DATA SECURITY, PLATFORM SECURITY, SOFTWARE SECURITY

BeyondTrust and NCS Partner to Strengthen Cybersecurity Posture for APAC Organisations

BeyondTrust | September 19, 2022 | Read time : 02:50 min

BeyondTrust
BeyondTrust, the leader in intelligent identity and access security, announced today a new strategic partnership with NCS Group, a leading technology services firm that provides services and solutions in consulting, digital, technology, cybersecurity and more. A strong player in identity security, NCS will be using the technology provided by BeyondTrust to offer companies best practice solutions in Privileged Access Management (PAM), a core component of enabling Zero Trust security.

Organisations today are evolving as a result of digital transformation, an accelerating shift to cloud, and an expanded remote workforce. However, these changes are also creating an increase in vulnerable endpoints and remote access, as well as a large number of digital identities that pose a significant cybersecurity risk if left unmanaged and unsecured. According to Gartner, unauthorised privileged access is now the primary method that threat attackers use to infiltrate an organisation's systems and network.

"From the rise of ransomware to an increased focus on digital transformation and Zero Trust strategies, it is a critical time for organisations to be equipped with solutions that can secure identities, safeguard access for remote employees, and strengthen endpoint security across hybrid environments. "Through this partnership, BeyondTrust and NCS will enable organisations in Asia Pacific with our Privileged Access Management (PAM) solutions to address these cybersecurity challenges."

Ben Wong, Director of Channel and Alliance for Asia Pacific & Japan at BeyondTrust

"When organisations think of access management, they may only think of traditional password management – and that should not be the case. There is an urgent need for organisations to implement more advanced endpoint security and access management solutions and many are still playing catch up in this area," said Mr. Wong. "This partnership with NCS enables us to provide tailored PAM solutions to customers across a wide range of industries from government to the commercial sectors. Combining the skills and experience of NCS with BeyondTrust's leading portfolio of PAM solutions will help their customers defend against the evolving threat landscape."

BeyondTrust is a leader in the 2022 Gartner Magic Quadrant for PAM for the fourth year running, with a comprehensive PAM portfolio that enables identity and access security that is monitored, managed, secured, and just-in-time, and includes these solutions::

  • Privileged Password Management
  • Secure Remote Access
  • Endpoint Privilege Management
  • Cloud Security Management

About NCS Group
NCS, a subsidiary of Singtel Group, is a leading technology services firm with presence in Asia Pacific and partners with governments and enterprises to advance communities through technology. Combining the experience and expertise of its 10,000-strong team across 55 specialisations, NCS provides differentiated and end-to-end technology services to clients with its NEXT capabilities in digital, cloud and platforms, as well as core offerings in application, infrastructure, engineering and cybersecurity. NCS also believes in building a strong partner ecosystem with leading technology players, research institutions and start-ups to support open innovation and co-creation. For more information, visit ncs.co.

About BeyondTrust
BeyondTrust is the worldwide leader in intelligent identity and access security, empowering organisations to protect identities, stop threats, and deliver dynamic access to empower and secure a work-from-anywhere world. Our integrated products and platform offer the industry's most advanced privileged access management (PAM) solution, enabling organizations to quickly shrink their attack surface across traditional, cloud and hybrid environments.

Spotlight

With the vast majority of data breaches due to compromised user credentials, it is not enough to simply encrypt information. Access to encrypted data through the StratoKey gateway is constantly analyzed and profiled to detect a vast array of threats and anomalies."

Spotlight

With the vast majority of data breaches due to compromised user credentials, it is not enough to simply encrypt information. Access to encrypted data through the StratoKey gateway is constantly analyzed and profiled to detect a vast array of threats and anomalies."

Related News

DATA SECURITY,PLATFORM SECURITY,SOFTWARE SECURITY

Palo Alto Networks Announces Medical IoT Security to Protect Connected Devices Critical to Patient Care

Palo Alto Networks | December 05, 2022

As healthcare providers use digital devices such as diagnostic and monitoring systems, ambulance equipment, and surgical robots to improve patient care, the security of those devices is as important as their primary function. Today, Palo Alto Networks (NASDAQ: PANW) announced Medical IoT Security — the most comprehensive Zero Trust security solution for medical devices — enabling healthcare organizations to deploy and manage new connected technologies quickly and securely. Zero Trust is a strategic approach to cybersecurity that secures an organization by eliminating implicit trust by continuously verifying every user and device. "The proliferation of connected medical devices in the healthcare industry brings a wealth of benefits, but these devices are often not well secured. For example, according to Unit 42, an alarming 75% of smart infusion pumps examined on the networks of hospitals and healthcare organizations had known security gaps. "This makes security devices an attractive target for cyberattackers, potentially exposing patient data and ultimately putting patients at risk." Anand Oswal, senior vice president of products, network security at Palo Alto Networks While a Zero Trust approach is critical to help protect medical devices against today's innovative cyberthreats, it can be hard to implement in practice. Through automated device discovery, contextual segmentation, least privilege policy recommendations and one-click enforcement of policies, Palo Alto Networks Medical IoT Security delivers a Zero Trust approach in a seamless, simplified manner. Medical IoT Security also provides best-in-class threat protection through seamless integration with Palo Alto Networks cloud-delivered security services, such as Advanced Threat Prevention and Advanced URL Filtering. The new Palo Alto Networks Medical IoT Security uses machine learning (ML) to enable healthcare organizations to: Create device rules with automated security responses: Easily create rules that monitor devices for behavioral anomalies and automatically trigger appropriate responses. For example, if a medical device that typically only sends small amounts of data unexpectedly begins to use a lot of bandwidth, the device can be cut off from the internet and security teams can be alerted. Automate Zero Trust policy recommendations and enforcement: Enforce recommended least-privileged access policies for medical devices with one click using Palo Alto Networks Next-Generation Firewalls or supported network enforcement technologies. This eliminates error-prone and time-consuming manual policy creation and scales easily across a set of devices with the same profile. Understand device vulnerabilities and risk posture: Access each medical device's Software Bill of Materials (SBOM) and map them to Common Vulnerability Exposures (CVEs). This mapping helps identify the software libraries used on medical devices and any associated vulnerabilities. Get immediate insights into the risk posture of each device, including end-of-life status, recall notification, default password alert and unauthorized external website communication. Improve compliance: Easily understand medical device vulnerabilities, patch status and security settings, and then get recommendations to bring devices into compliance with rules and guidelines, such as the Health Insurance Portability Accountability Act (HIPAA), General Data Protection Regulation (GDPR), and similar laws and regulations. Verify network segmentation: Visualize the entire map of connected devices and ensure each device is placed in its designated network segment. Proper network segmentation can ensure a device only communicates with authorized systems. Simplify operations: Two distinct dashboards allow IT and biomedical engineering teams to each see the information critical to their roles. Integration with existing healthcare information management systems, like AIMS and Epic Systems, helps automate workflows. Healthcare organizations are using Palo Alto Networks products to secure the devices that deliver cutting-edge care to millions of patients all over the world. "Establishing and maintaining acute situational awareness of the Internet of Medical Things (IoMT) environment is paramount to establishing an effective enterprise cybersecurity program. The ability to accurately detect, identify and respond to cyber threats is critical to ensuring minimal operational impact to clinical operations during a cyber event," said Tony Lakin, CISO, Moffitt Cancer Center. "Palo Alto Networks IoT capability seamlessly integrates with our continuous monitoring processes and threat-hunting operations. The platform consistently provides my teams with actionable information to allow them to proactively manage the threat surface of our medical device portfolio." "With thousands of devices to manage, healthcare environments are extremely complex and require intelligent security solutions capable of doing more. Palo Alto Networks understands this requirement and is leveraging machine learning (ML) for Medical IoT security. Adding intelligence will enable providers to improve operational efficiency, which will enhance patient and practitioner experience and alleviate the burden of an ongoing IT skills shortage," said Bob Laliberte, principal analyst, ESG. "Healthcare providers continue to be high-value targets for attackers. This reality, combined with the diversity of medical IoT devices and their inherent vulnerabilities, points to a real need for device security that is purpose-built for healthcare use cases. The ability to defend against threats targeting critical care devices while maintaining operational availability and strengthening the alignment of device governance responsibilities between IT and Biomed engineering teams is quickly becoming a necessity for the protection of patient data and lives," said Ed Lee, research director, IoT and Intelligent Edge Security, IDC. About Palo Alto Networks Palo Alto Networks is the world's cybersecurity leader. We innovate to outpace cyberthreats, so organizations can embrace technology with confidence. We provide next-gen cybersecurity to thousands of customers globally, across all sectors. Our best-in-class cybersecurity platforms and services are backed by industry-leading threat intelligence and strengthened by state-of-the-art automation. Whether deploying our products to enable the Zero Trust Enterprise, responding to a security incident, or partnering to deliver better security outcomes through a world-class partner ecosystem, we're committed to helping ensure each day is safer than the one before. It's what makes us the cybersecurity partner of choice.

Read More

DATA SECURITY,PLATFORM SECURITY,SOFTWARE SECURITY

Keeper Security Announces StateRAMP Authorization

Keeper Security | December 08, 2022

Keeper Security, the leading provider of zero-trust and zero-knowledge cybersecurity software protecting passwords, secrets and connections, today announced that the company has obtained StateRAMP Authorization at the Moderate Impact Level for its Keeper Security Government Cloud (KSGC). The nationwide StateRAMP cybersecurity verification program promotes the adoption of secure cloud services across state and local governments by providing a standardized approach to security and risk assessment for cloud technologies. StateRAMP Authorization differentiates KSGC from its competitors as the best in class zero-trust and zero-knowledge security solution for state and local governments, as well as higher-educational institutions, to protect their passwords, data, and secrets. StateRAMP Authorization enables these governments and organizations to accelerate the adoption of cloud computing by creating transparent standards and processes for security authorizations. It allows them to leverage Keeper's password management and cybersecurity platform on an institution-wide scale with confidence that the solution meets strict standardized security requirements. KSGC is hosted in AWS GovCloud (US), designed to host sensitive data, regulated workloads, and address the most stringent security and compliance requirements. Keeper's StateRAMP Authorization comes on the heels of KSGC achieving FedRAMP Authorization at the Moderate Impact Level in August 2022. While StateRAMP Authorization typically takes two years to complete, KSGC's existing FedRAMP Authorization accelerated the certification. To receive FedRAMP Authorization, organizations must implement controls from 17 different control families that originate from National Institute of Standards and Technology Special Publication 800-53. Now, KSGC is the first and only FedRAMP and StateRAMP Authorized password management platform in the industry. "We are proud to bring Keeper's password management and cybersecurity platform to StateRAMP Authorized status, and thrilled to be the first FedRAMP and StateRAMP Authorized password management platform. "KSGC's StateRAMP Authorization underscores our dedication to the highest standards of internal security controls and encryption. Keeper is eager to help state and local governments and higher-educational institutions protect their digital assets from ransomware, data breaches and other password-related cyberattacks." Darren Guccione, CEO and Co-Founder of Keeper Security Keeper provides government agencies with a human-centric cybersecurity solution that promotes adoption of password best practices, like the use of MFA, by employees and contractors. Keeper also promotes secure collaboration with encrypted record sharing that allows system administrators to regulate privileged access to files, as well as masking credentials. Keeper's zero-knowledge system architecture provides the highest levels of security and privacy. Encryption and decryption of data always occurs locally on the user's device, and only the encrypted ciphertext is stored in KSGC. KSGC's FedRAMP and StateRAMP Authorizations follow a White House Executive Order mandating zero-trust architecture and strong encryption, along with a draft memorandum by the Office of Management and Budget and the Cybersecurity and Infrastructure Security Agency mandating all federal agencies adopt a zero-trust security architecture by 2024. The memorandum specifically calls out password security requirements that KSGC facilitates, including strong password policies, the removal of a deprecated requirement to require special characters and regular password rotation, and the ability to compare user passwords against weak and breached data. About Keeper Security Keeper Security is transforming the way organizations of all sizes secure their passwords, secrets and confidential information. Keeper's easy-to-use cybersecurity platform is built on a foundation of zero-trust and zero-knowledge security to protect every user on every device, while meeting the most stringent government security and compliance requirements. Keeper is SOC 2 and ISO 27001 certified, FIPS 140-2 validated, FedRAMP and StateRAMP Authorized. Trusted by federal agencies including the Departments of Justice and Energy, Keeper is the leader for best-in-class password management, secrets management, privileged access, secure remote access and encrypted messaging.

Read More

DATA SECURITY, PLATFORM SECURITY, SOFTWARE SECURITY

SentinelOne and Perception Point Partner for Unparalleled Advanced Threat Protection and Rapid Remediation Across Principal Attack Vectors

Perception Point | September 30, 2022

Perception Point, a leading provider of advanced threat protection across digital channels, today announced that it has partnered with SentinelOne, an autonomous cybersecurity platform company, to provide customers unparalleled advanced threat detection and rapid remediation across enterprise endpoints, email, and cloud collaboration channels. SentinelOne Singularity XDR unifies prevention, detection, and response into a single platform driven by patented machine learning and intelligent automation. Perception Point isolates, detects and remediates all threats across the organization's main attack vectors, including email and cloud collaboration channels, from a single platform. Perception Point's integration with SentinelOne offers users the unique ability to simplify and consolidate protection across these attack vectors, and rapidly remediate any threat autonomously across them. Joint customers benefit from: Rapid remediation with additional triage from Perception Point's managed Incident Response service Reduced workloads on the SOC team by up to 75%, simplifying and shortening containment time Full visibility into attacks across the endpoint, email, and cloud collaboration apps "The threat landscape is only becoming more complex with attacks threatening organizations across multiple vectors. "We're excited to partner with SentinelOne to protect users from all threat types across their most used communication channels - endpoints, email, cloud collaboration apps, and cloud storage. The integration consolidates and simplifies threat prevention and remediation, boosting our customers' security posture while reducing the SOC team's workloads." Orit Shilvock, VP Sales at Perception Point "SentinelOne is committed to enabling choice and flexibility for our customers with Singularity Marketplace," said Ruby Sharma, Head of Technology Ecosystem, SentinelOne. "Partnering with Perception Point brings together leading detection and response capabilities to address threats across endpoint, email, cloud and collaboration attack surfaces." Perception Point's advanced threat protection solution is now available on the SentinelOne Singularity Marketplace. About Perception Point Perception Point is a Prevention-as-a-Service company for the fastest and most accurate next-generation detection and response to all attacks across email, cloud collaboration channels, and web browsers. The solution's natively integrated incident response service acts as a force multiplier to the SOC team, reducing management overhead, improving user experience and delivering continuous insights; providing proven best protection for all organizations. Deployed in minutes, with no change to the enterprise's infrastructure, the patented, cloud-native and easy-to-use service replaces cumbersome legacy systems to prevent phishing, BEC, spam, malware, Zero-days, ATO, and other advanced attacks well before they reach end-users. Fortune 500 enterprises and organizations across the globe are preventing content-borne attacks across their email and cloud collaboration channels with Perception Point. About SentinelOne SentinelOne is pioneering autonomous cybersecurity to prevent, detect, and respond to cyber attacks faster and with higher accuracy than ever before. Our Singularity XDR platform protects and empowers leading global enterprises with real-time visibility into attack surfaces, cross-platform correlation, and AI-powered response. Achieve more capability with less complexity.

Read More