DATA SECURITY

Endpoint Security of Lookout Mobile is Now StateRAMP Authorized

Lookout | March 04, 2022

Lookout, Inc., a provider of comprehensive endpoint-to-cloud security, announced today that its Lookout Mobile Endpoint Security solution had been granted StateRAMP Authorization. The Lookout solution has passed 325 security checks, indicating that it can handle sensitive, unclassified data and protect critical government networks. It gives state and local governments complete access over their entire fleet of iOS, Android, and ChromeOS endpoints, allowing them to secure agency data in real-time by detecting and responding to phishing, app, device, and network threats. Lookout is the premier provider of mobile endpoint security to the government and the first mobile security vendor to be approved by StateRAMP. In April 2020, Lookout Mobile Endpoint Security received FedRAMP approval.

StateRAMP is a nonprofit organization founded by state and local government leaders, industry professionals, and private firms to offer a standard for government entities to manage cybersecurity risks from third-party suppliers. These security standards are based on NIST Special Publication 800-53, a widely accepted catalog of security and privacy controls for information systems and organizations from the National Institute of Standards and Technology (NIST).

Attackers seek to breach agency networks in droves, fueled by the global epidemic and the trend to mass telework. According to a new SolarWinds and Market Connections survey of 400 decision-makers from federal, state, and municipal agencies and the education sector, endpoint security software is an important tool in managing risk. The Office of Management and Budget (OMB) M-22-01 mandates that federal agencies integrate mobile devices in their endpoint detection and response, continuous monitoring, and proactive threat hunting strategies, setting a high bar for state and local governments to meet.

"In the current environment of remote work and digital transformation of government services, state and local organizations are operating with an increasing number of mobile devices that are expanding their cyber attack surface, These organizations need tools that can detect and respond to threats on iOS, Android and ChromeOS devices to  secure data accessed from anywhere."

Tony D'Angelo, vice president, U.S. public sector, Lookout

The Lookout Security Graph, which analyses telemetry data from more than 200 million devices and 150 million apps and continually ingests and analyses millions of URLs every day, is at the heart of Lookout Mobile Endpoint Security. Lookout Mobile Endpoint Security uses machine intelligence to help state and local governments detect and respond to phishing, application, device, and network attacks while maintaining user privacy. In addition, lookout can automatically detect and respond to threats that have never been seen before, thanks to machine intelligence.

Following receiving FedRAMP Joint Advisory Board (JAB) Provisional Authorization to Operate for Lookout Mobile Endpoint Security in May 2020 and Secure Access Service Edge (SASE) in February 2022, the company was added to the StateRAMP AVL. StateRAMP's compliance verification is modeled after FedRAMP, and it necessitates the submission of an independent third-party audit to the StateRAMP Program Management Office (PMO) for approval.

Spotlight

The value of customer data has increased exponentially over time, but with it comes an increase in potential liability and exposure. Companies are struggling to understand how to proactively monitor and control user access privileges, and they often lack the visibility into what data is at risk, which can lead to potentially devastating security threats. In this white paper you will learn how to improve process efficiency in meeting security requirements. Continue reading to learn how to streamline your process with automated and centralized controls and simplified audit reviews.

Spotlight

The value of customer data has increased exponentially over time, but with it comes an increase in potential liability and exposure. Companies are struggling to understand how to proactively monitor and control user access privileges, and they often lack the visibility into what data is at risk, which can lead to potentially devastating security threats. In this white paper you will learn how to improve process efficiency in meeting security requirements. Continue reading to learn how to streamline your process with automated and centralized controls and simplified audit reviews.

Related News

DATA SECURITY

Smithers Announces the Launch of Information Security Services

Smithers | May 25, 2021

Smithers, a leading provider of testing, consulting, information, and compliance services, is pleased to announce the launch of its information security services department. This agency will provide auditing and certification services for NIST SP 800-171 and the Cybersecurity Maturity Model Certification (CMMC), as well as other customized information security offerings. Smithers Quality Assessments Division offers 25+ years of high-touch, value-added third-party auditing expertise to the CMMC program, including trained, professional auditors to perform CMMC assessments for organizations that are current suppliers to the United States (US) Department of Defense, as well as those looking to meet the requirements of being a supplier. Smithers' information security service offering ensures the security of clients' sensitive data by delivering reliable assessments on time and with a high level of touch. "Information security threats continue to intensify as a significant concern to organizations of all sizes," says Jeanette Preston, President of Smithers Quality Assessments Division. "As a matter of business continuity, many companies would be required to ensure sensitive data security as a requirement to do business with defense, governmental agencies, and highly regulated industries." The information security services department will be launched and led by Aaron Troschinetz, General Manager for Smithers Quality Assessments Division in North America. "During audits, we see that clients have a genuine need for these facilities," Troschinetz says. "Companies do not need multiple vendors because we provide information security in addition to our existing auditing and certification services. Smithers is now capable of serving as their full-service trusted partner." About Smithers Smithers is a multinational provider of testing, consulting, information, and compliance services that were founded in 1925 and is headquartered in Akron, Ohio. Smithers serves customers in the transportation, life science, packaging, fabrics, parts, consumer, and energy sectors through laboratories and operations in North America, Europe, and Asia. Smithers integrates science, technology, and business expertise to provide accurate data on time and with a high touch, allowing consumers to innovate with confidence.

Read More

DATA SECURITY

Owl Cyber Defense improves advanced network security capabilities with Trident Assured Collaboration Systems Acquisition

prnewswire | January 05, 2021

Owl Cyber Defense Solutions, LLC ("Owl"), a worldwide market pioneer in online protection arrangements and administrations for safeguarding network limits and empowering secure information sharing across areas, reported today the obtaining of the Trident Assured Collaboration Systems ("ACS") product offering. ACS has the solitary U.S. government-affirmed Voice over IP ("VoIP") and Video Teleconference ("VTC") Cross Domain Solution ("CDS") just as the business' most exceptional Full Motion Video ("FMV") sifting ability – usefulness basic to CDS activities in a time of robots and cameras. The obtaining gives Owl a more extensive scope of guaranteed network border guard arrangements than any rival on the lookout. Owl, upheld by private speculation firm DC Capital Partners, has been a main supplier of CDS to the U.S. Branch of Defense ("DoD") and Intelligence Community for over 20 years. Owl is likewise the worldwide pioneer in network safety assurance for basic framework, offering the solitary U.S. government tried and certify CDS accessible for organization inside and outside the U.S to both government and business customers. Owl's Cross Domain Solutions offer the most elevated level of organization edge security, far surpassing the capacities of firewalls and other ordinary organization protections. Owl's items are the decision for ensuring the country's most delicate organizations and frameworks against assault. Ongoing episodes have exhibited the failure of inheritance firewalls to forestall cyberattacks against basic business and working frameworks and cloud-based applications. The blend of Owl and ACS's innovation offers a full continuum of CDS items that give equipment upheld space partition and layers of information separating confirmation instead of a solitary organization line checkpoint with insignificant substance sifting. Arrangements like firewalls that worked 25 years back as an organization insurance approach are not, at this point compelling against country state quality assaults. As country state assaults increment, the methodologies utilized by state entertainers start to saturate the criminal side of cyberattacks. Powerful network safety presently requires a coordinated, multi-layered framework with information diode equipment parts in gatekeepers which perform escalated information assessment and confirmation. The up and coming age of insurance, coming out now and based on a mix of Owl and ACS innovation, installs CDS usefulness in incredibly low-inactivity, unmodifiable equipment. Thomas J. Campbell, Chairman of Owl and Founder and Managing Partner of DC Capital, said, "This is another step in executing our strategic vision. The acquisition of ACS not only places Owl ahead of other Cross Domain Solution providers, but it also plays a pivotal role in our larger strategy to offer true cybersecurity protection. The future requires solutions that are cost effective and easy to implement, use, and maintain." "The explosion of the Internet of Things ("IoT") demands cyber-secure devices, from those that control our critical infrastructure, to our homes and cars," said Campbell. "The technology Owl pioneered 20 years ago is now available in form factors small enough to be embedded inside devices. Owl has always been an early mover, the first to develop hardware-enforced network protection and now the first to offer a hardware-enforced CDS that can be embedded." "Owl has been rapidly moving towards this number one position for the last couple of years," commented Robert Stalick, President and CEO of Owl. "With the addition of ACS, the last piece has fallen into place. Owl is now the clear leader in accredited Cross Domain Solution offerings, with the widest range of capabilities and products – solving problems from tactical to enterprise in data, voice, and video; for government, critical infrastructure and commercial enterprises." Jerry B. Chernock, Partner at DC Capital, added, "Clearly we need to address the deficiency of firewalls. There is a motivation behind why our customers demand Cross Domain Solutions and not exclusively on firewalls. Late assaults, including a security break at an unmistakable U.S. based network protection firm and a few U.S. Government organizations, have accentuated the requirement for knowledge, military, basic framework and corporate customers to rapidly develop how they secure their organizations." "The sophistication of these technologies cannot be overstated," said Ken Walker, Chief Technology Officer at Owl. "The U.S. Government continues to set the standards for the most rigorous operational requirements and testing regimes globally, setting expectations that very few companies can meet. Owl is one of a handful of elite companies that satisfies the government-established 'Raise the Bar' requirements." About Owl Cyber Defense Solutions Owl has been serving the cybersecurity needs of the U.S. government since inception – providing hardware-enforced cybersecurity controls, industry leading expertise in operating system hardening, extensive device and network-based assessment services and thought-leadership in filtering/data processing disciplines. Owl Cross Domain Solutions are operating broadly in missions across both the DoD and the U.S. intelligence agencies. Globally Owl is the leader in perimeter protection for nuclear power plants, oil and gas operations, renewables and power generation and transmission, with aggressive growth occurring in the data center and cloud provider sectors. Owl continues to innovate and is bringing to market the world's first embeddable cybersecurity to serve the Internet of Things ("IoT").

Read More

DATA SECURITY

In one of the largest funding rounds in cybersecurity, CYE paves its way to hyper-growth, securing $100 million

prnewswire | February 10, 2021

CYE, the business chief in cybersecurity streamlining arrangements, declared today that it has brought more than $100 million up in a financing round, drove by the worldwide venture association EQT, with cooperation from existing financial backer, 83North. The venture - follows 5 years of organization and will be utilized to proceed with CYE's hyper-development in the worldwide market. Since its origin in 2012, CYE has been focused on aiding its clients assume full responsibility for their cybersecurity stances by empowering security pioneers to distinguish which business resources are in danger, focus on them dependent on basic business sway, and execute financially savvy remediation projects for ideal danger anticipation. Hyver, CYE's lead item, utilizes progressed calculations and diagram demonstrating to direct an exhaustive cybersecurity appraisal, covering the whole association, just as outsider merchants. Profoundly experienced 'red groups' at that point perform genuine, non-reproduced assaults, permitting CYE to precisely anticipate conceivable assault courses, enabling clients to forestall such assaults before they happen, just as the information on where assets should be contributed.

Read More