DATA SECURITY

Cylitic Security Chooses Swimlane to Deliver Enterprise-Grade Security Automation Services at Scale

Cylitic Security | November 15, 2021

Cylitic Security, a cyber security services provider, announced that it has chosen Swimlane, the leader in cloud-scale low-code security automation, to scale up its security operations.

Cylitic is pioneering a comprehensive managed security service to help small to medium-sized businesses successfully fight off sophisticated cyberattacks.

On average, Fortune 100 companies spend hundreds of millions of dollars annually on dedicated professional cybersecurity analysts, complicated tools, and technologies to continuously monitor their networks looking for anomalies and act in real-time to mitigate threats. Unfortunately, these capabilities are not always realistic for smaller entities. Security talent is expensive and sparse. Some cybersecurity technology vendors won't sell to smaller entities, which is also a disadvantage.

Yet, cybersecurity is not a concern only prevalent amongst large-scale enterprises--nor are the associated challenges with keeping an organization secure. Cybersecurity is an industry-wide concern for businesses of all shapes and sizes. Deploying security automation systems can bring the sophistication of enterprise-scale systems to the SMB customer. Low-code security automation provides a robust application development capability for use cases that can be solved with simple drag-and-drop data entry and business logic to extremely complex, sophisticated solutions that meet the needs of the entire organization. Cylitic's purpose is to bring advanced security capabilities and expertise to small to medium-sized customers who normally otherwise wouldn't have this access. Cylitic is leveling the playing field against threat adversaries who specifically target smaller organizations. 

"We are excited to be partnering with Swimlane. Their platform allows us to scale our security service even further and helps us protect tens of thousands of mission-critical systems for smaller organizations. Technology like Swimlane is common in large, sophisticated Fortune ranked companies and Government agencies. This is yet another piece of the puzzle for Cylitic to democratize the state of technology and tactics for smaller organizations that don't have experienced cybersecurity teams," said Andrew Thornton, Cylitic Security's Chief Security Officer.

"Today, every company is a technology company,Moreover, every company is experiencing the impacts of a global talent shortage, and simultaneously, security is having an unprecedented impact on businesses and their bottom line, making cybersecurity a company-wide issue. Together, Swimlane and Cylitic are bringing the power of the low-code security automation to the SMB market, providing a customer-first approach by combining security technology integrations with industry best practices to create market-ready solutions that accelerate time-to-value."

Cody Cornell, co-founder, and chief strategy officer, Swimlane

About Swimlane
Swimlane is the leader in cloud-scale, low-code security automation. Supporting use cases beyond SOAR, Swimlane improves the ease with which security teams can overcome process and data fatigue, as well as chronic staffing shortages. Swimlane unlocks the potential of automation beyond the SOC by delivering a low-code platform that serves as the system of record for the entire security organization and enables anyone within the organization to contribute their knowledge and expertise to the protection of the organization.

About Cylitic
Cylitic Security provides cyber security technology and services. Collectively the Cylitic team has defended global Fortune companies and critical government systems. Cylitic combines best in class Silicon Valley engineering with exceptional security talent to create the next generation of managed security services. Cylitic's people + technology work synergistically to protect their customers around the clock. The Cylitic team is particularly proud to apply their skills and tools to help protect small mission critical companies.

Spotlight

The End of Support (EOS) of Microsoft Windows Server 2003 in July 2015 will put millions of enterprise servers at risk. If your organization uses Microsoft Server 2003, the EOS will introduce serious security risks unless you are fully prepared to migrate to a new platform or put compensating controls in place. Because hackers know that Microsoft will no longer acknowledge or patch vulnerabilities, these servers will quickly become a favorite target for attacks. And the risks of running Windows Server 2003 after EOS will increase over time as more issues are found and not patched.

Spotlight

The End of Support (EOS) of Microsoft Windows Server 2003 in July 2015 will put millions of enterprise servers at risk. If your organization uses Microsoft Server 2003, the EOS will introduce serious security risks unless you are fully prepared to migrate to a new platform or put compensating controls in place. Because hackers know that Microsoft will no longer acknowledge or patch vulnerabilities, these servers will quickly become a favorite target for attacks. And the risks of running Windows Server 2003 after EOS will increase over time as more issues are found and not patched.

Related News

DATA SECURITY

Integrating with ServiceNow, SentinelOne to Unify IT and Security

SentinelOne | January 12, 2022

SentinelOne an independent cybersecurity platform firm has recently announced the launch of SentinelOne App for ServiceNow Security Incident Response (SIR).The integration brings together security and IT personnel for more effective incident response. Joint clients can utilize the ServiceNow platform to triage threats because SentinelOne is connected directly. The connection enables security, and IT teams to quickly implement a coordinated, comprehensive, and automated incident response plan across endpoints and cloud environments. Additionally, the SentinelOne Singularity Marketplace and the ServiceNow Store have the app. “The industry is under constant attack every day, as organizations grapple with vulnerabilities like log4j. Having enterprise-wide visibility and protection from SentinelOne Singularity helps our team understand the potential impact in just a few clicks. We use ServiceNow as our incident management and workflow automation platform - together our team has a single pane of glass for incident collaboration to mitigate threats in real-time.” - Identity and Endpoint Security Architect, Global Manufacturer Because ransomware and other forms of malware are becoming more common, IT and security teams must work together to prevent attacks. Unfortunately, many businesses rely on a slew of disparate tools to run their cybersecurity initiatives. As a result of the inefficiencies and alert fatigue, avoidable cyber events occur, posing a risk to the company. XDR solutions shift the paradigm, recasting cybersecurity as a problem of data and workflow automation. The SentinelOne App for ServiceNow Security Incident Response rapidly syncs threats from SentinelOne into the ServiceNow Incident Response module for a unified security program. An incident responder in ServiceNow can see all relevant incident details about the threat, such asthe event status and threat notes, as well as any additional context or notes produced in either platform. When the incident responder concludes that remedial action is required, ServiceNow can activate SentinelOne's automated response actions to destroy, quarantine, remediate, or even roll back any threat's potential impacts. “Streamlining threat investigation, response, and remediation workflows leads to significant risk reduction,Combining SentinelOne with ServiceNow gives defenders and incident responders the workflows they need to improve remediation across security and IT domains.” David Baldwin, Product Director, Ecosystem, SentinelOne

Read More

DATA SECURITY

New White Paper to be Released by Bluefin and Alpine Security Consulting on Payment and Data Security

Alpine Security Consulting | July 12, 2021

A new white paperon “Formulating a Complete Payment Data and Security Approach, ”authored by Alpine Security Consulting, has releasedby the recognized leader inand tokenization and encryption technologies for payment and data security, Bluefin. The main points covered and discussed in the whitepaper are considerations when choosing a data protection approach, rules and regulations governing sensitive data and payment, Protected Health Information (PHI) and ACH account data, Personally Identifiable Information (PII), and how tokenization can be combined with encryption to provide a single solution for securing cardholder data (CHD). Topics covered in the white paper are: • Payment and Privacy Data – History and Trends • Data Breaches, the Pandemic Effect, and the Shift to Online Commerce • Protecting Privacy Data – HIPAA, GDPR, and Privacy Acts • Protecting Financial Data – PCI DSS and Nacha • Bluefin's Payment and Data Security Suite: PCI-validated P2PE and ShieldConex® Data Security • The Roles of Encryption, Tokenization and Authentication in Protecting Data Bluefin specializes in data security solutions and omnichannel payment. With the company’s PCI-validated point-to-point encryption (P2PE)solutions, it is specialized in protecting all data. It is for ShieldConex data security platform and point-of-sale (POS) payments for the encrypted tokenization of PHI,PII, ACH and CHD account data. About Bluefin For payment and data security, Bluefin is the renowned leader in antokenization and encryption technologies. Our security suite includes call center, mobile and unattended payments, PCI-validated point-to-point encryption (P2PE) for contactless face-to-face, and our ShieldConex® data security platform for the protection of Personal Health Information (PHI),Personal Health Information (PHI), personally Identifiable Information (PII), and payment data entered online. About Alpine Security Consulting Alpine was founded to fulfill a passion to help businesses. With an experience of over 20 years in security, technology, and compliance, Alpines skill set can support virtually any business learn how to control ground-breaking security technologies with the outcome of translating security savings into tangible business worth.

Read More

Flowmon and Paessler Bring a Symbiosis of IT Infrastructure, Performance, and Security Monitoring

prnewswire | September 08, 2020

Flowmon Networks, a network intelligence company, has today announced an alliance with Paessler AG, an IT monitoring specialist. The integrated solution brings together broad IT infrastructure monitoring and advanced performance and security analysis to ensure a healthy and secure run of digital environments.Managing today's ever-changing IT environment requires a bullet-proof certainty that all assets are reliable, well-functioning and protected. Enhancing the symbiosis of IT infrastructure monitoring with advanced NetSecOps technology is only a natural step along the path to reaching this goal. Flowmon and Peassler's PRTG integrated solution brings together the excellence of both worlds.

Read More