Data Security

CyberHat secures $15 million in funding to expand its CYREBRO Enterprise-Level Cybersecurity Protection to Small and Medium-Sized Businesses

CYREBRO, the one-of-a-kind SOC as a stage arrangement by CyberHat declared today it has gotten $15 million in Series B financing, driven by Prytek, with support from InCapital, Mizrahi Bank, and past financial backer, Mangrove. This brings the complete organization subsidizing raised to date to $22M.

Upheld by a group of digital specialists, CYREBRO is democratizing admittance to best-of-breed network safety assets, changing how organizations today run their security tasks to rapidly react to and relieve digital dangers. CYREBRO is the principal innovation freethinker cloud-based security tasks focus (SOC) that is spearheading the SOC-as-a-Platform model. CYREBRO applies extensive endeavor level information security to associations against new dangers that have emerged from the distant workplace, including under-resourced private companies that have become ideal objectives for digital assaults.

The new subsidies will be utilized to extend CYREBRO's SOC-as-a-Platform to fulfill the detonating need for vigorous, versatile, straightforward, and basic security activities arrangements. Bringing to bear aptitude and conveying bespoke answers for undertakings across businesses, the subsidizing will speed up carry out of its contribution to the little to-medium estimated (SMB) market, separating hindrances to getting to fundamental network protection arrangements beforehand unattainable to the SMB client. Ludicrous year alone more than 47% of independent companies have encountered an information break or digital assault, and these occurrences can cut down a whole organization.

CYREBRO empowers organizations to unify online activities of the whole security stack, putting the force of big business grade SOC into the moderateness and adaptability of cloud-based assistance.

"CYREBRO is the subsequent stage in the advancement of working network safety and we are pleased to pioneer the SOC as a staged market," clarified Nadav Arbel, CEO of CyberHat. "Getting this round with our new and existing financial backers will empower us to speed up the improvement of CYREBRO and reinforce our range in the SMB market. We have made it our central goal to empower 1st-grade security tasks for associations of any size and any innovation stack, and all things considered, we are exceptionally eager to see the colossal development in CYREBRO customers across the globe."

CYREBRO's SOC stage is upheld by a group of cutting-edge digital examiners and measurable agents good to go, 24x7. The stage coordinates with any current security frameworks, devices, and programming, including all cloud-based stages and interior organization gadgets. CYREBRO offers a "turnkey" answer for SOC necessities, including the SIEM innovation (whenever required), danger chasing, danger insight, full-level investigators, analytical capacities, and a top notch IR accessible as needs are. Many universally settled organizations have effectively picked CYREBRO as their digital tasks stage to safeguard against information penetrates and assaults. This incorporates SMBs just as a basic foundation and enterprises like clubs, worldwide retailers, banks, insurance agencies, and other Fortune 500 organizations. Presently every SMB will approach these equivalent undertaking apparatuses and digital assurance assets.

"Prytek bunch, through our corporate endeavor arm, is eager to put resources into CyberHat. Cyberhat's answer will provide for our oversaw administrations to arm extra SOC capacities per request," said Arnon Shiboleth, Prytek Co-CEO. "We anticipate cooperating with the group as they keep on growing the innovation into new business sectors to satisfy the worldwide need."

About CYREBRO

CYREBRO was established in 2013 by CyberHat to help organizations take digital security to new and exceptional statures. Today, our central goal is to change network safety tasks by putting the force of an undeniable Security Operations Center (SOC) in the possession of any client in any association. Our group of head network protection specialists has built up the business' first on the web, innovation freethinker SOC-as-a-Platform. From vital observing to proactive danger chasing, sped up episode reaction, and upgraded consistency, we cover the full extent of safety needs.

About Prytek

Prytek imagined a news idea of a Business Operating Platform as a Service permitting banks to rethink whole activities. Prytek works in training, monetary help, digital and HR areas.

Spotlight

The challenges and risks of an everywhere world Every day, enterprise technology leaders are expected to support the digital imperative to work, develop, and deliver everything, everywhere — by bringing together distributed workforces, devices, clouds, systems, applications, and networks. But, there’s a problem. Technology teams

Spotlight

The challenges and risks of an everywhere world Every day, enterprise technology leaders are expected to support the digital imperative to work, develop, and deliver everything, everywhere — by bringing together distributed workforces, devices, clouds, systems, applications, and networks. But, there’s a problem. Technology teams

Related News

Software Security

DNSFilter Enhances Protective DNS Solution to Thwart New Threats

DNSFilter | December 15, 2023

DNSFilter today announced the addition of a new Malicious Domain Protection feature to its protective DNS software, building on its machine learning capabilities. This feature bolsters DNSFilter's enterprise-grade defenses providing better visibility and protection against Domain Generation Algorithms used in malware, botnet and other malicious domains, in addition to other threat vectors. This expands the company's threat detection capabilities and its ability to block large lists of undesirable domains and the security threats they pose. Enterprise security teams that manage and secure both modern and legacy infrastructure struggle to protect end users from all categories of web-based threats. DNSFilter scans every domain its customers access to identify zero-day threats and prevent access before they infiltrate the network. Malicious Domain Protection leverages new ML capabilities to assist in the identification of risky domain strings, which includes domain generation algorithms (DGA) and other threat vectors. DGAs are used in malware to generate up to 250,000 domain names each day for use as rendezvous points with their C&C servers. Malicious Domain Protection can identify more threats, including phishing, cryptojacking, botnet, ransomware and other spam domains, and catch them sooner. In the testing phase, Malicious Domain Protection identified more than 7,000 risky domains not yet identified by any other feeds. Threats were identified up to 10 days ahead of other third-party feeds with one domain being caught 59 days ahead. David Elkind, chief data scientist, DNSFilter, said: "We are constantly working to offer better awareness and remediation of threat vectors. DNSFilter has a powerful data collection engine, supplemented by third-party feeds and we are always innovating new ways to use this data to protect our customers. We intend to take full advantage of all this data to protect our customers. With this new addition, our customers have even more safeguards." About DNSFilter DNSFilter is redefining how organizations secure their largest threat vector: the Internet itself. DNSFilter is making the internet safer and workplaces more productive. In 2022 the threat protection leader blocked 9.1 billion threats, more than any other threat detection software globally. With 70% of attacks involving the Domain Name System (DNS) layer, DNSFilter provides protective DNS powered by machine learning that uniquely identifies 61% more threats than competitors on an average of seven days earlier, including zero-day attacks. Over 26 million monthly users trust DNSFilter to protect them from phishing, malware, and advanced cyber threats. DNSFilter's brands include Webshrinker, its next generation web categorization software, and Guardian, a consumer app focused on privacy protection.

Read More

Software Security

Keeper Streamlines Compliance Processes With Granular Sharing Enforcements

Keeper Security, Inc. | January 11, 2024

Keeper Security, the leading provider of zero-trust and zero-knowledge cybersecurity software protecting passwords, passkeys, privileged access, secrets and remote connections, announces Granular Sharing Enforcements will soon be available for all products in the Keeper® platform. Granular Sharing enables administrators to enforce detailed creating and sharing permissions at the user level. By implementing these permissions, organizations can ensure employees only have access to the resources necessary for their roles, minimizing the risk of unauthorized access, data breaches and lateral movement within a network. "It's critical for organizations to have security solutions that help them adhere to increasing regulations and compliance requirements," said Craig Lurey, CTO and Co-founder of Keeper Security. "Granular permission control helps organizations enhance their security posture by restricting access to sensitive information and systems. With Granular Sharing Enforcements, it's easier than ever for IT administrators to better control the principle of least privilege and streamline operations within their organizations." Keeper's added Granular Sharing Enforcement policies provide more detailed restrictions that administrators can apply to users for both creating and sharing records. Most employees do not need access to all of the data or functionalities within an organization, and many industries and geographical regions have specific regulations and compliance requirements regarding data protection and privacy, including HIPAA, GDPR, PCI DSS and SOX. Granular permission controls enable organizations to align with local and industry regulations by allowing them to define and enforce access policies. This helps in ensuring the organization is compliant with industry standards and legal requirements. Key features of Keeper's Granular Sharing Enforcements include: Auditing: Keeper provides clear alerting and reporting on over 100 different event types. Version control: Only a small subset of users have permissions to update or share records, helping teams ensure information is consistent and accurate. Seamless access on any device: Keeper provides the same user experience across platforms, ensuring cross functionality and ease of use, whether on web, desktop or mobile. Encryption: Keeper provides secure sharing with elliptic curve encryption, ensuring cybercriminals cannot intercept passwords or other shared records in transit. Keeper Administrators can easily customize permissions to best suit the compliance needs of their organization. Administrators modify permissions in the Enforcement Policies section of the Admin Console for the chosen role by selecting Creating and Sharing. Most permissions are activated by default for maximum security. Enforcements have been designed to be simple and powerful, allowing admins to choose the appropriate settings for their unique needs. Granular Sharing Enforcements will be available for all sharing needs within Keeper's Enterprise Password Manager, Keeper Secrets Manager and KeeperPAM. With Keeper's zero-knowledge password management and security platform, IT administrators have complete visibility into employee password practices, enabling them to monitor password use and enforce password security policies, including strong, unique passwords, Multi-Factor Authentication (MFA), Role-Based Access Control (RBAC), and other security policies. Keeper Secrets Manager® is a fully managed cloud-based, zero-knowledge platform for securing infrastructure secrets such as API keys, database passwords, access keys, certificates and any type of confidential data. Its latest offering, KeeperPAM™, provides next-generation Privileged Access Management (PAM) that is disrupting the traditional PAM market. KeeperPAM delivers enterprise-grade password, secrets and privileged connection management within a unified SaaS platform that is cost-effective, easy to use and simple to deploy. KeeperPAM enables least-privilege access with zero-trust and zero-knowledge security. Enterprises select Keeper because of its strong security architecture, ability to support federated and passwordless authentication with any identity provider, seamless integration into on-premises, cloud or hybrid environments and ease of use across desktop and mobile devices. About Keeper Security Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper's affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance. Trusted by millions of individuals and thousands of organizations, Keeper is the leader for best-in-class password and passkey management, secrets management, privileged access, secure remote access and encrypted messaging.

Read More

Data Security

GuidePoint Security Announces Portfolio of Data Security Governance Services

GuidePoint Security | January 30, 2024

GuidePoint Security, a cybersecurity solutions leader enabling organizations to make smarter decisions and minimize risk, today announced the availability of its Data Security Governance services, which are designed to help customers address the challenges of unstructured data and data sprawl through a proven process and program to meet their unique needs. GuidePoint’s Data Security Governance services consist of policies, standards, and processes leveraging the newest technologies to meet organizations’ data governance goals in both on-prem and cloud environments. Once the right strategy is determined with the customer, GuidePoint Security consultants will review program requirements, assess current policies and controls, perform gap analysis, design and develop/enhance the program, recommend and implement supporting technologies, and create operational processes and metrics. “Whether an organization is just beginning to build their data security governance program or needs help assessing and improving an existing program, our team and service capabilities are built to meet them at their current maturity level,” said Scott Griswold, Practice Director - Security Governance Services, GuidePoint Security. “We work side by side with the customer to conduct the necessary data discovery in their environment and provide tailored recommendations for solutions and processes to ultimately build/improve upon the data security governance program.” GuidePoint’s Data Security Governance Services include: Sensitive Data Cataloging: For organizations just getting started in the process of protecting their sensitive data, GuidePoint offers Data Identification workshops to identify sensitive data types in the environment, including trade secrets, intellectual property, and sensitive business communications. Data Security Governance Program Assessment: For organizations with existing Data Security Governance or Data Protection programs, GuidePoint Security experts will assess the program to identify policy non-compliance, gaps in data protection requirements—whether legal, regulatory, contractual, or business—and program maturity levels. Data Security Governance Program Strategy Development: The GuidePoint team will work with an organization's key stakeholders to design a program strategy aligned with relevant requirements. The outputs of this effort include delivering ongoing sensitive data discovery, automated classification and labeling, the application of required sensitive data protections, restrictions on where sensitive data can be stored and sent, and data retention policy enforcement. Merger and Acquisition Data Identification: This offering provides the ability to identify sensitive data within an M&A target or recent acquisition (including locations, amounts, and access rights) and then perform penetration testing on the storage repositories where that sensitive data exists to determine the risk of data compromise. About GuidePoint Security GuidePoint Security provides trusted cybersecurity expertise, solutions and services that help organizations make better decisions that minimize risk. Our experts act as your trusted advisor to understand your business and challenges, helping you through an evaluation of your cybersecurity posture and ecosystem to expose risks, optimize resources and implement best-fit solutions. GuidePoint’s unmatched expertise has enabled a third of Fortune 500 companies and more than half of the U.S. government cabinet-level agencies to improve their security posture and reduce risk. Learn more at www.guidepointsecurity.com.

Read More