PLATFORM SECURITY

BT launches transformational new security platform, Eagle-i, to predict and prevent cyber attacks

BT Group | October 18, 2021

  • Relentless growth and ever-changing nature of the threat landscape dictates a new, proactive approach to cyber security
  • Customers to benefit from advances in AI and automation, combined with BT's networking expertise, in transformational cyber defence platform
  • Eagle-i builds on BT's recent security investment and partner ecosystem to address issues such as a more than 50 per cent increase in malware traffic over the last 6 months

Business and public sector bodies continue to face an exponential growth in the volume and complexity of cyber attacks, with new research from BT identifying a more than 50 per cent increase in malware traffic over the last six months. Alongside a global shortage of skilled security professionals, organisations around the world are struggling to keep a lid on evolving cyber threats and maintain their defences.

In response, BT is launching its most sophisticated cyber defence platform yet — Eagle-i. It combines BT's industry-leading network insight with advances in AI and automation to predict, detect and neutralise security threats before they get a chance to inflict damage. The platform has been designed to self-learn from the intelligence provided by each intervention, so that it constantly improves its threat knowledge and dynamically refines how it protects customers across a multi-cloud environment.

Eagle-i will utilise an AI layer to provide real-time detection of issues and intelligent automated responses, enabling users to significantly speed up their reaction to security issues and outpace their cyber threats. It is also uniquely able to integrate with technologies from across the security ecosystem so that organisations can both optimise their capabilities and spot any holes in their defences without having to replace existing investments. The platform will underpin how BT protects its global operations and provide phased enhancements and increased functionalities for all BT's managed security services.

Security is now at the top of the boardroom and government agenda yet many organisations are seeing their cyber risks increase to unmanageable levels. This situation demands a new, proactive approach. Eagle-i leverages the latest advances in AI and automation to continually monitor, learn and evolve so customers can stay a step ahead of cyber criminals.

Kevin Brown, managing director, BT Security

About BT
BT Group is the UK's leading telecommunications and network provider and a leading provider of global communications services and solutions, serving customers in 180 countries. Its principal activities in the UK include the provision of fixed voice, mobile, broadband and TV (including Sport) and a range of products and services over converged fixed and mobile networks to consumer, business and public sector customers. For its global customers, BT provides managed services, security and network and IT infrastructure services to support their operations all over the world. BT consists of four customer-facing units: Consumer, Enterprise, Global and its wholly-owned subsidiary, Openreach, which provides access network services to over 650 communications provider customers who sell phone, broadband and Ethernet services to homes and businesses across the UK.

Spotlight

For several years now, ESET experts from around the world have been contributing to our annual Trends report, which offers a brief review of the milestones reached in the world of cybersecurity and our predictions about possible attack scenarios and measures to counteract them in 2019. The basic scenarios regarding these issues vary little: it comes down to defending the confidentiality, integrity, and availability of data belonging to individuals and companies against repeated attacks by cybercriminals who try to access, use, and/or steal these data. For these reasons, in the 2019 edition of the Trends report you will find a section focusing on data privacy and the rising importance for businesses to manage data privacy correctly, especially in light of the Facebook/Cambridge Analytica controversy, as well as the Google breach and subsequent decision to shut down Google+.

Spotlight

For several years now, ESET experts from around the world have been contributing to our annual Trends report, which offers a brief review of the milestones reached in the world of cybersecurity and our predictions about possible attack scenarios and measures to counteract them in 2019. The basic scenarios regarding these issues vary little: it comes down to defending the confidentiality, integrity, and availability of data belonging to individuals and companies against repeated attacks by cybercriminals who try to access, use, and/or steal these data. For these reasons, in the 2019 edition of the Trends report you will find a section focusing on data privacy and the rising importance for businesses to manage data privacy correctly, especially in light of the Facebook/Cambridge Analytica controversy, as well as the Google breach and subsequent decision to shut down Google+.

Related News

DATA SECURITY,PLATFORM SECURITY,SOFTWARE SECURITY

Tanium Expands Collaboration with Microsoft as It Joins the Microsoft Intelligent Security Association (MISA)

Tanium | August 17, 2022

Tanium, the industry’s first provider of converged endpoint management (XEM), today announced that it has been nominated to join the Microsoft Intelligent Security Association (MISA), an ecosystem of independent software vendors and managed security service providers (MSSPs) that have integrated their solutions with Microsoft security technology to help customers better defend themselves against increasingly sophisticated cyber threats. “I believe that Microsoft and Tanium's partnership is going to transform the future of IT security and operations for my organization,” said Mark Wantling, CIO at the University of Salford. “By combining Tanium's real-time visibility and control with Microsoft's advanced threat intelligence, orchestration, and analytics services, I can quickly and easily identify and address vulnerabilities, remediate threats, and manage my estate across a multitude of platforms — and I don't need dozens of point solutions to do it.” As hybrid work and other digital transformations expand organizations’ IT assets and attack surfaces, customers benefit by consolidating security platforms to more seamlessly deliver security, performance, and automation, without needless complexity and alert fatigue. “I am excited to see that Tanium and Microsoft are working together,” said Andy Lawrence, cyber security improvements manager, Willis Towers Watson. “Combining Tanium’s real-time data and control with Microsoft’s services will allow my team to more effectively manage and secure my entire IT estate.” Tanium was nominated for MISA membership in part as a result of an integration with Microsoft Sentinel, soon to be available via the Sentinel Content Hub. Currently, Tanium is available in the Microsoft Commercial Marketplace, an online store providing applications and services for use on Azure. Customers can purchase and provision Tanium directly from the marketplace and apply the purchase to their Microsoft Azure Consumption Commitments (MACC). Every day, Tanium customers around the world take advantage of the Azure cloud platform, including streamlined deployment and provisioning, to accelerate their security strategies. “The largest and most sophisticated organizations trust Tanium to manage and secure their digital estates. “Combining Microsoft's security solutions with Tanium's real-time data, distribution, and control not only enables effective automation and resilient security, but it also creates accelerated savings for customers converging multiple point solutions into fewer, more comprehensive, and robust solutions.” Rob Jenks, senior vice president of corporate strategy at Tanium Together, Tanium’s integrations with Microsoft’s technology deliver the capabilities customers need to manage and secure IT estate from cloud to the edge, including active threat hunting, faster remediation, real-time patching, and the automated delivery of detailed real-time data. “Members of the Microsoft Intelligent Security Association – like Tanium – integrate their security solutions with Microsoft’s technology to gain more signal, increase visibility and better protect against threats. By extending Microsoft’s security capabilities across the ecosystem, we help our shared customers to succeed.” – Maria Thomson, Microsoft Intelligent Security Association Lead. About Tanium Tanium, the industry’s only provider of converged endpoint management (XEM), leads the paradigm shift in legacy approaches to managing complex security and technology environments. Only Tanium protects every team, endpoint, and workflow from cyber threats by integrating IT, Compliance, Security, and Risk into a single platform that delivers comprehensive visibility across devices, a unified set of controls, and a common taxonomy for a single shared purpose: to protect critical information and infrastructure at scale. Tanium has been named to the Forbes Cloud 100 list for six consecutive years and ranks on Fortune’s list of the Best Large Workplaces in Technology. In fact, more than half of the Fortune 100 and the U.S. armed forces trust Tanium to protect people; defend data; secure systems; and see and control every endpoint, team, and workflow everywhere.

Read More

PLATFORM SECURITY

Axonius Adds Key Integrations with AWS

Axonius | July 25, 2022

Axonius, a cybersecurity asset management provider, today announced integrations with Amazon Macie, Amazon GuardDuty, and AWS SecurityHub while extending its Amazon Inspector functionality. These new integrations will help customers to better understand and manage vulnerabilities across their Amazon Web Services (AWS) infrastructure. By connecting to both AWS first-party and ISV-third party security solutions, Axonius provides comprehensive visibility and management of assets across AWS cloud, multi-cloud, and on-premises. The latest integrations provide the following capabilities: Identify Exposed Amazon S3 Buckets: Axonius fetches findings from Amazon Macie to help customers identify exposed Amazon S3 buckets to maintain data integrity and compliance. Detecting Malicious Activity & Compromised Security Controls: By integrating with Amazon GuardDuty, Axonius helps customers detect malicious activity to protect AWS accounts, workloads, and data and help them understand which assets have compensating security controls. Helping Meet Security Best Practices: With insights from AWS SecurityHub, customers can compare against correlated data to verify whether assets that don't meet best practice standards have a compensating security control. Comprehensive View of Cloud Security Posture: Axonius delivers a complete inventory of assets from more than 450 correlated data sources giving customers a comprehensive view of their cloud security, including vulnerability data from Amazon Inspector. "As companies continue to shift workloads to the cloud, they're also increasingly leveraging cloud provider-native security service offerings. "Yet customers are still exhausted by the highly-manual, slow, and error-prone processes that negatively impact their risk mitigation, threat management, and compliance. With Axonius and AWS, customers finally have a unified view of their assets while dramatically strengthening their security posture." Mark Daggett, Vice President of Worldwide Channels and Alliances at Axonius About Axonius Axonius is the cybersecurity asset management platform that gives organizations a comprehensive asset inventory, uncovers gaps, and automatically validates and enforces policies. Deployed in minutes, the Axonius cyber asset attack surface management (CAASM) solution integrates with hundreds of data sources to give customers the confidence to control complexity by mitigating threats, navigating risk, decreasing incidents, automating response actions, and informing business-level strategy. Cited as one of the fastest growing cybersecurity startups, with accolades from CNBC, Forbes, and Fortune, Axonius covers millions of devices for customers around the world.

Read More

DATA SECURITY,PLATFORM SECURITY,SOFTWARE SECURITY

​​GuidePoint Security Names Deepwatch as a New Partner in the Company’s Federal Emerging Cyber Vendor Program

GuidePoint Security | September 21, 2022

GuidePoint Security, a cybersecurity solutions leader enabling organizations to make smarter decisions and minimize risk, announced today that Deepwatch, the leader in advanced managed detection and response (MDR) security, has joined the Emerging Cyber Vendor Program. This GuidePoint Security Program is specifically designed to help emerging cybersecurity vendors expand their federal footprint. As part of this program, the Deepwatch MDR solution is now available under GuidePoint’s GSA Multiple Award Schedule Contract #GS-35F-508CA. Through this partnership, Deepwatch’s MDR solution will be brought to the public sector through GuidePoint Security, which has 40+ years of collective federal expertise across sales and marketing, operations, engineering and procurement. "We are thrilled to be partnering with Deepwatch to support its expansion into the public sector market. “Through its advanced security operations platform and dedicated squads of security experts, Deepwatch will help government agencies better detect and respond to threats.” Jim Quarantillo, Federal Partner, GuidePoint Security "This important partnership ultimately provides federal agencies with enhanced on-going situational awareness of their attack surface and the ability to rapidly detect and contain threats,'' said Carl Helle, chief revenue officer at Deepwatch. “We are proud to partner with GuidePoint Security, leveraging their deep cybersecurity consulting and federal expertise, to help government agencies protect against cyber threats." Deepwatch delivers the industry’s most advanced managed detection and response security, protecting organizations from cyber threats 24/7/365. With Deepwatch, customers get a team of always-on cybersecurity experts who work with them as an extension of their team, powered by an advanced security operations platform that delivers high-fidelity alerting and automated response capabilities for rapidly containing threats. About GuidePoint Security GuidePoint Security provides trusted cybersecurity expertise, solutions, and services that help organizations make better decisions that minimize risk. Our experts act as your trusted advisor to understand your business and challenges, helping you through an evaluation of your cybersecurity posture and ecosystem to expose risks, optimize resources and implement best-fit solutions. GuidePoint’s unmatched expertise has enabled a third of Fortune 500 companies and more than half of the U.S. government cabinet-level agencies to improve their security posture and reduce risk. About Deepwatch Deepwatch is the leader in managed security services, protecting organizations from ever-increasing cyber threats 24/7/365. Powered by Deepwatch’s cloud security operations platform, Deepwatch provides the industry’s fastest, most comprehensive detection and automated response to cyber threats together with tailored guidance from dedicated experts to mitigate risk and measurably improve security posture. Hundreds of organizations, from Fortune 100 to mid-sized enterprises, trust Deepwatch to protect their business.

Read More