BlueVoyant | October 21, 2021
BlueVoyant, a cybersecurity company, today announced a strategic partnership with SentinelOne, an autonomous cybersecurity platform company. The partnership will see BlueVoyant unite its unrivaled cybersecurity expertise with the advanced, automated endpoint detection and response capabilities of SentinelOne's Singularity Complete Suite to deliver exceptional Managed Detection and Response (MDR) services to clients.
The cyber threat environment continues to intensify as organizations implement long-term distributed working solutions, and the number of endpoints proliferates as a result. This expanded attack surface is attracting more sophisticated, well-resourced, and persistent adversaries, putting pressure on businesses of all sizes to mount effective, multi-layered defense programs – often with limited financial and technical resources that do not match the scale of threats they face.
Our partnership with SentinelOne aligns with BlueVoyant's goal to make best-of-breed technologies and services accessible to companies of all sizes. The SentinelOne Singularity Complete Suite, deployed alongside our elite 24/7 security operations experts, will empower our MDR service to deliver proactive defense and threat eradication capabilities. This gives customers confidence that their systems are well defended against sophisticated attacks.
Milan Patel, Global Head of Managed Security Services at BlueVoyant
BlueVoyant's MDR service is designed for new and existing SentinelOne customers, who are looking for an elite security operations partner to strengthen their cybersecurity posture and prevent disruptive attacks. It supports clients by monitoring, investigating, responding to, and mitigating advanced attacks on endpoints. Offering initial setup, continuous policy management and tuning, implemented by the experts in BlueVoyant's elite 24/7 security operations center, BlueVoyant MDR provides full-spectrum protection throughout the security event cycle.
SentinelOne's Singularity Complete Suite provides single-agent, enterprise-grade attack prevention, detection, response and handling across endpoints, cloud and IoT, coupled with critical automations that lift the burden from analysts. It automatically correlates telemetry and maps it into the MITRE ATT&CK® framework, reducing manual investigation times and the risk of alert fatigue for SOC and IT analysts.
Nicholas Warner, COO of SentinelOne, added: "BlueVoyant's MDR service gives customers access to advanced expertise not typically available in-house. By complementing those skills with the visibility and automation at the heart of our Singularity Complete suite, we have formed a compelling partnership that extends the scope of effective cybersecurity."
Jim Rosenthal, CEO of BlueVoyant, concluded: "Our partnership will enable BlueVoyant to similarly advance the speed, scale, and accuracy of our MDR services, bringing enterprise-level cybersecurity within the reach of small to mid-sized businesses."
At BlueVoyant, we recognize that effective cybersecurity requires active prevention and defense across both your organization and supply chain. Our proprietary data, analytics and technology, coupled with deep expertise, works as a force multiplier to secure your full ecosystem.
Cyware | June 24, 2022
Cyware, the industry's leading provider of the technology platform for building Cyber Fusion Centers for businesses and threat intelligence sharing for ISACs and ISAOs, announces the successful completion of the System and Organization Controls (SOC) 2 Type 2 Audit for the trust services criteria relevant to Security ("applicable trust services criteria") set forth in TSP section 100, Trust Services Criteria for Security, Availability, Processing Integrity, Confidentiality, and Integrity, Confidentiality, and Integrity, Confident (AICPA, Trust Services Criteria). The result demonstrates the company's dedication to the highest levels of data protection.
The American Institute of Certified Public Accountants (AICPA) developed SOC 2 as a reporting framework that establishes guidelines for Software-as-a-Service (SaaS) enterprises that manage customer and user data. The accreditation confirms that the organization's internal systems and controls are in ongoing conformity with the SOC 2 audit criteria. Schellman & Company, a worldwide-recognized attestation and compliance services provider, performed the audit for Cyware.
“Commitment to the highest levels of data security has always been one of our foremost business priorities. The SOC 2 Type 2 certification process is not easy to achieve but our team was fully committed and prepared to ensure we check all the required boxes. The new milestone will further strengthen the confidence of our current and future customers in our robust compliance with industry benchmark data security standards including SOC 2 (Type 1 and Type 2) and ISO/IEC 27001:2013.”
Anuj Goel, CEO, Cyware
Cyware unifies previously compartmentalized security operations, allowing firms to more efficiently automate and exchange threat data, as well as cooperate on threat response inside their security divisions and with other enterprises within their network.
NordVPN | February 11, 2022
With the launching of Threat Protection, which is integrated into the NordVPN app, NordVPN, the world's largest VPN service provider, takes another step toward cementing its position as a market leader in cybersecurity. By preventing trackers, phishing attempts, invasive adverts, harmful websites, and corrupted files, this new function provides a complete defense against cyber threats.
"At Nord Security, we know that cybersecurity evolves rapidly, and cybersecurity tools must evolve too. And as part of a broader effort to shift into a more encompassing cybersecurity company, introducing Threat Protection brings us one step closer," says Vykintas Maknickas, product strategist at NordVPN. "With the introduction of Threat Protection, we will be able to offer more services and more comprehensive protection that doesn't depend merely on your VPN connection."
Threat Protection protects against three types of threats. Web trackers and malicious adverts, as well as hazardous websites and corrupted files, are among them.
Web trackers and malicious ads
Defending against trackers is often outside the scope of a VPN, which is where Threat Protection comes in. Threat Protection improves the overall web privacy experience by ultimately preventing trackers. In real-time, you can monitor and manage the blacklisted trackers.
To avoid harmful websites, utilize Threat Protection while browsing the web. Before the page loading, Threat Protection displays a warning popup. This allows you to escape rather than proceed to a potentially hazardous site where you could be phished or have your info harvested.
Threat Protection can also be the first line of security while downloading a file from the internet. It will scan the file for malware and, if none are found, it will be designated as safe without any interruptions. However, if malware is discovered, the file will be removed before it can cause any harm. You'll also get access to a log of scanned files that you may look at at any time.
"Threat Protection takes what was once the task of antivirus software and merges it with NordVPN,Regardless of how long you have been using the internet, you can end up falling victim to some precarious website or download. This is exactly why Threat Protection was introduced — to add a layer of security to make your online browsing safer, cleaner, and more private."
Vykintas Maknickas, product strategist at NordVPN
Users must download the newest OpenVPN version of the NordVPN app from the official website to use Threat Protection. Users will be protected without connecting to a VPN server once the feature is enabled. Threat Protection is currently available for all macOS users, and Windows users will receive it gradually.
NordVPN is a service provided by Nord Security. Nord Security is steadily progressing toward its goal of being an all-in-one cybersecurity solution. Three more market-leading products join NordVPN: NordLocker, an encrypted cloud storage solution; NordPass, a next-generation password manager; and NordLayer, an advanced network access security solution.