Cisco Makes Webex More Secure, Triples Video Call Capacity

Cisco | June 18, 2020

Cisco Makes Webex More Secure, Triples Video Call Capacity
  • Cisco has revealed its video conferencing platform Webex will receive a host of new security facilities designed to better reflect the new business reality.

  • Cisco Live! 2020, the firm announced it would build upon existing security facilities by extending its data loss prevention (DLP) retention.

  • Like competitors Zoom and Microsoft Teams, Cisco was well-positioned to capitalize on the sudden dependence on cloud-based collaboration services.


Cisco has revealed its video conferencing platform Webex will receive a host of new security facilities designed to better reflect the new business reality, amid an unprecedented surge in demand. At Cisco Live! 2020, the firm announced it would build upon existing security facilities by extending its data loss prevention (DLP) retention, Legal Hold and eDiscovery to Webex Meetings.


The service will also see AES 256 Bit encryption with GCM mode added to its end-to-end encryption options - a move designed to deliver superior protection for meeting data and resistance to tampering. The company also revealed it has scaled Webex’s global capacity dramatically in recent weeks, and is now running the service at three times the previous capacity. The platform supported half a billion meeting participants in April alone, accounting for 25 billion meeting minutes.



Read more: CISCO TO SECURE ITS BLOCKCHAIN-AS-A-SERVICE (BAAS) PLATFORM FOR ENTERPRISE SECURITY

Think this is the opportunity, this is the time to build out a more robust technology infrastructure to prepare for what’s next, because we don’t know what will come next

~ Robbins said, Cyber Security


What we know is possible now versus what we believed 6 months will fundamentally change how we think about work in the future. Period.It’s time to think about how our wider network architecture really needs to change, based on these incredibly different traffic flows we see today, versus the way they were when we architected this infrastructure 15-20 years ago. Like competitors Zoom and Microsoft Teams, Cisco was well-positioned to capitalize on the sudden dependence on cloud-based collaboration services.


Having scaled rapidly to match the explosion in demand, the firm is now looking to cement its position with a heightened emphasis on security - an issue that has defined recent debates around video collaboration. When it comes to business meetings, learning in classrooms, doctors appointments, government hearings - those need safeguarding,” said Javed Khan, VP and GM of Cisco’s Collaboration Group. Security has to be core to who you are as a company. It is not something that can be bolted on top as an afterthought.


It’s time to think about how our wider network architecture really needs to change, based on these incredibly different traffic flows we see today, versus the way they were when we architected this infrastructure.


According to the firm, dynamism defines the new enterprise environment, and security measures should reflect this new reality. Cybercriminals have launched a new series of phishing attacks which attempt to steal the account credentials of Cisco Webex users by utilizing fake certificate error warnings. Just as other video conferencing software has seen a huge uptick in usage by remote workers during the pandemic, so to has Cisco's video and team collaboration solution. So far the campaign, which uses graphics and formatting taken from legitimate Cisco emails to impersonate the company, has already sent out phishing emails to up to 5,000 Webex users according to the email security firm Abnormal Security.


The attackers try to lure in users by inducing a sense of urgency in their phishing emails that are designed to closely resemble the automated SSL certificate error alerts that the company sends out to its customers. The phishing emails used in the campaign warn unsuspecting users that they need to verify their accounts as they are blocked by the administrator as a result of Webex Meeting SSL certificate errors. Users are then asked to click on an embedded “Log in” hyperlink in the message and sign in in order to unlock their accounts. Abnormal Security provided more details on the link contained in the campaign's phishing emails in an advisory, saying.


Read more: GOOGLE TOP CHOICE FOR CYBERCRIMINALS FOR BRAND-IMPERSONATION SPEAR-PHISHING CAMPAIGNS

Spotlight

Discover how well you can handle a cyber attack and how you can improve your disaster management.

Related News

DATA SECURITY

Arctic Wolf Security Operations Cloud Reaches Massive Scale and a Global Footprint

Arctic Wolf | November 09, 2021

-Arctic Wolf®, a leader in security operations, today announced the global expansion of its industry-leading cloud-native platform, the Arctic Wolf Security Operations Cloud, to provide customers and partners with unified visibility, protection, and automation, through a growing number of technical integrations. With the establishment of a European Security Operations Center (SOC) in Frankfurt, Germany, Arctic Wolf customers in any location, will have full flexibility in how their native security solution data is stored and accessed to aid in their compliance with local and international data governance regulations. Built on an open XDR architecture, the Arctic Wolf Security Operations Cloud has scaled to ingest, parse, enrich, and analyze over 1.6 trillion security events and 1.3 petabytes of data each week from over one million licensed users at 2,000 global customers. By leveraging machine learning and artificial intelligence the Arctic Wolf Security Operations Cloud now processes events at an equivalent or greater rate than that of other market-defining cloud platforms. This momentum is driven by a strong uptick in demand for the technology in the enterprise market, demonstrated by Arctic Wolf’s 510% year-over-year large enterprise ARR growth in the first quarter of the fiscal year. Unlike the rest of the industry that is just now starting to parse solutions to integrate data from multiple attack surfaces, Arctic Wolf’s platform was built from day one on a cloud-native architecture that seamlessly ingests data from endpoint, network, identity, and cloud sources to deliver automated threat detection and response at scale. This unification of an organization’s security data ensures only verified security incidents are escalated to customers, effectively eliminating alert fatigue, and ensuring internal security resources have the time needed to focus on hardening their overall security posture. Powering Security Operations at a Global Scale To further support Arctic Wolf’s ongoing global expansion, the company has leveraged the scalability and extensibility of the AWS public cloud infrastructure, providing new customers the ability to have their native security solution data hosted within the Arctic Wolf Security Operations Cloud in their choice of the United States, Germany, or Canada. With five SOCs spread across North America and Europe, as well as a growing team of remote security analysts, organizations within Arctic Wolf’s global customer base can have confidence that the Arctic Wolf Concierge Delivery Model aligns with the needs of their compliance requirements on their security journey to end cyber risk. Delivering Critical Outcomes Across the Entire Security Operations Framework The massive growth in the power and scale of the Arctic Wolf Security Operations Cloud has been pushed by explosive market demand for security operations, which has resulted in the company doubling its sales for eight consecutive years and achieving a $4.3B valuation as part of a $150M Series F funding round in July. In addition to the business expansion driving the momentum of its cloud-native platform, Arctic Wolf has also made aggressive investments in ecosystem integrations, resulting in the Arctic Wolf Security Operations Cloud adding support for dozens of new security data sources over the last year. Arctic Wolf’s universal and unlimited approach to data ingestion allows customers to gain visibility and control over historically disparate security solutions, while removing the need for security leaders to choose which data sources are important or cost-effective to monitor. Supporting Quotes: “While every other aspect of the modern technology stack has a category-defining platform —think Salesforce, ServiceNow, and Workday— no one in cybersecurity has managed to unify the market and produce a true platform that serves all security operations use cases for midsize and enterprise customers,The Arctic Wolf Security Operations Cloud delivers exactly that – the unified security operations experience that owns the outcome for the customer, and our new global footprint makes it easier than ever for organizations to have full control over where their native security solution data is stored.” Nick Schneider, president and chief executive officer of Arctic Wolf “Accelerated digital transformation and the shift to cloud-based solutions require organizations to rethink data protection strategies and upscale their data security infrastructures to meet the ever-evolving privacy and data compliance landscape,” said Duncan Brown, vice president, European Enterprise Research, IDC. “This trend is global in nature and in Europe, in particular, we are seeing a rapid movement to adopt cloud environments. The vendors who will lead the market in that change will need to demonstrate a proven track record in delivering a mature, global cloud model that meets data sovereignty requirements without compromising speed and scalability.” With the Security Operations Cloud, Arctic Wolf is the first to deliver a cloud-based platform that gives organizations the protection, resilience, and guidance they need to defend against cyber threats, including Managed Detection and Response (MDR), Managed Risk, Cloud Security Posture Management (CSPM), and Managed Security Awareness —each delivered by the unique concierge delivery model. About Arctic Wolf: Arctic Wolf® is a global leader in security operations, delivering the first cloud-native security operations platform to end cyber risk. Powered by threat telemetry spanning endpoint, network, and cloud sources, the Arctic Wolf® Security Operations Cloud ingests and analyzes more than 1.6 trillion security events a week across the globe, enabling critical outcomes for most security use cases and optimizing customers’ disparate security solutions. Now deployed to more than 2,000 customers worldwide, the Arctic Wolf® Platform delivers automated threat detection and response at scale, and empowers organizations of any size to stand up world-class security operations with the push of a button.

Read More

DATA SECURITY

Strong customer growth and recruits continue to increase security Notable security sales executive to scale rapid expansion

businesswire | December 17, 2020

Elevate Security, the first human risk management platform of its kind, today announced the appointment of security sales expert, Carolyn Hieken as Vice President of Sales to join its executive leadership team. Hieken will spearhead Elevate Security’s strategic growth objectives further expanding customer impact to improve the way security teams measure, communicate and reduce employee risk. “Carolyn is a powerhouse and brings more than 25 years of security and technology sales experience to Elevate Security,” said Robert Fly, CEO, Elevate Security. “Her proven expertise in developing Fortune 1000 enterprise partnerships and growing teams is the exact talent we needed to expedite Elevate Security’s expansion.” Elevate Security recruits Hieken on the heels of a successful series A1 investment round. Despite the COVID-19 pandemic, Elevate Security has doubled its customer base since the beginning of the year. As Elevate Security achieves continued customer growth, so does the company’s measurable impact on security resilience - Elevate Security reported influencing more than two million positive security decisions across the installed base resulting in prevented incidents and proven improvement to cyber resilience. “Elevate Security is solving the security industry's greatest challenge which presents tremendous expansion opportunities. The Elevate Security team has established solid success to-date, and I am excited to further scale and accelerate our impact to help more organizations optimize their security technology spend, reduce employee risk and improve their overall cyber resilience,” said Hieken. Hieken brings more than 25 years of technology and security expertise to the Elevate Security team with previous leadership roles at McAfee, Imperva and CA Software. About Elevate Security Elevate Security, the leader in Human Risk Management software, helps security leaders in enterprises measure, reduce and communicate human risk to keep their companies safe from cyber threats. One of the most challenging aspects of building a cybersecurity program is the human risk component. Elevate Security provides a way to quantify this human risk across the entire organization using security incident data that is already available. Quantifying human risk and analyzing it as part of an overall cyber risk framework provides unique insights to the Chief Information Security Officer (CISO). Armed with this insight, CISO’s are in a much better position to optimize their security technology spend, focus their monitoring and detection capabilities on the high risk groups and strengthen their overall cyber defense strategy. Medium and large enterprises across industries, from financial services, technology, healthcare and more, have benefited from increased cyber resilience by incorporating Elevate Security into their security infrastructure.

Read More

ThreatConnect partners Microsoft Graph Security API to Strengthen Security Automation

ThreatConnect | August 19, 2020

ThreatConnect, Inc.®, provider of the industry’s only intelligence-driven security operations solutions, announced today that it has joined the Microsoft Intelligent Security Association and will integrate Microsoft solutions with the ThreatConnect Threat Intelligence (TIP) and Security Orchestration Automation and Response (SOAR) Platform using the Microsoft Graph Security API. This integration allows ThreatConnect clients to connect with nearly any piece of Microsoft technology, including Azure Sentinel, O365, and Microsoft Defender ATP, using the Microsoft Graph Security API. The integration allows clients to retrieve alerts, perform data enrichment, gain relevant threat intelligence, and carry out incident response actions. The Microsoft Graph Security API is a single interface that connects to Microsoft security products. Through this integration, made possible by ThreatConnect’s robust App Services capability, clients are able to subscribe to and listen for Microsoft Graph Notifications, parse these notifications for subsequent operations, and manage Graph Mail and security alerts via ThreatConnect Playbooks. Some examples of actions supported:

Read More

Spotlight

Discover how well you can handle a cyber attack and how you can improve your disaster management.