DATA SECURITY

Blu Ventures Expands Cybersecurity Strategy

Blu Venture Investors | May 24, 2021

Blu Venture Investors, a primary source risk capital firm, today announced the launch of the BVI Cyber Fund, a $25M fund targeted at Series A growth companies in cybersecurity. This fund builds on the success and momentum Blu Ventures has established in supporting the cybersecurity ecosystem within the Mid-Atlantic region and beyond.

"With over 800 cybersecurity firms within the Washington, D.C. region, Blu Ventures is seated at the middle of the cyber/intelligence ecosystem," said Michael Sutton, Investment member and former CSO of Zscaler. "We are excited to continue helping fast-growing cyber companies scale and tackle the foremost difficult cybersecurity challenges facing commercial and government organizations today."

The timing of the BVI Cyber Fund comes at a pivotal time given the record-breaking increase in sophisticated breaches and cyberattacks and President Biden's May 12, 2021 Executive Order on Improving the Nation's Cybersecurity. Blu Ventures has and can still invest in forward-looking cybersecurity technologies within core areas that include Endpoint Detection & Response, Data Storage; Web & Cloud; Messaging; Network; Industrial & Internet of Things (IoT); Threat Intel; Mobile; Fraud Protection & Transaction; Risk, Compliance & Training; Specialized Threat Analysis & Protection and Security Ops & Incident Response.

About Blu Venture Investors

Founded in 2010, Blu Ventures has deployed $85MM in capital so far in early-stage cyber and enterprise software firms. Currently, the firm is invested in 35 cyber companies to incorporate ID.me, Cybrary, Huntress Labs, Ostendio and Threat Quotient. As a primary source risk capital firm, Blu's principals bring expertise across a spread of industries and an investment perspective closely aligned with entrepreneurs.

Spotlight

L-3 I(S) uses a balanced approach of building security into system design, engineering processes and secure coding standards for the life cycle of a program, from the beginning stages of customer requirements, all the way through building, testing and deployment. We understand the different approaches needed for building security into a new-start program and those needed for a legacy program to ensure secure and functional systems. We can provide support at any stage.

Spotlight

L-3 I(S) uses a balanced approach of building security into system design, engineering processes and secure coding standards for the life cycle of a program, from the beginning stages of customer requirements, all the way through building, testing and deployment. We understand the different approaches needed for building security into a new-start program and those needed for a legacy program to ensure secure and functional systems. We can provide support at any stage.

Related News

DATA SECURITY, PLATFORM SECURITY, SOFTWARE SECURITY

Aunalytics Launches Security Patching Platform as a Service

Aunalytics | September 27, 2022

Aunalytics, a leading data management and analytics company delivering managed IT and data platform services for mid-sized and enterprise businesses, today initiated its Security Patching Platform, Co-managed Patching as a Service to complement the company’s Advanced Security solution suite. Windows OS and supported 3rd party patch management allow for tighter security in the defense against cyberattacks and the new offering ensures active remediation. According to a 2022 Data Breach Investigations Report by Verizon, around 70 percent of successful cyberattacks exploited known vulnerabilities with available patches, making it important to update operating systems and applications regularly to prevent such attacks. Now, Aunalytics’ new technology as a service includes the tools, structure, strategy and intelligence for managing patch deployment and is a complete solution with best practices, templates, libraries, and built-in alert thresholds. Lack of security patching leads to vulnerabilities within an organization’s information systems, internal controls, or system processes, which can then be exploited by cybercriminals. Using a collection of tools, cyber attackers use the vulnerability to gain unauthorized access to corporate systems and data. Identifying and resolving vulnerabilities is very important since a successful exploit can lead to a full-scale system breach. Workstation and server application patching ensures that organizations have baseline protection against the latest security vulnerabilities, preventing such attacks before they occur. However, patching can be difficult to manage and update in real-time as software fixes are published on an ongoing basis. Setting up and coordinating manual patching across an organization can be extremely cumbersome, taking days to organize, schedule, and execute across an entire company. McKinsey cites good patch management as a top proactive maintenance measure that can help organizations prevent cyberattacks. However, knowing the priority level for patch installment can be confusing and lead to poor patch management as a result. Enlisting the help of a partner to employ security patching best-practices can add true value to many organizations. Aunalytics patch detection, download, and installment methods are developed considering each client's security and uptime requirements and prioritized in order of threat potential. Aunalytics’ experienced security patching team proactively monitors for updates, eliminating worry for end users and server administrators. As part of the new service, users gain access to comprehensive security solutions with customized alerting and vulnerability prioritization, leveraging proprietary solutions and processes. The platform facilitates collaboration between IT and security teams and includes the following capabilities: Inventory and performance management and proactive alerting Patch deployment control strategy, prioritization, planning Patch vetting and blacklisting intelligence Windows Operating System patch management Supported 3rd Party Patch Management Anti-Malware DNS-based Malware Protection Device Encryption Management Innovative management tool library “Security patch exploits can have extremely damaging effects on an organization, decreasing revenues or causing reputational damage, making it imperative to have security patching in place. “Aunalytics’ Security Patching Platform services allow for the rapid resolution of these concerns to maintain the highest levels of cyber-resiliency.” Chris Nicholson, Vice President of Managed IT Services About Aunalytics Aunalytics is a leading data management and analytics company delivering Insights-as-a-Service for mid-sized businesses and enterprises. Selected for the prestigious Inc. 5000 list for two consecutive years as one of the nation’s fastest growing companies, Aunalytics offers managed IT services and managed analytics services, private cloud services, and a private cloud-native data platform for data management and analytics. The platform is built for universal data access, advanced analytics and AI -- unifying distributed data silos into a single source of truth for highly accurate, actionable business information.

Read More

DATA SECURITY, NETWORK THREAT DETECTION, PLATFORM SECURITY

Exabeam Introduces New-Scale SIEM™

Exabeam | October 17, 2022

Exabeam, a global cybersecurity leader and creator of New-Scale SIEM for advancing security operations, today announced a groundbreaking cloud-native portfolio of products that enables security teams everywhere to Detect the Undetectable™. New-Scale SIEM is a powerful combination of cloud-scale security log management, industry-leading behavioral analytics, and an automated investigation experience. Built on the cloud-native Exabeam Security Operations Platform, the New-Scale SIEM product portfolio gives worldwide security teams the greatest fighting chance at defeating adversaries with advanced threat detection, investigation, and response (TDIR). The new product portfolio is generally available (GA) today. “Security operations teams have faced difficulty defending against complex threats and evolving adversarial behavior because technology innovation has not kept up in the realm where big data meets cybersecurity. “Exabeam is known for having the best behavioral analytics product on the market — it’s why so many of the world’s largest organizations count on Exabeam every day to help stop adversaries, including the majority now utilizing valid credentials. We are marrying behavior analytics with the world's most modern, hyperscale, cloud-native data lake to ingest, parse, store, and search data in real time from anywhere. The SIEM industry has been ripe for evolution for some time and New-Scale SIEM represents that evolution.” Michael DeCesare, CEO and President Exabeam Unmatched Performance Significantly more affordable than competitive offerings, the new Exabeam cloud-native product portfolio is built on an open platform that integrates with more than 500 different third-party products and includes nearly 8,000 pre-built parsers, greatly reducing onboarding, deployment, and run times. An industry-first, security teams can now search query responses across petabytes of hot, warm, and cold data in seconds. Organizations can now also process logs at sustained speeds of over one million events per second. “The Exabeam Security Operations Platform and portfolio of products are designed like no other on the market. We deliver the single solution security operations analysts can count on to conduct accelerated, thorough threat detection, investigation, and response (TDIR) with the most consistent and successful outcomes,” said Adam Geller, Chief Product Officer, Exabeam. “We provide security teams with a holistic picture of their environment –– data from core security products, IT infrastructure, and business applications joined with critical user and device context and timely threat intelligence data –– to detect what competitive SIEMs simply can’t. In addition to our industry-leading behavioral analytics, we’re proud to deliver world-class security log management and new modular SIEM solutions for organizations at all stages of their data growth and security journey.” Understanding Normal Behavior to Detect and Prioritize Anomalies Organizations can use Exabeam to defend against the rising threat of external and internal attacks that in today’s world are more often than not leveraging compromised credentials. More than 750 behavioral models power 1,200 anomaly detection rules in Exabeam to baseline normal behavior for every user and device. This is beyond anything a legacy SIEM can possibly create with correlation rules. For example, for an organization with basic logging, 20,000 users, and 50,000 assets, Exabeam can dynamically build and update 50 million unique detection rules. According to the 2022 Verizon DBIR, over 90% of breaches are rooted in compromised credentials. Whether it’s phishing, ransomware, malware, or other external threats, valid credentials have emerged as the adversaries’ primary target. This combined with explosive amounts of data demands a shift in investment from legacy on-premises, rule-based detections to cloud-native SIEM platforms that uniquely understand normal behavior, even as normal keeps changing. “It’s all about the credentials. Today’s announcement takes Exabeam, our customers, partners, and the SIEM market into an entirely new stratosphere,” said Ralph Pisani, President, Exabeam. “Detecting stolen or misused credentials –– and the abnormal behavior that follows –– is not possible without understanding normal behavior. If you don’t know normal behavior for every single user and device in your environment, understanding abnormal behavior in your organization is a near impossible undertaking –– this is a fundamental capability that only Exabeam can deliver on at scale.” Whether replacing a legacy product with New-Scale SIEM, or complementing an ineffective third-party SIEM solution by adding the industry’s most powerful behavioral analytics and automation to it, Exabeam can help organizations achieve security operations success. Exabeam customers are moving to and experiencing the benefits of New-Scale SIEM. “Exabeam is our holistic security operations platform that provides and coordinates automated visibility, detection, analytics, investigation, and response across our key operating environments,” said Jerry Larsen, IT Security Manager, Patrick Industries. “We have several ERP systems that all need to be protected and Exabeam does the job better than any legacy SIEM we looked at –– we’re excited to be an Exabeam customer and part of their innovation machine.” “At NEC Australia, securing our data, users, devices and infrastructure are paramount to how we operate as a technology company. Having broad and accurate visibility of our IT environment as well as the ability to recognise what’s normal behavior for our users and entities is key,” said Peter Fröchtenicht, National Service Manager – Security and Compliance, NEC Australia. “Deploying Exabeam’s SIEM has enabled our team to effectively prioritize security alerts, which has freed up time for our analysts to focus on other security tasks, whilst also having a greater understanding of our attack surface and how all our employees interact with our resources.” New Exabeam products include: Exabeam Security Log Management - Cloud-scale security log management to ingest, parse, store, and search log data with powerful dashboarding and correlation. Exabeam SIEM - Cloud-native SIEM at hyperscale with fast, modern search, and powerful correlation, reporting, dashboarding, and case management. Exabeam Fusion - New-Scale SIEM™, powered by modern, scalable security log management, powerful behavioral analytics, and automated TDIR. Exabeam Security Analytics - Automated threat detection powered by user and entity behavior analytics with correlation and threat intelligence. Exabeam Security Investigation - TDIR powered by user and entity behavior analytics, correlation rules, and threat intelligence, supported by alerting, incident management, automated triage, and response workflows. Exabeam architected its new security operations platform and New-Scale SIEM product portfolio on Google Cloud (NASDAQ: GOOGL). “We are delighted that Exabeam has built its platform and portfolio of products on Google Cloud to help more companies securely leverage their data at cloud scale,” said Gerrit Kazmaier, Vice President and General Manager, Data Analytics and Business Intelligence at Google Cloud. “The combination of Exabeam cybersecurity products with Google's Data Cloud capabilities removes limits on security team productivity, storage, and speed to fully optimize security operations.” About Exabeam Exabeam is a global cybersecurity leader that created New-Scale SIEMTM for advancing security operations. Built for security people by security people, we reduce business risk and elevate human performance. The powerful combination of our cloud-scale security log management, behavioral analytics, and automated investigation experience gives security operations an unprecedented advantage over adversaries including insider threats, nation states, and other cyber criminals. We Detect the UndetectableTM by understanding normal behavior, even as normal keeps changing – giving security operations teams a holistic view of incidents for faster, more complete response.

Read More

DATA SECURITY, PLATFORM SECURITY, SOFTWARE SECURITY

OpenText partners with MAD Security to improve response time to cyberthreats and shrink the attack surface

OpenText | October 20, 2022

Today, OpenText™ , a global leader in information management with an extensive security solution portfolio, announced a partnership between OpenText Network Detection & Response (NDR) technology and MAD Security. This joint solution from OpenText and MAD Security will empower customers to cut false positive security alerts significantly and protect sensitive government data against advanced cyber threats. MAD Security, a managed security service provider (MSSP) that helps contractors and other small and medium sized enterprises detect potential breaches and prevent attackers from disrupting operations or exfiltrating data, knows firsthand that government contractors are a prime target for cyber-attacks, from phishing and social engineering to malware and ransomware. To strengthen its cybersecurity capabilities, MAD Security decided to augment its offering with NDR capabilities. The aim was to continuously monitor and analyze raw enterprise network traffic, creating a baseline of network behavior that would help analysts hunt down emerging threats faster. "In the past, MAD Security has relied on an anomaly-based intrusion detection system to find indicators of compromise (IOCs). While this approach was effective for analyzing north-south traffic across small networks, it was a challenge to pinpoint IOCs across larger networks with significant volumes of east-west traffic. "If we could reduce the time our analysts spent drilling down into the data, we could accelerate our response and improve cost efficiency—ultimately providing a more competitive service. Working with OpenText, we can now detect and correlate events, investigate the data and notify the client in an average of just 6.5 minutes—less than half of SLA." Jeremy Conway, CEO at MAD Security MAD Security selected OpenText NDR because of the level of visibility it provides. The company can now look beyond individual subsets of endpoint and log data to build up a clear picture of what happened and when during an attack—even if the network traffic is encrypted. MAD Security uses OpenText NDR to make sure remediation efforts are successful, for example, by monitoring for new IOCs during its cleanup effort to detect whether the attacker is changing tactics or switching to an alternate toolset. An end-to-end network security platform, OpenText NDR simplifies network threat detection by combining smart packet capture (Smart PCAP) and rich network metadata generation, delivering a clear view of even the most complex networks. With OpenText NDR, MAD Security can gain insights faster than ever through deep packet inspection, behavioral anomaly detection, IOC matching, and AI-powered analytics. "We are thrilled to be able to count MAD Security among our many incredible customers and are proud to see not just our solutions working for the organization but also be part of its growth and success," said Muhi Majzoub, Executive Vice President and Chief Product Officer at OpenText. "By supporting MAD Security with OpenText NDR, we were able to help the company achieve its growth target while keeping its analyst team lean." About OpenText OpenText, The Information Company™, enables organizations to gain insight through market leading information management solutions, powered by OpenText Cloud Editions.

Read More