, including endpoints, network, cloud and logs into a single repository. Malwarebytes EDR collects critical endpoint and server data and sends it to Stellar Cyber, which analyzes the data to identify potential threats. As security analysts complete investigation in Stellar Cyber, response actions are sent to Malwarebytes to eliminate the threat. "Today's IT and security teams spend more time sifting through data than eliminating actual threats. Organizations need real-time data sharing and visibility to enable decisive actions before attackers are successful," said Brian Thomas, Malwarebytes Vice President of Worldwide MSP and Channel programs. "Stellar Cyber shares our mission to simplify cybersecurity for resource-constrained organizations. Together we uniquely deliver an intelligent and automated solution that allows security teams to be more efficient, and organizations more productive and protected." About Stellar Cyber Stellar Cyber Open XDR platform delivers comprehensive, unified security without complexity, empowering lean security teams of any skill to successfully secure their environments. With Stellar Cyber, organizations reduce risk with early and precise identification and remediation of threats while slashing costs, retaining investments in existing tools, and improving analyst productivity, delivering an 8X improvement in MTTD and a 20X improvement in MTTR. The company is based in Silicon Valley. About Malwarebytes Malwarebytes believes that when people and organizations are free from threats, they are free to thrive. Founded in 2008, Malwarebytes CEO Marcin Kleczynski had one mission: to rid the world of malware. Today, that mission has expanded to provide cyberprotection for every one. Malwarebytes provides consumers and organizations with device protection, privacy, and prevention through effective, intuitive, and inclusive solutions in the home, on-the-go, at work, or on campus.

Read More

DATA SECURITY,PLATFORM SECURITY,SOFTWARE SECURITY

KnowBe4 Launches New Mobile Learner App for Anytime, Anywhere Cybersecurity Learning

KnowBe4 | November 29, 2022

KnowBe4, the provider of the world's largest security awareness training and simulated phishing platform, today announced it is launching the new KnowBe4 Mobile Learner App to empower end users by introducing security awareness and compliance training on the go at no additional cost to customers, improving user engagement and strengthening security culture. With a large majority of the world's population using smartphones today, mobile training revolutionizes the way people learn. This new app will enable end users to complete their security awareness and compliance training conveniently from their tablets or smartphones, giving them 24/7/365 access. "The KnowBe4 Mobile Learner App is the first of its kind to launch in the security awareness and compliance training space, making it easier than ever to train users while subsequently strengthening an organization's security culture. "This new app will enable IT and security teams to improve engagement and completion rates for required training thanks to a seamless user experience. This will also help users to associate security with their personal devices, keeping it top of mind all the time rather than only when they are at work on their computers. We are making this substantial new capability available at no additional cost to all subscription levels as a show of our commitment to supporting our customers' security and human risk management objectives." Stu Sjouwerman, CEO, KnowBe4 Based on subscription levels, KnowBe4 offers 100+ Mobile-First training modules that were designed specifically for mobile. The KnowBe4 Learner App supports push notifications for custom announcements, updates on assigned training as well as KnowBe4 newsletters. About KnowBe4 KnowBe4, the provider of the world's largest security awareness training and simulated phishing platform, is used by more than 54,000 organizations around the globe. Founded by IT and data security specialist Stu Sjouwerman, KnowBe4 helps organizations address the human element of security by raising awareness about ransomware, CEO fraud and other social engineering tactics through a new-school approach to awareness training on security. Kevin Mitnick, an internationally recognized cybersecurity specialist and KnowBe4's Chief Hacking Officer, helped design the KnowBe4 training based on his well-documented social engineering tactics. Tens of thousands of organizations rely on KnowBe4 to mobilize their end users as their last line of defense.

Read More

DATA SECURITY,PLATFORM SECURITY,SOFTWARE SECURITY

Datadog Announces Integration with Amazon Security Lake

Datadog | November 30, 2022

Datadog, Inc., the monitoring and security platform for cloud applications, today announced a new integration with Amazon Security Lake. The integration, announced during AWS re:Invent, makes it easy for Amazon Security Lake users to send cloud security logs to Datadog in a standard format. Building data pipelines in order to aggregate and route security logs to various security analytics solutions can be a cumbersome and time-consuming process. For Amazon Security Lake customers, Datadog's integration provides an easy way to send security logs to Datadog with minimal configuration required. Once security logs are ingested into Datadog, customers can analyze and identify threats through out-of-the-box detection rules or by writing custom security rules. They can also do deeper investigations using Datadog's log management tools. "Amazon Security Lake makes it easier for teams to manage their cloud security data and analyze it with partner solutions of their choice," said Rod Wallace, General Manager for Amazon Security Lake. "Datadog's integration with Amazon Security Lake will allow customers to collect their security logs to improve their cybersecurity posture and send them to Datadog for analysis leveraging an open source schema." "Security threat detection and investigation is dependent on an effective logging strategy that ensures critical logs are being properly analyzed. However, managing dozens of log integrations from cloud-hosted accounts and entities can be cumbersome and lead to gaps in visibility. "Amazon Security Lake and Datadog are working together to provide an easy way to set up and manage important log integrations for Datadog Cloud SIEM, giving customers deep visibility into their most critical infrastructure." Pierre Betouin, SVP of Security Products at Datadog About Datadog Datadog is the monitoring and security platform for cloud applications. Our SaaS platform integrates and automates infrastructure monitoring, application performance monitoring and log management to provide unified, real-time observability of our customers' entire technology stack. Datadog is used by organizations of all sizes and across a wide range of industries to enable digital transformation and cloud migration, drive collaboration among development, operations, security and business teams, accelerate time to market for applications, reduce time to problem resolution, secure applications and infrastructure, understand user behavior and track key business metrics.

Read More

DATA SECURITY,PLATFORM SECURITY,SOFTWARE SECURITY

Malwarebytes and Stellar Cyber Partner to Investigate and Mitigate Cyber Threats

Malwarebytes | November 28, 2022

Malwarebytes, a global leader in real-time cyber protection, today announced a new partnership with Stellar Cyber, an industry-leading Open XDR platform that delivers comprehensive, unified security without complexity. The partnership helps resource-constrained teams produce consistent security outcomes across all environments; on-premises, cloud and anything in between. The partnership comes at a critical time in the cybersecurity landscape, as security products become more complex and IT teams spend more time maintaining their security controls, instead of investigating and mitigating cyber threats. According to a 2020 report from Palo Alto Networks, only 46 percent of security operations decision makers are satisfied with their current ability to detect threats. "They point to wasted time chasing false leads, poorly integrated security tools, and a large learning curve for effectively using those tools," according to the report. "Every security team should be able to deliver continuous, consistent security regardless of their skills or experience. "By tightly integrating Malwarebytes' cutting-edge EDR technology with the Stellar Cyber Open XDR platform, IT teams are able to close the gaps between security controls that attackers exploit." Andrew Homer, Vice-President of Technology Alliances at Stellar Cyber The integration pairs Malwarebytes' EDR solution–which collects detailed threat information for analysis and investigation–with the Stellar Cyber Open XDR Platform that ingests, normalizes, and enriches security data, including endpoints, network, cloud and logs into a single repository. Malwarebytes EDR collects critical endpoint and server data and sends it to Stellar Cyber, which analyzes the data to identify potential threats. As security analysts complete investigation in Stellar Cyber, response actions are sent to Malwarebytes to eliminate the threat. "Today's IT and security teams spend more time sifting through data than eliminating actual threats. Organizations need real-time data sharing and visibility to enable decisive actions before attackers are successful," said Brian Thomas, Malwarebytes Vice President of Worldwide MSP and Channel programs. "Stellar Cyber shares our mission to simplify cybersecurity for resource-constrained organizations. Together we uniquely deliver an intelligent and automated solution that allows security teams to be more efficient, and organizations more productive and protected." About Stellar Cyber Stellar Cyber Open XDR platform delivers comprehensive, unified security without complexity, empowering lean security teams of any skill to successfully secure their environments. With Stellar Cyber, organizations reduce risk with early and precise identification and remediation of threats while slashing costs, retaining investments in existing tools, and improving analyst productivity, delivering an 8X improvement in MTTD and a 20X improvement in MTTR. The company is based in Silicon Valley. About Malwarebytes Malwarebytes believes that when people and organizations are free from threats, they are free to thrive. Founded in 2008, Malwarebytes CEO Marcin Kleczynski had one mission: to rid the world of malware. Today, that mission has expanded to provide cyberprotection for every one. Malwarebytes provides consumers and organizations with device protection, privacy, and prevention through effective, intuitive, and inclusive solutions in the home, on-the-go, at work, or on campus.

Read More

Spotlight

Panzura

Panzura

Panzura makes hybrid multi-cloud data management seem easy. Panzura’s data management platform is a single, unified data engine designed to securely power the most rigorous, large-scale multi-site enterprise data workflows across the globe. Intelligent edge technologies enable LAN performance with cl...

Events

Resources