NETWORK THREAT DETECTION

Axonius Integrates with the New, Enhanced Amazon Inspector to Deliver Comprehensive Cyber Asset Attack Surface Management

Axonius | December 06, 2021

Axonius, a leader in cybersecurity asset management, today announced an integration with the new Amazon Inspector, an automated security assessment service. The integration will enable mutual customers to better understand and manage vulnerabilities across their Amazon Web Services (AWS) infrastructure.

Amazon Inspector is a vulnerability management service that continually scans AWS workloads for software vulnerabilities and unintended network exposure. The solution automatically discovers all running Amazon Elastic Compute Cloud (Amazon EC2) instances and container images residing in Amazon Elastic Container Registry (Amazon ECR), at any scale, and immediately starts assessing them for known vulnerabilities. Because Axonius delivers a complete inventory of assets from many correlated data sources, customers can gain a comprehensive view of their cloud security posture, including vulnerability data found from Amazon Inspector.

"Customers are burdened by the increasing number of security tools to protect the sprawl of cloud, physical, and virtual assets in their environments,It's not easy for them to surface which assets are not covered by their security controls that should be, or if they are covered, whether the control is actually working. Customers are exhausted with the highly manual, slow, and error-prone processes that negatively impact their risk mitigation, threat management, and compliance. With Axonius, customers can get a unified view of their assets and dramatically accelerate the process of strengthening security posture across all of their assets.”

Mark Daggett, vice president of worldwide channels and alliances, Axonius

Comprehensively Track and Assess the Security of AWS Assets: In just a few clicks, the Axonius Query Wizard can identify any AWS assets that have not been assessed with Amazon Inspector. Customers can also easily search for a set of assets based on their last scan time, or segment AWS assets with known vulnerabilities by common vulnerabilities and exposures (CVE) severity, CVE ID, and more. It can also be used to track the Amazon Inspector usage and coverage.

Manage Vulnerabilities Within a Broader Context: Beyond simply identifying known vulnerabilities, Axonius delivers correlated data from tools such as endpoint detection and response, privilege access management, and more to help cloud security, DevOps, and security operations teams prioritize which vulnerabilities to remediate first. With an endless backlog of vulnerabilities to manage, this level of context is imperative to helping teams mitigate the vulnerabilities that are more likely to be exploited, or that would have the most impact if exploited.

Improve Cloud Compliance Based on Industry Benchmarks: Customers can also ensure that their AWS assets adhere to security best practices, such as the CIS AWS Foundations Benchmark. Using Axonius and Amazon Inspector, cloud security teams can prioritize which assets pose the most risk due to any detected vulnerability or deviation from security standards and best practices.

“To be effective, security and DevOps teams need to prioritize vulnerability remediation based on business impact”, said Michael Fuller, director of product management, AWS Security Services. “With the new Amazon Inspector, we’ve dramatically simplified continuous and automated vulnerability assessment for customers across their entire organization, whether they have one AWS account or five thousand. The Axonius integration then brings developers more contextual asset data to help prioritize vulnerability remediation.”

About Axonius
Axonius is the cybersecurity asset management platform that gives organizations a comprehensive asset inventory, uncovers gaps, and automatically validates and enforces policies. Deployed in minutes, the Axonius cyber asset attack surface management (CAASM) solution integrates with hundreds of data sources to give customers the confidence to control complexity by mitigating threats, navigating risk, decreasing incidents, automating response actions, and informing business-level strategy. Cited as one of the fastest growing cybersecurity startups, with accolades from CNBC, Forbes, and Fortune, Axonius covers millions of devices for customers around the world.

Spotlight

Security is a tricky investment. How much is enough? Even after securing the organization, are you ever really secure? Every IT professional knows that WITH enough time and money, it is possible to achieve your goals. However, rarely are either of these resources plentiful. Add to these typical constraints, a growing challenge to find qualified security experts, and the problem is becoming daunting. Many organizations are at security crossroads. They now understand the importance of having a security program, but have no idea of how to build one or where to start.

Spotlight

Security is a tricky investment. How much is enough? Even after securing the organization, are you ever really secure? Every IT professional knows that WITH enough time and money, it is possible to achieve your goals. However, rarely are either of these resources plentiful. Add to these typical constraints, a growing challenge to find qualified security experts, and the problem is becoming daunting. Many organizations are at security crossroads. They now understand the importance of having a security program, but have no idea of how to build one or where to start.

Related News

DATA SECURITY

eSentire Leverages Guidewire to Quantify and Reduce Cyber Security Risk

eSentire | October 11, 2021

eSentire, recognized globally as the Authority in Managed Detection and Response (MDR), and Guidewire Software, Inc. today announced that eSentire is leveraging Guidewire Cyence’s market-leading, internet-scale cyber data listening and modeling capabilities to support in financially quantifying and reducing cyber risk. Cyber threats pose one of the greatest risks to businesses today, yet it is becoming increasingly harder to identify and protect against those risks and secure insurance coverage,The combination of eSentire and Guidewire Cyence technologies and expertise fill a significant gap to help businesses assess, design, and implement cyber risk solutions and quantify their security ROI and risk reduction. eSentire Chief Technology Officer Dustin Hillard eSentire’s technical cybersecurity expertise in 24/7 threat detection and response to real-time and zero-day threats, combined with Guidewire’s strengths in economic modeling, will enable cybersecurity leaders to tie the efficacy of their security spends to security program return-on-investment. The eSentire Atlas XDR platform, ingesting data from over 1,000 customers across 70 countries worldwide, automatically blocks more than 1 billion threats per year and learns from more than 2 million rapid, human-led investigations per year, yielding a significant proprietary data set that maps internal risk factors to security outcomes. Guidewire’s cyber risk modeling and scoring data for more than 600,000 businesses is now integrated with eSentire’s asset risk scoring, providing security recommendations through eSentire’s Insight Portal: Business Risk Scoring: eSentire customers now have access to Guidewire’s Cyence Risk Rating within the eSentire Insight portal. This business risk rating predicts the probability of a public data breach in the next 12 months. Each business risk rating is contextualized based on industry, size, and revenue band in comparison to its segment peers. Asset Risk Scoring: eSentire customers will benefit from eSentire’s own artificial intelligence risk models learned from targeted attacks defended across its global customer base to determine the probability of an internal security incident originating at the asset level over the next three months. eSentire leverages these insights to make proactive security recommendations on how to reduce each customer organization’s risk. The Royal United Services Institute reported that despite ransomware being the leading claim source for cyber insurers, many organizations are not approved due to open internet access, primarily through open Remote Desktop Protocols (RDP). Through their work together, eSentire and Guidewire have identified and remediated several open RDP scenarios, thereby reducing risk and enabling the organizations to improve their cyber insurance risk profile. In fact, eSentire and Guidewire have developed preferred cybersecurity insurance relationships with Guidewire customers that deliver improved deductibles and expansive coverage for eSentire customers. Hillard added, “eSentire customers now have the opportunity to engage with an expert Cyber Risk Advisor to build a proactive security plan tailored to reducing risk in their environment while considering business- and asset-specific insights,” says eSentire Chief Technology Officer Dustin Hillard. “As a result of our work together, we earn the confidence of the insurance market and our customers get improved cyber risk insurance pricing and policy coverage.” “We are thrilled to join eSentire in making tangible, transparent, and quantifiable cyber risk reduction a reality for businesses worldwide,” says Guidewire Chief Innovation Officer Paul Mang. “We are committed to helping organizations manage the economic volatility associated with cyber threats, both through the efficient use of risk transfer insurance solutions and through proactive risk management actions.” This exciting innovation in cyber risk quantification has been complemented by the introduction of eSentire’s Cyber Risk Advisor program as part of the firm’s overall customer success engagement model. These advisors are security practitioners with consultative and solutions architecture experience, who act as an extension of the customer’s cybersecurity team, demonstrating a clear understanding of each organization’s business objectives and security priorities. The Cyber Risk Advisor supports customers with infrastructure assessments, regular service reviews, and interprets risk scoring metrics to develop a tailored risk reduction roadmap with recommendations that prioritize risk mitigation. These recommendations are based on the insights driven from eSentire’s 24/7 Security Operations Center, Threat Response Unit (TRU), and the new Guidewire Cyence Risk Rating integration. About eSentire eSentire, Inc., the Authority in Managed Detection and Response, protecting the critical data and applications of 1000+ organizations in 70+ countries from known and unknown cyber threats. Founded in 2001, the company’s mission is to hunt, investigate and stop cyber threats before they become business-disrupting events. Combining cutting-edge machine learning XDR technology, 24/7 Threat Hunting, and proven security operations leadership, eSentire mitigates business risk and enables security at scale. The Team eSentire difference means enterprises are protected by the best in the business with a named Cyber Risk Advisor, 24/7 access to SOC Cyber Analytics & Elite Threat Hunters, and industry-leading threat intelligence research from eSentire’s Threat Response Unit (TRU). eSentire provides Managed Risk, Managed Detection and Response and Incident Response Services. For more information, visit www.esentire.com and follow @esentire. About Guidewire Software Guidewire is the platform P&C insurers trust to engage, innovate, and grow efficiently. We combine digital, core, analytics, and AI to deliver our platform as a cloud service. More than 450 insurers, from new ventures to the largest and most complex in the world, run on Guidewire. As a partner to our customers, we continually evolve to enable their success. We are proud of our unparalleled implementation track record, with 1,000+ successful projects, supported by the largest R&D team and partner ecosystem in the industry. Our marketplace provides hundreds of applications that accelerate integration, localization, and innovation.

Read More

DATA SECURITY

HUB Security acquires the leading Cyber Security Comsec for NIS 70M

HUB Security | September 30, 2021

HUB Security ("HUB" or the "Company"), announces today the acquisition of Comsec Global for NIS 70 million, of which HUB will pay NIS 40 million in cash and NIS 30 million in its own shares. The Shares consideration are under a share sale lock-up provision for a period of 6 months post closing of the transaction. The main goal of the acquisition is to dramatically increase HUB Security's global sales and distribution infrastructure by over 40 countries, which will enable the Company to more than double its revenues and significantly accelerate penetration of HUB's unique cyber-security solutions in global enterprises. HUB has developed a technology that can cause a paradigm shift in the Cyber Security market, HUB's solution was considered to be the Holy Grail long awaited by governments and enterprises worldwide. The combination between the two companies creates a unique entity that has a strong foundation of global cyber business coupled with an unparalleled growth potential that leverages upon a 40-country sales infrastructure. In our opinion, this is a classic case of 1+1 equals 10 and not two. Mr. Rony Sternbach, Comsec Chairman and controlling shareholder. Comsec is one of the leading companies in Israel's cybersecurity sector. Founded in 1987, the company was a pioneer in data security and now has an extensive customer base spanning over a thousand leading companies in 40 countries across five continents. It operates four consulting and distribution companies and has subsidiaries in the UK and the Netherlands. The company offers a broad spectrum of services to its clients, providing comprehensive solutions in application security, security, and source code testing. These include application lifecycle development consulting, infrastructure security, and communication security. It further provides security auditing via several models; Threat Modeling, penetration tests, Black Box and comprehensive White Box audit Design Review, and more. Comsec's annual sales turnover is approx NIS 120 million. Its customers include banking, insurance, hi-tech, communications, industrial, retail, large-scale infrastructures, and local and central government bodies and ministries. Comsec is a one-stop shop for all their cybersecurity needs. HUB Security was established in 2017 by veterans of the IDF's 8200 and 81 intelligence units. The company specializes in protecting sensitive commercial information and has an advanced encrypted computing solution for companies and organizations aimed at preventing hostile intrusions and the theft of sensitive commercial information. Hub offers cybersecurity solutions to, amongst others, the AI, Fintek, and critical infrastructure sectors. The company employs 400 employees, and its offices are located in Israel and the United States.

Read More

DATA SECURITY

Nozomi Networks Raises the Bar on Delivering Prioritized Actionable Intelligence for OT/IoT Networks to Accelerate Responses to Security Threats

Nozomi Networks | October 27, 2021

Nozomi Networks Inc., the leader in OT and IoT security, today announced new updates in Vantage™, the first cloud-based OT/IoT network security solution that equips security professionals and industrial operators with actionable, AI-driven insights to manage risk and speed precise remediation. The new enhancements help eliminate “alert fatigue” by narrowing down the hundreds of notifications security teams have to parse to determine the severity of vulnerabilities. “With attacks on OT and IoT infrastructure occurring daily, we know that organizations are overwhelmed with prioritizing risk reduction efforts, responding to alerts, and accelerating the detection of malware,The latest release of Vantage is designed to not only detect threats in critical infrastructure but also help prioritize and guide remediation steps quickly and efficiently. Only Vantage can provide these capabilities at the scale of the largest OT and IoT networks in the world.” Andrea Carcano, Co-Founder and Chief Product Officer at Nozomi Networks According to Ponemon Research, 52% of organizations say they are at a disadvantage in responding to vulnerabilities because they use a manual process and 72% say difficulty in prioritizing vulnerabilities contributes to patch delays. ESG Research finds 34% of cyber security professionals reported their biggest vulnerability management challenge is prioritizing which vulnerabilities to remediate. “Nozomi Networks has a proven reputation for continuous innovation and these latest updates only add to it,” said Frost & Sullivan Industry Analyst Danielle VanZandt. “With the explosive growth of IoT devices in industrial environments, now more than ever, security professionals need faster paths to actionable intelligence and tools that support the best possible response. Nozomi Networks has stepped up with a solution that fills the gap.” In this latest upgrade, Nozomi Networks continues to expand vulnerability management automation and intelligence with new prioritization metrics for vulnerability assessments. New Vantage features include: Prioritized Vulnerability Management With the new vulnerability dashboard, operators can quickly visualize all the OT and IoT vulnerabilities in the network, prioritize which vulnerabilities pose the greatest risk, and assess the level of effort to address the issues network-wide. Vantage provides: Actionable insights on remediation steps, patches, and upgrades. Built-in analytics scores that highlight which corrections will have the biggest impact on risk reduction, as well as identify which may be more labor-intensive. In addition to the Vantage vulnerability management process, Vantage leverages an AI-driven threat detection engine that analyzes endpoint and network configurations, traffic flows, and network packet contents to provide the deepest and most sophisticated insights for OT networks in the industry. Customized Playbooks for Precise Response In addition to customizing alerts for specific threats and vulnerabilities, now security professionals have the option to supplement these notifications with custom playbooks designed to guide response plans for each alert. These playbooks: Precisely guide remediation steps for specific threats, simplifying and accelerating operational response. Can be customized to specify workflows for each alert and to address individual customer environments and workflows. Can be shared between organizations. Streamlined Operations With Vantage, security professionals can quickly manage multiple hundreds or thousands of sites with limited resources. The SaaS-based solution is easy to deploy and runs in the cloud, providing near zero-cost setup and ongoing maintenance. Automated analysis and playbooks simplify remediation steps and costs to enable smaller teams to have more visibility across more devices and more sites. Vantage also makes it feasible to share security data with partners, vendors, and other applications from the centralized cloud repository without opening the network up to external users. About Vantage Vantage was designed to meet the rapidly evolving requirements of IoT-enabled infrastructures. The cloud-based OT and IoT network visibility and security solution delivers unmatched security and visibility with the unlimited scalability of SaaS. Vantage makes it possible to grow without limitations to consolidating data aggregation, analysis, and operations. With Vantage you can protect any number of OT, IoT, IT, edge, and cloud assets, located anywhere, with a single platform. About Nozomi Networks Nozomi Networks accelerates digital transformation by protecting the world’s critical infrastructure, industrial and government organizations from cyber threats. Our solution delivers exceptional network and asset visibility, threat detection, and insights for OT and IoT environments.

Read More