DATA SECURITY

Balbix Extends Cyber Security Posture Automation to AWS

Balbix | November 02, 2021

Balbix, provider of the world's leading platform for cybersecurity posture automation, announced today the general availability of the Balbix Connector for AWS. As a result of the new offering, customers gain a comprehensive inventory of their assets spanning on-premises and cloud as well as the ability to discover, prioritize and mitigate unseen risks, including unpatched software vulnerabilities, weak credentials, missing or poor encryption, trust issues and cloud infrastructure misconfigurations.

A surge in cloud adoption has made modern IT environments more complex and increased the enterprise attack surface. While gains have been made in cloud security, visibility remains siloed. Proactive cybersecurity tools are typically split into on-premises and cloud silos, making it extremely difficult to get a consolidated view into both environments. In addition, the ability to identify and address the most pressing risks requires the assistance of automation to successfully scale.

Improved AWS Security Posture Management
The new Connector for AWS provides support for the most popular AWS Cloud services including core services like Amazon Elastic Compute Cloud (Amazon EC2), Amazon Simple Storage Service (Amazon S3), and AWS Identity and Access Management (IAM); database and container services like Amazon Relational Database Service (Amazon RDS), and Amazon Elastic Kubernetes Service (Amazon EKS); and analytics services like Amazon OpenSearch Service. As a result, teams overseeing security of their AWS environments can:
  • Get comprehensive visibility into cloud assets and accurately categorize them into compute, storage, network, and containers
  • Discover exposure to common cloud attack vectors, especially misconfigurations – the most exploited attack vector for the cloud
  • Measure risks in terms of the likelihood and monetary impact of them being exploited in order to prioritize risks for remediation and report on the overall security posture

Visibility Across the Entire Network
With the addition of the Connector for AWS, Balbix merges cloud and on-premises visibility in one view, eliminating the need for security practitioners to look through multiple dashboards and allowing them to work more productively.

"With a significant portion of our IT infrastructure already running in AWS alongside a longer-term cloud-first strategy to migrate most workloads to the cloud, the addition of the Balbix Connector for AWS enables us to drive down risk comprehensively across our enterprise," said Nate Miller, Senior IT Manager, Global Cyber Security and IT Compliance at Cooper-Standard. "However, we know some critical IT infrastructure will remain on-premises. The unified visibility provided by Balbix is key to enable our cyber security teams to make the best decisions for the business and most efficiently minimize the risk of breach."

Advanced Risk Analysis
AWS data is analyzed using purpose-built AI algorithms to produce a comprehensive view of cyber-risk for organizational cloud assets, along with relevant context and recommended action items. Risk is measured in dollars, which provides a common language that organizations can use to prioritize projects, spending and track the effectiveness of their overall cybersecurity program.

"Traditionally, cyber posture tools have been siloed, only offering views for cloud or on-premises, never both,We are excited to introduce the Balbix Connector for AWS to break down the siloed approach and offer AWS customers a holistic view of their overall corporate risk, along with new insights to manage security under the shared responsibility model."

Gaurav Banga, CEO at Balbix

About Balbix
Balbix is the world's leading platform for cybersecurity posture automation. Using Balbix, organizations can discover, prioritize and mitigate unseen risks and vulnerabilities at high velocity. With seamless data collection and petabyte-scale analysis capabilities, Balbix is deployed and operational within hours, and helps to decrease breach risk immediately. Balbix counts many global 1000 companies among its rapidly growing customer base and was named a "Cool Vendor" by Gartner in 2018.

Spotlight

Traditional security approaches, such as perimeter-based and role-based security, tend to lockdown everything by default, which limits legitimate data usage and frustrates business users. Above all, they cannot stop data breaches. Businesses need to embrace risk assessment approach and security must become data-centric. This whi

Spotlight

Traditional security approaches, such as perimeter-based and role-based security, tend to lockdown everything by default, which limits legitimate data usage and frustrates business users. Above all, they cannot stop data breaches. Businesses need to embrace risk assessment approach and security must become data-centric. This whi

Related News

DATA SECURITY

Combating industrial cyber threats with new security certifications and products, Rockwell Automation

businesswire | November 19, 2020

Organizations keep on requiring help making sure about their modern activities as they associate creation and IT frameworks and battle with cyberthreats focusing on mechanical control frameworks. To address this issue, Rockwell Automation keeps extending its cybersecurity accreditations and joining progressed security capacities into a greater amount of its items. Rockwell Automation as of late got confirmation to the IEC (International Electrotechnical Commission) 62443-3-3 cybersecurity standard. The accreditation, performed by outsider TÜV Rheinland, implies Rockwell Automation has exhibited the capacity to introduce and arrange creation frameworks to meet security prerequisites to level 1 as characterized on the planet's driving worldwide norm. Rockwell Automation offers reference designs for executing an ensured creation framework, for example, PlantPAx 5.0, the cutting edge disseminated control framework (DCS) for plantwide measure control. The structures were created to assist clients with guaranteeing creation frameworks while limiting the need to purchase new advancements as a component of the cycle. Until now, Rockwell Automation has gotten a few confirmations for the IEC 62443 arrangement of norms. Rockwell Automation likewise as of late got confirmation for the ISO (International Organization for Standardization) 27001 norm, affirming that the organization's data security the board framework used to ensure information fulfills the guideline's prerequisites. This can give significant serenity to clients that Rockwell Automation is utilizing best practices to secure their licensed innovation, for example, when clients use administrations like distant help and observing. “Companies are facing the dual challenge of digital transformation to stay competitive, while also keeping their people, operations and intellectual property secure,” said Sujeet Chand, senior vice president and chief technology officer, Rockwell Automation. “We continue to aggressively expand our cybersecurity skills, certifications, product capabilities and services in ways that help our customers stay ahead of new threats and focus on realizing new possibilities with digital transformation.” Notwithstanding procuring the new confirmations, Rockwell Automation is additionally delivering new items with CIP Security to assist organizations with making sure about their correspondences. Created by the worldwide exchange and standard improvement association ODVA, CIP Security is the simply standard intended to make sure about correspondences between modern control frameworks and different gadgets on an EtherNet/IP organization. New modern control items offering CIP Security include: Allen-Bradley PowerFlex 755T AC drives Kinetix 5300 servo drives Other Rockwell Automation items that as of now uphold CIP Security include: ControlLogix 5580 regulators Kinetix 5700 servo drives 1756-EN4TR correspondence module To help ensure the numerous gadgets being used today that don't uphold CIP Security, Rockwell Automation is additionally presenting the new CIP Security Proxy gadget. At the point when utilized in a truly made sure about area, the gadget gives CIP Security to a wide scope of modern control gadgets and make safer mechanical organizations. About Rockwell Automation Rockwell Automation, Inc. , is a global leader in industrial automation and digital transformation. We connect the imaginations of people with the potential of technology to expand what is humanly possible, making the world more productive and more sustainable. Headquartered in Milwaukee, Wisconsin, Rockwell Automation employs approximately 23,000 problem solvers dedicated to our customers in more than 100 countries. To learn more about how we are bringing The Connected Enterprise to life across industrial enterprises.

Read More

DATA SECURITY

BitSight and Glass Lewis Partner to Expand Investor Understanding of Cybersecurity

BitSight | September 28, 2021

BitSight, the standard in security ratings, and Glass Lewis, the leading provider of independent global governance solutions, today announced a strategic partnership to include critical cybersecurity information – comprised of BitSight Security Ratings, data, and insights – with Glass Lewis' Proxy Paper research reports. Information on 20,000+ companies will be included in an effort to help investors better understand how cybersecurity issues may affect their investments. Investor concerns around environmental, social, and governance issues continue to rise, leading to closer examinations of management and board effectiveness in addressing these challenges. Failure to adequately manage cyber risk can materially impact a company's revenue and financial performance. BitSight's Security Ratings and data will supply Glass Lewis clients with data-driven, evidence-based cybersecurity intelligence, which, in turn, will provide new visibility into a dimension of company performance and governance. Investors are mostly in the dark when it comes to the cybersecurity of their investments.Providing Glass Lewis clients with BitSight ratings and data alongside its proxy research reports will deliver the insights necessary to have an enhanced understanding of the efficacy of a company's oversight of cybersecurity risks and outcomes. It's a new era in informing investors about cyber risks. Steve Harvey, BitSight's chief executive officer. "The BitSight Security Rating and insights will allow our clients to identify cyber risk exposure, potentially minimizing both reputational risk and long-term financial losses," said Dan Concannon, Glass Lewis Chief Commercial Officer. "We are excited to include the industry's most respected and widely leveraged Security Rating in our Proxy Paper research reports allowing our clients to address this rapidly expanding risk." The landscape of governance, especially as it pertains to cyber controls, is changing rapidly and institutions from the United Nations to the Securities and Exchange Commission (SEC) are increasingly focused on market transparency for global investors. Beginning in 2011 with its landmark cybersecurity guidance, the SEC has signaled that cybersecurity is a material business risk requiring consistent, adequate disclosure. The SEC created a cyber enforcement unit in 2017, updated guidance in 2018, and recently levied a series of fines at companies over inadequate disclosures of cybersecurity issues. Over 1,300 clients, including most of the world's largest pension plans, mutual funds, and asset managers who collectively manage over $40 trillion in assets, use Glass Lewis' research and technology solutions to inform and facilitate their corporate governance activities. About BitSight BitSight is transforming the way that the global marketplace addresses cyber risk with cybersecurity ratings and analytics. The BitSight Security Ratings Platform applies sophisticated algorithms, producing daily security ratings that range from 250 to 900, to help organizations manage their own security performance; mitigate third party risk; underwrite cyber insurance policies; conduct financial diligence; and improve national security. With 2,300 global customers and the largest ecosystem of users and information, BitSight is the Standard in Security Ratings. About Glass Lewis: Glass Lewis is the leading provider of independent global governance solutions. We enable institutional investors and publicly listed companies to make sustainable decisions based in research and data. We cover 30,000+ meetings each year, across approximately 100 global markets. Our customers include the majority of the world's largest pension plans, mutual funds, and asset managers who collectively manage over $40 trillion in assets. Our core solutions include Proxy Paper proxy research and Viewpoint proxy vote management platform.

Read More

DATA SECURITY

Vectra AI Reveals Cybersecurity Blind Spots in PaaS and IaaS Environments with Security Survey

Vectra AI | August 06, 2021

Vectra AI, a leader in threat detection and response, today released the findings of the PaaS & IaaS Security Survey Report. The report compiled the answers of 317 IT executives all using AWS, 70% coming from organizations of 1,000+ employees. The findings show a rapid expansion and reliance on AWS services while simultaneously showcasing security blind spots within many organizations. As digital transformation efforts continue, the survey found that AWS is becoming an even more critical component to organizations who are regularly deploying new workloads, leveraging deployments in multiple regions and are relying on more than one AWS service. The survey found: 64% of DevOps respondents are deploying new workload services weekly or even more frequently 78% of organizations are running AWS across multiple regions (40% in at least three) 71% of respondents say that they are using more than four AWS services (such as S3, EC2, IAM, etc.) The expansion of AWS services has naturally led to increased complexity and risk with 100% of companies surveyed having experienced at least one security incident in their public cloud environment. Gartner anticipated that over 99% of cloud breaches will have a root cause of customer misconfiguration. Some blind spots the Vectra report uncovered include: 30% of organizations surveyed have no formal sign-off before pushing to production 40% of respondents say they do not have a DevSecOps workflow 71% of organizations say that 10 or more people can modify the entire infrastructure in their AWS environments, creating numerous attack vectors for hackers. Despite these blind spots, the survey showed that companies are taking security seriously. Over half of the companies reported having double-digit security operations center (SOC) headcounts, showing a significant investment in keeping their organizations secure. "Securing the cloud with confidence is nearly impossible due to its ever-changing nature," said Matt Pieklik, Senior Consulting Analyst at Vectra. "To address this, companies need to limit the number of attack vectors malicious actors are able to take. This means creating formal sign-off processes, creating DevSecOps workflows and limiting the number of people that have access to their entire infrastructure as much as possible. Ultimately, companies need to provide security holistically, across regions and automate as many activities as possible to enhance their effectiveness." Vectra has answered this industry need through the creation of Detect for AWS which reduces risk of cloud services being exploited, detects threats against AWS services, and automatically responds to attacks against applications running in AWS. To learn more about the threats facing today's organizations you can download the full Paas & IaaS Security Survey Report or read our companion blog. About Vectra Vectra is the leader in threat detection and response – from cloud and data center workloads to user and IoT devices. Its Cognito® platform accelerates threat detection and investigation using AI to enrich network metadata it collects and stores with the right context to detect, hunt and investigate known and unknown threats in real time. Vectra offers four applications on the Cognito platform to address high-priority use cases. Cognito Stream™ sends security-enriched metadata to data lakes and SIEMs. Cognito Recall™ is a cloud-based application to store and investigate threats in enriched metadata. Cognito Detect™ uses AI to reveal and prioritize hidden and unknown attackers at speed. And Cognito Detect for Office 365 and Azure AD™ finds and stops attacks in enterprise SaaS applications and the Microsoft 365 ecosystem.

Read More