SOFTWARE SECURITY

DigitSec and UST Announce Partnership to Offer Continuous Application Security Testing for Salesforce DevSecOps

DigitSec and UST | August 27, 2021

DigitSec, provider of the most comprehensive AppSec testing platform purpose-built for Salesforce, and UST, a leading digital transformation solutions company, today announced a partnership to provide full-spectrum application security testing as part of a comprehensive Salesforce portfolio for enterprise customers.

UST will offer its clients the DigitSec SaaS Security Scanner™- S4 for Salesforce™ as part of its plan to deliver more secure and resilient solutions for testing and remediation.

DigitSec S4 is a continuous application security testing platform for Salesforce DevSecOps that integrates multiple security tools, empowering developers and administrators to accurately identify security issues faster and with far fewer false positives than traditional AppSec testing solutions. It offers an automated penetration testing solution combining static source code analysis (SAST), interactive runtime testing (IAST), software composition analysis (SCA), and cloud security configuration review for a truly comprehensive Salesforce security assessment.

Commenting on the partnership, Prasan Vyas, General Manager and Global Head of SFDC Practice, UST, said, "At UST, we are constantly improving our value proposition for our Global 2000 and Fortune 500 customers by leveraging our platform expertise and working together with best-of-breed partners to help build secure and robust solutions. For our Salesforce customers, DigitSec presents a digital-age tool to secure applications against potential security threats early on in the build process. The partnership underwrites UST's deep commitment to the Salesforce platform and helping our customers identify and remediate security risks in their Salesforce orgs."

"Given the mission-critical and sensitive nature of customer personally identifiable information (PII) and other data, it's critical that developers consider security first in their Salesforce projects. Our S4 platform provides a continuous and automated 360-degree view of potential threats and now is available to UST clients as they create and update their Salesforce applications," said DigitSec CEO Waqas Nazir.   

S4 for Salesforce can quickly and accurately identify thousands of potential security vulnerabilities with the lowest rate of false positives in the industry. The DigitSec platform also supports compliance framework requirements including GDPR, HIPAA, ISO-27001, SOX, PCI DSS, CCPA, and APPI.

About DigitSec
DigitSec provides the most comprehensive application security testing platform purpose-built for Salesforce, including automated penetration testing. Its patented SaaS Security Scanner, S4, quickly assesses Salesforce security posture, allowing developers to easily identify potential issues before deployment while supporting compliance requirements.

About UST
For more than 20 years, UST has worked side by side with the world's best companies to make a real impact through transformation.  Powered by technology, inspired by people, and led by our purpose, we partner with our clients from design to operation. Through our nimble approach, we identify their core challenges and craft disruptive solutions that bring their vision to life. With deep domain expertise and a future-proof philosophy, we embed innovation and agility into our clients' organizations—delivering measurable value and lasting change across industries and around the world. Together, with over 26,000 employees in 25 countries, we build for boundless impact—touching billions of lives in the process.

Spotlight

Information Security Interview Questions with Answers – Dr. Charles Wood, Duquesne University1. What are the three basic tenets of information security?2. What's the most common information security weakness inside organizations?3. How are you going to STOP our company from hacking?4. How would you manage security in our company?5. How would secure every single system in our company?

Spotlight

Information Security Interview Questions with Answers – Dr. Charles Wood, Duquesne University1. What are the three basic tenets of information security?2. What's the most common information security weakness inside organizations?3. How are you going to STOP our company from hacking?4. How would you manage security in our company?5. How would secure every single system in our company?

Related News

DATA SECURITY,PLATFORM SECURITY,SOFTWARE SECURITY

Beyond Identity Launches Joint Integration With Zscaler to Accelerate Enterprise Zero Trust Security Strategies

Beyond Identity | December 09, 2022

Beyond Identity, the leading provider of phishing-resistant multi-factor authentication (MFA), has expanded its integration offerings to include cloud security leader Zscaler. The joint solution strengthens a zero trust architecture and reduces the attack surface by continuously validating the user and device and enabling secure access to applications. As threat actors’ attacks increase in scope, using freely available tools that simplify the task, legacy MFA solutions that rely on penetrable passwords and codes no longer guarantee protection throughout an active session. As such, Gartner recommends companies adjust their zero trust initiatives as “credentials and signals must be continuously reevaluated post login.” To provide enterprises with continuous identity and device inspection and verification, Beyond Identity’s integration with the Zscaler Zero Trust Exchange™ platform enables the real-time exchange of risk signals that are incorporated prior to initial user authentication and monitored continuously thereafter, increasing the security of the entire user session. Further, ongoing risk signal exchange between the solutions allows for near real-time notification and enforcement should a device fall out of compliance during an active session, and for session termination and remediation to ensure both user and device are ready for re-authentication. “Beyond Identity is committed to delivering the industry’s most secure and robust phishing-resistant authentication solution while removing the user friction that has stalled enterprise rollout of existing MFA solutions,” said Kurt Johnson, Chief Strategy Officer and Head of Corporate Development at Beyond Identity. “To achieve this objective, Beyond Identity is building an ecosystem of like-minded leaders, like Zscaler, where real-time information exchange can raise the level of application and system security and form the foundation of an enterprise’s journey to zero trust security.” ”As cyberattacks become more sophisticated and users work from everywhere, removing the silos of security solutions is key for implementing zero trust. “With Beyond Identity integrating into the Zscaler Zero Trust Exchange platform, customers have another strong option to enforce device-driven conditional access continuously, and adapt to their risk policies and application sensitivity.” Amit Raikar, VP of Tech Alliances and Business Development at Zscaler This integration empowers Beyond Identity and Zscaler customers to easily modernize their MFA strategies, minimize the risk of password-based and MFA-bypass breaches and extend the footprint of existing cybersecurity investments. By eliminating the need for a password from this process, usability and user satisfaction are ultimately improved while removing entire authentication attack vectors. “Lowering the risk of password-based breaches and secure application access are key business drivers for security leadership teams.stated Mick Coady, WWT, Global VP of Cyber Security Solutions at World Wide Technology. “The Zscaler, Beyond Identity integration enables organizations to achieve both.” About Beyond Identity Beyond Identity is revolutionizing secure digital access for workforces, contractors, customers and developers. Our Universal Passkey Architecture provides the industry’s most secure and frictionless multifactor authentication that prevents credential-based breaches, ensures device trust, and delivers secure and frictionless digital access, eliminating passwords entirely. Industry leaders like Snowflake, Unqork and Roblox rely on Beyond Identity to solve their access security challenges for their customers, employees, contractors and developers and to advance their journey toward Zero Trust Security.

Read More

ENTERPRISE SECURITY,PLATFORM SECURITY,SOFTWARE SECURITY

LogRhythm Improves Security Analytics with Expanded Security Operations Capabilities

LogRhythm | January 06, 2023

On January 05, 2023, LogRhythm, the company that empowers security teams to tackle an ever-changing threat landscape with confidence, introduced a variety of expanded capabilities and integrations for its security operations solutions. The enhancements improve LogRhythm's capacity to serve as a much-needed force multiplier for security teams that are required to defend against cyberattacks with confidence, effectiveness, and efficiency. This update follows the release of LogRhythm Axon, an innovative, cloud-native security operations platform launched in October. In addition, the organization is launching new visualizations and advanced analytics that provide seamless visibility into potential security threats. Axon and its latest updates are designed to simplify the experience of security analysts by making it easier for teams to identify, examine, and report on potential threats, easing the burden of managing risks and the operating infrastructure. In addition, these improvements span the entire suite of LogRhythm's offerings to collectively facilitate threat detection and resolution by SOC teams, improving analyst productivity and effectiveness. The key features of the updates include the following: LogRhythm Axon: New out-of-the-box and custom analytics rules that have rules for MITRE ATT&CK detections. Using the Observation Workflow, customers can quickly investigate log observations raised by analytics. Reduce time spent searching for data through new markdown and histogram widgets. LogRhythm UEBA: New detection models allow for the detection of elusive threats for Windows systems. LogRhythm NDR: Integration with Microsoft EDR improves blind spot detection and endpoint visibility. Enhanced analyst experience through expanded UI improvements. The new configuration page enables to import of data from VirusTotal smoothly. LogRhythm SIEM: The improved collection administrative workflow reduces the time required to configure, deploy, and manage log sources that involve Open Collector. Expanded and updated LogRhythm's library of supported log sources. Improved audit logging makes it easier to detect suspicious activity and track significant changes made by users. About LogRhythm LogRhythm, Inc. is an American security intelligence firm founded in 2003 that specializes in SIEM, log management, network and endpoint monitoring, forensics, and security analytics. With a comprehensive array of high-performance security, compliance, and operations solutions, LogRhythm is built to address a rapidly evolving world of cybersecurity threats. In addition, LogRhythm combines a versatile and comprehensive security operations platform, advisory services, and technology partnerships to help SOC teams defend sensitive data.

Read More

DATA SECURITY,PLATFORM SECURITY,SOFTWARE SECURITY

Cymulate Integrates with the Trend Micro Vision One XDR Platform

Cymulate | December 07, 2022

Cymulate, the market leader in Threat Exposure Assessment and Cybersecurity Controls Validation, today announced a new technology integration with Trend Micro, a global cybersecurity leader, which reduces risk related to cyber threats. In addition to joining the Trend Micro Vision One ecosystem partner program, the company has completed the technology integration of its cybersecurity risk validation and exposure management solution with the Trend Micro Vision One XDR platform. The collaboration will correlate simulated attacks with ongoing events and alerts, enhancing the security control environment and management against malicious behavior and real and simulated malware. Today's malicious actors are becoming increasingly sophisticated in their execution of attacks. As a result, organizations must have measures in place to protect their network and ensure they are constantly monitoring their environment for new threats. Together, the integrated Cymulate and Trend Micro Vision One XDR solution provides comprehensive protection against cyber threats and strengthens an organization's security posture with the following benefits: Automated and continuous security validation across the entire attack kill-chain Ongoing simulation that operationalizes the MITRE ATT&CK framework Creating auto remediation playbooks to new threats and attack vectors Configuration of Trend Micro's XDR policies to Cymulate's actionable remediation guidance "Cyberattacks are not showing any signs of slowing down and need a united front from security providers to combat them. "We are delighted to be partnering with Trend Micro so that businesses can better understand any weaknesses in their security posture and optimize their existing security infrastructure to better protect their organizations." Carolyn Crandall, chief security advocate at Cymulate "Security validation is an essential step for organizations to take towards cyber resilience," said Jon Clay, vice president of threat intelligence at Trend Micro. "Integrating our solutions with Cymulate is an exciting milestone for us. This new offering will significantly strengthen the risk assessment capability and provide enhanced seamless protection for mission-critical environments through ongoing simulated attacks deployed alongside events and alerts coming from Trend Micro." Cymulate's platform is recognized for its ability to continuously test a business's security posture against immediate threats and to validate whether security controls are functioning properly to stop in-network activities tied to execution methods, OS manipulation, data manipulation, lateral movement, data exfiltration, and other actions that inform on how bad the incursion or breach might be. The breadth and depth of this platform have earned it recognition as the gold standard for continuous threat exposure management (CTEM) programs, an emerging security program that was coined by Gartner, Inc. About Cymulate Cymulate's continuous risk validation and exposure management platform provides security professionals with the ability to continuously challenge, validate and optimize their on-premises and cloud cyber-security posture with visualization end-to-end across the MITRE ATT&CK® framework. The platform provides automated, expert and threat intelligence led risk assessments that are simple to deploy and use for organizations of all cybersecurity maturity levels. It also provides an open framework to create and automate red and purple teaming by generating penetration scenarios and advanced attack campaigns tailored to their unique environments and security policies. About Trend Micro Trend Micro, a global cybersecurity leader, helps make the world safe for exchanging digital information. Fueled by decades of security expertise, global threat research, and continuous innovation, Trend Micro's cybersecurity platform protects hundreds of thousands of organizations and millions of individuals across clouds, networks, devices, and endpoints. As a leader in cloud and enterprise cybersecurity, the platform delivers a powerful range of advanced threat defense techniques optimized for environments like AWS, Microsoft, and Google, and central visibility for better, faster detection and response. With 7,000 employees across 65 countries, Trend Micro enables organizations to simplify and secure their connected world.

Read More