Security Audit and Compliance
Lumen Technologies | September 13, 2023
Lumen Technologies announces the launch of key security enhancements to its industry-leading secure access service edge product.
The company’s SASE Solutions represents a first-of-its-kind, fully digital experience for purchasing, configuring, and overseeing enterprise SASE.
The latest features incorporated into Lumen SASE Solutions are security service edge and cloud-hosted gateways.
On September 12, 2023, Lumen Technologies, a leading provider of Secure Access Service Edge (SASE) solutions, committed to advancing human progress through technology facilitating the connection of people, data, and applications, announced the addition of key enhancements to its landmark SASE product. The addition of new features makes lumen SASE solutions even more simplified and flexible for customers.
Lumen SASE Solutions represents a pioneering, entirely digital experience for purchasing, configuring, and managing enterprise SASE. This is a significant step in Lumen's ongoing efforts to drive innovation and foster growth. Notably, the SASE product improvements launch are a direct outcome of valuable customer feedback.
The Lumen SASE approach focuses on simplification in order to deliver flexible, secure, and scalable SASE solutions to organizations of all sizes and industries.
Senior Director of SASE Product Management at Lumen, Darren Wolner, said,
There has been a rapid adoption of cloud-based services as more organizations implement hybrid work, but security is paramount to any cloud-based experience. This means savvy organizations soon realized a whole new set of requirements and challenges. We quickly enhanced the product to fit their requirements.
[Source – Cision PR Newswire]
Darren mentioned that Lumen has a strong focus on meeting customer wants and needs. He cited the latest SASE updates as a prime illustration of this commitment.
The new capabilities added to Lumen SASE Solutions include:
Security Service Edge (SSE)
SSE encompasses a suite of integrated, cloud-centric security capabilities, which feature cloud-hosted gateways. These capabilities are designed to ensure secure access to websites, facilitate the safe sharing of sensitive data, and manage user permissions for software-as-a-service (SaaS) applications. These solutions are delivered in partnership with prominent SD-WAN and security providers.
Cloud-hosted Gateways
Cloud-hosted gateways offer organizations the flexibility to adopt 'grow as they go' network and security management features as they scale without the necessity of on-premises equipment.
In addition to the global expansion of Lumen technologies, customers based in the US can now deploy premise-based SASE services to locations in EMEA and Canada.
Pete Finalle, Research Manager with IDC, stated,
The new, hybrid perimeter – encompassing the main office down to the remote workforce – has collided with multi-cloud resources. This has created numerous networking and security complexities that are difficult to solve without a customer outcomes-based approach, which few companies can provide.
[Source – Cision PR Newswire]
Finalle pointed out that Lumen has a distinctive position to deliver real business outcomes through a comprehensive, cloud-based network security stack. This stack significantly benefits from Lumen's presence in both network and cloud infrastructure. Additionally, he mentioned that the company's digital customer experience and managed approach to resolving the intricate security and networking challenges allow them to mitigate the deployment and management difficulties that frequently hinder the adoption of SASE.
Read More
Enterprise Security, Platform Security, Software Security
Business Wire | August 17, 2023
Conceal, a forerunner in defending against web-based attacks, proudly announces its partnership with NGS, the UK's leading transformative cybersecurity solution provider. Through this collaboration, NGS clients will benefit immensely from Conceal's patented zero-trust browser solution, fortifying their web protection like never before.
"As the cyber threat landscape evolves, it's crucial for businesses to be equipped with the most advanced tools to prevent potential breaches," said Jonathan Lassman, Founder and Director of NGS. "Integrating with Conceal allows us to provide our clients with a first-rate security solution that halts threats at the browser's doorstep, preventing data compromise and ensuring optimal user experience. We are thrilled about this partnership and ready to set new industry standards."
Gordon Lawson, CEO of Conceal, shared, "NGS has proven its mettle in the cybersecurity arena, focusing on driving value and prioritizing user experience. This partnership will enable us to jointly address the sophisticated browser-based threats and challenges that modern businesses face. Together, we'll redefine web security for countless organizations."
ConcealBrowse stands as a game-changer in the realm of web-browser security. Seamlessly integrating with existing security infrastructures, it offers minimal setup hassle and supplies invaluable telemetry data compatible with SIEMs and popular analytical tools.
About NGS
With its motto, "Be Transformative," NGS has made significant strides in the cybersecurity world, bridging the gap between emerging technology challenges and security solutions. Through strategic collaborations with top-tier vendors, NGS offers unparalleled security solutions tailored to modern business needs. Their holistic approach, focusing on delivering more for less, has made them a go-to for businesses seeking to bolster their digital defenses without breaking the bank.
About Conceal
Conceal is at the forefront of defending against web-based attacks, using innovative technology to detect, prevent, and shield businesses and individual users from ever-evolving online threats. ConcealBrowse operates on the principle of proactive protection. Its AI-powered intelligence engine, ConcealSherpa, runs at machine speed with virtually zero latency to identify potentially harmful webpages autonomously, stopping cyber attacks that take advantage of weaponized links. For more information, visit https://conceal.io/.
Read More
Enterprise Security, Platform Security, Software Security
Business Wire | August 14, 2023
Detectify, the leading External Attack Surface Management platform powered by elite ethical hackers, today announced enhancements to its platform that can significantly help to elevate an organization’s visibility into its attack surface. Many organizations need help gaining visibility into the IP addresses across their whole environment. Detectify's new capabilities enable organizations to uncover unauthorized assets and ensure regulatory compliance.
The attack surface has grown exponentially, not least in how decentralized organizations have become. Over 10% of Detectify customers are hosting data across three continents, illustrating how their products and services are more global than ever. Detectify also notes that 30% of their customer base is leveraging more than 5 service providers, which reflects the growing trend in vulnerabilities as a result of human errors, like server misconfigurations. Moreover, organizations are quickly expanding their digital footprint, with 73% of Detectify customers using IPv6 addresses.
With the introduction of the new IP Addresses view, Detectify users gain seamless access to a comprehensive list of all IPs associated with their domains, accompanied by valuable insights, including hosting provider details, geographical locations, and Autonomous System Numbers (ASNs). This update is further complemented by interactive charts, enabling users to detect outlier countries or providers, and streamlining the process of identifying potential security concerns.
"It's not uncommon for our customers to encounter instances where unauthorized geolocations are used to spin up new machines or witness sudden spikes in hosting activities from approved countries,” said Danwei Tran Luciani, Interim VP of Product at Detectify. “These anomalies can expose organizations to risk, particularly when traditional automated detection methods fall short. Our new IP Addresses view empowers security teams to proactively address these challenges, strengthening their overall cybersecurity posture."
Detectify's new IP Addresses view provides security teams with tangible benefits to navigate complex attack surfaces, such as:
Uncovering unauthorized assets: For organizations with large attack surfaces, this capability allows users to identify unauthorized assets hosted by unapproved vendors. By instantly detecting an asset being hosted by a non-approved provider, security teams can take swift action and mitigate potential threats.
Ensuring regulatory compliance: For businesses operating in highly regulated environments where compliance is paramount, the new view is critical in determining the hosting locations of specific customer data. This enhanced visibility ensures adherence to regulatory requirements and fortifies data privacy measures.
The new IP Addresses view is now available to all Detectify customers, reinforcing the company's commitment to empowering security teams with cutting-edge solutions to safeguard organizations’ ever-evolving attack surfaces. For more information visit www.detectify.com
About Detectify
Detectify sets the standard for External Attack Surface Management (EASM), providing 99.7% accurate vulnerability assessments. Product security and AppSec teams trust Detectify to expose exactly how attackers will exploit their Internet-facing applications. The Detectify platform automates continuous real-world, payload-based attacks crowdsourced through its global community of elite ethical hackers, exposing critical weaknesses before it’s too late. Go hack yourself: detectify.com.
Read More