PLATFORM SECURITY

Cerberus Sentinel completes acquisition of CyberViking

Cerberus Sentinel | July 07, 2022 | Read time : 2 min

Cerberus Sentinel
Cerberus Cyber Sentinel Corporation (NASDAQ: CISO), a cybersecurity consulting and managed services firm based in Scottsdale, Ariz., announced that it has completed the acquisition of CyberViking, a cybersecurity company based in Georgia and Oregon. Upon the closing of the transaction, CyberViking became a wholly owned subsidiary of Cerberus Sentinel.

CyberViking founder and cyber lead for the company is Carric Dooley. CyberViking specializes in application security services, incident response and threat hunting, and the creation and management of security operations centers. They have advised many Fortune 100 companies worldwide.

"With the addition of CyberViking, we take a next step in expanding our international reach as well as broadening our expertise for our cybersecurity healthcare and industrial controls systems customers. "Carric is an innovative thinker who is well respected by customers for solving and preparing for challenging cybersecurity threats. The team is the very embodiment of our commitment to a culture of security."

David Jemmett, founder and CEO, Cerberus Sentinel

"We are looking forward to helping shape a global strategy for incident response, as well as driving new capabilities in application security," said Dooley. "We believe in the development of the cybersecurity community and have actively participated as trainers and presenters at global conferences.  Our two organizations share a vision in helping our customers rise above the cybersecurity challenges inherent in threats today and in the future, and to get them to a place where they can concentrate on growing their business."

About Cerberus Sentinel
Cerberus Sentinel is an industry leader in Managed Cybersecurity and Compliance (MCCP) services with its exclusive MCCP+ managed compliance and cybersecurity services plus culture program. The company is rapidly expanding by acquiring world-class cybersecurity, secured managed services, and compliance companies with top-tier talent that utilize the latest technology to create innovative solutions to protect the most demanding businesses and government organizations against continuing and emerging security threats and compliance obligations.

Spotlight

Information security analysts plan and carry out security measures to protect an organization’s computer networks and systems. Their responsibilities are continually expanding as the number of cyberattacks increases. Most information security analyst positions require a bachelor’s degree in a computer-related field. Employers usually prefer to hire analysts with experience in a related occupation.

Spotlight

Information security analysts plan and carry out security measures to protect an organization’s computer networks and systems. Their responsibilities are continually expanding as the number of cyberattacks increases. Most information security analyst positions require a bachelor’s degree in a computer-related field. Employers usually prefer to hire analysts with experience in a related occupation.

Related News

DATA SECURITY,PLATFORM SECURITY,SOFTWARE SECURITY

New CyberRes Voltage File Analysis Suite Enables Proactive Data Protection with SmartScan

CyberRes | September 06, 2022

CyberRes, a Micro Focus (LSE: MCRO; NYSE: MFGP) line of business, today announced a new version of Voltage File Analysis Suite (FAS), a cloud platform that combines the latest in data discovery and data protection. Among the new features in Voltage FAS is SmartScan, a tool for intelligent sampling and dynamic tagging for petabyte scale data discovery, enabling data analysts to find the areas of higher data risk faster. "The new CyberRes Voltage File Analysis Suite takes data security to the next level with its data discovery and protection capabilities within one solution. "Since it is delivered as a SaaS solution, it possesses the scalability needed to meet the needs of any user's data estate. Furthermore, the dynamic Voltage SmartScan tool provides users with the resources needed to conduct more prescriptive, deeper scans of their data infrastructure and take more focused protective actions." Reiner Kappenberger, Director Product Management, Voltage Data Privacy and Protection Voltage FAS is not limited by the constraints of geographic or political boundaries, enabling users to achieve and maintain compliance standards for the growing number of privacy regulations around the world. Voltage FAS enhances global privacy awareness with dynamic data masking, contextually aware entity detection for thirty-nine-plus countries and economic regions. Also with this release, Voltage FAS is now available as a managed security services provider (MSSP) offering, which goes hand-in-hand with its availability as a software-as-a-service (SaaS) platform. Voltage FAS works with cloud, on-premise and all hybrid models by understanding and managing data in place. As some regions require data residency for organizations, Voltage FAS can also be deployed on private clouds, enabling organizations to effectively find and protect their sensitive data without having any data leave the region. "The release of our Voltage as a Service MSP/MSSP offering is designed to enable managed security services providers with flexible go-to-market options, pay-as-you-grow models, unified data discovery use cases to build managed services catalog offerings, thereby solving customer requirements for outcome-driven data discovery and protection with extremely quick time to value," said Marianne Van der Pluym, VP Global MSSP Strategy and Sales. One MSSP that has capitalized on the flexibility of Voltage FAS is Advania Sweden. "At Advania, we built our Data Management as a Service on the Voltage/FAS platform in our own data center and are able to be compliant with strict governmental rules and GDPR," said Tomas Wanselius, CEO of Advania Sweden. The new version of Voltage FAS is also receiving high marks from end users. "File Analysis Suite has a pivotal role in our environment, not only supporting Turkish Data Protection Regulation and PCI/DSS but also helping us to understand the other critical/sensitive data should be protected," Olcay Nisanoglu, IT Operations Director, BELBIM. "Since this project was a priority for the management team, we took an immediate action to start the project. Thanks to SmartScan's functionality with File Analysis Suite, all critical folders were quickly identified, allowing us to efficiently focus on these areas." Voltage FAS' data discovery capabilities can go deeper and broader across unstructured data repositories than most in the market. Voltage FAS supports more than 1,000 file types and discovery across the most common sources of unstructured data and collaboration platforms on premises and in the cloud including Microsoft 365, SharePoint, Exchange, Azure file and object stores, Google Workspaces, SMB (Samba), Amazon S3 object stores, as well as other source via a custom connector API. Voltage FAS includes the latest Optical Character Recognition (OCR) technology to enable users to discover sensitive data in images, such as scans of identifications and contracts. About CyberRes CyberRes is a Micro Focus line of business. We bring the expertise of one of the world's largest security portfolios to help our customers navigate the changing threat landscape by building both cyber and business resiliency within their teams and organizations. CyberRes is part of a larger set of digital transformation solutions that fight adverse conditions so businesses can continue to run today, keep the lights on, and transform to grow and take advantage of tomorrow's opportunities.

Read More

DATA SECURITY

Veza, the Data Security Platform Built on the Power of Authorization, Announces Partnership with Google Cloud

Veza | July 20, 2022

Veza, the data security platform built on the power of authorization, announces today that the company has entered a partnership with Google Cloud, including product integration that enables Google Cloud customers to harness the capabilities of Veza’s data security platform across their multi-cloud ecosystem. Veza, which recently launched in April 2022 after two years of building in stealth, makes it easy to understand, manage, and control who can and should take what action on what data. With this new integration, Google Cloud customers can now directly access the capabilities of Veza’s authorization-based data security platform integrated with Google Cloud Policy Analyzer to identify, manage, and control external identities and service accounts to Google Cloud services (Looker, BigQuery, and more). This partnership furthers the relationship between Google and Veza, which began in 2021 when GV led the Series B investment in Veza and GV Partner Karim Faris joined Veza Board of Directors. “The cloud is quickly becoming the primary footprint for organizations. By prioritizing and investing in security, Google Cloud has earned a differentiated position in the market,” said Tarun Thakur, Co-founder and CEO, Veza. “The initial product integration between Veza and Google Cloud, publicly demonstrated at the Google Cloud Security Summit in May this year, is a powerful example of how intelligence from Veza’s Authorization Graph can bolster the data security of Google Cloud customers. It shows how identity-to-data relationship insights from the Veza platform can be pulled directly into the Google Cloud Policy Analyzer, allowing customers to secure both Google Cloud data (Looker, BigQuery, Google Storage Buckets, etc.) to which multi-cloud identities (AD, Azure AD, Okta, etc.) have permissions and multi-cloud data (AWS, Snowflake, etc.) that is being accessed by Google Cloud identities.” “Securing cloud environments and data from cybercrime and threats is a key priority of organizations across the globe. “With Veza’s platform now available alongside Google Cloud’s secure and global infrastructure, customers will be able to quickly deploy the solutions they need to better understand, control, and securely take action on their data across their multi-cloud environments.” Sunil Potti, General Manager and Vice President, Cloud Security, Google Cloud Veza’s data security platform aggregates identity information from humans, service accounts, and cloud IAM entities, and authorization data from apps and data systems, giving organizations a centralized, SaaS-based control plane to visualize, manage, and control data access controls through Veza’s Authorization Graph. Veza integrates with cloud identity providers, SaaS and custom apps, and data systems, and translates system-specific entitlements and permissions into a common, human-understandable business language, visualized in the platform as effective permissions. The platform brings a novel approach to data security by enabling organizations to address key data security use cases across access reviews and certifications for SaaS apps and data systems, privileged access management to data and apps, data lake security and governance, management of cloud entitlements, and much more. It delivers prioritized insights, provides access workflows, and actionable recommendations for remediation of over-privileged accounts, enabling security and IT teams to correct anomalies and right-size their organization’s permissions to protect against ransomware and other data breaches. As organizations continue to adapt to the evolving demands of hybrid remote and in-office work, multi-cloud and hybrid-cloud environments — those with multiple providers of disparate data, app, compute, and infrastructure systems — are becoming the norm. According to the Flexera 2022 State of the Cloud Report, 89% of companies surveyed are multi-cloud, with only 2% operating in single private clouds and 9% in single public clouds. This trend is leading to a distributed web of data, relationships, and access points that are changing and difficult to track and secure. Veza and Google Cloud already have a number of joint customers deployed across the industries of SaaS software, marketing technology, and media, including Vox Media. “To support Vox Media’s growth and increasing M&A activity without compromising security, we need to ensure that across all of our brands, the right users have access only to the data they need access to, and that we have full visibility over what they can do with that data,” says Ateeb Ahmad, Senior Director, IT Infrastructure, Vox Media. With Veza and Google Cloud working together, we’ve been able to seamlessly manage access controls over our data for our largest merger to date, and tightly scope identity-to-data permissions even as our footprint with Google Cloud and other technologies grows.” “The greatest gifts of the multi-cloud and the generational architectural shift of the modern data systems are also its greatest risks: securing data, scalability, flexibility, and seamless collaboration,” says Thakur. “When organizations enable workers to reach from one cloud to another to leverage data across their entire multi-cloud ecosystem, they foster growth, enable more intelligence, and promote agility. However, such apps and data systems are also more porous and are at increased risk of cybercrime and ransomware. We purpose-built Veza’s Core Authorization Platform for the multi-cloud so that organizations can implement strong access governance policies - Veza continuously evaluates these policies and enables both automated workflows for access reviews, automated access removal for toxic and stale combinations, and facilitates access grant and request for any app, data, and service.” About Veza Veza is the data security platform built on the power of authorization. Our platform is purpose-built for hybrid multi-cloud environments to help you use and share your data safely. Veza makes it easy to understand, manage, and control who can and should take what action on what data. We organize authorization metadata across identity providers, data systems, cloud service providers, and SaaS applications — all to address the toughest data security challenges of the modern era. Founded in 2020, the company is funded by top-tier investors including Accel, Bain Capital, Ballistic Ventures, Blackstone, GV, Norwest Venture Partners, and True Ventures

Read More

DATA SECURITY,PLATFORM SECURITY,SOFTWARE SECURITY

ReasonLabs' RAV Endpoint Protection Achieves Gold OPSWAT Access Control Certification for Endpoint Security Applications

ReasonLabs | September 05, 2022

ReasonLabs, a leading cybersecurity company providing enterprise-grade protection to users all around the world, has today announced that its RAV Endpoint Protection solution has received Gold Certification from Access Technologies (OPSWAT), a leader in critical infrastructure protection. OPSWAT's Access Control Certification Program provides reliable and consistent metrics for validating the effectiveness of anti-malware products and establishing device trust. The program's Gold certification badge is awarded to applications that achieve access control compatibility. "Achieving Gold Certification in OPSWAT's Access Control Center Program further validates RAV Endpoint Protection as an industry-leading next-generation consumer solution. "The certification has created an easy way for customers to validate our solution's capabilities. End users can be assured that RAV Endpoint Protection secures endpoints with a high degree of confidence." Kobi Kalif, CEO of ReasonLabs ReasonLabs is the first Next-Generation Antivirus (NGAV) software with Endpoint Detection and Response (EDR) capabilities built specifically for home users. Whereas traditional antiviruses use a one-to-one detection technology to fight breaches and malware, ReasonLabs's intuitive engine utilizes a variety of technologies and techniques to predict and prevent virus attacks. By leveraging machine learning algorithms and AI, RAV Endpoint Protection sorts through millions of files to easily identify potentially hazardous ones and ensures proactive detection and resolution of the most complex malware. "From OPSWAT's inception, we have pioneered the concept of zero trust," said Benny Czarny, founder and CEO of OPSWAT. "The OPSWAT Access Control Certification Program extends this idea to IT System Administrators by relieving them from the daunting task of researching, testing and identifying the right endpoint anti-malware and encryption solutions by having us test it for them. We've done the work and verified applications that meet our exacting zero trust standards." Since RAV Endpoint Protection utilizes state-of-the-art EDR technology powered by artificial intelligence, ReasonLabs is able to provide the strongest defense for customers' personal assets. By utilizing an EDR approach, RAV is able to detect threats virtually anywhere, in contrast to systems built with a legacy one-to-one detection method. When coupled with its other security products including RAV VPN, RAV Safer Web, RAV Online Security, and FamilyKeeper, users can feel confident knowing every single endpoint is secured. "We developed the OPSWAT Access Control Certification Program to recognize the very best security solutions in the market, and ReasonLabs' RAV Endpoint Protection solution has met these demanding requirements," said Hamid Karimi, VP Technology Alliances and OEM at OPSWAT. "Gold certification is a badge of trust that certifies that a vendor's solutions do what they say they do and are effective against the latest emerging threats. IT professionals who are looking for the most effective antivirus solutions rely on Gold Certified vendors, and now they should consider ReasonLabs' RAV Endpoint Protection." About ReasonLabs ReasonLabs is a cybersecurity pioneer equipping tens of millions of families and individuals worldwide with the same level of cyber protection enjoyed by Fortune 500 companies. Its AI-powered, next-generation antivirus engine scans billions of files around the world to predict and prevent cyberattacks in real-time, 24/7. Its flagship product, RAV Endpoint Protection, together with its other products combine to form a multilayered solution that safeguards home users against next-generation threats. Co-Founded in 2016 by seasoned cybersecurity expert Andrew Newman—an architect of Microsoft's native cybersecurity program, Microsoft Defender—ReasonLabs is based in New York and Tel Aviv.

Read More