'AI & ML algorithms will play a critical role in identifying cyber threats,' asserts Trishneet Arora

Cyber scoring or quantification of risk in dollar value allows management.
Trishneet Arora, a self-made individual, demonstrated remarkable vision, intellect, and competence when he established a startup at the young age of 19. Under his guidance, the flagship venture has expanded into both the entertainment and educational sectors. With Trishneet at the helm, the potential for growth and success knows no bounds. Let's delve into his insights on securing UPI-based applications.

We are proud to be the first company enabling organizations to manage their entire cybersecurity risk portfolio on a single platform and make informed decisions by understanding quantifiable risks on a scale from zero to ten.

Media 7: Can you describe your professional journey, emphasizing the pivotal moments that have motivated and influenced your decision to pursue this career path?
Trishneet Arora:
In 2013, when I started this company, the real challenge was identifying the actual needs of IT professionals who had recently graduated from colleges or universities. The IT industry was already crowded with a large number of unemployed individuals. I read a report from Nascom that indicated a demand for 77,000 security professionals every year. Since I was deeply involved in cybersecurity and had authored a few books on the subject, I saw an opportunity to train people in this field. Thus, I believed it was the right industry to be in and to educate college and university students, so that they could pursue a career in cybersecurity.

The demand for cybersecurity professionals was significant, with a need for close to 100,000 experts annually in the country. That's how our journey began. We progressed from working in enterprise security to becoming an Enterprise Product Company, collaborating with law enforcement defense organizations worldwide, not just in India. We also engaged with the banking and financial ecosystem both nationally and globally. Currently, we work with Fortune 500 companies globally, always striving to address cybersecurity needs.

Over time, TAC Security created a niche market that didn't exist before. We brought together various elements on a single platform, allowing diverse leaders to use multiple tools while gaining visibility into their organization's IT security posture. We are proud to be the first company to offer such a solution, enabling organizations to manage their entire cybersecurity risk portfolio on a single platform and make informed decisions by understanding quantifiable risks on a scale from zero to ten.

We also introduced cyber scoring, another pioneering feature. With this system, risks are quantified on a scale from 0 to 1, and the dollar impact of each vulnerability or risk within the IT stack is visible. Our journey has always been driven by passion and dedication to solving problems in the cybersecurity world. Moving forward, we aim to continue this mission and shape the future of cybersecurity.

M7: Tell us the story of TAC Security as a safeguarding agency of UPI-based applications?
TA:
We are currently working with the National Payment Corporation of India since the early launch of UPI. Our role is to help them identify and manage the risks in their UPI applications as their trusted cybersecurity partner. When we look at the UPI's transactional value, it surpasses even American Express, a globally renowned company. This fact makes us proud to be associated with such a prestigious organization from the very beginning. Our efforts aim to protect their systems from cyber threats, enabling them to expand into different areas and countries.

M7: How can businesses communicate their commitment to cybersecurity to customers, investors, and other stakeholders, and why is that critical for establishing credibility?
TA:
Today, everything around us, from home appliances to the cars we drive and the phones we use, revolves around SAP technology. Technology has become the centre point of our lives, and at the core of it lies cybersecurity. Without proper cybersecurity, we are vulnerable to disarray in this interconnected era. It's an indispensable aspect of the industry and our lives.

We take pride in working in an industry where cybersecurity plays a vital role, not only in the banking sector but also in healthcare. Even in the healthcare sector, where surgeries are performed using AI machines, cybersecurity remains crucial. To effectively convey commitment towards cybersecurity, businesses can adopt various strategies. Firstly, transparency in security policies is essential. Secondly, robust data protection measures must be implemented and diligently maintained. Compliances like GDPR and data localization need to be in place as well. Another vital aspect is third-party assessments. Engaging external security assessors can help identify and evaluate critical risks in a company's cybersecurity infrastructure. Quantifying the results of these assessments is crucial as it helps maintain the organization's reputation.

By employing such strategies, businesses can effectively communicate their dedication to cybersecurity, establish credibility, and build trust with customers, investors, and stakeholders. Cyber scoring or quantification of risk in dollar value allows management to understand the potential damage to the company's reputation if a breach occurs, enabling them to take prompt and appropriate actions in response to the risks.

Read more: ‘Data and analytics play a crucial role in shaping our advertising strategies,' asserts Aleksander Groshev


Real-time AI can not only analyse vast amounts of data but also quickly detect patterns that could potentially lead to breaches.

M7: How does your company leverage digital marketing channels, such as social media, email marketing, and online advertising, to reach and engage with your target audience?
TA:
We believe in effective communication with our customers, addressing their problems, and providing assistance on a larger scale. By being customer-centric and solution-oriented, we don't feel the need to invest in marketing or advertisements. For young companies like TAC Security, social media can serve as a free platform to raise our voice and showcase our values and commitments to our customers. However, given the nature of our business, which revolves around trust and confidentiality, we are cautious about disclosing customer information on social media.

Instead, we utilize social media to help both enterprises and individual users understand how they can mitigate risks and address problems within their ecosystems. For instance, we conducted a survey on vulnerability management last year, in which the National cybersecurity Coordinator of the country, General Pant, and over 100 CSOs from the country and globally participated. The survey was widely read and appreciated by various cybersecurity leaders worldwide, which indirectly benefited our reputation and opened up new opportunities for us.

Our primary intention was to educate, but it ended up generating additional opportunities. We understand that providing educational content can be beneficial, whether through social media or any other platform. Ultimately, the goal is to make people more aware and informed about cybersecurity matters.

M7: What value propositions you consider are important in terms of content creation?
TA:
Content serves as a means for me to share my thoughts and ideas with others. When using content to educate people, it can be quite effective. However, if the primary purpose is self-promotion, it may not yield the desired results. Therefore, it is crucial to utilize content primarily for educational purposes.

M7: What types of content creation formats work best according to you in the IT industry? Also, what are some examples of effective content marketing strategies that have helped companies like yours to establish themselves as thought leaders?
TA:
Cybersecurity is a vast and ever-evolving industry in today's time, with information becoming irrelevant rapidly. To be most effective, we must focus on ensuring that the content we put out is informative, accurate, and relevant. Keeping up with trends, educating people, and spreading awareness are the types of content that work well for our industry and a company like ours. Therefore, it's essential to prioritize sharing such valuable information.

M7: How does TAC security use data analytics to obtain insights into customer preferences and behaviour, and how can these insights be used to enhance the customer experience?
TA:
Data is the most important thing in today's world. As someone once said, there are only two things you can trust: God or data. It's the only way to believe in what is truly accurate. So, our approach involves collecting data from various sources, including customer interactions, website behavior, and surveys. The most crucial aspect is understanding customer preferences and their problems, as we are a problem-solving company. Talking to customers and collecting data helps us gain insights into their needs.

We utilize data analytics techniques to identify patterns, trends, and historical data. Additionally, we have a unique feature in our platform, a prediction model based on machine learning. This model not only reveals past and present vulnerabilities and risks in our customers' systems but also predicts future vulnerabilities and risks.

Continuous improvement is vital, and we use data analytics to identify areas for enhancing customer support. Analysing customer feedback and behaviour provides us with valuable insights into pain points and areas where we can enhance the customer experience. This approach helps us optimize our offerings and make data-driven decisions.

Read more: Content is a crucial aspect of your online presence as it essentially represents your brand,' says Michael Cichon.


Keeping up with trends, educating people, and spreading awareness are the types of content that work well for our industry.

M7: What do you think will be the most important advancements in retail cybersecurity in the coming years?
TA:
Artificial intelligence and machine learning algorithms will play a critical role in identifying and responding to cyber threats. Real-time AI can not only analyse vast amounts of data but also quickly detect patterns that could potentially lead to breaches. This enables many of our customers to proactively use AI and machine learning for threat intelligence, helping them stay one step ahead of criminals and adversaries.

Another crucial area is Zero Trust. The United States Government is also focusing heavily on this approach. Traditional parameter-based security is no longer sufficient to face real cyber-attacks. Zero Trust architecture emphasizes strict access controls, continuous authentication, and ongoing monitoring of user activities, regardless of their location or network connection.

IoT security is another important aspect, and cyber risk quantification is yet another approach. These strategies enable retailers to strengthen their cybersecurity posture and protect their customers' data, which is of utmost importance to any company. By implementing these measures, retailers can proactively mitigate cyber threats. However, it's essential to recognize that the threat landscape is continuously evolving. Retailers must adapt and stay ahead by embracing emerging technologies and best practices to effectively safeguard their systems, IT assets, and customer information wisely.

M7: What key elements and best practices contributed to TAC Security's global recognition and the prestigious Best Enterprise of the Year award?
TA:
There are many factors, but awards are never even a byproduct. You should not focus on awards; rather, you should focus on your work. That's what we believe. I think the innovative solutions TAC Security brings forth help us stay ahead of the times. We have launched more than three solutions in the past year, showcasing the speed of innovation in the cybersecurity field.

Innovation is crucial for delivering exceptional results and ensuring customer success, which is a critical element for us. Customers act as the real brand ambassadors for a company. After innovation, customer success is parallel, meaning one relies on the other. The center point of both these aspects is our exceptional team. Talent management is something we prioritize at TAC Security, building a diverse workforce. We take pride in having a substantial number of female employees who contribute significantly to building the future of cybersecurity.

These are the parameters that have led us to achieve not just one, but countless awards. From being recognized as part of the 30 under 30 or Fortune 40 of 40 to receiving the Entrepreneur of the Year award by Entrepreneur magazine, all these accolades are centered around innovation, customer success, and, most importantly, our amazing team - the rock stars of TAC Security.

M7: Lastly, as a young business leader, what have been the most valuable lessons you've picked up in your inspirational career trajectory? 
TA:
The first lesson that inspires me is learning from failure, not success. This idea recently came to my mind, and it's so true, yet not often discussed. Success has many fathers, but failure has none. However, failure provides numerous learning opportunities, unlike success. When you succeed, there may be no room for further learning. In a concise manner, continuous learning is vital. Another crucial aspect is building relationships, not just with shareholders but also with customers. Understanding their problems and finding solutions to address their needs helps us grow.

Emotional intelligence plays a significant role in leadership. Exceptional leaders emphasize emotional intelligence, valuing the perspectives and feelings of others. Actively listening and showing compassion around their needs and challenges creates a supportive environment that brings out the best in any team. Maintaining work-life balance is equally important.

Taking calculated risks is essential, but knowing when to step back and stop a wrong decision is crucial. Stepping out of the comfort zone is necessary for growth. As a leader, I encountered a product launch failure multiple times, but I persisted and made it work after several attempts. Timing plays a significant role, and persistence comes with various costs - financial, emotional, and physical. One should consider these aspects and develop a sixth sense as a key metric for successful leadership.

ABOUT TAC SECURITY

TAC Security, a global leader in vulnerability management, offers protection to Fortune 500 companies, leading enterprises, and governments worldwide. Through its advanced Artificial Intelligence (AI) based Vulnerability Management Platform called ESOF (Enterprise Security in One Framework), TAC Security effectively manages over 5 million vulnerabilities. ESOF has been acknowledged as Gartner's top choice for Vulnerability Management/Assessment, making it the preferred solution by customers. The company has received accolades for its exceptional work environment, being recognized as a "Great Place to Work" and earning the title of "Great People Manager Company" for the third consecutive time by GMI in collaboration with Forbes and The Economic Times. To know more, please visit https://tacsecurity.com/

More C-Suite on deck

‘In the industry, we've observed fragmentation, especially among larger organizations,’ says Chris Fisher

Media 7 | October 16, 2023

Chris Fisher is a seasoned marketing professional who specializes in digital marketing and demand generation to fuel business growth. I integrate product messaging and innovative strategies with data-driven marketing to achieve quantifiable outcomes. Read on to know his thoughts about safeguarding the layers of Cyber-security.

Read More

‘Data and analytics play a crucial role in shaping our advertising strategies,' asserts Aleksander Groshev

Media 7 | June 28, 2023

Aleksander Groshev is the CEO and Co-Founder of Autobahn Security. Previously he was Vice President of Product responsible for the product development of the SaaS platform. Before joining Autobahn Security he held the position of Head of Product at Fincite, a wealth management B2B platform.

Read More

'Content is a crucial aspect of your online presence as it essentially represents your brand,' says Michael Cichon

Media 7 | June 15, 2023

Michael Cichon is a seasoned B2B marketer specializing in digital and content marketing for identity-based online fraud detection and advanced email security solutions. With an expertise in product and digital marketing, he excels in developing brand narratives, driving integrated demand generation campaigns, and connecting with customers on a personal level to inspire action. Read on to know his ideas on the importance of content syndication practices in information security industry.

Read More

‘In the industry, we've observed fragmentation, especially among larger organizations,’ says Chris Fisher

Media 7 | October 16, 2023

Chris Fisher is a seasoned marketing professional who specializes in digital marketing and demand generation to fuel business growth. I integrate product messaging and innovative strategies with data-driven marketing to achieve quantifiable outcomes. Read on to know his thoughts about safeguarding the layers of Cyber-security.

Read More

‘Data and analytics play a crucial role in shaping our advertising strategies,' asserts Aleksander Groshev

Media 7 | June 28, 2023

Aleksander Groshev is the CEO and Co-Founder of Autobahn Security. Previously he was Vice President of Product responsible for the product development of the SaaS platform. Before joining Autobahn Security he held the position of Head of Product at Fincite, a wealth management B2B platform.

Read More

'Content is a crucial aspect of your online presence as it essentially represents your brand,' says Michael Cichon

Media 7 | June 15, 2023

Michael Cichon is a seasoned B2B marketer specializing in digital and content marketing for identity-based online fraud detection and advanced email security solutions. With an expertise in product and digital marketing, he excels in developing brand narratives, driving integrated demand generation campaigns, and connecting with customers on a personal level to inspire action. Read on to know his ideas on the importance of content syndication practices in information security industry.

Read More

Related News

Software Security

SCYTHE Latest Version 4.1 Introduces Enhanced Deployment Flexibility and AI-Driven Productivity Boost

Business Wire | November 02, 2023

SCYTHE, a leading provider of cybersecurity solutions, announces the release of SCYTHE 4.1, the latest evolution in its cutting-edge cyber resilience offering. This release brings new and enhanced features to empower organizations in their continuous efforts to strengthen their cybersecurity posture. SaaS Offering for Unparalleled Flexibility SCYTHE 4.1 introduces its initial Software as a Service (SaaS) offering, providing organizations with newfound deployment flexibility. This SaaS option offers the same robust capabilities as the on-premises version, ensuring that teams can choose the deployment model that best suits their needs without pricing changes. SCYTHE's commitment to flexibility ensures that organizations can secure their infrastructure on their terms. Advanced Agent Support with Scheduling for Continuous Testing To unlock even greater control over security testing, SCYTHE 4.1 introduces advanced agent support with scheduling. This feature allows organizations to perform continuous testing by automating the deployment and execution of security assessments at specified intervals. With the power of scheduling, teams can proactively identify threats, assess controls, and evaluate their readiness to respond to cyber threats. SCYTHE empowers organizations to maintain the highest level of cyber resilience without manual intervention. Cloppy - Your AI-Powered Security Analyst In a significant leap forward, SCYTHE unveils the early access beta release of "Cloppy," its supervised machine learning (ML)-based AI analyst chatbot. Cloppy enhances team productivity, job satisfaction, and cybersecurity capabilities by delivering instant insights and recommendations. This AI-driven assistant will leverage private knowledge base instances, ensuring sensitive information stays secure. Cloppy is poised to become a trusted companion for security professionals, providing real-time guidance and augmenting their decision-making processes. As cyber threats continue to evolve, so must our approach to cybersecurity. SCYTHE 4.1 represents our commitment to innovation and empowering organizations to stay ahead of cyber adversaries, said Marc Brown, Head of Product at SCYTHE. With our SaaS offering, advanced agent support, and the introduction of Cloppy, we're equipping organizations with the tools they need to enhance their cyber resilience while simplifying offensive security. SCYTHE 4.1 Platform is now available for both new and existing customers. For more information on SCYTHE's comprehensive cyber resilience solutions, please visit https://scythe.io. About SCYTHE SCYTHE represents a paradigm shift in cybersecurity risk management, empowering organizations to Attack, Detect, and Respond efficiently. The SCYTHE platform enables collaboration between red, blue, and purple teams to build and emulate real-world adversarial campaigns. SCYTHE's innovative dual-deployment options and comprehensive features ensure a proactive cybersecurity approach. Headquartered in Arlington, VA, SCYTHE is privately funded by distinguished partners dedicated to shaping a more resilient cybersecurity landscape.

Read More

Software Security

Palo Alto Networks Intends to Acquire Talon Cyber Security

Palo Alto Networks | November 08, 2023

Palo Alto Networks plans to acquire Talon Cyber Security to enhance its Secure Access Service Edge (SASE) solution. Talon's Enterprise Browser technology, when integrated with Prisma SASE, will provide secure access to business applications. The acquisition reflects the importance of adapting SASE solutions to ensure consistent security for unmanaged devices. Palo Alto Networks, a global cybersecurity leader, has announced its intent to acquire Talon Cyber Security, an enterprise browser technology pioneer, to enhance its Secure Access Service Edge (SASE) solution and provide comprehensive protection for managed and unmanaged devices. In today's digital landscape, unmanaged devices often connect to enterprise applications without adequate security measures, making them susceptible entry points for attackers seeking to access sensitive information. Lee Klarich, Chief Product Officer of Palo Alto Networks, emphasized the importance of securing all work activity through an Enterprise Browser without compromising device privacy to protect users and applications effectively. He continued that the integration of Talon's technology with Prisma SASE aims to provide consistent security for all users and devices. Anand Oswal, SVP and GM at Palo Alto Networks highlighted the significance of securing unmanaged devices with the same robust security as managed devices, especially in today's dynamic threat landscape. HE further stated that the combination of Prisma SASE and Talon's Enterprise Browser is poised to revolutionize security measures in modern digital environments. Talon Cyber Security's Enterprise Browser technology offers an innovative solution that, when integrated with Prisma SASE, will enable users to securely access business applications from any device, including non-corporate devices, while ensuring a seamless user experience. This strategic move by Palo Alto Networks addresses the evolving security challenges in a connected world. Talon's Co-Founder and CEO, Ofer Ben-Noon, acknowledged the shifting work models and user preferences and the need for powerful last-mile security solutions. Talon's Enterprise Browser is designed to offer familiar user experiences with enterprise-grade protection. Ben emphasized that partnership with Palo Alto Networks is seen as a catalyst to accelerate its mission of delivering superior outcomes for customers. Talon, founded by Ofer Ben-Noon and Ohad Bobrov, secured the RSA Conference's Innovation Sandbox contest in 2022. The co-founders will continue to lead their teams within the Prisma SASE team at Palo Alto Networks upon the completion of the acquisition. Anand Oswal, Senior Vice President and General Manager at Palo Alto Networks, highlighted the advantages and security risks associated with Bring Your Own Device (BYOD) policies. He noted that Talon's Enterprise Browser provided security teams enhanced visibility and control over work-related Software as a Service (SaaS) and web activity across all devices, including personal and unmanaged endpoints. Anand emphasized the need for Secure Access Service Edge (SASE) solutions to adapt in order to secure unmanaged devices with the same consistent security measures applied to managed devices. This would enable users to access business applications securely from any device and location.

Read More

Cloud Security

Tigera Boosts Calico for Enhanced Security & Performance

Tigera | November 07, 2023

Tigera, a provider of an active security platform for containers and Kubernetes, has announced significant upgrades to its Calico Open Source and Calico Cloud. These improvements focus on enhancing the security, scalability, and performance of Kubernetes deployments for enterprises, providing a comprehensive solution for containerized environments. Given the increased utilization of Windows containers in production, Tigera has introduced the Calico Open Source Windows HostProcess Container feature. It streamlines node pool deployment, eliminating the need for manual node initialization and enhancing Kubernetes administrators' ability to manage Windows container-based applications efficiently. Calico Cloud now introduces a Security Score and Recommended Actions feature, addressing the paramount importance of security in Kubernetes clusters. This feature offers administrators an at-a-glance view of their organization's security posture by monitoring historical trends and risks by namespace. Moreover, it provides actionable recommendations tailored to each workload, fortifying the security of individual workloads and the entire cluster. It supports IPv6 for the eBPF dataplane, meeting the demands of enterprise-class applications by providing scalable, high-performance networking. This innovation ensures optimal performance for latency-sensitive applications and addresses IP shortages. Multi-cluster Kubernetes deployments over VxLAN are on the rise, requiring enhanced application layer observability and security. Calico introduces Kubernetes Cluster Mesh for VxLAN, offering a scalable solution for workload communication and security policy enforcement across Kubernetes clusters. This simplifies complex multi-cluster environments and ensures enterprise infrastructure can run efficiently, securely, and compliantly. These Calico enhancements redefine container networking and security, enabling enterprises to secure, scale, and optimize their Kubernetes clusters with unparalleled confidence. Tigera's Chief Product Officer, Amit Gupta, emphasized the importance of these updates, stating that Calico provides the industry's most complete solution for securing and observing Kubernetes environments. About Tigera Tigera provides the industry's sole active security platform, complemented by comprehensive observability capabilities tailored for containers and Kubernetes. The company's platform operates on a multifaceted front, effectively thwarting, identifying, troubleshooting, and autonomously mitigating potential security breach risks. It offers its platform through two distinct avenues: a fully managed SaaS solution, Calico Cloud, or a self-managed service, Calico Enterprise. Its open-source offering, Calico Open Source, is the most widely adopted solution for container networking and security, shaping the landscape of secure container environments.

Read More

Software Security

SCYTHE Latest Version 4.1 Introduces Enhanced Deployment Flexibility and AI-Driven Productivity Boost

Business Wire | November 02, 2023

SCYTHE, a leading provider of cybersecurity solutions, announces the release of SCYTHE 4.1, the latest evolution in its cutting-edge cyber resilience offering. This release brings new and enhanced features to empower organizations in their continuous efforts to strengthen their cybersecurity posture. SaaS Offering for Unparalleled Flexibility SCYTHE 4.1 introduces its initial Software as a Service (SaaS) offering, providing organizations with newfound deployment flexibility. This SaaS option offers the same robust capabilities as the on-premises version, ensuring that teams can choose the deployment model that best suits their needs without pricing changes. SCYTHE's commitment to flexibility ensures that organizations can secure their infrastructure on their terms. Advanced Agent Support with Scheduling for Continuous Testing To unlock even greater control over security testing, SCYTHE 4.1 introduces advanced agent support with scheduling. This feature allows organizations to perform continuous testing by automating the deployment and execution of security assessments at specified intervals. With the power of scheduling, teams can proactively identify threats, assess controls, and evaluate their readiness to respond to cyber threats. SCYTHE empowers organizations to maintain the highest level of cyber resilience without manual intervention. Cloppy - Your AI-Powered Security Analyst In a significant leap forward, SCYTHE unveils the early access beta release of "Cloppy," its supervised machine learning (ML)-based AI analyst chatbot. Cloppy enhances team productivity, job satisfaction, and cybersecurity capabilities by delivering instant insights and recommendations. This AI-driven assistant will leverage private knowledge base instances, ensuring sensitive information stays secure. Cloppy is poised to become a trusted companion for security professionals, providing real-time guidance and augmenting their decision-making processes. As cyber threats continue to evolve, so must our approach to cybersecurity. SCYTHE 4.1 represents our commitment to innovation and empowering organizations to stay ahead of cyber adversaries, said Marc Brown, Head of Product at SCYTHE. With our SaaS offering, advanced agent support, and the introduction of Cloppy, we're equipping organizations with the tools they need to enhance their cyber resilience while simplifying offensive security. SCYTHE 4.1 Platform is now available for both new and existing customers. For more information on SCYTHE's comprehensive cyber resilience solutions, please visit https://scythe.io. About SCYTHE SCYTHE represents a paradigm shift in cybersecurity risk management, empowering organizations to Attack, Detect, and Respond efficiently. The SCYTHE platform enables collaboration between red, blue, and purple teams to build and emulate real-world adversarial campaigns. SCYTHE's innovative dual-deployment options and comprehensive features ensure a proactive cybersecurity approach. Headquartered in Arlington, VA, SCYTHE is privately funded by distinguished partners dedicated to shaping a more resilient cybersecurity landscape.

Read More

Software Security

Palo Alto Networks Intends to Acquire Talon Cyber Security

Palo Alto Networks | November 08, 2023

Palo Alto Networks plans to acquire Talon Cyber Security to enhance its Secure Access Service Edge (SASE) solution. Talon's Enterprise Browser technology, when integrated with Prisma SASE, will provide secure access to business applications. The acquisition reflects the importance of adapting SASE solutions to ensure consistent security for unmanaged devices. Palo Alto Networks, a global cybersecurity leader, has announced its intent to acquire Talon Cyber Security, an enterprise browser technology pioneer, to enhance its Secure Access Service Edge (SASE) solution and provide comprehensive protection for managed and unmanaged devices. In today's digital landscape, unmanaged devices often connect to enterprise applications without adequate security measures, making them susceptible entry points for attackers seeking to access sensitive information. Lee Klarich, Chief Product Officer of Palo Alto Networks, emphasized the importance of securing all work activity through an Enterprise Browser without compromising device privacy to protect users and applications effectively. He continued that the integration of Talon's technology with Prisma SASE aims to provide consistent security for all users and devices. Anand Oswal, SVP and GM at Palo Alto Networks highlighted the significance of securing unmanaged devices with the same robust security as managed devices, especially in today's dynamic threat landscape. HE further stated that the combination of Prisma SASE and Talon's Enterprise Browser is poised to revolutionize security measures in modern digital environments. Talon Cyber Security's Enterprise Browser technology offers an innovative solution that, when integrated with Prisma SASE, will enable users to securely access business applications from any device, including non-corporate devices, while ensuring a seamless user experience. This strategic move by Palo Alto Networks addresses the evolving security challenges in a connected world. Talon's Co-Founder and CEO, Ofer Ben-Noon, acknowledged the shifting work models and user preferences and the need for powerful last-mile security solutions. Talon's Enterprise Browser is designed to offer familiar user experiences with enterprise-grade protection. Ben emphasized that partnership with Palo Alto Networks is seen as a catalyst to accelerate its mission of delivering superior outcomes for customers. Talon, founded by Ofer Ben-Noon and Ohad Bobrov, secured the RSA Conference's Innovation Sandbox contest in 2022. The co-founders will continue to lead their teams within the Prisma SASE team at Palo Alto Networks upon the completion of the acquisition. Anand Oswal, Senior Vice President and General Manager at Palo Alto Networks, highlighted the advantages and security risks associated with Bring Your Own Device (BYOD) policies. He noted that Talon's Enterprise Browser provided security teams enhanced visibility and control over work-related Software as a Service (SaaS) and web activity across all devices, including personal and unmanaged endpoints. Anand emphasized the need for Secure Access Service Edge (SASE) solutions to adapt in order to secure unmanaged devices with the same consistent security measures applied to managed devices. This would enable users to access business applications securely from any device and location.

Read More

Cloud Security

Tigera Boosts Calico for Enhanced Security & Performance

Tigera | November 07, 2023

Tigera, a provider of an active security platform for containers and Kubernetes, has announced significant upgrades to its Calico Open Source and Calico Cloud. These improvements focus on enhancing the security, scalability, and performance of Kubernetes deployments for enterprises, providing a comprehensive solution for containerized environments. Given the increased utilization of Windows containers in production, Tigera has introduced the Calico Open Source Windows HostProcess Container feature. It streamlines node pool deployment, eliminating the need for manual node initialization and enhancing Kubernetes administrators' ability to manage Windows container-based applications efficiently. Calico Cloud now introduces a Security Score and Recommended Actions feature, addressing the paramount importance of security in Kubernetes clusters. This feature offers administrators an at-a-glance view of their organization's security posture by monitoring historical trends and risks by namespace. Moreover, it provides actionable recommendations tailored to each workload, fortifying the security of individual workloads and the entire cluster. It supports IPv6 for the eBPF dataplane, meeting the demands of enterprise-class applications by providing scalable, high-performance networking. This innovation ensures optimal performance for latency-sensitive applications and addresses IP shortages. Multi-cluster Kubernetes deployments over VxLAN are on the rise, requiring enhanced application layer observability and security. Calico introduces Kubernetes Cluster Mesh for VxLAN, offering a scalable solution for workload communication and security policy enforcement across Kubernetes clusters. This simplifies complex multi-cluster environments and ensures enterprise infrastructure can run efficiently, securely, and compliantly. These Calico enhancements redefine container networking and security, enabling enterprises to secure, scale, and optimize their Kubernetes clusters with unparalleled confidence. Tigera's Chief Product Officer, Amit Gupta, emphasized the importance of these updates, stating that Calico provides the industry's most complete solution for securing and observing Kubernetes environments. About Tigera Tigera provides the industry's sole active security platform, complemented by comprehensive observability capabilities tailored for containers and Kubernetes. The company's platform operates on a multifaceted front, effectively thwarting, identifying, troubleshooting, and autonomously mitigating potential security breach risks. It offers its platform through two distinct avenues: a fully managed SaaS solution, Calico Cloud, or a self-managed service, Calico Enterprise. Its open-source offering, Calico Open Source, is the most widely adopted solution for container networking and security, shaping the landscape of secure container environments.

Read More

Spotlight

TAC Security

TAC Security

TAC Security is a global leader in vulnerability management that protects Fortune 500 companies, leading enterprises, and governments around the world. TAC Security manages 5+ Million vulnerabilities through it's Artificial intelligence (AI) based Vulnerability Management Platform ESOF (Enterpris...

Events

Resources

resource image

Data Security, Enterprise Security, Software Security

Protecting Against Sophisticated Bot Attacks

Whitepaper

resource image

Data Security, Enterprise Identity, Enterprise Security

The Veritas Ransomware Resiliency Strategy

Whitepaper

resource image

Data Security, Enterprise Security, Software Security

Protecting Against Sophisticated Bot Attacks

Whitepaper

resource image

Data Security, Enterprise Identity, Enterprise Security

The Veritas Ransomware Resiliency Strategy

Whitepaper

Events