'We measure our success based on customer satisfaction, loyalty and retention,' says Strobes CEO Venu Rao

Vulnerability Management Platform for Companies
Venu Rao is a successful entrepreneur and cybersecurity professional who excels in developing client relationships by addressing their challenges and providing affordable and convenient validated solutions. With more than 15 years of experience in technology, product development, marketing and sales, he deeply understands the IT industry. As the Co-founder & CEO of Strobes Security, he is helping clients improve their cybersecurity posture by solving significant problems in the vulnerability management space with innovative solutions.
Read his interview to know his thoughts about the cybersecurity landscape and the importance of having customer-centric solutions.

By streamlining the detection, analysis, and response process, seamless security automation can help ensure faster remediation from vulnerabilities and threats.

Media 7: Hello Venu, thank you for your time. Could you share with us the factors that motivated you to pursue your current career path and describe your career trajectory?
Venu Rao:
I have always been inclined towards technology and entrepreneurship. My entrepreneurial journey has been interesting and a roller-coaster ride. I started with an IT staffing business, then scaled up to offshore IT development, and eventually developed a GPS-based Vehicle Tracking system in 2008. Although we made decent penetration in the Indian market, the GPS VTA product couldn't grow as expected because it was ahead of its time. After a break and a few years of working as a Business Head at a tech company, I am back to entrepreneurship with WeSecureApp. Innovation in technology and problem-solving using cutting-edge technologies has always been my primary motivation.

M7:  Please share with us some of the most rewarding experiences or accomplishments of your professional journey.
VR:
I was fascinated by the James Bond car, and with a team we have built a technology that allowed tracking and monitoring of vehicles during a time when smartphones were not yet prevalent, 2G was limited to metros and Tier 1 cities, and there was no cloud technology available. With a simple SMS, one could switch off the car, operate the air conditioning, and set up geo-fencing, among other features. Although the product did not achieve success, I believe that the journey of developing and marketing a new technology has brought me immense satisfaction and valuable lessons.

M7: Can you tell us a bit about the history of Strobes Security and how the company was founded?
VR:
Strobes Security was destiny for us. My co-founders are my cousins, and in 2015, when we met, all of us were in a transitional phase. I wanted to get back into entrepreneurship, Akhil, who is a hacker, was looking for a new path, and Srini, who had over 20 years of experience in the US market, was also in a similar situation. With our deep family history, we knew each other's strengths and working style in such detail that it was a no-brainer to team up and offer cybersecurity consulting services to enterprise customers.

Read more: 'Data is the answer to a more effective digital transformation,' says SonicWall's Diane Walker


Implementing a customer-centric approach involves putting the needs and preferences of the customers at the forefront of the organization's strategy, decision-making, and operations.

M7: What types of security services does Strobes Security offer, and how do they differ from other companies in the industry?
VR:
We are known for being one of the best offensive security companies in the industry. The Strobes platform offers solutions for multiple use-cases, including Pentest as a Service (PTaaS), DevSecOps, and Vulnerability Management. Our customers trust us for the following reasons:

aVulnerability Prioritization Technology: Our platform employs advanced technology to prioritize vulnerabilities, ensuring that our clients focus on the most critical issues first.
b. More than 75 connectors: We have over 75 connectors that integrate with various scanners, CI-CD, ITSM, and SIEM platforms, providing our clients with a seamless experience.
c. Scanner & tool agnostic platform: Our platform is not limited to specific scanners or tools, making it easier for clients to work with the tools they prefer.
d. Dashboards for visibility and cyber risk quantification: We provide our clients with dashboards that offer visibility into their security posture, allowing them to quantify their cyber risks.
e. Hybrid framework: We use a hybrid framework that combines both manual and automated testing to conduct offensive security assessments, ensuring that our clients receive accurate and reliable results.


M7: According to you, what are the best practices that a company dealing with vulnerability management should follow?
VR:
 a. Establish a formal vulnerability management program: The company should establish a formal vulnerability management program that includes policies, procedures, and guidelines for managing vulnerabilities.
b. Conduct regular vulnerability assessments: It should conduct regular vulnerability assessments of its systems and networks to identify potential vulnerabilities.
c. Prioritize vulnerabilities based on risk: It should prioritize vulnerabilities based on their severity and potential impact on the organization.
d. Develop a patch management plan: It should have a patch management plan that outlines the process for applying patches to systems and software.
e. Implement security controls: It should implement security controls to reduce the likelihood of vulnerabilities being exploited.
f. Monitor for new vulnerabilities: It should monitor for new vulnerabilities and incorporate them into its vulnerability management program.
g. Provide employee training: It should provide employee training on how to identify and report potential vulnerabilities.
h. Conduct incident response planning: It should have an incident response plan in place that includes procedures for responding to a security breach or vulnerability.
i. Conduct regular audits: It should conduct regular audits of its vulnerability management program to ensure that it is effective and up-to-date.

By following these best practices, companies can minimize the risk of security breaches and protect their systems and data from potential threats.


M7: Please explain how Strobes Security prioritizes customer satisfaction and ensures that clients receive high-quality service.
VR: a. Understand our customers' needs:
One size does not fit all. Every customer is different and so are their requirements. We understand our customers’ requirements thoroughly and accordingly provide tailor-made solutions.
b. Empathize with our customers: We understand the challenges of being a CISO and someone responsible for the company's security posture. With a team of vCISOs and CISO Advisory Board, we empathize with our customers and genuinely share the inputs and suggestions to improve the security posture of their organization.
c. Extended team: We believe to be the extended security team rather than a vendor. With that approach, we ensure to provide amazing support in remediation and achieve their compliance goals

Read more: 'Innovative, strategic marketing that’s well-executed yields substantial ROI,' believes Ann Strackhouse Miller


Advanced Vulnerability Intelligence is an ongoing process, and organizations should continually monitor their systems and networks for new vulnerabilities and threats.

M7: How does seamless security automation ensure faster remediation from vulnerabilities and threats?
VR: a. Asset Discovery:
Automated tools like Storbes ReconX can be used to do reconnaissance to find all the public and internal assets and trigger vulnerability scans automatically to find the vulnerabilities.
b. Prioritization: Strobes VI can also help prioritize vulnerabilities and threats based on their severity, exploitability and impact. This can help security teams focus on the most critical issues first and ensure that they are addressed promptly.
c. Quick Analysis: Automated tools can analyze security events and incidents quickly, reducing the time it takes to investigate and understand the scope of the problem.
d. Automated Response: Once a vulnerability or threat is identified and analyzed, automated tools can initiate a response automatically. This can include actions such as blocking network traffic, quarantining infected systems, or deploying security patches.

Overall, by streamlining the detection, analysis, and response process, seamless security automation can help ensure faster remediation from vulnerabilities and threats. This can help organizations better protect their assets, reduce downtime, and minimize the impact of security incidents.


M7: What are some of the key considerations organizations should keep in mind when implementing Advanced Vulnerability Intelligence? Please shed light.
VR:
Implementing Advanced Vulnerability Intelligence is a critical process for any organization that wants to protect its assets from security threats. Here are some key considerations that organizations should keep in mind when implementing Advanced Vulnerability Intelligence:

a. Define the scope and objectives: It is important to define the scope and objectives of the Advanced Vulnerability Intelligence program. This includes identifying the systems, applications, and networks that need to be monitored, as well as the types of threats and vulnerabilities that the organization wants to be alerted to.

b. Determine the data sources: The quality of the data sources used in Advanced Vulnerability Intelligence is critical to the success of the program. Organizations should evaluate their existing sources of vulnerability data and identify additional sources that can provide relevant, timely, and accurate information.

c. Choose the right tools: There are a variety of tools available for Advanced Vulnerability Intelligence, ranging from vulnerability scanners to threat intelligence platforms. Organizations should evaluate their options and choose the tools that best fit their needs.

d. Establish a process for analyzing and prioritizing vulnerabilities: Once vulnerabilities are identified, it is important to have a process in place for analyzing and prioritizing them based on their severity, likelihood of exploitation, and potential impact.

e. Develop an action plan: Once vulnerabilities are identified and prioritized, organizations should develop an action plan for addressing them. This may include patching systems, reconfiguring networks, or implementing additional security controls.

f. Monitor and review: Advanced Vulnerability Intelligence is an ongoing process, and organizations should continually monitor their systems and networks for new vulnerabilities and threats. Regular reviews of the program can help identify areas for improvement and ensure that the program remains effective over time.

g. Ensure compliance: Depending on the industry or regulatory requirements, organizations may need to ensure compliance with certain standards or regulations. Compliance requirements should be factored into the Advanced Vulnerability Intelligence program to ensure that the organization meets all necessary obligations.


M7: How does your organization implement a customer-centric approach?
VR:
Implementing a customer-centric approach involves putting the needs and preferences of the customers at the forefront of the organization's strategy, decision-making, and operations. Here are the steps we take to implement a customer-centric approach:

a. Develop a customer-centric culture: A customer-centric culture involves building an organizational culture that places the customer at the center of everything that we do. This involves creating a shared vision, mission, and values that prioritize the customer experience.
b. Understand customer needs: We understand the needs, wants, and preferences of our customers.
c. Empower employees: We empower our employees to make decisions that benefit the customer. This includes providing training, tools, and resources to help employees deliver exceptional customer service.
d. Deliver a personalized experience: Customers today expect a personalized experience. We tailor our products, services, and interactions to meet the unique needs and preferences of each customer.
e. Continuously improve: Our approach involves continuously gathering feedback from customers and using it to improve the organization's products, services, and processes. This requires a culture of continuous improvement and a willingness to embrace change.
f. Measure success: Finally, we measure our success based on customer satisfaction, loyalty, and retention. This involves tracking key metrics, such as Net Promoter Score and Customer Lifetime Value.


M7: What are the future plans or goals of Strobes Security and how do you see the company evolving in the coming years?
VR:
With the current modules and upcoming features that will be rolled out in the coming weeks, we are moving towards building a next-generation offensive security platform. Our goal is to leverage the best of both worlds to protect our customers through the combination of security automation and security experts.

Over the next few years, we plan to establish a strong partner ecosystem globally, which will enable us to grow exponentially. Additionally, we will continue to innovate our product offerings while maintaining focus on building a positive culture within our organization.

ABOUT STROBES SECURITY

Strobes Security is a leading company in the vulnerability management field, offering flagship products such as PTaaS and VM365, as well as managed services that simplify the vulnerability reporting process. The company's risk-centered vulnerability management platform utilizes an inbuilt vulnerability intelligence engine that prioritizes critical patches, ensuring that the right vulnerabilities are fixed at the right time.
Strobes Security is guided by four pillars that include a risk-centric approach, seamless security automation, high-end vulnerability intelligence, and a customer-centric approach. To know more about Strobes Security please visit, https://www.strobes.co/.

More C-Suite on deck

‘Data and analytics play a crucial role in shaping our advertising strategies,' asserts Aleksander Groshev

Media 7 | June 28, 2023

Aleksander Groshev is the CEO and Co-Founder of Autobahn Security. Previously he was Vice President of Product responsible for the product development of the SaaS platform. Before joining Autobahn Security he held the position of Head of Product at Fincite, a wealth management B2B platform.

Read More

‘In the industry, we've observed fragmentation, especially among larger organizations,’ says Chris Fisher

Media 7 | October 16, 2023

Chris Fisher is a seasoned marketing professional who specializes in digital marketing and demand generation to fuel business growth. I integrate product messaging and innovative strategies with data-driven marketing to achieve quantifiable outcomes. Read on to know his thoughts about safeguarding the layers of Cyber-security.

Read More

‘Security solutions need to be consistent, regardless of geography or technical stack,’ emphasizes Nishant Kaushik

Media 7 | June 16, 2023

Nishant Kaushik is an excellent technologist with strategic foresight and tactical know-how to manage technology-driven businesses and security expansion plans. He has successfully led cross-functional and highly focused teams to achieve business objectives that align with customer needs. Read this interview to discover Nishant’s expertise and unique perspective on omnichannel security and risk management.

Read More

‘Data and analytics play a crucial role in shaping our advertising strategies,' asserts Aleksander Groshev

Media 7 | June 28, 2023

Aleksander Groshev is the CEO and Co-Founder of Autobahn Security. Previously he was Vice President of Product responsible for the product development of the SaaS platform. Before joining Autobahn Security he held the position of Head of Product at Fincite, a wealth management B2B platform.

Read More

‘In the industry, we've observed fragmentation, especially among larger organizations,’ says Chris Fisher

Media 7 | October 16, 2023

Chris Fisher is a seasoned marketing professional who specializes in digital marketing and demand generation to fuel business growth. I integrate product messaging and innovative strategies with data-driven marketing to achieve quantifiable outcomes. Read on to know his thoughts about safeguarding the layers of Cyber-security.

Read More

‘Security solutions need to be consistent, regardless of geography or technical stack,’ emphasizes Nishant Kaushik

Media 7 | June 16, 2023

Nishant Kaushik is an excellent technologist with strategic foresight and tactical know-how to manage technology-driven businesses and security expansion plans. He has successfully led cross-functional and highly focused teams to achieve business objectives that align with customer needs. Read this interview to discover Nishant’s expertise and unique perspective on omnichannel security and risk management.

Read More

Related News

Platform Security

D3 Security is a proud participant in the Microsoft Security Copilot Partner Private Preview

D3 Security | January 08, 2024

D3 Security today announced its participation in the Microsoft Security Copilot Partner Private Preview. D3 Security was selected based on their proven experience with Microsoft Security technologies, willingness to explore and provide feedback on cutting edge functionality, and close relationship with Microsoft. “In the context of security, AI’s impact is likely to be profound, tilting the scales in favor of defenders and empowering organizations to defend at machine speed. At Microsoft, we are privileged to have a leading role in advancing AI innovation, and we are so grateful to our incredible ecosystem of partners, whose mission-driven work is critical to helping customers secure their organizations and confidently bring the many benefits of AI into their environments,” said Vasu Jakkal, Corporate Vice President, Microsoft Security. D3 Security is working with Microsoft product teams to help shape Security Copilot product development in several ways, including validation and refinement of new and upcoming scenarios, providing feedback on product development and operations to be incorporated into future product releases, and validation and feedback of APIs to assist with Security Copilot extensibility. “D3 has always pushed SOAR technology forward, be it through our deep research into integration design; our Event Pipeline, which reduces alert-handling time by up to 99%; or our operationalizing of the MITRE ATT&CK and D3FEND frameworks,” said Gordon Benoit, President, D3 Security. “By teaming with Microsoft in the Security Copilot Partner Private Preview, we will be able to use AI to evolve SOAR in ways that would have sounded impossible just a year ago.” Security Copilot is the first AI-powered security product that enables security professionals to respond to threats quickly, process signals at machine speed, and assess risk exposure in minutes. It combines an advanced large language model (LLM) with a security-specific model that is informed by Microsoft's unique global threat intelligence and more than 65 trillion daily signals. About D3 Security D3 Security’s Smart SOAR™ (security orchestration, automation, and response) solves entrenched problems in cybersecurity by transforming separate tools into a unified ecosystem with multi-tier automation, codeless orchestration, and robust case management. Smart SOAR performs autonomous triage and reduces false positives so enterprise, MSSP, and public sector security teams can spend more time on real threats. Product or service names mentioned herein may be the trademarks of their respective owners.

Read More

API Security

Cequence and Vercara Partner to Combat Cyber Threats and Revolutionize API Security

Cequence Security | January 25, 2024

Cequence Security is proud to announce a new partnership with Vercara, a leading provider of cloud-based services that secure the online experience. This collaboration aims to fortify the cybersecurity landscape by pairing Vercara’s network and application protections with Cequence Security's innovative Unified API Protection (UAP) platform. Security teams encounter substantial hurdles in safeguarding API applications from cyber-attacks, including the rapid development and deployment of API applications across diverse cloud providers. The unmanaged and unprotected nature of these APIs can harbor critical vulnerabilities, making them susceptible to exploitation. Moreover, the lack of a clear and consistent security posture across the application footprint introduces further complexities. To address these challenges, Cequence Security's UAP platform provides a comprehensive discovery of the entire API attack surface, encompassing both external and internal APIs. It ensures compliance with security and governance best practices, eliminating unknown and unmitigated API security risks. Furthermore, the solution offers native real-time inline protection, blocking API attacks before they reach applications. "The absence of API protection puts you at risk of potential theft, fraud, non-compliance, and business disruptions,” said Carlos Morales, SVP Solutions at Vercara. “Our partnership with Cequence combines our collective best-in-class services to address the evolving demands of the cybersecurity landscape, ensuring that businesses can confidently deploy needed applications and successfully navigate the complexities of API security with advanced, holistic protection.” Arun Gowda, VP, Business Development at Cequence Security, said, “In the evolving landscape of cybersecurity, the extensive risk of data compromise in API breaches goes beyond external APIs to internal ones. These often-overlooked internal APIs can access sensitive data not intended for public exposure. APIs have changed the game for attackers, making it imperative to prioritize the security of all assets accessible through APIs, including those not expected to be publicly exposed.” He added, “We are pleased to combine our innovative API security solutions with Vercara's innovative WAF and DDoS services to deliver advanced, holistic API protection. This collaboration reinforces our commitment to provide unparalleled security measures for businesses reliant on APIs.” Cequence Security's UAP platform is unparalleled in addressing all phases of the API security lifecycle. It provides: Discovery: A continuous API attack surface discovery management product that assesses your application footprint, offering a complete inventory of external APIs. Compliance: A security posture management product that identifies security risks in APIs, ensuring compliance with specifications, security test requirements, and governance best practices. Protection: Detects and prevents sophisticated automated API attacks and business logic abuse using advanced machine learning rules, providing real-time protection without relying on third-party components. About Cequence Security Cequence, a pioneer in API security and bot management, is the only solution that delivers Unified API Protection (UAP), uniting discovery, compliance, and protection across all internal and external APIs to defend against attacks, targeted abuse, and fraud. Requiring less than 15 minutes to onboard an API without requiring any instrumentation, SDK, or JavaScript integration, the flexible deployment model supports SaaS, on-premises, and hybrid installations. Cequence solutions scale to handle the most demanding Fortune and Global 2000 organizations, securing more than 8 billion daily API calls and protecting more than 3 billion user accounts across these customers. To learn more, visit www.cequence.ai. About Vercara Vercara is a purpose-built, global, cloud-based security platform that provides layers of protection to safeguard businesses’ online presence, no matter where attacks originate or where they are aimed. Delivering the industry’s highest-performing solutions and supported by unparalleled 24/7 human expertise and hands-on guidance, top global brands depend on Vercara to protect their networks and applications against threats and downtime. Vercara’s suite of cloud-based services is secure, reliable, and available, delivering peace of mind and ensuring that businesses and their customers experience exceptional interactions all day, every day. Pressure-tested in the world’s most tightly regulated and high-traffic verticals, Vercara’s mission-critical security portfolio provides best-in-class DNS and application and network security (including DDoS and WAF) services to its Global 5000 customers and beyond. For more information, visit vercara.com.

Read More

Data Security

Rubrik Chosen by Carhartt to Drive Complete Cyber Resilience

Rubrik | January 10, 2024

Rubrik, the Zero Trust Data Security™ company, today announced that America’s premium workwear brand Carhartt has consolidated multiple legacy backup tools with Rubrik Security Cloud to achieve cyber resilience. After moving to Rubrik, Carhartt realized more than 50 percent in monthly cost savings, while significantly improving its data security capabilities. “Data resilience is key to the continued security and success of our business. We work hard to ward off intruders but we have to operate on the assumption that they will find a way in,” said Michael Karasienski, cloud platforms manager at Carhartt. “Rubrik Security Cloud restores data fast and without fail for both our cloud and on-premises environments. Rubrik plays a key role in building trust in our system with secure protocols and access controls; it isn’t just a data security solution, it’s peace of mind for our brand.” Established in 1889, Carhartt has a rich heritage of developing rugged products for workers on and off the job. The company honors hard work, approaching its business with the same honesty, dependability, and trust that its consumers display day-in and day-out. Prior to Rubrik, Carhartt used a variety of different backup solutions across its operations. After an upgrade of a critical application failed, Carhartt’s administrators discovered that that application data hadn’t been backed up, forcing the team to reconstruct more than two-weeks’ worth of data manually. Furthermore, the Carhartt team discovered malware in backups from its legacy tools, resulting in weeks of searching data sets to manually complete the investigation. With Rubrik Security Cloud, Carhartt’s IT team can now devote more time to other priorities — like business requests, incidents, and reducing technical debt — while saving more than 50 percent in operational costs each month. The company’s IT and Security teams are also collaborating to reduce risk to the organization, zeroing in on malware and tying investigations into its security operations center. “A highly interconnected business like Carhartt is responsible for mountains of sensitive data. Protecting that data is paramount to maintain customer trust and minimize business disruption,” said Anneka Gupta, Chief Product Officer at Rubrik. “Outdated legacy technology was never built with security in mind, so organizations must turn to modernized platforms and zero-trust methodologies to defend their data. With a holistic solution like Rubrik Security Cloud, organizations like Carhartt know their business will be resilient in the face of any cyber threat.” Carhartt utilizes numerous Rubrik products, including Anomaly Detection, Sensitive Data Monitoring, Threat Hunting, as well as its integration with Microsoft Sentinel. About Rubrik Rubrik is on a mission to secure the world’s data. With Zero Trust Data Security™, we help organizations achieve business resilience against cyberattacks, malicious insiders, and operational disruptions. Rubrik Security Cloud, powered by machine learning, secures data across enterprise, cloud, and SaaS applications. We help organizations uphold data integrity, deliver data availability that withstands adverse conditions, continuously monitor data risks and threats, and restore businesses with their data when infrastructure is attacked.

Read More

Platform Security

D3 Security is a proud participant in the Microsoft Security Copilot Partner Private Preview

D3 Security | January 08, 2024

D3 Security today announced its participation in the Microsoft Security Copilot Partner Private Preview. D3 Security was selected based on their proven experience with Microsoft Security technologies, willingness to explore and provide feedback on cutting edge functionality, and close relationship with Microsoft. “In the context of security, AI’s impact is likely to be profound, tilting the scales in favor of defenders and empowering organizations to defend at machine speed. At Microsoft, we are privileged to have a leading role in advancing AI innovation, and we are so grateful to our incredible ecosystem of partners, whose mission-driven work is critical to helping customers secure their organizations and confidently bring the many benefits of AI into their environments,” said Vasu Jakkal, Corporate Vice President, Microsoft Security. D3 Security is working with Microsoft product teams to help shape Security Copilot product development in several ways, including validation and refinement of new and upcoming scenarios, providing feedback on product development and operations to be incorporated into future product releases, and validation and feedback of APIs to assist with Security Copilot extensibility. “D3 has always pushed SOAR technology forward, be it through our deep research into integration design; our Event Pipeline, which reduces alert-handling time by up to 99%; or our operationalizing of the MITRE ATT&CK and D3FEND frameworks,” said Gordon Benoit, President, D3 Security. “By teaming with Microsoft in the Security Copilot Partner Private Preview, we will be able to use AI to evolve SOAR in ways that would have sounded impossible just a year ago.” Security Copilot is the first AI-powered security product that enables security professionals to respond to threats quickly, process signals at machine speed, and assess risk exposure in minutes. It combines an advanced large language model (LLM) with a security-specific model that is informed by Microsoft's unique global threat intelligence and more than 65 trillion daily signals. About D3 Security D3 Security’s Smart SOAR™ (security orchestration, automation, and response) solves entrenched problems in cybersecurity by transforming separate tools into a unified ecosystem with multi-tier automation, codeless orchestration, and robust case management. Smart SOAR performs autonomous triage and reduces false positives so enterprise, MSSP, and public sector security teams can spend more time on real threats. Product or service names mentioned herein may be the trademarks of their respective owners.

Read More

API Security

Cequence and Vercara Partner to Combat Cyber Threats and Revolutionize API Security

Cequence Security | January 25, 2024

Cequence Security is proud to announce a new partnership with Vercara, a leading provider of cloud-based services that secure the online experience. This collaboration aims to fortify the cybersecurity landscape by pairing Vercara’s network and application protections with Cequence Security's innovative Unified API Protection (UAP) platform. Security teams encounter substantial hurdles in safeguarding API applications from cyber-attacks, including the rapid development and deployment of API applications across diverse cloud providers. The unmanaged and unprotected nature of these APIs can harbor critical vulnerabilities, making them susceptible to exploitation. Moreover, the lack of a clear and consistent security posture across the application footprint introduces further complexities. To address these challenges, Cequence Security's UAP platform provides a comprehensive discovery of the entire API attack surface, encompassing both external and internal APIs. It ensures compliance with security and governance best practices, eliminating unknown and unmitigated API security risks. Furthermore, the solution offers native real-time inline protection, blocking API attacks before they reach applications. "The absence of API protection puts you at risk of potential theft, fraud, non-compliance, and business disruptions,” said Carlos Morales, SVP Solutions at Vercara. “Our partnership with Cequence combines our collective best-in-class services to address the evolving demands of the cybersecurity landscape, ensuring that businesses can confidently deploy needed applications and successfully navigate the complexities of API security with advanced, holistic protection.” Arun Gowda, VP, Business Development at Cequence Security, said, “In the evolving landscape of cybersecurity, the extensive risk of data compromise in API breaches goes beyond external APIs to internal ones. These often-overlooked internal APIs can access sensitive data not intended for public exposure. APIs have changed the game for attackers, making it imperative to prioritize the security of all assets accessible through APIs, including those not expected to be publicly exposed.” He added, “We are pleased to combine our innovative API security solutions with Vercara's innovative WAF and DDoS services to deliver advanced, holistic API protection. This collaboration reinforces our commitment to provide unparalleled security measures for businesses reliant on APIs.” Cequence Security's UAP platform is unparalleled in addressing all phases of the API security lifecycle. It provides: Discovery: A continuous API attack surface discovery management product that assesses your application footprint, offering a complete inventory of external APIs. Compliance: A security posture management product that identifies security risks in APIs, ensuring compliance with specifications, security test requirements, and governance best practices. Protection: Detects and prevents sophisticated automated API attacks and business logic abuse using advanced machine learning rules, providing real-time protection without relying on third-party components. About Cequence Security Cequence, a pioneer in API security and bot management, is the only solution that delivers Unified API Protection (UAP), uniting discovery, compliance, and protection across all internal and external APIs to defend against attacks, targeted abuse, and fraud. Requiring less than 15 minutes to onboard an API without requiring any instrumentation, SDK, or JavaScript integration, the flexible deployment model supports SaaS, on-premises, and hybrid installations. Cequence solutions scale to handle the most demanding Fortune and Global 2000 organizations, securing more than 8 billion daily API calls and protecting more than 3 billion user accounts across these customers. To learn more, visit www.cequence.ai. About Vercara Vercara is a purpose-built, global, cloud-based security platform that provides layers of protection to safeguard businesses’ online presence, no matter where attacks originate or where they are aimed. Delivering the industry’s highest-performing solutions and supported by unparalleled 24/7 human expertise and hands-on guidance, top global brands depend on Vercara to protect their networks and applications against threats and downtime. Vercara’s suite of cloud-based services is secure, reliable, and available, delivering peace of mind and ensuring that businesses and their customers experience exceptional interactions all day, every day. Pressure-tested in the world’s most tightly regulated and high-traffic verticals, Vercara’s mission-critical security portfolio provides best-in-class DNS and application and network security (including DDoS and WAF) services to its Global 5000 customers and beyond. For more information, visit vercara.com.

Read More

Data Security

Rubrik Chosen by Carhartt to Drive Complete Cyber Resilience

Rubrik | January 10, 2024

Rubrik, the Zero Trust Data Security™ company, today announced that America’s premium workwear brand Carhartt has consolidated multiple legacy backup tools with Rubrik Security Cloud to achieve cyber resilience. After moving to Rubrik, Carhartt realized more than 50 percent in monthly cost savings, while significantly improving its data security capabilities. “Data resilience is key to the continued security and success of our business. We work hard to ward off intruders but we have to operate on the assumption that they will find a way in,” said Michael Karasienski, cloud platforms manager at Carhartt. “Rubrik Security Cloud restores data fast and without fail for both our cloud and on-premises environments. Rubrik plays a key role in building trust in our system with secure protocols and access controls; it isn’t just a data security solution, it’s peace of mind for our brand.” Established in 1889, Carhartt has a rich heritage of developing rugged products for workers on and off the job. The company honors hard work, approaching its business with the same honesty, dependability, and trust that its consumers display day-in and day-out. Prior to Rubrik, Carhartt used a variety of different backup solutions across its operations. After an upgrade of a critical application failed, Carhartt’s administrators discovered that that application data hadn’t been backed up, forcing the team to reconstruct more than two-weeks’ worth of data manually. Furthermore, the Carhartt team discovered malware in backups from its legacy tools, resulting in weeks of searching data sets to manually complete the investigation. With Rubrik Security Cloud, Carhartt’s IT team can now devote more time to other priorities — like business requests, incidents, and reducing technical debt — while saving more than 50 percent in operational costs each month. The company’s IT and Security teams are also collaborating to reduce risk to the organization, zeroing in on malware and tying investigations into its security operations center. “A highly interconnected business like Carhartt is responsible for mountains of sensitive data. Protecting that data is paramount to maintain customer trust and minimize business disruption,” said Anneka Gupta, Chief Product Officer at Rubrik. “Outdated legacy technology was never built with security in mind, so organizations must turn to modernized platforms and zero-trust methodologies to defend their data. With a holistic solution like Rubrik Security Cloud, organizations like Carhartt know their business will be resilient in the face of any cyber threat.” Carhartt utilizes numerous Rubrik products, including Anomaly Detection, Sensitive Data Monitoring, Threat Hunting, as well as its integration with Microsoft Sentinel. About Rubrik Rubrik is on a mission to secure the world’s data. With Zero Trust Data Security™, we help organizations achieve business resilience against cyberattacks, malicious insiders, and operational disruptions. Rubrik Security Cloud, powered by machine learning, secures data across enterprise, cloud, and SaaS applications. We help organizations uphold data integrity, deliver data availability that withstands adverse conditions, continuously monitor data risks and threats, and restore businesses with their data when infrastructure is attacked.

Read More

Spotlight

Strobes Security, Inc.

Strobes Security, Inc.

Strobes Security is leading the way to disrupt the vulnerability management space with our flagship products VM365 and PTaaS. Our products and managed services aim to simplify the vulnerability reporting & management process, assuring end-to-end solutions via our risk-centered vulnerability manageme...

Events

Resources

Events