Zscaler | June 23, 2022
Zscaler, Inc., the global leader in cloud security, unveiled today new breakthrough AI/ML innovations driven by the world's largest security cloud for unsurpassed user protection and digital experience monitoring. The new capabilities expand Zscaler's Zero Trust Exchange security platform, allowing companies to implement a Security Service Edge (SSE) that safeguards against the most advanced cyberattacks while providing an outstanding digital experience to users and easing zero trust architecture adoption.
Cyberattacks on encrypted internet traffic have increased 314%, ransomware has increased 80%, and double extortion attacks have increased roughly 120%. Phishing is also on the rise, with businesses such as finance, government, and retail experiencing yearly increases in assaults of more than 100% in 2021. Organizations must adjust their defenses to real-time risk changes in order to battle growing threats. However, lean IT and security teams are facing security alert fatigue as they become more exposed to real-time attacks, and they frequently lack the resources and capabilities to adequately analyze and respond to the rising amount of threats.
Zscaler is tackling these difficulties by offering one-click root cause analysis to rapidly identify the issues causing bad digital experiences, freeing up IT and security teams from debugging and allowing them to focus on preventing attacks. AI-powered security assists IT workers by automating threat detection in order to provide better and quicker protection.
“Cybercriminals are using AI, automation, and advanced techniques to train machines to hack or socially engineer victims faster than ever before. To help our customers combat these escalating techniques, we’ve dramatically advanced AI and machine learning in our cloud to take advantage of our massive data pool, giving our customers granular real-time risk visibility and a solution to combat attackers that no other security vendor can provide.”
Amit Sinha, President, Zscaler
“Delivering seamless digital experiences, from employee devices to the applications they need, goes hand in hand with securing our sensitive business applications and data, no matter where it resides. Zscaler’s integrated cloud platform helped us effortlessly adopt a zero trust architecture, reduce risk, accelerate our digital transformation, and achieve business goals.” said Darren Beattie, Modern Workplace and Security Operations Manager at Auckland New Zealand-headquartered Tower Limited.
“With Zscaler’s AI-powered Zero Trust platform based on a SSE framework, we are able to augment and expand the reach of our IT and security team to stop the growing frequency of advanced cyberattacks. The threat landscape is constantly evolving, and these new AI capabilities will effectively enable us to see real-time changes in risk, automate our response process, and stay ahead of the attackers,” said Stephen Bailey, Vice President of Information Technology at Cache Creek Casino Resort.
Splashtop, Acronis | July 06, 2022
Managed Service Providers (MSPs) using Acronis for endpoint protection management can now initiate Splashtop remote control sessions directly from within the console to provide faster, reliable support for client workloads.
CUPERTINO, Calif. and MIAMI, FL, July 6, 2022 — Splashtop and Acronis today announced a partnership that integrates solutions for secure remote access and support with Acronis Cyber Protect Cloud, an all-in-one data and cybersecurity protection platform. This integration alleviates downtime by enabling MSP technicians to access and take control of computers to troubleshoot and resolve issues directly from the Acronis Cyber Protect Cloud console – resulting in increased customer satisfaction and decreased costs.
Acronis Cyber Protect Cloud unites backup and next-generation, AI-based anti-malware, antivirus, and endpoint protection management in one solution. With Splashtop integrated, service providers can instantly access all their clients’ managed devices directly from the Acronis console, enabling faster remediation of incidents, reliable support, and increased efficiency by providing instant access to endpoints.
Now, not only are client workloads protected with a world-class integrated solution, but they can be easily and immediately accessed in case of an incident. Service providers can deliver on-demand help desk support to any end user computer or mobile device remotely using Splashtop, regardless of device type or operating system. They can also enable their end users to remotely access their work computers, all from a centralized platform.
“No business is safe in the current cyberthreat landscape, and they are looking to Managed Service Providers who specialize in cyber protection services,” said Acronis Vice President and General Manager, Americas, Pat Hurley. “Acronis provides the air-tight protection MSPs need, while Splashtop’s intuitive interface allows issues to be resolved without delay, reducing costs associated with downtime.”
Managed Service Providers can execute service requests faster, exceed SLAs and increase overall customer satisfaction by enabling this free-of-charge integration with Splashtop. Client workloads are protected with a world-class cyber protection solution that is easily accessible in the event of an incident. Users enjoy:
Quick onboarding: The Acronis-Splashtop integration enables users to initiate immediate, one-click access to all managed workloads.
Easy remote desktop access for managed devices: Support distributed teams and devices with ease, whether employees are working from home, from the office, or on the go.
Native features during remote sessions: Take advantage of Splashtop’s high performance features, including file transfer, remote reboot, share technician desktop, chat and more.
The synergy between Acronis Cyber Protect Cloud and Splashtop allows service providers to deliver superior remote support — silently, seamlessly and on time — through a reliable, direct connection.
“Security is the backbone of everything we do at Splashtop, so we are proud to partner with such a trusted and proven cyber protection platform,” said Thomas Deng, Co-Founder and SVP of Product Management at Splashtop. “Acronis leaves no stone unturned when it comes to the protections and support it offers service providers and their clients.”
200,000 businesses and 30 million end users around the world securely use Splashtop, including large banks, sports & entertainment companies, educational institutions, healthcare organizations and government agencies. To learn more about the Acronis Splashtop integration, visit solutions.acronis.com/splashtop and Splashtop.com/integrations/acronis.
Splashtop is a leader in secure remote access and support. Its solutions for flexible work, learning and IT support deliver an ‘in-person experience’ that is as fast, simple and secure as being in front of an on-site machine. Splashtop delivers high performance with 4k quality at 60fps; advanced security features and compliance; one application for access and support for all devices and operating systems; and instant global support with direct access to an expert. More than 30 million users, including those in 85% of Fortune 500 enterprises, enjoy Splashtop products globally. Splashtop.com
Acronis unifies data protection and cybersecurity to deliver integrated, automated cyber protection that solves the safety, accessibility, privacy, authenticity, and security (SAPAS) challenges of the modern digital world. With flexible deployment models that fit the demands of service providers and IT professionals, Acronis provides superior cyber protection for data, applications, and systems with innovative next-generation antivirus, backup, disaster recovery, and endpoint protection management solutions powered by AI. With advanced anti-malware powered by cutting-edge machine intelligence and blockchain based data authentication technologies, Acronis protects any environment – from cloud to hybrid to on premises – at a low and predictable cost.
Founded in Singapore in 2003 and incorporated in Switzerland in 2008, Acronis now has more than 2,000 employees and offices in 34 locations worldwide. Its solutions are trusted by more than 5.5 million home users and 500,000 companies, and top-tier professional sports teams. Acronis products are available through over 50,000 partners and service providers in over 150 countries and 26 languages.
Cyware | June 24, 2022
Cyware, the industry's leading provider of the technology platform for building Cyber Fusion Centers for businesses and threat intelligence sharing for ISACs and ISAOs, announces the successful completion of the System and Organization Controls (SOC) 2 Type 2 Audit for the trust services criteria relevant to Security ("applicable trust services criteria") set forth in TSP section 100, Trust Services Criteria for Security, Availability, Processing Integrity, Confidentiality, and Integrity, Confidentiality, and Integrity, Confident (AICPA, Trust Services Criteria). The result demonstrates the company's dedication to the highest levels of data protection.
The American Institute of Certified Public Accountants (AICPA) developed SOC 2 as a reporting framework that establishes guidelines for Software-as-a-Service (SaaS) enterprises that manage customer and user data. The accreditation confirms that the organization's internal systems and controls are in ongoing conformity with the SOC 2 audit criteria. Schellman & Company, a worldwide-recognized attestation and compliance services provider, performed the audit for Cyware.
“Commitment to the highest levels of data security has always been one of our foremost business priorities. The SOC 2 Type 2 certification process is not easy to achieve but our team was fully committed and prepared to ensure we check all the required boxes. The new milestone will further strengthen the confidence of our current and future customers in our robust compliance with industry benchmark data security standards including SOC 2 (Type 1 and Type 2) and ISO/IEC 27001:2013.”
Anuj Goel, CEO, Cyware
Cyware unifies previously compartmentalized security operations, allowing firms to more efficiently automate and exchange threat data, as well as cooperate on threat response inside their security divisions and with other enterprises within their network.