XM Cyber | June 28, 2022
XM Cyber, a hybrid cloud security provider, announced the acquisition of Cyber Observer, a pioneer in Continuous Controls Monitoring (CCM) and Cloud Security Posture Management (CSPM). This is XM Cyber's latest growth milestone in a year in which the organization has considerably increased its lead position in the cybersecurity market.
Companies are changing faster than ever before, owing to growing regulation, competition, and consumer expectations. Traditional risk management techniques are no longer cost-effective and are incapable of providing the coverage or speed necessary in a dynamic digital environment. By incorporating XM Cyber's market-leading attack path management with Cyber Observer's continuous control monitoring, security teams will be able to see both their cyber exposures as well as how their existing security controls and identification and response tools can react to these threats at any given time, accurately representing the true risk to the business.
The Cyber Observer platform will be incorporated into XM Cyber's, providing a unified, continuous picture of the vulnerabilities and exposures that put vital assets at risk, as well as the security control gaps that fail to prevent assaults. It will also automate compliance validation and reporting for important standards such as ISO, NIST, GDPR, SWIFT, and PCI.
"Even as awareness of cybersecurity risk continues to grow, attackers are thriving and routinely exploiting attack paths that can be used to move laterally through an enterprise network. Our goal is to give security teams the ability to easily understand and correct their security posture on a continuous basis, including weaknesses, exposures and compensating security controls across the full internal and external attack surface covering on-prem, cloud and SaaS systems. This acquisition is not an isolated event, but just the latest step in our strategy to provide the most comprehensive and proactive security posture management platform on the market."
Noam Erez, co-founder and CEO, XM Cyber
Schwarz Group is the world's fourth largest retailer and a major player in cloud computing. With the establishment of a European cloud, the corporation has expanded fast in the digital area in recent years. Schwarz bought XM Cyber as its cyber branch in November 2021. Since then, XM Cyber has expanded its product offering, increased its worldwide staff, and enlarged its customer base. Schwarz's strong financial stability and wide digital vision are a driving force for development and innovation.
"Cyber Observer's patented continuous control monitoring capabilities are a perfect complement to XM Cyber's award-winning hybrid cloud security platform. We are excited about this opportunity and look forward to working with the XM Cyber team to deliver the first end-to-end continuous cyber security posture management solution supporting both cloud and on-premises coverage," said Shimon Becker, co-founder and CEO, Cyber Observer.
Delinea | June 01, 2022
Delinea, a leading supplier of PAM solutions for seamless security, released "Conversational Server Access Security" to assist enterprises safeguard hybrid infrastructure against assaults. The free eBook from Conversational Geek illustrates how to use Zero Trust to adhere with Least Privilege and decrease risk.
Cybercriminals target Windows, UNIX, and Linux servers on-premise and in the cloud to exploit vulnerabilities. By attacking servers, fraudsters may access financials, IP, and more, opening the door to system-wide data theft, ransomware, and worse.
Delinea's guide on server access security explains how stacking security measures directly on servers can check that privileged credentials have the proper rights at every access point. Implementing a Zero Trust cybersecurity approach based on the Principle of Least Privilege reinforces this by giving access to server resources only to confirmed identities with the necessary entitlements, when they need them, and for only the time required to perform the job. Then remove those rights so they cannot be exploited.
"The concepts of Zero Trust and least privilege are not new, but many IT and security professionals are unclear about how to apply them in rapidly-changing, more complex hybrid environments. This new resource can help anyone get a better understanding of how to secure access to on-premises and cloud servers and take actionable steps to avoid becoming the next victim of cybercrime targeting modern infrastructure."
Joseph Carson, Chief Security Scientist and Advisory CISO at Delinea
The eBook's best practices assist cybersecurity professionals in implementing a server access security plan to:
Find and remove standing privileges that allow users to connect to servers from anywhere and at any time.
At each access control point, verify identities and permissions.
Make certain that only authorized users may access or modify resources on each server.
Allow users just-enough, just-in-time access and only provide elevated access when necessary.
At the server-side, log and record behavior.
Fusion Connect | July 22, 2022
Fusion Connect, a leading provider of managed security and collaboration services, has launched a comprehensive security offering with a new endpoint management and security service that allows businesses to identify, control, and secure devices and applications at a time when security threats continue to disrupt companies globally.
The new portfolio enables organizations to better understand the complete picture of their security risks and take action to mitigate them. Fusion Connect provides a complete solution that secures against threats while also hunting for unknown vulnerabilities that can upend a business from managing network components with advanced edge security for unified threat management (UTM) and remote access VPN to device level management.
Additionally, the new portfolio helps organizations to improve reaction time to threats by connecting and securing any element in the organization's environment. The centralized platform enables enterprises to take swift action by providing a wide range of capabilities to improve IT efficiency and security hygiene.
Fusion Connect's enhanced security measures come at a time when a massive talent shortage persists globally. According to (ISC)², the size of the cybersecurity workforce is 65% below what it needs to be.
"Heavier workloads, unfilled positions, and security employee burnout are making things especially chaotic in cybersecurity. "With cyberattacks becoming more common, more sophisticated, and more costly, businesses need to quickly fill gaps and stop just simply firefighting. Using artificial intelligence and strategic managed services partners are ways to ensure organizations are protected and can mitigate threats before the attack occurs. And that's what our latest offering addresses."
Ken Morford, Vice President of Security at Fusion Connect
Fusion Connect plans to continue expanding its comprehensive security portfolio to empower CISOs to gain the control, visibility, and speed needed to thwart cyber threats and keep their networks and organizations secure.
About Fusion Connect
Fusion Connect manages, orchestrates, and secures the critical technology infrastructure that enables the connected enterprise. We tailor our highly available and secure cloud communication, collaboration, security, and network management platforms to meet the unique needs of our mid-market and enterprise customers. Our AI-based management systems, along with our highly skilled technicians, dynamically ensure world-class application performance under any conditions.