SOFTWARE SECURITY

Cybermaxx Cybersecurity Provider partners with Logi Analytics to strengthen MAXX Data Defense Systems Suite data analytics capabilities.

prnewswire | November 02, 2020

Today, Logi Analytics, the main supplier of installed examination answers for programming groups, and CyberMaxx, the pioneer in network protection tasks administrations for medical care associations, report another organization incorporating Logi Info into CyberMaxx's MAXX Data Defense Systems set-up of oversaw security administrations and arrangements. CyberMaxx will be revealing the new information examination capacities beginning November second, 2020.
Progressed information examination is a higher priority than any time in recent memory for network safety tasks groups – especially with cyberattacks expanding year-over-year for organizations, all things considered. For MSSPs like CyberMaxx, which is totaling information from various sources at the same time, viable representations and revealing is basic to guaranteeing their security administrations stay on top of things so their clients can settle on speedy choices and decrease their danger of a break. Presently with Logi Info, CyberMaxx is improving its information investigation and detailing capacities while as yet holding the innovative adaptability that has made it a powerful online protection accomplice to undertakings for more than 15 years.
"Enterprises are dealing with an increasing volume of threats, and MSSPs entrusted with protecting these firms can't afford to lose their knowledge advantage – or else breaches will only continue," says Brett Hansen, CMO at Logi Analytics. "With the Logi Symphony suite of services – including Logi Info – CyberMaxx is now able to embed powerful data analytics, reporting, and visualization capabilities into their MAXX suite of managed services – equipping their security team and customers with the threat visibility and actionable data insights that are the difference between partner safety and business disruption."
CyberMaxx has been giving overseen security administrations to endeavors for over 15 years, zeroing in on the three mainstays of individuals, cycle, and innovation to forestall, recognize, and react to cyberattacks. Eminently, CyberMaxx gives specific oversaw security administrations to endeavors in the medical care, money related administrations, and retail areas – requiring chief network safety skill as well as an intensive comprehension of the specific consistence needs every area requires. It's all day, every day/365 security activities place (SOC) and network safety group are more basic than any other time in recent memory for these organizations, and with Logi Info CyberMaxx can give clients will more noteworthy danger knowledge and announcing highlights that will forestall, distinguish and react to breaks quicker than at any other time.
"CyberMaxx is constantly pushing forward to anticipate our customers' needs and provide the highest level of service in our industry, which is evidenced today by our 99% customer retention rate.  The partnership with Logi and the combined force of the CyberMaxx and Logi teams have delivered an innovative data analytics platform with powerful dashboards that will help our customers prevent costly breaches."  said Thomas Lewis, CEO of CyberMaxx.
CyberMaxx can utilize Logi Info as a component of its more extensive Logi Symphony membership – which furnishes the MSSP with admittance to the full Logi Analytics programming suite for a solitary, set cost. As CyberMaxx's investigation needs develop over the long haul, they'll have the option to exploit the full broadness of Logi Analytics' bleeding edge implanted examination instruments effortlessly and cost-effectiveness.
Logi Analytics' insight and comprehension of installed examination is basic to network safety activities for organizations in 2020 and past. These instruments help improve perceivability of dangers and new or disregarded assault vectors, while making it simpler for IT experts to dissect and follow up on the information without disturbing application work process. For MSSPs, these capacities are taking on consistently expanding significance as endeavors move a greater amount of their IT activities to the cloud while the quantity of endpoint gadgets increments essentially – especially in the wake of the COVID-19 pandemic and the more extensive move to far off work thus.
About Logi Analytics
Logi Analytics empowers the world's software teams with the most intuitive, developer-grade embedded analytics solutions and a team of dedicated people, invested in your success. Logi leverages your existing tech stack, so you can quickly build, manage and deploy your application. And because Logi supports unlimited customization and white-labeling, you have total control to make the application uniquely your own. Over 2,200 application teams have trusted Logi to help power their businesses with sophisticated analytics capabilities.
About Cybermaxx
CyberMaxx prevents, detects, and responds to cyberattacks for healthcare organizations. CyberMaxx equips its customers with a 24/7/365 security operations center with services including endpoint threat detection and response, network-based threat detection and prevention, security information and event management (SIEM) with advanced data analytics, vulnerability risk management, and incident response services.

Spotlight

The 2019 Cyberthreat Defense Report surveyed 1,200 IT and security decision makers about cyberthreats and their plans to defend against them. The report revealed: 88% of mid-size enterprises reported a successful cyberattack. Nearly two-thirds of IT and security professionals believe a successful cyberattack is imminent. Detecting insider threats remains an enormous challenge for virtually every security organization.

Spotlight

The 2019 Cyberthreat Defense Report surveyed 1,200 IT and security decision makers about cyberthreats and their plans to defend against them. The report revealed: 88% of mid-size enterprises reported a successful cyberattack. Nearly two-thirds of IT and security professionals believe a successful cyberattack is imminent. Detecting insider threats remains an enormous challenge for virtually every security organization.

Related News

SOFTWARE SECURITY

Absolute Software Reveals Resilient Zero Trust Security Advances

Absolute Software | April 11, 2022

Absolute Software, a leading provider of self-healing endpoint and secure access solutions, today announced enhancements to its Secure Access product portfolio (formerly NetMotion by Absolute), allowing customers to reduce risk and improve UX in today's borderless, and work-from-anywhere environments. Absolute is introducing a number of new product improvements with this version, including self-healing Zero Trust Network Access (ZTNA), a resilient deployment architecture, and increased network and ZTNA policy intelligence. Absolute was recently named a Representative Vendor in Gartner's Zero Trust Network Access Market Guide for February 2022. Among the important findings in the report, Gartner states, “An increased focus by end-user organizations on zero trust strategies — and a desire to provide a more secure, flexible hybrid workforce connectivity — is driving increased interest in the ZTNA market.” Joe Savarese, EVP of Secure Access Products at Absolute said that “This release is an important milestone in our mission to be the leading ZTNA solution for the perimeter-less workplace, differentiated by resilience and reliability. The results from our customer beta test – our largest and most successful to date – validate that these new capabilities meet urgent and significant customer needs. As seamless secure access has become imperative for the perimeter-less workplace, administrators need easy-to-implement ZTNA solutions that deliver both maximum security and an optimal user experience.” IT and security professionals can now secure essential infrastructure, apps, devices, and data without sacrificing user productivity thanks to these product upgrades. The following are some of the advantages: Truly resilient ZTNA: Absolute's self-healing ZTNA client for Windows is capable of autonomously repairing or reinstalling itself if tampered with, unintentionally deleted, or otherwise ceased operating – guaranteeing that it stays healthy and provides the full intended value. Resilient deployment architecture: Absolute has introduced Resilience to its distributed network architecture utilizing active-active server technology, bringing the advantages of Software-as-a-Service (SaaS) to customer-managed settings, such as high availability, horizontal scale-out, and zero downtime updates. This ground-breaking solution allows individual system components to self-heal in the case of a breakdown and assures that other servers may take over if necessary, preventing interruption or denial-of-service to end users without the need for administrator involvement. Dynamic re-authentication and secure access enforcement: Customers may now more easily implement current cloud authentication solutions to reduce the risk exposure associated with compromised credentials via dynamic re-authentication and secure access enforcement. Enhancements include the ability to challenge a user's security credentials if circumstances or the environment change and compel them to re-authenticate using an existing mechanism, such as Multi-factor Authentication (MFA). Foundational zero trust security: New ZTNA policy actions improve the basis of zero trust security posture, boosting the capacity to safeguard workers from accessing harmful apps and network locations and restricting lateral movement. Expanded diagnostics and monitoring capabilities: Enhanced diagnoses and monitoring capabilities: With the introduction of Absolute Insights for Network, the firm has expanded its current diagnostics and monitoring capabilities (formerly NetMotion Mobile IQ). This includes ARM device support for MacOS and Windows, as well as improved intelligence for 5G networks (e.g., signal quality, network availability, network coverage, and network usage) and ZTNA policy enforcement (e.g., policy-blocked hosts/websites, addresses/ports, and web reputation) to reduce phishing, smishing, and other malicious activity.

Read More

DATA SECURITY

Huawei and RCR Wireless Host a Fireside Chat on Zero-Trust Cybersecurity Strategy

Huawei | May 13, 2021

In collaboration with RCR Wireless, Huawei Technologies USA held a fireside chat with Andy Purdy, Chief Security Officer at Huawei Technologies USA, and Sean Kinney, Editor in Chief at RCR Wireless, to explore how organizations can understand and adopt zero-trust strategies. Purdy, a cybersecurity specialist, provides insights into accelerating the global adoption of standardized processes for ensuring the security of all telecom devices. He also discusses the wider implications of Huawei's inclusion on the US export controls list on the supply chain. While the list was established to protect national security, it has grown in scope and has had unexpected consequences for the global supply chain. The fireside chat, which can be seen here, goes into greater detail on the importance of reestablishing global trust and cooperation to maintain a regular supply chain. Zero-trust cybersecurity strategies can promote an environment for innovation while also protecting national security through an intervention based on facts, verification, transparency, and risk management. The zero-trust model, which is based on never trusting and always verifying, assists companies in minimizing damage and reducing the possibility of hackers trying to infiltrate their systems. Following SolarWinds and other cyberattacks, the cybersecurity community has recognized the crucial importance of transparency and accountability. Experts emphasize the growing importance of incentives to encourage companies to uphold secure cybersecurity practices, as well as the need to hold organizations accountable when they fail to do so. Are telecom operators building their networks following zero-trust principles? What will experts do to improve industry assurance, accountability, and transparency? What else will Huawei do to push for the global adoption of standardized processes for checking the security of all telecom equipment, not just Huawei's? And how has Huawei's inclusion on the U.S. Commerce Department's Bureau of Industry and Security entity list affected the company overall? Purdy and Kinney delve into these and other issues, including actionable insights into making cyberspace safer and more transparent by using zero-trust cybersecurity. About Huawei Huawei is a world leader in infrastructure and smart devices for information and communications technology (ICT). We are dedicated to bringing digital to every person, home, and enterprise through interconnected technologies across four key domains – telecom networks, IT, smart devices, and cloud services – for a fully connected, intelligent world. Huawei's whole product, solution, and service portfolio are both competitive and secure. We create long-term value for our customers by an open partnership with ecosystem partners, collaborating to empower people, enhance home life, and inspire innovation in organizations of all sizes. Huawei innovates to meet the needs of its customers. We make significant investments in basic research, focusing on technological breakthroughs that drive the world forward. We hire over 188,000 people and operate in over 170 countries and regions. Huawei, which was established in 1987, is a private company that is entirely owned by its employees.

Read More

DATA SECURITY

To boost customer defences against cybersecurity threats, Cybereason chooses Oracle Cloud infrastructure

prnewswire | December 21, 2020

Prophet today reported that Cybereason, an innovator in future-prepared insurance, received Oracle Cloud Infrastructure (OCI) as its favored stage to control the Cybereason Defense Platform and backing its worldwide extension. The two organizations are cooperating to help secure endeavors against cutting edge online protection dangers at each endpoint and across the undertaking. With Oracle Cloud Infrastructure's worldwide versatility, quick, microsecond dormancy organization and ease, the Cybereason Defense Platform is to convey ground-breaking danger counteraction and discovery capacities through cutting edge conduct investigation and profound logical connections. Controlled by Oracle Cloud, Cybereason clients will profit by a cloud-local design that makes sure about endpoints on a worldwide scale, and quick sending through Oracle's help of industry standard, open source instruments like Terraform and Ansible. "We're excited to collaborate with Oracle to enhance our company's cloud infrastructure for our award-winning unified protection platform. We chose Oracle Cloud Infrastructure because of its security-first approach and performance. Together, we will deliver unmatched visibility and risk reduction to our global customer base. Additionally, the Oracle Cloud global footprint will enable Cybereason to offer in-country hosting in more locations for meeting regulatory data sovereignty requirements," said Lior Div, Cybereason CEO and cofounder. Not at all like other endpoint security arrangements that depend on caution driven ways to deal with insurance, Cybereason offers an activity driven methodology that empowers security groups to quit pursuing alarms and naturally pick up perceivability into vindictive tasks by aggressors. Cybereason conveys a main proportion of one investigator to 200,000 endpoints, empowering endeavor security groups to acknowledge expanded operational effectiveness. The Cybereason arrangement improves the productivity in identification and reaction of dangers by 93%1 and takes out arising dangers very quickly versus days. "Cybereason joins a growing roster of companies adopting Oracle Cloud Infrastructure for its leading security and price performance advantages delivered across its global cloud footprint," said Clay Magouyrk, executive vice president, Oracle Cloud Infrastructure. "Adopting Oracle Cloud Infrastructure will enhance Cybereason's ability to deliver insights into threats across thousands of endpoints and enable customers to stay one step ahead of today's most nefarious attacks." Prophet and Cybereason likewise went into an organization to together market and sell arrangements. Cybereason's driving endpoint insurance stage is advanced for conveyance by means of Oracle's second-age worldwide cloud districts. The arrangement is accessible through Cybereason and in the Oracle Cloud Marketplace, where clients can look for accessible applications and administrations to locate the best business answers for their associations. About Cybereason Cybereason is the champion for today's cyber defenders providing future-ready attack protection that unifies security from the endpoint, to the enterprise, to everywhere the battle moves. The Cybereason Defense Platform combines the industry's top-rated detection and response (EDR and XDR), next-gen anti-virus (NGAV), and proactive threat hunting to deliver context-rich analysis of every element of a Malop (malicious operation). The result: defenders can end cyber attacks from endpoints to everywhere. Cybereason is a privately held, international company headquartered in Boston with customers in more than 30 countries.

Read More