DATA SECURITY,ENTERPRISE IDENTITY,SOFTWARE SECURITY
Tanium | September 16, 2022
Tanium, the industry’s only provider of converged endpoint management (XEM), today announced the first of several powerful integrations between Microsoft and the Tanium XEM platform. The integration marks the latest expansion in a relationship that includes Tanium’s membership in the Microsoft Intelligent Security Association (MISA) and its availability in the Microsoft Azure Marketplace.
By making Tanium’s rich, real-time endpoint data accessible directly from the Sentinel console, the integration enables IT organizations to comprehensively detect, investigate, triage, prioritize, and remediate threats automatically, extending Sentinel’s advanced security and analytics capabilities, reducing the number of false positives that require disposition, and allowing security practitioners to better identify threats that might otherwise be missed.
“Environments like ours are complex — there’s a great diversity of the types of devices and a large number of users accessing sensitive information,” said Mark Wantling, CIO the University of Salford. “It‘s a lot for my relatively small InfoSec team to manage, so I'm very excited about Tanium's integration with Microsoft Sentinel. Now my team can investigate, identify, triage, and remediate threats quickly without even leaving the Sentinel console, and that's a gamechanger.”
The Tanium integration with Sentinel also enables active threat hunting. With Tanium’s detailed real-time data taken directly from the endpoint, security practitioners are better able to contextualize and correlate alerts sourced from both Microsoft and Tanium with almost no delay across an entire IT environment. They get accurate real-time data rather than information that may no longer be correct as a result of inherent latency. Additionally, Tanium gives incident responders the ability to take immediate action on alerts as they happen including quarantining a device, deploying a patch, or updating software, all from the Sentinel console. Customers benefit from proactive, predictive, automated management of their entire IT stack.
Tanium + Sentinel gives Microsoft customers the ability to monitor and ensure their Microsoft’s solutions are highly available and operate at optimal health. With its real-time distributed architecture, Tanium can independently verify that all Microsoft services are deployed and up-to-date and validate that it is fully performant on every endpoint. If needed, customers can easily deploy a patch or quarantine a device in seconds to ensure they get the most out of their Microsoft investments.
“We’re excited to continue to expand our relationship with Microsoft. “Already we work together to make Microsoft environments healthier and more secure by reducing risks for customers and protecting their investments in Azure, and soon we’ll be releasing a series of powerful integrations with Microsoft tools in addition to our Sentinel Integration.”
Rob Jenks, SVP of corporate strategy at Tanium
In addition to joining MISA, Tanium is available in the Microsoft Azure Marketplace, an online store providing applications and services for use on Azure. Customers can purchase and provision Tanium directly from the marketplace and apply the purchase to their Microsoft Azure Consumption Commitments (MACC).
Tune in now to hear Tanium CEO Orion Hindawi and Microsoft Corporate VP of Cybersecurity Ann Johnson discuss the vision for the partnership and how Tanium’s real-time data and control can enhance security, performance, and automation for today’s growing enterprises. You can also visit www.youtube.com/watch?v=S-gZC9M3lkE.
Tanium, the industry’s only provider of converged endpoint management (XEM), leads the paradigm shift in legacy approaches to managing complex security and technology environments. Only Tanium protects every team, endpoint, and workflow from cyber threats by integrating IT, Compliance, Security, and Risk into a single platform that delivers comprehensive visibility across devices, a unified set of controls, and a common taxonomy for a single shared purpose: to protect critical information and infrastructure at scale. Tanium has been named to the Forbes Cloud 100 list for seven consecutive years and ranks on Fortune’s list of the Best Large Workplaces in Technology. In fact, more than half of the Fortune 100 and the U.S. armed forces trust Tanium to protect people; defend data; secure systems; and see and control every endpoint, team, and workflow everywhere. That’s the power of certainty.
DATA SECURITY,PLATFORM SECURITY,SOFTWARE SECURITY
JupiterOne | August 19, 2022
JupiterOne, the industry's leading provider of cyber asset attack surface management (CAASM) technology, today announced that it was named as a Sample Vendor for CAASM in the latest release of the Gartner Hype Cycle for Cyber Risk Management, 2022.
According to Gartner, "In 2022, the global risk landscape continues to be impacted by the ongoing COVID-19 pandemic conditions, the Russian invasion of Ukraine, labor shortage, worsening climate change, and inflation. In particular, the increased inflation rate and labor market tightness mean that organizations must do more with fewer resources."
The Gartner report notes that security and risk management (SRM) leaders continue to struggle to:
"Position risk management as a decision-making practice. Either because of their rigid focus on framework-based controls or inability to scale their security and risk controls for individual projects
Inform cyber and technology decisions in an ever-expanding operating ecosystem
Gain sufficient transparency in evaluating environmental, social and governance risks and incidents, local and worldwide.
Mitigate global supply chain risks as these risks continue to form a web of complexity and volatility.
Look for ways to automate and inform risk assessment with data-driven insights."
One solution category that addresses these challenges is the cyber asset attack surface management (CAASM) space, where solutions aggregate and track assets such as endpoints, servers, devices, and applications. By consolidating internal and external cyber assets, users can use queries to find gaps in coverage for security tools such as vulnerability assessment and endpoint detection and response (EDR) tools. JupiterOne pioneered a graph-based approach to CAASM that allows customers to track and monitor IP addresses and analyze and map all intra-asset relationships.
As the Gartner analysts explained, "CAASM enables security teams to improve basic security hygiene by ensuring security controls, security posture, and asset exposure are understood and remediated. Organizations that deploy CAASM reduce dependencies on homegrown systems and manual collection processes, and remediate gaps either manually or via automated workflows. Organizations can visualize security tool coverage, support attack surface management (ASM) processes, and correct systems of record that may have stale or missing data."
The drivers of CAASM adoption, according to Gartner, include:
"Full visibility into all information technology (IT), Internet of Things (IoT) and operational technology (OT) assets under an organization's control, which improves understanding of the attack surface area and existing security control gaps or serves as part of a wider ASM process.
Quicker audit compliance reporting through more accurate, current and comprehensive asset and security control reports.
Consolidation of existing products that collect asset and exposure information into a single normalized view, which reduces the need for manual processes or dependencies on homegrown applications.
Access to consolidated asset views for multiple individuals and teams across an organization, such as enterprise architects, security operations teams and IT administrators, who can benefit from viewing and querying consolidated asset inventories with a view to achieving business objectives."
The recent Gartner report on Top Trends in Cybersecurity 2022 cited "Attack Surface Expansion" as one of the year's top security trends resulting from the expanding digital footprint of modern organizations. According to the report, "A dramatic increase in attack surface is emerging from changes in the use of digital systems, such as new hybrid work, accelerated use of public cloud, more tightly interconnected supply chains, expansion of public-facing digital assets and increased use of operational technology." In our opinion, security leaders who reinvent the cybersecurity function and technology architecture can better position their organizations to maintain and grow value in an increasingly agile, distributed, and decentralized environment.
JupiterOne was named a Sample Vendor for CAASM in the latest release of the Gartner Hype Cycle for Security Operations, 2022. The report is available for complimentary download from JupiterOne.
Additionally, Gartner recognized JupiterOne as a Representative Provider for CAASM in the Innovation Insights for Attack Surface Management and as a Sample Vendor in the Gartner Hype Cycle for Workload and Network Security, 2022 research reports.
"JupiterOne is honored to receive yet another recognition from Gartner. Right now, the world is full of uncertainty, making it challenging to conduct business. More than ever, businesses must prioritize effective security measures. Security leaders can get invaluable insights by tracking their assets and making efficient use of their resources. Overall, organizations can make better data-driven business decisions while keeping security risks in mind."
Erkang Zheng, Founder and CEO at JupiterOne
JupiterOne is a cyber asset attack surface management (CAASM) platform company providing visibility and security into your entire cyber asset universe. Using graphs and relationships, JupiterOne provides a contextual knowledge base for an organization's cyber asset operations. With JupiterOne, teams can discover, monitor, understand, and act on changes in their digital environments. Cloud resources, ephemeral devices, identities, access rights, code, pull requests, and much more are collected, graphed, and monitored automatically by JupiterOne.
DATA SECURITY,PLATFORM SECURITY,SOFTWARE SECURITY
Hillstone Networks | August 25, 2022
Hillstone Networks, an innovative and accessible cybersecurity solutions provider, today unveiled new models in the Hillstone Networks A-Series Next Generation Firewalls (NGFW), the A7600 and A6800, to help enterprises secure their expanding network edge, deliver powerful network security capabilities, and drive sustainability with solutions in a compact 1RU form factor.
According to IBM’s Cost of a Breach 2022 report, 83% of organizations studied have had more than one breach. Cyberattacks are not abating, and the cost, damages and recovery from a single breach continue to rise. Against an aggressive cyberattack backdrop, the volume and complexity of traffic in today’s IT environments continue to exponentially increase due to the expansion of different services such as videos, apps, and cloud-based-everything. With increased connectivity to services comes an increased complexity of vulnerabilities to secure against.
Secure An Expanded Network Edge with Hillstone A-Series Next Generation Firewalls
Enterprises need high-performing next-generation firewalls to meet today’s bandwidth requirements, service levels, and defend against more advanced threats. As the network edge expands from the traditional on-premises network perimeter, IT teams now must secure unforeseen levels of depth, as all layers of the IT stack must be secured at the edge.
Minimize the Speed versus Security Trade-off with Proprietary Hardware Acceleration Engine
IT teams regularly compromise one need over another, based on budget or resources. Hillstone’s proprietary Hardware (HW) Acceleration Engine offloads network traffic from the processor, allowing more resources to be dedicated for comprehensive security services, bringing streamlined threat detection and prevention capabilities to high-traffic applications and scenarios. The HW Acceleration Engine delivers ultra-low latency in network packet forwarding, allowing the NGFW to sift through and secure even the most latency-sensitive applications, including multimedia streaming, broker services, and other high-volume transactions.
Native Cyberresilience Combined with High Throughput/Low Latency Deliver on App and Customer Experience
Raw processing speed, with throughputs of 200 Gbps and 280 Gbps, allow for packet forwarding within a few microseconds, delivering quality of service across networks. Enterprise-grade security features come native with these offerings, including comprehensive and advanced threat protection for known and unknown malware with multiple security services, including Intrusion Prevention, IP Reputation, URL Filtering, Anti-Spam, Anti-Virus, Cloud Sandbox, Botnet C2, among others.
“Because today’s network traffic across all applications and services is increasing both in complexity, and in volume across hybrid and multi-cloud deployments, a high performing NGFW is no longer optional – it is now mandatory. “Today’s data centers, edge locations, service providers are looking for a powerful solution that delivers on multiple fronts – security, performance, and customer experience. The new NGFW offerings deliver the on the needs of our customers today with the flexibility of multiple deployment models.”
Tim Liu, co-founder & CTO, Hillstone Networks
The A-Series NGFW is a solid platform for enterprise customers to enable an SD-WAN solution to bridge connectivity and security needs. The integration consolidates network VPN and security in one device or client, allowing for a faster, lower-cost and more secure local internet connection at remote locations. In addition, customers can also unlock a Zero Trust Network Access (ZTNA) solution, to meet remote access security requirements, including identity-based, least-privileged secure access, as well as context-aware, adaptive access control, enhancing both security and effectiveness for the remote connections.
About Hillstone Networks
Hillstone Networks’ innovative and accessible cybersecurity solutions reshape enterprise and service provider security, enabling cyber resilience while lowering TCO. Providing comprehensive visibility, superior intelligence, and rapid protection to see, understand, and act against cyberthreats from edge to cloud, Hillstone is favorably rated by leading analysts and trusted by global companies.