DATA SECURITY

Credence Security, a Leading Cybersecurity and Digital Forensics Value-Added Distributor, has Launched a New Partner Portal

CREDENCE SECURITY | June 03, 2021

The demand for leading cybersecurity and digital forensics solutions is higher than ever. For over 20 years, Credence Security, a PAN-EMEA specialty distributor, has led in these areas along with governance, risk, and compliance, based in Dubai and regional presence in Johannesburg, London, Nairobi, New Delhi, and Saudi Arabia. Credence Security provides cybersecurity and digital forensics solutions to both public and private sector enterprises through a select network of specialist resellers.

In exciting news from the company, in response to its continued rapid growth, Credence Security recently announced the launch of its new Credence Security Partner Portal, which will enable easier deal registration, better tracking of opportunities, and SPIFF programs, access to sales and marketing materials, and much more. This is expected to be a precious tool for the company's resellers.

"Our channel partners are one of our most important relationships," commented Philip Cherian, Regional Channel Director. "We paid attention to our partner feedback and enhanced our Channel Partner Program and Partner Experience Portal, doubling down on our commitment to helping them succeed by continuing to invest in our Channel, tools, and infrastructure to support our partners across the region and make it even easier for them to do business with our vendors and us."

Credence Security is built on the foundation of 4 focus pillars – Continuous Adaptive Risk and Trust Assessment, Data Protection and Governance, Digital Forensics and Incident Response and Identity, Payments, and Data Security. "The value delivered in all of these areas is something that continues to grow, both as technology advances, but also from the company making every effort to understand the challenges partners and clients face so they can be more effectively addressed," commented Moe Bux, Regional Sales Director. "This strategy has been a key component in Credence Security's success and continued value-added growth."

The Credence Security Partner Portal launch arrives on the back of a record-breaking year for the channel team, which saw its best year across the channel in respect of:

• Channel team growth
• Overall revenue growth generated by our specialist resellers
• Partner growth in both geographical as well as vertical expansion

ABOUT CREDENCE SECURITY

Established in 1999, Credence Security, a PAN-EMEA specialty distributor, is cybersecurity, forensics, governance, risk, and compliance. Unlike most other distributors, we take a consultative "value-add" solution approach; we collaborate with our partners and their customers to understand their needs, both from a technology and business perspective, and then work very closely with our partners to deliver tailor-made solutions. Working closely with globally recognized, award-winning vendors including AccessData, ESET, Entrust, Magnet Forensics, ZeroFox, and Trustwave, Credence Security provides best-in-class, Cybersecurity and Forensics technologies and solutions to protect organizations against advanced persistent threats, malicious adversaries, and internal malpractice.

Spotlight

Transformation of the backup infrastructure is the next frontier for IT and storage managers. Backup is an area where architectures are only slowly evolving, and "never touch a running system" is the mantra in many organizations. However, the transformation of the IT infrastructure that is happening in most IT departments today, starting with the introduction of server virtualization technologies and driving towards greater levels of automation and orchestration, has a significant impact on current and future data protection architectures.

Spotlight

Transformation of the backup infrastructure is the next frontier for IT and storage managers. Backup is an area where architectures are only slowly evolving, and "never touch a running system" is the mantra in many organizations. However, the transformation of the IT infrastructure that is happening in most IT departments today, starting with the introduction of server virtualization technologies and driving towards greater levels of automation and orchestration, has a significant impact on current and future data protection architectures.

Related News

DATA SECURITY,PLATFORM SECURITY,SOFTWARE SECURITY

Qumulo Helps Customers Avoid the Complexity of Protecting Unstructured Data with its Comprehensive Approach to Data Security

Qumulo, Inc. | November 11, 2022

Qumulo, the radically simple way to manage petabyte-scale data anywhere, today announced the launch of the company’s new corporate security initiative “Simply Secure,” a multi-layered approach designed to protect data across multiple points of vulnerability. Qumulo’s “Simply Secure” initiative is meant to help organizations minimize the risk of business disruption and protect their data from theft or loss with a complete suite of security features that continue to harden over time, all-inclusive with their Qumulo® subscription, without additional cost for future releases. The unprecedented rise in cyber threats in recent years is creating dire consequences for businesses: multi-million dollar ransom payments, days or weeks in disruption of operations, and potential loss of valuable data sets. Not only that, cyber attacks which become public often leave behind permanent reputational damage. While most organizations understand and respect the risk of poor security posture, many are strapped for cycles, time, and expertise to build adequate defenses around their unstructured data. Qumulo is meeting its customers anywhere – edge, core, and in the cloud – with a holistic approach to security, making it simple for customers to protect their data from ransomware attacks, data theft, and data destruction. Qumulo not only helps customers ensure lighting-fast recovery but also helps proactively detect and prevent anomalies, so organizations and end users can simply secure their sensitive data. Customers are granted access to each new security feature every two weeks, which is available through non-disruptive software upgrades, increasing the value of Qumulo clusters over time. “Qumulo’s focus on radical simplicity means it's taken an approach to security that makes it as easy as possible for customers to protect their data everywhere it’s stored.” Kiran Bhageshpur, Chief Technology Officer at Qumulo Qumulo is constantly developing new and enhancing existing features to provide the most robust security possible. The most recent releases add five new layers to storage security for greater data protection, including: Multi-tenancy VLAN Isolation: Organizations can now use virtual local area networks (VLANs) to isolate administrative interfaces from their file system clients, such that the general network population cannot reach the interfaces. This adds an additional guarantee of network protection, while helping consolidate multiple use cases on a single cluster, resulting in potential cost savings. Single sign-on & Access Tokens: Cluster administrators can now eliminate the need for sensitive user passwords when logging into the Qumulo administrator UI or API since user credentials are prime targets for theft by cyber attackers. NFSv4.1 Kerberos Authentication & Encryption: All data is encrypted before transmitting across networks, preventing any bad actor that intercepts the data from understanding it in plain text. Federal Information Processing Standards (FIPS) 140-2 certification of Qumulo encryption: Now, customers with FIPS requirements can maintain compliance and independently verify that Qumulo’s data-at-rest encryption meets the standards set by the National Institute of Standards and Technology (NIST). Customers who don’t require FIPS certification can rest assured their data is protected by the highest standards. OpenMetrics API provides telemetry data to 3rd party monitoring and alerting systems, so organizations can proactively detect and quickly respond to anomalies at risk of disrupting operations such as an attack-in-progress. “Trust is mission critical when it comes to security,” said Kathy Ahuja, VP of Information Security at Qumulo. “That’s why we’ve built a security posture with FIPS 140-2 accreditation and enhanced encryption that provides the greatest level of protection for our cryptographic modules. Our customers know they can trust Qumulo with their data. And as cybercriminals continue to advance their own breach strategies, we’re well prepared to continue to improve our security measures to match and defeat the complexities of these attacks.” About Qumulo, Inc. Qumulo is the radically simple way to manage petabyte-scale data anywhere – edge, core or cloud – on the platform of your choice. In a world with trillions of files and objects comprising 100+ Zettabytes worldwide, companies need a solution that combines the ability to run anywhere with simplicity. This is precisely what Qumulo was founded to accomplish.

Read More

DATA SECURITY, PLATFORM SECURITY, SOFTWARE SECURITY

BlackBerry Strengthens Cybersecurity Platform to Provide Customers with Greater Threat Identification, Remediation Capabilities, and Endpoint Support

BlackBerry | October 27, 2022

Today at the BlackBerry Security Summit, BlackBerry Limited announced powerful enhancements to its AI-based cybersecurity portfolio that will help customers strengthen their overall security posture, improve workflows, and ensure business resilience. Capabilities include enhanced data context for zero-trust network access, and faster, more efficient operations to stay one step ahead of today's and tomorrow's threats. "BlackBerry is focused on delivering solutions that help businesses safeguard their sensitive data, solve challenges and stay on top of a rapidly evolving cyber threat landscape. "These new capabilities further strengthen our end-to-end approach to cybersecurity that's deeply rooted in the advanced intelligence of our Cylance® platform, which time and again has been proven to identify and stop attacks before they can even start." Billy Ho, Executive Vice President, Security Products at BlackBerry Key enhancements include: BlackBerry® UEM BlackBerry UEM's unrivalled maturity allows customers to benefit from new APIs that offer significantly reduced administrative overhead. This is in addition to stronger integration of all Google services from ChromeOS to Android, offering unified administration and an improved user experience. BlackBerry UEM will also offer greater eSIM integration to enhance a user's digital SIM experience. CylancePROTECT®, CylanceOPTICS®, CylanceGUARD® Threat hunters now have access to a single-pane view of the most critical issues with the ability to act quickly. Significant updates across triage and analysis workflows provide a dramatically improved user experience that reduces operational burden, improves investigation speed, and lowers the total cost of ownership; critical for analysts as they investigate and respond to endpoint threats. CylanceGATEWAY™ In addition to endpoint, network, and user telemetry, BlackBerry's ZTNA offering, CylanceGATEWAY, now provides data access and leakage visibility via a newly launched data loss detection module, CylanceAVERT™. CylanceGATEWAY also receives enhanced network anomaly detection to identify threats, broadened support for cloud workspaces and more granular access control. By constantly monitoring data and application access patterns across endpoints, email, and SaaS applications, organizations are now better equipped to detect and prevent malicious activity, including compromised accounts and insider threats, which Gartner estimates are responsible for 50 to 70 percent of all security incidents and 75 percent of all security breaches. "The cybersecurity workforce shortage has elevated the need for efficiency to be as important as efficacy as security professionals aim to stay ahead of a constant barrage of complex, competing and evolving threats," said Frank Dickson, Group Vice President, Security and Trust at IDC. "Added controls, workflow improvements and contextual nuance provide organizations with the ability to act quickly in detecting and responding to endpoint threats and are in desperate need by an industry facing a critical talent gap." The UX workflow improvements and data context additions will be available later this year and early next year through CylancePROTECT, CylanceOPTICS, CylanceGUARD, CylanceGATEWAY, and BlackBerryUEM offerings. About BlackBerry BlackBerry provides intelligent security software and services to enterprises and governments around the world. The company secures more than 500M endpoints including 215M vehicles. Based in Waterloo, Ontario, the company leverages AI and machine learning to deliver innovative solutions in the areas of cybersecurity, safety, and data privacy solutions, and is a leader in the areas of endpoint security, endpoint management, encryption, and embedded systems. BlackBerry's vision is clear - to secure a connected future you can trust.

Read More

DATA SECURITY, PLATFORM SECURITY, SOFTWARE SECURITY

BeyondTrust and NCS Partner to Strengthen Cybersecurity Posture for APAC Organisations

BeyondTrust | September 19, 2022

BeyondTrust, the leader in intelligent identity and access security, announced today a new strategic partnership with NCS Group, a leading technology services firm that provides services and solutions in consulting, digital, technology, cybersecurity and more. A strong player in identity security, NCS will be using the technology provided by BeyondTrust to offer companies best practice solutions in Privileged Access Management (PAM), a core component of enabling Zero Trust security. Organisations today are evolving as a result of digital transformation, an accelerating shift to cloud, and an expanded remote workforce. However, these changes are also creating an increase in vulnerable endpoints and remote access, as well as a large number of digital identities that pose a significant cybersecurity risk if left unmanaged and unsecured. According to Gartner, unauthorised privileged access is now the primary method that threat attackers use to infiltrate an organisation's systems and network. "From the rise of ransomware to an increased focus on digital transformation and Zero Trust strategies, it is a critical time for organisations to be equipped with solutions that can secure identities, safeguard access for remote employees, and strengthen endpoint security across hybrid environments. "Through this partnership, BeyondTrust and NCS will enable organisations in Asia Pacific with our Privileged Access Management (PAM) solutions to address these cybersecurity challenges." Ben Wong, Director of Channel and Alliance for Asia Pacific & Japan at BeyondTrust "When organisations think of access management, they may only think of traditional password management – and that should not be the case. There is an urgent need for organisations to implement more advanced endpoint security and access management solutions and many are still playing catch up in this area," said Mr. Wong. "This partnership with NCS enables us to provide tailored PAM solutions to customers across a wide range of industries from government to the commercial sectors. Combining the skills and experience of NCS with BeyondTrust's leading portfolio of PAM solutions will help their customers defend against the evolving threat landscape." BeyondTrust is a leader in the 2022 Gartner Magic Quadrant for PAM for the fourth year running, with a comprehensive PAM portfolio that enables identity and access security that is monitored, managed, secured, and just-in-time, and includes these solutions:: Privileged Password Management Secure Remote Access Endpoint Privilege Management Cloud Security Management About NCS Group NCS, a subsidiary of Singtel Group, is a leading technology services firm with presence in Asia Pacific and partners with governments and enterprises to advance communities through technology. Combining the experience and expertise of its 10,000-strong team across 55 specialisations, NCS provides differentiated and end-to-end technology services to clients with its NEXT capabilities in digital, cloud and platforms, as well as core offerings in application, infrastructure, engineering and cybersecurity. NCS also believes in building a strong partner ecosystem with leading technology players, research institutions and start-ups to support open innovation and co-creation. For more information, visit ncs.co. About BeyondTrust BeyondTrust is the worldwide leader in intelligent identity and access security, empowering organisations to protect identities, stop threats, and deliver dynamic access to empower and secure a work-from-anywhere world. Our integrated products and platform offer the industry's most advanced privileged access management (PAM) solution, enabling organizations to quickly shrink their attack surface across traditional, cloud and hybrid environments.

Read More