Accenture Strengthens Security Portfolio By Acquiring Context Information Security

Infosecurity | March 09, 2020

  • Context Information Security is the latest in a string of acquisitions done by Accenture.

  • Context offers high-end cybersecurity, intelligence-driven red teams, vulnerability research and incident response services.

  • Accenture has now further strengthened its security portfolio.

Accenture has acquired one of the UK's most recognized and respected information security service providers, Context Information Security for an undisclosed sum from former parent company Babcock International Group. Founded and headquartered in London, Context has offices in Sydney and Melbourne and is headed up locally by Asia Pacific managing director Kirk Stephen.


Context Information Security is the latest in a string of acquisitions done by Accenture. In January, it acquired Symantec’s cybersecurity services business. With the acquisition of Context, Accenture has added more firepower to its already powerful portfolio that includes déjà vu Security, iDefense, Maglan, Redcore, Arismore, and FusionX.



This acquisition is an excellent match for us, combining a group of highly skilled cybersecurity professionals globally while providing differentiated services to clients in the UK market. The deal signals continued aggressive growth for Accenture Security and gives us a new branch of talented family members to help clients grow their business with confidence and resilience

- Kelly Bissell, Senior Managing Director, Accenture



Context offers high-end cybersecurity, intelligence-driven red teams, vulnerability research and incident response services. It has involved in handling some of the most advanced incident response cases in the industry. Context has a client base spanning multiple industries including financial services, government, aerospace and defense, infrastructure and more.


READ MORE: Singapore announces cyber command to defend on the cyberspace frontier


Acquisition of Context makes it a part of the Accenture's cyber-defense offerings, strengthening its security's existing portfolio.



Context has a remarkable set of cybersecurity skills, capabilities and reputation in the UK as well as in the international financial services industry to complement the growth we have already driven for more than a decade in this market. We are excited to welcome this talented group of professionals that share a common vision of providing world-class cybersecurity to our clients.

- Nick Taylor, UKI lead, Accenture Security



"Accenture’s industry-focused approach across adversary simulation, red teaming, incident response and more, matches Context’s own strategy. Accenture’s family culture is a great fit for Context," said Context Information Security’s chief executive officer, Mark Raeburn.


Context Information Security was founded in London in 1998 and presently has more than 250 employees with offices in Australia, Germany and the United States.


READ MORE: Imperva uses AI to block AI-weaponised cyber threats

Spotlight

An enhanced means of verifying identity that requires you to present two pieces of evidence – your credentials –in order to gain access to an account or other secure/restricted area. Your credentials fall into any of these three categories: something you know (like a password or PIN), something you have (like a smart card or a token device), or something you are (like your fingerprint, voice recognition or other biometric). 2FA is a form of Multi-Factor Authentication.

Spotlight

An enhanced means of verifying identity that requires you to present two pieces of evidence – your credentials –in order to gain access to an account or other secure/restricted area. Your credentials fall into any of these three categories: something you know (like a password or PIN), something you have (like a smart card or a token device), or something you are (like your fingerprint, voice recognition or other biometric). 2FA is a form of Multi-Factor Authentication.

Related News

PLATFORM SECURITY

Uptycs Unveils Advanced Container and Kubernetes Capabilities

Uptycs | May 27, 2022

Uptycs, the first cloud-native security analytics platform that enables both cloud and endpoint security from a single platform, today unveiled expanded container and Kubernetes security posture management (KSPM) features for its cloud workload protection platform (CWPP). These features enable real-time identification of containerized workloads, proactive scanning of container images in the CI/CD pipeline, constant compliance monitoring, and Kubernetes security policy audit and enforcement. According to Gartner, by 2026, over 90% of the world's enterprises will be operating containerized apps in production, up from less than 40% currently. Businesses, on the other hand, struggle to manage and maintain these transitory assets. Misconfigurations in the control plane and insecure policies at the single container layer are used by attackers to escalate permissions, conduct container escapes, and compromise nodes for executing code. "Organizations are rapidly scaling their Kubernetes environments and seeing tremendous gains in optimization, availability, and developer productivity, but too often Security teams are left playing catch up. With telemetry from Kubernetes systems supported by our analytics platform, Security teams know immediately what resources they have and the security posture of those resources—across public and private clouds, scaling to tens of thousands of pods. Combined with our industry-leading container security capabilities, this gives Security teams confidence that they have the proper controls in place to minimize risk while enabling innovation." Ganesh Pai, CEO and Co-founder of Uptycs Uptycs offers both fully managed (AWS EKS, Azure AKS, Google GKE) and self-managed Kubernetes environments, such as VMware Tanzu and Google Anthos. Uptycs contains a range of container runtimes (Docker, containerd, CRI-O). The latest KSPM capabilities offered by the Uptycs platform are now readily accessible and will be shown at the 2022 RSA Conference (booth #435) from June 6-9. Learn more about the Uptycs container and Kubernetes security service by visiting the Uptycs blog.

Read More

SOFTWARE SECURITY

Fusion Connect Introduces Extensive Security Portfolio to Help Enterprises Take Control of Their IT Environment

Fusion Connect | July 22, 2022

Fusion Connect, a leading provider of managed security and collaboration services, has launched a comprehensive security offering with a new endpoint management and security service that allows businesses to identify, control, and secure devices and applications at a time when security threats continue to disrupt companies globally. The new portfolio enables organizations to better understand the complete picture of their security risks and take action to mitigate them. Fusion Connect provides a complete solution that secures against threats while also hunting for unknown vulnerabilities that can upend a business from managing network components with advanced edge security for unified threat management (UTM) and remote access VPN to device level management. Additionally, the new portfolio helps organizations to improve reaction time to threats by connecting and securing any element in the organization's environment. The centralized platform enables enterprises to take swift action by providing a wide range of capabilities to improve IT efficiency and security hygiene. Fusion Connect's enhanced security measures come at a time when a massive talent shortage persists globally. According to (ISC)², the size of the cybersecurity workforce is 65% below what it needs to be. "Heavier workloads, unfilled positions, and security employee burnout are making things especially chaotic in cybersecurity. "With cyberattacks becoming more common, more sophisticated, and more costly, businesses need to quickly fill gaps and stop just simply firefighting. Using artificial intelligence and strategic managed services partners are ways to ensure organizations are protected and can mitigate threats before the attack occurs. And that's what our latest offering addresses." Ken Morford, Vice President of Security at Fusion Connect Fusion Connect plans to continue expanding its comprehensive security portfolio to empower CISOs to gain the control, visibility, and speed needed to thwart cyber threats and keep their networks and organizations secure. About Fusion Connect Fusion Connect manages, orchestrates, and secures the critical technology infrastructure that enables the connected enterprise. We tailor our highly available and secure cloud communication, collaboration, security, and network management platforms to meet the unique needs of our mid-market and enterprise customers. Our AI-based management systems, along with our highly skilled technicians, dynamically ensure world-class application performance under any conditions.

Read More

PLATFORM SECURITY

Sophos Announces Sophos X-Ops

Sophos | July 21, 2022

Sophos, a global leader in next-generation cybersecurity, today announced Sophos X-Ops, a new cross-operational unit linking SophosLabs, Sophos SecOps and Sophos AI, three established teams of cybersecurity experts at Sophos, to help organizations better defend against constantly changing and increasingly complex cyberattacks. Sophos X-Ops leverages the predictive, real-time, real-world, and deeply researched threat intelligence from each group, which, in turn, collaborate to deliver stronger, more innovative protection, detection and response capabilities. Sophos today is also issuing “OODA: Sophos X-Ops Takes on Burgeoning SQL Server Attacks,” research about increased attacks against unpatched Microsoft SQL servers and how attackers used a fake downloading site and grey-market remote access tools to distribute multiple ransomware families. Sophos X-Ops identified and thwarted the attacks because the Sophos X-Ops teams combined their respective knowledge of the incidents, jointly analyzed them, and took action to quickly contain and neutralize the adversaries. “Modern cybersecurity is becoming a highly interactive team sport, and as the industry has matured, necessary analysis, engineering and investigative specializations have emerged. Scalable end-to-end operations now need to include software developers, automation engineers, malware analysts, reverse engineers, cloud infrastructure engineers, incident responders, data engineers and scientists, and numerous other experts, and they need an organizational structure that avoids silos,” said Joe Levy, chief technology and product officer, Sophos. “We’ve unified three globally recognized and mature teams within Sophos to provide this breadth of critical, subject matter and process expertise. Joined together as Sophos X-Ops, they can leverage the strengths of each other, including analysis of worldwide telemetry from more than 500,000 customers, industry-leading threat hunting, response and remediation capabilities, and rigorous artificial intelligence to measurably improve threat detection and response. Attackers are often too organized and too advanced to combat without the unique combined expertise and operational efficiency of a joint task force like Sophos X-Ops.” Speaking in March 2022 to the Detroit Economic Club about the FBI partnering with the private sector to counter the cyber threat, FBI Director Christopher Wray said, “What partnership lets us do is hit our adversaries at every point, from the victims’ networks back all the way to the hackers’ own computers, because when it comes to the FBI’s cyber strategy, we know trying to stand in the goal and block shots isn’t going to get the job done. “We’re disrupting three things: the threat actors, their infrastructure and their money. And we have the most durable impact when we work with all of our partners to disrupt all three together.” Sophos X-Ops is taking a similar approach: gathering and operating on threat intelligence from its own multidisciplinary groups to help stop attackers earlier, preventing or minimizing the harms of ransomware, espionage or other cybercrimes that can befall organizations of all types and sizes, and working with law enforcement to neutralize attacker infrastructure. While Sophos’ internal teams already share information as a matter of course, the formal creation of Sophos X-Ops drives forward a faster, more streamlined process necessary to counter equally fast-moving adversaries. “Effective cybersecurity requires robust collaboration at all levels, both internally and externally; it is the only way to discover, analyze and counter malicious cyber actors at speed at scale. Combining these separate teams into Sophos X-Ops shows that Sophos understands this principle and is acting on it.” Michael Daniel, president and CEO, Cyber Threat Alliance Sophos X-Ops also provides a stronger cross-operational foundation for innovation, an essential component of cybersecurity due to the aggressive advancements in organized cybercrime. By intertwining the expertise of each group, Sophos is pioneering the concept of an artificial intelligence (AI) assisted Security Operations Center (SOC), which anticipates the intentions of security analysts and provides relevant defensive actions. In the SOC of the future, Sophos believes this approach will dramatically accelerate security workflows and the ability to more quickly detect and respond to novel and priority indicators of compromise. “The adversary community has figured out how to work together to commoditize certain parts of attacks while simultaneously creating new ways to evade detection and taking advantage of weaknesses in any software to mass exploit it. The Sophos X-Ops umbrella is a noted example of stealing a page from the cyber miscreants’ tactics by allowing cross-collaboration amongst different internal threat intelligence groups,” said Craig Robinson, IDC research vice president, Security Services. “Combining the ability to cut across a wide breadth of threat intelligence expertise with AI assisted features in the SOC allows organizations to better predict and prepare for imminent and future attacks.” About Sophos Sophos is a worldwide leader in next-generation cybersecurity, protecting more than 500,000 organizations and millions of consumers in more than 150 countries from today’s most advanced cyberthreats. Powered by threat intelligence, AI and machine learning from SophosLabs and SophosAI, Sophos delivers a broad portfolio of advanced products and services to secure users, networks and endpoints against ransomware, malware, exploits, phishing and the wide range of other cyberattacks. Sophos provides a single integrated cloud-based management console, Sophos Central – the centerpiece of an adaptive cybersecurity ecosystem that features a centralized data lake that leverages a rich set of open APIs available to customers, partners, developers, and other cybersecurity vendors. Sophos sells its products and services through reseller partners and managed service providers (MSPs) worldwide.

Read More