DATA SECURITY

CyberMDX Joins the Microsoft Intelligent Security Association

CyberMDX | April 21, 2021

CyberMDX, a leading healthcare cybersecurity provider that provides visibility and threat prevention for medical devices and clinical networks, announced today that it has joined the Microsoft Intelligent Security Association (MISA), an ecosystem of independent software vendors and managed security service providers that have integrated their security solutions with Microsoft to better defend against a wide range of threats. CyberMDX's leading Healthcare Security Suite has been integrated with Microsoft Defender for Endpoint to provide robust visibility and incident management for medical devices and IoT.

The integration combines CyberMDX's unmanaged network visibility and identification capability with Microsoft Defender for Endpoints' single pane of glass view of the managed network to provide healthcare organizations with unrivaled cross-platform device visibility, classification, and incident response capabilities. The built-in automation allows security teams to go from warning to remediation in minutes and at scale.

Customers will benefit from CyberMDX's ability to automatically identify and label unmanaged clinical assets, such as medical equipment and IoMT, to establish an accurate inventory of all connected devices within the network, in addition to the visibility benefits and identification capabilities.

About CyberMDX

CyberMDX is a medical cybersecurity pioneer and the firm behind the leading IoMT visibility and security solution. CyberMDX identifies, categorizes, and defends wired medical equipment, preserving resiliency, patient protection, and data privacy. Risks are quickly mitigated and assets streamlined with CyberMDX's continuous endpoint discovery and mapping, comprehensive risk management, AI-powered containment & reaction, and operational analytics.CyberMDX is a medical cybersecurity pioneer and the firm behind the leading IoMT visibility and security solution. CyberMDX identifies, categorizes, and defends wired medical equipment, preserving resiliency, patient protection, and data privacy. Risks are quickly mitigated and assets streamlined with CyberMDX's continuous endpoint discovery and mapping, comprehensive risk management, AI-powered containment & reaction, and operational analytics.

Spotlight

Trusteer has been protecting customers against cybercrime since 2006. Based on our accumulated experience with hundreds of customers and millions of protected endpoints, we have created a framework that includes 7 key requirements for selecting a cybercrime prevention solution.

Spotlight

Trusteer has been protecting customers against cybercrime since 2006. Based on our accumulated experience with hundreds of customers and millions of protected endpoints, we have created a framework that includes 7 key requirements for selecting a cybercrime prevention solution.

Related News

DATA SECURITY

Perfect storm of cybersecurity risks threatens the hybrid workplace

HP Wolf Security | November 01, 2021

HP Inc. today released its latest HP Wolf Security report: Out of Sight & Out of Mind, a comprehensive global study highlighting how the rise of hybrid work is changing user behavior and creating new cybersecurity challenges for IT departments. The research shows that a growing number of users are buying and connecting unsanctioned devices outside of IT’s purview. It also highlights that threat levels are rising, with attackers increasingly successful at bypassing defenses and tricking users into initiating attacks through phishing. All of this is making IT support more complex, time-consuming, and costly than ever. The report combines data from a global YouGov online survey of 8,443 office workers who shifted to Working from Home (WFH) during the pandemic, and a global survey of 1,100 IT decision makers conducted by Toluna. Key findings include: New Shadow IT buying and installing endpoints with security out of mind: ‘Shadow IT’ typically refers to non-IT departments deploying software beyond the purview of IT. This shadow is now spreading, with individuals procuring and connecting devices without being checked by IT. 45% of office workers surveyed purchased IT equipment (such as printers and PCs) to support home working in the past year. However, 68% said security wasn’t a major consideration in their purchasing decision, while 43% didn’t have their new laptop or PC checked or installed by IT, and 50% said the same of their new printer. Phishing becoming increasingly successful: 74% of IT teams have seen a rise in the number of employees opening malicious phishing links or attachments on emails in the last 12-months. 40% of office workers surveyed aged 18-to-24 have clicked on a malicious email with almost half (49%) saying they have done so more often since working from home. Of office workers that clicked or nearly clicked a link, 70% didn’t report it to IT – 24% didn’t think it was important, 20% cited the “hassle factor”, while 12% had a fear of reprisal or being punished. Increase in devices being compromised fuels growth in rebuild rates: 79% of IT teams report rebuild rates increased during the pandemic. Rebuild rates directly correlate to the number of endpoints that require wiping and reimaging because they have been compromised, which implies more attackers are successfully breaching outer defenses. The real figure could be higher still: 80% of IT teams worry that employee devices might be compromised and they don’t know about it. "People often don't know if they have clicked on something malicious, so the real numbers are likely much higher," comments Ian Pratt, Global Head of Security for Personal Systems, HP Inc. "Threat actors don't always announce themselves, as playing the 'long game' to move laterally and infiltrate higher-value infrastructure has proven to be more lucrative. For example, by using cloud backups to exfiltrate sensitive data in bulk, encrypting data on servers, then demanding a multi-million-dollar ransom.” Pratt continues: "It shouldn't be this easy for an attacker to get a foothold - clicking on an email attachment should not come with that level of risk. By isolating and containing the threat you can mitigate any harmful impact, preventing persistence and lateral movement." With threats rising, it’s becoming more difficult for IT teams to deliver security support. 77% of IT teams said the time it takes to triage a threat has increased in the past year, while an estimated 62% of alerts relating to the endpoint are false positives, leading to wasted time. With IT teams tied up dealing with alerts, it’s becoming harder for them to onboard employees and identify threats: 65% of IT teams said that patching endpoint devices is more time-consuming and difficult due to the mass shift to home working, while 64% said the same of provisioning and onboarding new starters with secure devices. As a result, IT teams estimate the cost of IT support in relation to security has risen by 52% in the last 12-months. 83% of IT teams said the pandemic has put even more strain on IT support because of home worker security problems, while 77% of IT teams say homeworking is making their job much harder and that they fear teams will burnout and consider quitting. “As IT continues to grow in complexity, security support is becoming unmanageable,” Pratt concludes. "For hybrid working to be a success, IT security teams need to be freed from spending hours provisioning and fielding user access requests so they can focus on tasks that add value. We need a new security architecture that not only protects against known and unknown threats, but that helps to reduce the burden to liberate cybersecurity teams and users alike. By applying the principles of Zero Trust, organizations can design resilient defenses to keep the business safe and recover quickly in the event of a compromise.” HP is helping organizations to secure the hybrid workplace by delivering endpoint security that provides teams with greater visibility and management tools. With HP Wolf Security1 organizations benefit from robust, built-in protection from the silicon to the cloud, and BIOS to browser. HP Wolf Security provides the ideal support for securing the hybrid workplace – for example HP Sure Click Enterprise2 reduces the attack surface by rendering malware, delivered via email, browser or downloads, harmless through threat containment and isolation. HP Wolf Security enables teams to deliver defense-in-depth and enhanced protection, privacy, and threat intelligence, gathering data at the endpoint to help protect the business at large. About HP Wolf Security From the maker of the world’s most secure PCs3 and Printers4, HP Wolf Security is a new breed of endpoint security. HP’s portfolio of hardware-enforced security and endpoint-focused security services are designed to help organizations safeguard PCs, printers, and people from circling cyber predators. HP Wolf Security provides comprehensive endpoint protection and resiliency that starts at the hardware level and extends across software and services.

Read More

SOFTWARE SECURITY

Cybermaxx Cybersecurity Provider partners with Logi Analytics to strengthen MAXX Data Defense Systems Suite data analytics capabilities.

prnewswire | November 02, 2020

Today, Logi Analytics, the main supplier of installed examination answers for programming groups, and CyberMaxx, the pioneer in network protection tasks administrations for medical care associations, report another organization incorporating Logi Info into CyberMaxx's MAXX Data Defense Systems set-up of oversaw security administrations and arrangements. CyberMaxx will be revealing the new information examination capacities beginning November second, 2020. Progressed information examination is a higher priority than any time in recent memory for network safety tasks groups – especially with cyberattacks expanding year-over-year for organizations, all things considered. For MSSPs like CyberMaxx, which is totaling information from various sources at the same time, viable representations and revealing is basic to guaranteeing their security administrations stay on top of things so their clients can settle on speedy choices and decrease their danger of a break. Presently with Logi Info, CyberMaxx is improving its information investigation and detailing capacities while as yet holding the innovative adaptability that has made it a powerful online protection accomplice to undertakings for more than 15 years. "Enterprises are dealing with an increasing volume of threats, and MSSPs entrusted with protecting these firms can't afford to lose their knowledge advantage – or else breaches will only continue," says Brett Hansen, CMO at Logi Analytics. "With the Logi Symphony suite of services – including Logi Info – CyberMaxx is now able to embed powerful data analytics, reporting, and visualization capabilities into their MAXX suite of managed services – equipping their security team and customers with the threat visibility and actionable data insights that are the difference between partner safety and business disruption." CyberMaxx has been giving overseen security administrations to endeavors for over 15 years, zeroing in on the three mainstays of individuals, cycle, and innovation to forestall, recognize, and react to cyberattacks. Eminently, CyberMaxx gives specific oversaw security administrations to endeavors in the medical care, money related administrations, and retail areas – requiring chief network safety skill as well as an intensive comprehension of the specific consistence needs every area requires. It's all day, every day/365 security activities place (SOC) and network safety group are more basic than any other time in recent memory for these organizations, and with Logi Info CyberMaxx can give clients will more noteworthy danger knowledge and announcing highlights that will forestall, distinguish and react to breaks quicker than at any other time. "CyberMaxx is constantly pushing forward to anticipate our customers' needs and provide the highest level of service in our industry, which is evidenced today by our 99% customer retention rate. The partnership with Logi and the combined force of the CyberMaxx and Logi teams have delivered an innovative data analytics platform with powerful dashboards that will help our customers prevent costly breaches." said Thomas Lewis, CEO of CyberMaxx. CyberMaxx can utilize Logi Info as a component of its more extensive Logi Symphony membership – which furnishes the MSSP with admittance to the full Logi Analytics programming suite for a solitary, set cost. As CyberMaxx's investigation needs develop over the long haul, they'll have the option to exploit the full broadness of Logi Analytics' bleeding edge implanted examination instruments effortlessly and cost-effectiveness. Logi Analytics' insight and comprehension of installed examination is basic to network safety activities for organizations in 2020 and past. These instruments help improve perceivability of dangers and new or disregarded assault vectors, while making it simpler for IT experts to dissect and follow up on the information without disturbing application work process. For MSSPs, these capacities are taking on consistently expanding significance as endeavors move a greater amount of their IT activities to the cloud while the quantity of endpoint gadgets increments essentially – especially in the wake of the COVID-19 pandemic and the more extensive move to far off work thus. About Logi Analytics Logi Analytics empowers the world's software teams with the most intuitive, developer-grade embedded analytics solutions and a team of dedicated people, invested in your success. Logi leverages your existing tech stack, so you can quickly build, manage and deploy your application. And because Logi supports unlimited customization and white-labeling, you have total control to make the application uniquely your own. Over 2,200 application teams have trusted Logi to help power their businesses with sophisticated analytics capabilities. About Cybermaxx CyberMaxx prevents, detects, and responds to cyberattacks for healthcare organizations. CyberMaxx equips its customers with a 24/7/365 security operations center with services including endpoint threat detection and response, network-based threat detection and prevention, security information and event management (SIEM) with advanced data analytics, vulnerability risk management, and incident response services.

Read More

DATA SECURITY

NHC Collaborates with Check Point to Launch a Security Offering

NHC | April 08, 2021

New Horizon Communications Corp. (NHC), THE Communications STACK Provider™ supporting SMB and Enterprise organizations in North America with their VoIP, UCaaS, Contact Center, Collaboration, SD-WAN, Security, Network conglomeration and Managed Services needs, has joined forces with Check Point Software Technologies® (CHKP), settled in Tel Aviv Israel, to dispatch NHC's cloud-first Security Suite. In 2020, Gartner® named Check Point Software Technologies a pioneer in their Network Firewalls Magic Quadrant. Also, Check Point's capacity to incorporate sufficiently with NHC's SD-WAN assistance, given upstream by VMware, guided NHC to pick Check Point as their new Network Security accomplice. Designated spot's profound item seat will permit NHC to grow security capacities at the client edge while building up an entrance to the arising Secure Access Service Edge (SASE). "The market scene has been changing so quickly, particularly with a year ago's lockdown and rotate to a dispersed labor force model. We perceived rapidly that our clients require a strong yet adaptable arrangement as it identifies with getting their organization both at the branch level and at their all-inclusive branches, á la their worker homes", said Stephen Gibbs, President and Chief Operation Officer, NHC. "The association we're declaring today permits NHC to jump recklessly into extending our client security balance with a cloud-first arrangement which viably grows our client's edge organization and gets it from dangers both known and obscure. Combined with our Managed Service, STACKGuard, which gives clients perceivability and organization occasion goal, NHC is once more at the front of conglomerating innovation with an emphasis on the client experience." NHC's underlying business sector offering will be centered around getting the client's organization edge through the arrival of the accompanying two items: NHC EdgeSecure™ - A little impression virtual security door with cutting edge danger counteraction that can be midway conveyed and overseen in practically no time, making it an ideal security answer for branch workplaces. EdgeSecure works as a Virtual Network Function (VNF) on our Software-characterized WAN (SD-WAN) branch office machines to give extensive danger avoidance security, zero-day assurance, coordinated conveyance, the board and robotization. Clients have full control of safety strategy and information, fulfilling security and guideline prerequisites. EdgeSecure furnishes associations of all sizes with coordinated, progressed danger counteraction, decreasing intricacy and bringing down the complete expense of possession. Dissimilar to different arrangements that just identify dangers, EdgeSecure forestalls dangers with Check Point's SandBlast Zero-Day Protection. Sandblast Zero-Day is a cloud-facilitated sandboxing innovation where records are immediately isolated and investigated, running in a virtual sandbox to find vindictive conduct before it enters your organization. Malware is identified during the adventure stage, even before programmers can apply avoidance procedures endeavoring to sidestep the sandbox. This inventive arrangement joins cloud-facilitated Edge Gateway-level investigation and OS-level sandboxing to keep contamination from the most hazardous adventures and zero-day and focused on assaults. The arrangement likewise incorporates Application Control and URL Filtering to uphold safe web use. IPS, Anti-Bot and Antivirus security from known dangers, and HTTPS assessment shields from dangers attempting to stow away inside encoded HTTPS channels. Advantages include: • Lightweight VM intended for the WAN edge • 1GB of memory, 1GB of plate, 1 CPU center • Mechanized destinations on-boarding • Cloud the board • Inbound and outbound traffic assessment • Keep up protection and consistence NHC CloudSecure™ - Network security as an assistance, CloudSecure, is a cloud-facilitated network danger counteraction administration offering an upkeep free, thorough, moderate security answer for distant locales and branch workplaces. CloudSecure flawlessly conveys the most recent and most far reaching network safety accessible, shielding branch workplaces from the most recent age of focused and progressed digital dangers. CloudSecure doesn't trouble IT staff with sending or keeping up devoted equipment and supports adding progressed danger avoidance capacities on top of existing switches or SD-WAN organizations. With a straightforward and simple arrangement measure, network traffic from existing SD-WAN edge gadgets are burrowed to an essential cloud-based organization security administration at a close by area. A subsequent association gives repetition. This guarantees branch workplaces stay associated. As an Outbound organization firewall, highlights incorporate Application Control, URL Filtering (SWG), Content Awareness (DLP), IPS, Anti-Bot, Antivirus, SandBlast Threat Emulation (sandboxing) Protocols Inspected All ports, all conventions including SSL/TLS Applications and Websites 110+ classes and granular control of 8,000+ applications Data Types 40+ pre-characterized information types including PCI, PII, HIPAA, source code and that's just the beginning. Advantages include: • Most recent and consistently forward-thinking security • Flexible and versatile • Under 50 milliseconds idleness • Guarantees 99.999% uptime • APIs computerize on-boarding new locales • GRE or IPsec burrows guarantee security ABOUT NHC Established in 2002 as an enlisted public utility, NHC conveys a solitary way to all heritage and complex innovations on a solitary receipt, overseen through a solitary agony of glass, and with smoothed out 100% stateside support groups. There's no compelling reason to go elsewhere for any correspondence arrangement. NHC administration contributions include: • VoIP • Bound together Communications as a Service (UCaaS) • Contact Center as a Service (CCaaS) • Cooperation administrations • Programming Defined Wide Area Network (SD-WAN) • Security as-a-Service (SECaaS) • Programming as-a-Service (SaaS) • Regular Telephone Service (POTS) • Fiber | Broadband • LtE/5G Connectivity • Equipment as-a-Service (HaaS) • Overseen Services NHC tailors every answer for our end client needs through a record the board model spearheaded by our authors. A genome, which remembers for profundity investigation and comprehension of an association's present basic necessities while staying aware of their future development needs. NHC Key Differentiators of NHC include: • Underlay Network conveyance anyplace in North America • Cloud-first Overlay administrations conveyed over any organization • Task Management to scale from administration conveyance to Day-2 help • Straightforward online gateway for a solitary sheet of glass see • Administration investigation and point by point revealing of innovation use • Organization occasion perceivability and control • NHC is THE Communications STACK Provider™ for current SMB and Enterprise organizations, just as provincial Government Agencies.

Read More