‘Security solutions need to be consistent, regardless of geography or technical stack,’ emphasizes Nishant Kaushik

Nishant Kaushik Talks About Transaction Processing Systems.
Nishant Kaushik is an excellent technologist with strategic foresight and tactical know-how to manage technology-driven businesses and security expansion plans. He has successfully led cross-functional and highly focused teams to achieve business objectives that align with customer needs. Read this interview to discover Nishant’s expertise and unique perspective on omnichannel security and risk management.

We actively participate in organizations, communities, and forums where the latest security threats and vulnerabilities are discussed, shared, and communicated.

Media 7: Please tell us something about your organization. What are some of the biggest challenges Uniken faces in ensuring that your omnichannel transaction processing systems are secure and how do you address those challenges?
Nishant Kaushik:
 As we provide a security platform for customer facing businesses that operate on a variety of channels, just dealing with the continued evolution of each of these channels and their associated technology stacks is our biggest challenge. We need to make sure that the security solutions we provide to our customer and clients are consistent, regardless of which geography, what technical stack, or what technical capability the end users have.  Delivering that is our key focus, and in order to address these challenges and maintain consistency, we really focus on understanding the technical stack evolutions, staying up-to-date on the latest standards and threat vectors, and emerging best practices.

The consistency really comes from our simplicity of approach. We have a very strong security and privacy-by-design philosophy to our product development and our product capabilities.  And, we don't really try to deviate from that too much regardless of the channel or the tech stack. It gives us a very strong north star in terms of how to tackle the constantly changing landscape, avoid confusion, or create gaps in the product offering. That really is the key to us maintaining that consistency of security and experience.

M7: How does your organization balance the need for security with the need for convenience and ease of use in your transaction processing systems?
NK: 
From a design philosophy perspective, we try not to think of it as balance but as optimization. Often in security, we hear of people trying to strike a balance because they're told they have to choose between security and convenience - you can either have one or the other, but you can't have both. From the beginning, our approach has been to deliver the best of both worlds by focusing on the end customer experience, so really thinking about the end-user and how they approach it. By putting ourselves in the end-user's shoes and making sure that whatever we do from a security perspective is done in a fashion that doesn't put the burden on them, but instead makes it simple for them to use whichever product or channel they're engaging in. That enables us to find the optimal approach to delivering the right level of security without compromising the user experience that the end user is striving for. Our user-centric design or human-centric design approach to security enables us to balance concerns and achieve that optimization of security and convenience.

M7: Can you discuss your unique approach to risk management and how you prioritize security measures across different channels and systems?
NK: 
From a risk management perspective, the approach is really driven by us doing threat vector analysis. We have a few different frameworks we follow that allow us to identify tabletop scenarios and security analyses of threat vectors that customers would face. We use them to feed requirements into product design decisions concerning our defense in-depth approach for security, where we have combined omnichannel multifactor authentication, channel security, device security, etc. into our overall product solution set. The main differentiator for how we have approached the product is rather than being locked into one particular segment of security, either pure authentication or pure network security, we took a holistic approach where we decided we had to bring all of these pieces together, all of these different aspects of security together into one combined solution where they have to work together to deliver a cohesive and consistent approach.

Our approach to risk management was driven by this philosophy of looking at the security threat environment from multiple angles, not just from a user-risk perspective, but also from a device-risk and a network-risk perspective. And that approach helps us prioritize - essentially from a product management perspective – what features and capabilities to deliver our customers, irrespective of the channel. This directly led to our product approach in delivering omnichannel security. We try to ensure that no channel becomes the weakest link because attackers will always gravitate towards it. They will analyze your environment and find that weakest link, that channel which has the lowest security, and they will direct their attacks at that channel.

If you focused on strengthening your authentication in the mobile stack, they might go to the web. If you spend time shoring up the security for mobile and web, then they might attack the contact center or the call center. To protect our customers, we wanted to ensure that every channel was equally secure. That helped us prioritize our measures towards a mobile-first approach and deliver our solutions in a mobile-first manner.

Read more: ‘Marketing can be the oxygen to a company’s growth,’ says Shashi Kiran


From a product perspective, we consistently follow best practices such as continuous patching and updates of our security stack and software stack.

M7: In all aspects of your career, have you been involved in any projects or situations that particularly stood out to you as memorable?
NK:
 When you've been doing this for as long as I have and you're in a space as exciting and varied as identity and security, you tend to go through many different things. So, there's no one thing that stands out. There have been several engagements with clients, especially at early stages of the company, where you're doing proof of concepts or prototypes, and you encounter some interesting situations that kind of come out of left field and throw you for a loop, requiring you to react on the spot.

Some of them are challenging, some of them are comical almost, like that time during a proof of concept where in the middle of the final demo, somebody literally pulled out the power plug on the computers and our demo died in the middle. I’ve been in an early stage startup where we had to recover or essentially help the company rebuild itself out of the ashes of 9/11… so in a long career, I continue to find memorable things every year as we continue to play in a space that's interesting, whether we're dealing with new and emerging tech or companies that are trying to bring unique solutions to market. For example, we’re working with some of our partners on creating solutions for financial inclusion and technology that caters to the unbanked or people in remote areas – all of which continues to throw exciting challenges at us.

M7: How does your organization monitor developments in the latest trends of omnichannel security and what steps do you take to ensure that your systems are always at the forefront of security best practices?
NK: 
That's a somewhat complex question because it is a multi-dimensional approach. The number one thing that we do is listen to our customers. Often our customers or our clients are the ones dealing with the latest trends because they're seeing it in their customer environment, they're finding out which devices are being used and what capabilities their end customers are demanding. So client feedback is a big part of what helps us to understand the latest trends and how those impact our product roadmap. We are also involved in several industry bodies and standards organizations that are at the forefront of defining the next level of technology and where our technology trends are heading to, whether it's our involvement in the FIDO Alliance, organizations like the Better Identity Coalition and so on.

By getting involved with industry bodies and standards bodies as well as listening to our customers, we're able to look at these aspects from multiple different angles in terms of what's being seen and where things are going. And that's how we stay at forefront of the best practices.

M7: How does your company act quickly and effectively to a security breach to keep customers and businesses as safe as possible?
NK:
  Thankfully, we haven't had to deal with a security breach so far and we hope that it stays that way. We feel confident in our ability to avoid it because of our multidimensional defense-in-depth approach to security. That said, this is a constant battle, right? This requires constant vigilance so we have put multiple measures in place, like constantly monitoring the list of CVEs that are being published, being connected to various organizations that publish information regarding emerging threats or things that need to be addressed in our technology stack, constant patching of systems, patching of libraries, updating of algorithms, staying up-to-date on the latest versions of technologies in our security stack. These are proactive steps we take to stay ahead and minimize the risk of a breach or incident that can occur.

In our SaaS solutions, we have comprehensive security monitoring and intrusion detection tools in place that help us keep an eye on the environment and ensure that things are as safe as possible. We have incident response procedures, methodologies, and tools that we use for this purpose that, thankfully, we have yet to need. But still, we feel pretty confident that we have a good set of tools and processes in place – all of which go through the process of certification by independent third parties, to make sure that what we're doing meets industry standards and the requirements that we demand of ourselves as well as what our clients demand from us.

Read more:'We measure our success based on customer satisfaction, loyalty and retention,' says Strobes CEO Venu Ra


Adopting a user-centric or human-centric design approach to security enables us to effectively balance concerns and optimize both security and convenience.

M7: How does your company's REL-ID cryptographic solution safeguard the various layers of security stack?
NK:
 As I was mentioning earlier, one of the unique aspects of the REL-ID solution that we have developed is that we are not in a particular domain or limited to a particular domain. We're not just authentication or just network security. We've looked at the problem domains and recognized that in order to truly provide both the security and the user experience that our clients are demanding, we have to look at it from multiple dimensions and at every layer of the stack. That's been at the core of our design for our product.

When looking at how end users interact with an organization, there are many aspects that all contribute to the security equation, starting with the end user themselves. You need to focus on identity and provide strong authentication, multifactor authentication, strong identity assurance. Those users are using devices, so you need to know they are free of compromise and not contributing to the security problem. That's where having an understanding of the device health, the mobile framework and the software stack its running on. Then there’s the networks that the data is getting exchanged on, so now you need network security and encryption to protect data transmission between the end user and the clients' services, provide security for the API layers that those mobile apps are using, protect and hardening the mobile apps themselves. That’s multiple layers of the stack that goes basically, as we say, all the way from the end user to the backend - each layer of the stack has to be protected and done in a way that is consistent and always communicating with each other.
That's really how we've built our REL-ID solution, in order to ensure that every transaction is secure and reliable and has high assurance.

M7: How do you ensure that your third-party partners and vendors, such as payment processors and cloud service providers, adhere to your organization's security requirements and standards?
NK:
 It starts with the risk management approach that we discussed a little earlier that forces us to define what our requirements are for our third party vendors. It forces us to create an evaluation framework and policy framework that we then apply consistently to all of our partners and vendors. A great deal of that is only possible through the reliance on standard certifications that these providers obtain, similar to us.

For example, if we're talking about using something like Microsoft Azure, then obviously we are heavily reliant on the fact that the Microsoft Azure platform has gone through SOC2 and other certifications that are letting us know that they are meeting the security requirements we have. When it comes to some of our other partners, we rely not only on their certifications but also on the communication we have with them one-on-one, understanding their technology capabilities and doing our own evaluation of their technology and security stack, in many cases implementing our recommendations as part of their products as well. It's a multi-layered approach that we follow, keying of that consistent risk management approach that we're taking to working with our partners.

M7: How do you keep track of the latest security threats and vulnerabilities and ensure that your security protocols are robust enough to withstand them?
NK: 
Our defense in-depth approach, again, is a key part of this. There is no one answer, so it's again multilayered - ranging from us being involved with organizations and communities and participating in forums where the latest security threats and vulnerabilities are being discussed, shared, communicated.

The security community is actually quite robust and mature in this manner and very open to sharing information. There's a lot of strength we derive from being part of that broader committee. Secondly, we work with some of the leading organizations that provide real-time threat intelligence and information that feed our systems  that we rely on when it comes to things like malware detection, and so on, those are a big part of our solutions.

From a product perspective, we continue to engage in best practices around continuous patching and updates of our security stack and software stack as well as doing things like vulnerability assessments using both static analysis as well as doing independent third party vulnerability testing of our solutions.

ABOUT UNIKEN INC.

Uniken the company expands opportunities for client-focused organizations by focusing on establishing certainty in identity and security, all while ensuring exceptional customer experiences. The belief at Uniken is that identity should not be based solely on trust, but rather on certainty. This belief is backed by their award-winning REL-ID security platform, which plays a crucial role in elevating identity from mere trust to absolute certainty. Not only does REL-ID enhance security, but it also enhances the overall consumer experience.To know more, visit https://www.uniken.com/

More C-Suite on deck

'Content is a crucial aspect of your online presence as it essentially represents your brand,' says Michael Cichon

Media 7 | June 15, 2023

Michael Cichon is a seasoned B2B marketer specializing in digital and content marketing for identity-based online fraud detection and advanced email security solutions. With an expertise in product and digital marketing, he excels in developing brand narratives, driving integrated demand generation campaigns, and connecting with customers on a personal level to inspire action. Read on to know his ideas on the importance of content syndication practices in information security industry.

Read More

'AI & ML algorithms will play a critical role in identifying cyber threats,' asserts Trishneet Arora

Media 7 | July 28, 2023

Trishneet Arora, a self-made individual, demonstrated remarkable vision, intellect, and competence when he established a startup at the young age of 19. Under his guidance, the flagship venture has expanded into both the entertainment and educational sectors. With Trishneet at the helm, the potential for growth and success knows no bounds. Let's delve into his insights on securing UPI-based applications.

Read More

‘In the industry, we've observed fragmentation, especially among larger organizations,’ says Chris Fisher

Media 7 | October 16, 2023

Chris Fisher is a seasoned marketing professional who specializes in digital marketing and demand generation to fuel business growth. I integrate product messaging and innovative strategies with data-driven marketing to achieve quantifiable outcomes. Read on to know his thoughts about safeguarding the layers of Cyber-security.

Read More

'Content is a crucial aspect of your online presence as it essentially represents your brand,' says Michael Cichon

Media 7 | June 15, 2023

Michael Cichon is a seasoned B2B marketer specializing in digital and content marketing for identity-based online fraud detection and advanced email security solutions. With an expertise in product and digital marketing, he excels in developing brand narratives, driving integrated demand generation campaigns, and connecting with customers on a personal level to inspire action. Read on to know his ideas on the importance of content syndication practices in information security industry.

Read More

'AI & ML algorithms will play a critical role in identifying cyber threats,' asserts Trishneet Arora

Media 7 | July 28, 2023

Trishneet Arora, a self-made individual, demonstrated remarkable vision, intellect, and competence when he established a startup at the young age of 19. Under his guidance, the flagship venture has expanded into both the entertainment and educational sectors. With Trishneet at the helm, the potential for growth and success knows no bounds. Let's delve into his insights on securing UPI-based applications.

Read More

‘In the industry, we've observed fragmentation, especially among larger organizations,’ says Chris Fisher

Media 7 | October 16, 2023

Chris Fisher is a seasoned marketing professional who specializes in digital marketing and demand generation to fuel business growth. I integrate product messaging and innovative strategies with data-driven marketing to achieve quantifiable outcomes. Read on to know his thoughts about safeguarding the layers of Cyber-security.

Read More

Related News

API Security

Cequence and Vercara Partner to Combat Cyber Threats and Revolutionize API Security

Cequence Security | January 25, 2024

Cequence Security is proud to announce a new partnership with Vercara, a leading provider of cloud-based services that secure the online experience. This collaboration aims to fortify the cybersecurity landscape by pairing Vercara’s network and application protections with Cequence Security's innovative Unified API Protection (UAP) platform. Security teams encounter substantial hurdles in safeguarding API applications from cyber-attacks, including the rapid development and deployment of API applications across diverse cloud providers. The unmanaged and unprotected nature of these APIs can harbor critical vulnerabilities, making them susceptible to exploitation. Moreover, the lack of a clear and consistent security posture across the application footprint introduces further complexities. To address these challenges, Cequence Security's UAP platform provides a comprehensive discovery of the entire API attack surface, encompassing both external and internal APIs. It ensures compliance with security and governance best practices, eliminating unknown and unmitigated API security risks. Furthermore, the solution offers native real-time inline protection, blocking API attacks before they reach applications. "The absence of API protection puts you at risk of potential theft, fraud, non-compliance, and business disruptions,” said Carlos Morales, SVP Solutions at Vercara. “Our partnership with Cequence combines our collective best-in-class services to address the evolving demands of the cybersecurity landscape, ensuring that businesses can confidently deploy needed applications and successfully navigate the complexities of API security with advanced, holistic protection.” Arun Gowda, VP, Business Development at Cequence Security, said, “In the evolving landscape of cybersecurity, the extensive risk of data compromise in API breaches goes beyond external APIs to internal ones. These often-overlooked internal APIs can access sensitive data not intended for public exposure. APIs have changed the game for attackers, making it imperative to prioritize the security of all assets accessible through APIs, including those not expected to be publicly exposed.” He added, “We are pleased to combine our innovative API security solutions with Vercara's innovative WAF and DDoS services to deliver advanced, holistic API protection. This collaboration reinforces our commitment to provide unparalleled security measures for businesses reliant on APIs.” Cequence Security's UAP platform is unparalleled in addressing all phases of the API security lifecycle. It provides: Discovery: A continuous API attack surface discovery management product that assesses your application footprint, offering a complete inventory of external APIs. Compliance: A security posture management product that identifies security risks in APIs, ensuring compliance with specifications, security test requirements, and governance best practices. Protection: Detects and prevents sophisticated automated API attacks and business logic abuse using advanced machine learning rules, providing real-time protection without relying on third-party components. About Cequence Security Cequence, a pioneer in API security and bot management, is the only solution that delivers Unified API Protection (UAP), uniting discovery, compliance, and protection across all internal and external APIs to defend against attacks, targeted abuse, and fraud. Requiring less than 15 minutes to onboard an API without requiring any instrumentation, SDK, or JavaScript integration, the flexible deployment model supports SaaS, on-premises, and hybrid installations. Cequence solutions scale to handle the most demanding Fortune and Global 2000 organizations, securing more than 8 billion daily API calls and protecting more than 3 billion user accounts across these customers. To learn more, visit www.cequence.ai. About Vercara Vercara is a purpose-built, global, cloud-based security platform that provides layers of protection to safeguard businesses’ online presence, no matter where attacks originate or where they are aimed. Delivering the industry’s highest-performing solutions and supported by unparalleled 24/7 human expertise and hands-on guidance, top global brands depend on Vercara to protect their networks and applications against threats and downtime. Vercara’s suite of cloud-based services is secure, reliable, and available, delivering peace of mind and ensuring that businesses and their customers experience exceptional interactions all day, every day. Pressure-tested in the world’s most tightly regulated and high-traffic verticals, Vercara’s mission-critical security portfolio provides best-in-class DNS and application and network security (including DDoS and WAF) services to its Global 5000 customers and beyond. For more information, visit vercara.com.

Read More

Data Security

Rubrik Chosen by Carhartt to Drive Complete Cyber Resilience

Rubrik | January 10, 2024

Rubrik, the Zero Trust Data Security™ company, today announced that America’s premium workwear brand Carhartt has consolidated multiple legacy backup tools with Rubrik Security Cloud to achieve cyber resilience. After moving to Rubrik, Carhartt realized more than 50 percent in monthly cost savings, while significantly improving its data security capabilities. “Data resilience is key to the continued security and success of our business. We work hard to ward off intruders but we have to operate on the assumption that they will find a way in,” said Michael Karasienski, cloud platforms manager at Carhartt. “Rubrik Security Cloud restores data fast and without fail for both our cloud and on-premises environments. Rubrik plays a key role in building trust in our system with secure protocols and access controls; it isn’t just a data security solution, it’s peace of mind for our brand.” Established in 1889, Carhartt has a rich heritage of developing rugged products for workers on and off the job. The company honors hard work, approaching its business with the same honesty, dependability, and trust that its consumers display day-in and day-out. Prior to Rubrik, Carhartt used a variety of different backup solutions across its operations. After an upgrade of a critical application failed, Carhartt’s administrators discovered that that application data hadn’t been backed up, forcing the team to reconstruct more than two-weeks’ worth of data manually. Furthermore, the Carhartt team discovered malware in backups from its legacy tools, resulting in weeks of searching data sets to manually complete the investigation. With Rubrik Security Cloud, Carhartt’s IT team can now devote more time to other priorities — like business requests, incidents, and reducing technical debt — while saving more than 50 percent in operational costs each month. The company’s IT and Security teams are also collaborating to reduce risk to the organization, zeroing in on malware and tying investigations into its security operations center. “A highly interconnected business like Carhartt is responsible for mountains of sensitive data. Protecting that data is paramount to maintain customer trust and minimize business disruption,” said Anneka Gupta, Chief Product Officer at Rubrik. “Outdated legacy technology was never built with security in mind, so organizations must turn to modernized platforms and zero-trust methodologies to defend their data. With a holistic solution like Rubrik Security Cloud, organizations like Carhartt know their business will be resilient in the face of any cyber threat.” Carhartt utilizes numerous Rubrik products, including Anomaly Detection, Sensitive Data Monitoring, Threat Hunting, as well as its integration with Microsoft Sentinel. About Rubrik Rubrik is on a mission to secure the world’s data. With Zero Trust Data Security™, we help organizations achieve business resilience against cyberattacks, malicious insiders, and operational disruptions. Rubrik Security Cloud, powered by machine learning, secures data across enterprise, cloud, and SaaS applications. We help organizations uphold data integrity, deliver data availability that withstands adverse conditions, continuously monitor data risks and threats, and restore businesses with their data when infrastructure is attacked.

Read More

Data Security

GuidePoint Security Announces Portfolio of Data Security Governance Services

GuidePoint Security | January 30, 2024

GuidePoint Security, a cybersecurity solutions leader enabling organizations to make smarter decisions and minimize risk, today announced the availability of its Data Security Governance services, which are designed to help customers address the challenges of unstructured data and data sprawl through a proven process and program to meet their unique needs. GuidePoint’s Data Security Governance services consist of policies, standards, and processes leveraging the newest technologies to meet organizations’ data governance goals in both on-prem and cloud environments. Once the right strategy is determined with the customer, GuidePoint Security consultants will review program requirements, assess current policies and controls, perform gap analysis, design and develop/enhance the program, recommend and implement supporting technologies, and create operational processes and metrics. “Whether an organization is just beginning to build their data security governance program or needs help assessing and improving an existing program, our team and service capabilities are built to meet them at their current maturity level,” said Scott Griswold, Practice Director - Security Governance Services, GuidePoint Security. “We work side by side with the customer to conduct the necessary data discovery in their environment and provide tailored recommendations for solutions and processes to ultimately build/improve upon the data security governance program.” GuidePoint’s Data Security Governance Services include: Sensitive Data Cataloging: For organizations just getting started in the process of protecting their sensitive data, GuidePoint offers Data Identification workshops to identify sensitive data types in the environment, including trade secrets, intellectual property, and sensitive business communications. Data Security Governance Program Assessment: For organizations with existing Data Security Governance or Data Protection programs, GuidePoint Security experts will assess the program to identify policy non-compliance, gaps in data protection requirements—whether legal, regulatory, contractual, or business—and program maturity levels. Data Security Governance Program Strategy Development: The GuidePoint team will work with an organization's key stakeholders to design a program strategy aligned with relevant requirements. The outputs of this effort include delivering ongoing sensitive data discovery, automated classification and labeling, the application of required sensitive data protections, restrictions on where sensitive data can be stored and sent, and data retention policy enforcement. Merger and Acquisition Data Identification: This offering provides the ability to identify sensitive data within an M&A target or recent acquisition (including locations, amounts, and access rights) and then perform penetration testing on the storage repositories where that sensitive data exists to determine the risk of data compromise. About GuidePoint Security GuidePoint Security provides trusted cybersecurity expertise, solutions and services that help organizations make better decisions that minimize risk. Our experts act as your trusted advisor to understand your business and challenges, helping you through an evaluation of your cybersecurity posture and ecosystem to expose risks, optimize resources and implement best-fit solutions. GuidePoint’s unmatched expertise has enabled a third of Fortune 500 companies and more than half of the U.S. government cabinet-level agencies to improve their security posture and reduce risk. Learn more at www.guidepointsecurity.com.

Read More

API Security

Cequence and Vercara Partner to Combat Cyber Threats and Revolutionize API Security

Cequence Security | January 25, 2024

Cequence Security is proud to announce a new partnership with Vercara, a leading provider of cloud-based services that secure the online experience. This collaboration aims to fortify the cybersecurity landscape by pairing Vercara’s network and application protections with Cequence Security's innovative Unified API Protection (UAP) platform. Security teams encounter substantial hurdles in safeguarding API applications from cyber-attacks, including the rapid development and deployment of API applications across diverse cloud providers. The unmanaged and unprotected nature of these APIs can harbor critical vulnerabilities, making them susceptible to exploitation. Moreover, the lack of a clear and consistent security posture across the application footprint introduces further complexities. To address these challenges, Cequence Security's UAP platform provides a comprehensive discovery of the entire API attack surface, encompassing both external and internal APIs. It ensures compliance with security and governance best practices, eliminating unknown and unmitigated API security risks. Furthermore, the solution offers native real-time inline protection, blocking API attacks before they reach applications. "The absence of API protection puts you at risk of potential theft, fraud, non-compliance, and business disruptions,” said Carlos Morales, SVP Solutions at Vercara. “Our partnership with Cequence combines our collective best-in-class services to address the evolving demands of the cybersecurity landscape, ensuring that businesses can confidently deploy needed applications and successfully navigate the complexities of API security with advanced, holistic protection.” Arun Gowda, VP, Business Development at Cequence Security, said, “In the evolving landscape of cybersecurity, the extensive risk of data compromise in API breaches goes beyond external APIs to internal ones. These often-overlooked internal APIs can access sensitive data not intended for public exposure. APIs have changed the game for attackers, making it imperative to prioritize the security of all assets accessible through APIs, including those not expected to be publicly exposed.” He added, “We are pleased to combine our innovative API security solutions with Vercara's innovative WAF and DDoS services to deliver advanced, holistic API protection. This collaboration reinforces our commitment to provide unparalleled security measures for businesses reliant on APIs.” Cequence Security's UAP platform is unparalleled in addressing all phases of the API security lifecycle. It provides: Discovery: A continuous API attack surface discovery management product that assesses your application footprint, offering a complete inventory of external APIs. Compliance: A security posture management product that identifies security risks in APIs, ensuring compliance with specifications, security test requirements, and governance best practices. Protection: Detects and prevents sophisticated automated API attacks and business logic abuse using advanced machine learning rules, providing real-time protection without relying on third-party components. About Cequence Security Cequence, a pioneer in API security and bot management, is the only solution that delivers Unified API Protection (UAP), uniting discovery, compliance, and protection across all internal and external APIs to defend against attacks, targeted abuse, and fraud. Requiring less than 15 minutes to onboard an API without requiring any instrumentation, SDK, or JavaScript integration, the flexible deployment model supports SaaS, on-premises, and hybrid installations. Cequence solutions scale to handle the most demanding Fortune and Global 2000 organizations, securing more than 8 billion daily API calls and protecting more than 3 billion user accounts across these customers. To learn more, visit www.cequence.ai. About Vercara Vercara is a purpose-built, global, cloud-based security platform that provides layers of protection to safeguard businesses’ online presence, no matter where attacks originate or where they are aimed. Delivering the industry’s highest-performing solutions and supported by unparalleled 24/7 human expertise and hands-on guidance, top global brands depend on Vercara to protect their networks and applications against threats and downtime. Vercara’s suite of cloud-based services is secure, reliable, and available, delivering peace of mind and ensuring that businesses and their customers experience exceptional interactions all day, every day. Pressure-tested in the world’s most tightly regulated and high-traffic verticals, Vercara’s mission-critical security portfolio provides best-in-class DNS and application and network security (including DDoS and WAF) services to its Global 5000 customers and beyond. For more information, visit vercara.com.

Read More

Data Security

Rubrik Chosen by Carhartt to Drive Complete Cyber Resilience

Rubrik | January 10, 2024

Rubrik, the Zero Trust Data Security™ company, today announced that America’s premium workwear brand Carhartt has consolidated multiple legacy backup tools with Rubrik Security Cloud to achieve cyber resilience. After moving to Rubrik, Carhartt realized more than 50 percent in monthly cost savings, while significantly improving its data security capabilities. “Data resilience is key to the continued security and success of our business. We work hard to ward off intruders but we have to operate on the assumption that they will find a way in,” said Michael Karasienski, cloud platforms manager at Carhartt. “Rubrik Security Cloud restores data fast and without fail for both our cloud and on-premises environments. Rubrik plays a key role in building trust in our system with secure protocols and access controls; it isn’t just a data security solution, it’s peace of mind for our brand.” Established in 1889, Carhartt has a rich heritage of developing rugged products for workers on and off the job. The company honors hard work, approaching its business with the same honesty, dependability, and trust that its consumers display day-in and day-out. Prior to Rubrik, Carhartt used a variety of different backup solutions across its operations. After an upgrade of a critical application failed, Carhartt’s administrators discovered that that application data hadn’t been backed up, forcing the team to reconstruct more than two-weeks’ worth of data manually. Furthermore, the Carhartt team discovered malware in backups from its legacy tools, resulting in weeks of searching data sets to manually complete the investigation. With Rubrik Security Cloud, Carhartt’s IT team can now devote more time to other priorities — like business requests, incidents, and reducing technical debt — while saving more than 50 percent in operational costs each month. The company’s IT and Security teams are also collaborating to reduce risk to the organization, zeroing in on malware and tying investigations into its security operations center. “A highly interconnected business like Carhartt is responsible for mountains of sensitive data. Protecting that data is paramount to maintain customer trust and minimize business disruption,” said Anneka Gupta, Chief Product Officer at Rubrik. “Outdated legacy technology was never built with security in mind, so organizations must turn to modernized platforms and zero-trust methodologies to defend their data. With a holistic solution like Rubrik Security Cloud, organizations like Carhartt know their business will be resilient in the face of any cyber threat.” Carhartt utilizes numerous Rubrik products, including Anomaly Detection, Sensitive Data Monitoring, Threat Hunting, as well as its integration with Microsoft Sentinel. About Rubrik Rubrik is on a mission to secure the world’s data. With Zero Trust Data Security™, we help organizations achieve business resilience against cyberattacks, malicious insiders, and operational disruptions. Rubrik Security Cloud, powered by machine learning, secures data across enterprise, cloud, and SaaS applications. We help organizations uphold data integrity, deliver data availability that withstands adverse conditions, continuously monitor data risks and threats, and restore businesses with their data when infrastructure is attacked.

Read More

Data Security

GuidePoint Security Announces Portfolio of Data Security Governance Services

GuidePoint Security | January 30, 2024

GuidePoint Security, a cybersecurity solutions leader enabling organizations to make smarter decisions and minimize risk, today announced the availability of its Data Security Governance services, which are designed to help customers address the challenges of unstructured data and data sprawl through a proven process and program to meet their unique needs. GuidePoint’s Data Security Governance services consist of policies, standards, and processes leveraging the newest technologies to meet organizations’ data governance goals in both on-prem and cloud environments. Once the right strategy is determined with the customer, GuidePoint Security consultants will review program requirements, assess current policies and controls, perform gap analysis, design and develop/enhance the program, recommend and implement supporting technologies, and create operational processes and metrics. “Whether an organization is just beginning to build their data security governance program or needs help assessing and improving an existing program, our team and service capabilities are built to meet them at their current maturity level,” said Scott Griswold, Practice Director - Security Governance Services, GuidePoint Security. “We work side by side with the customer to conduct the necessary data discovery in their environment and provide tailored recommendations for solutions and processes to ultimately build/improve upon the data security governance program.” GuidePoint’s Data Security Governance Services include: Sensitive Data Cataloging: For organizations just getting started in the process of protecting their sensitive data, GuidePoint offers Data Identification workshops to identify sensitive data types in the environment, including trade secrets, intellectual property, and sensitive business communications. Data Security Governance Program Assessment: For organizations with existing Data Security Governance or Data Protection programs, GuidePoint Security experts will assess the program to identify policy non-compliance, gaps in data protection requirements—whether legal, regulatory, contractual, or business—and program maturity levels. Data Security Governance Program Strategy Development: The GuidePoint team will work with an organization's key stakeholders to design a program strategy aligned with relevant requirements. The outputs of this effort include delivering ongoing sensitive data discovery, automated classification and labeling, the application of required sensitive data protections, restrictions on where sensitive data can be stored and sent, and data retention policy enforcement. Merger and Acquisition Data Identification: This offering provides the ability to identify sensitive data within an M&A target or recent acquisition (including locations, amounts, and access rights) and then perform penetration testing on the storage repositories where that sensitive data exists to determine the risk of data compromise. About GuidePoint Security GuidePoint Security provides trusted cybersecurity expertise, solutions and services that help organizations make better decisions that minimize risk. Our experts act as your trusted advisor to understand your business and challenges, helping you through an evaluation of your cybersecurity posture and ecosystem to expose risks, optimize resources and implement best-fit solutions. GuidePoint’s unmatched expertise has enabled a third of Fortune 500 companies and more than half of the U.S. government cabinet-level agencies to improve their security posture and reduce risk. Learn more at www.guidepointsecurity.com.

Read More

Spotlight

Uniken Inc.

Uniken Inc.

Uniken unlocks limitless possibilities for client-centric organizations by creating certainty in identity and security while delivering amazing customer experiences. Uniken’s REL-ID platform secures every step of client interactions, all in a fully integrated solution, all invisible to the client an...

Events

Resources