DATA SECURITY

Field Effect and RS22 partner to help UK businesses defend against increasing cyber security threats

Field Effect | October 29, 2021

Field Effect and RS22 partner to help UK businesses defend against increasing cyber security threats
Field Effect, a global cyber security company specializing in intelligence-grade protection for small and medium organizations, today announced a new partnership with RS22, a UK-based IT security reseller and managed service provider. With up to 65% of large and medium sized UK companies affected by data breaches in the past 12 months, the partnership will enable best-in-class cyber security protection for RS22 customers, helping them defend and stay ahead of business-disrupting cyber attacks.

"RS22's goal of helping their customers mitigate cyber threats using the best technologies in the industry, coupled with our mission to bring intelligence-grade cyber security solutions to small and mid-sized businesses, makes this partnership an excellent fit," said Andrew Milne, Chief Revenue Officer of Field Effect. "Together, we look forward to providing customers across the UK with a comprehensive, holistic approach to cyber security to help ensure their businesses are fully protected."

Founded with a vision to bring back a personal touch to IT and cyber security services, RS22 firmly believes that compassion doesn't have to be absent in the IT industry. By offering a full welcoming, professional service that those working in the IT sector deserve, their clients never need to feel like they're on their own. RS22 helps businesses stay ahead of cyber threats and guides their customers through the best protection to their specific needs and suggests optimal ways to stay on top of their security.

"As a boutique reseller based in the Midlands, we only recommend to our customers the very best companies and software vendors available on the market,Our selection process reviews those businesses that offer something different and unique whilst also making the lives of IT Security Professionals easier wherever possible. We work with vendors that put the customer first. This is why we're delighted to partner with Field Effect, whose Covalence solution hits our perfect sweet-spot… easy to use, human centric and powerfully effective without being prohibitively expensive."

Rich Smith, Managing Director of RS22

Field Effect's MDR solution, Covalence, is the only security solution built and designed from the ground up that makes it easy for small and medium businesses to get comprehensive, powerful protection from a single platform. The unique strength of Covalence is that it sees into every aspect of a business' threat surface and aggregates the data from multiple security events into simple, actionable steps, making it fast and easy to prevent and resolve threats.

"We like working with Field Effect as we only work with best-of-breed technologies," said Aaron Matthews, Head of Sales, RS22. "We really see the value in their proposition and are looking forward to many shared successes in the coming years."

This partnership is part of RS22's ongoing commitment to security. Not only will it enhance the security of their own applications, but it will also make it easy for their customers to secure their organizations.

About Field Effect Software, Inc.
Field Effect believes organizations of all sizes deserve powerful cyber security solutions to protect them. The company's threat detection, monitoring, training and compliance products and services are the results of years of research and development by the brightest talents in the cyber security industry. For more information, visit  fieldeffect.com.

About RS22
Founded with a vision to bring back a personal touch to IT and Cyber Security Services, RS22 places the emphasis on the benefits for the people on the other side of the screen. We aim to be good to work with, not just good to work for. Our business has understood from the inside that the people we deal with daily, the Tech and IT Security Teams, are increasingly placed under additional stress and can often be treated as a tool by larger businesses. We make sure that each person we deal with is given the answers they need from straight-talking problem solvers, who've spent time in the trenches too. Mostly we care about Outcomes, not just about Incomes.

Spotlight

In the past, the only discussions people had about email were focused on the never-ending inbox and the amount of time wasted filtering through it. The Snowden revelations changed all that. Suddenly, every mainstream media outlet was covering email and its lack of security. Companies reconsidered how they sent intellectual property outside the office, and the public began asking about safe methods for exchanging personal data with their service providers. But like most jolts, the effect of the Snowden revelations wore off. Companies forgot about the risk of email amidst the flurry of business, and the public became distracted by everyday life.

Related News

DATA SECURITY

AirSlate Announces SignNow Partnership with Defa3 Cyber Security

airSlate | April 15, 2021

airSlate, a pioneer partner and preferred provider of information technology and security solutions and services in the Middle East, reported today that its award-winning eSignature solution, signNow, is now available to customers of Defa3 Cyber Security. The collaboration will help to raise awareness of airSlate in the area while also increasing the importance of Defa3 Cyber Security's technology portfolio to its customers. “Knowing Defa3 Cyber Security's leadership in the region, we saw an opportunity to partner with their offering and aggressively expand our presence in the Middle East,” said Scott Owen, airSlate's Vice President of Business Development and Channel. “We are thrilled to collaborate with Defa3 Cyber Security and help their clients meet the growing need to digitize and simplify their document processes.” signNow provides a stable and compliant eSignature solution that enables users to accept, deliver, and e-sign documents in seconds. Teams can conduct business anywhere, at any time, and on any device, since it can be configured as a stand-alone application or combined with any other application through API. SignNow's tracking, analytics, and data governance give users more visibility, and its intuitive, customer-friendly user interface and API allow for a more smooth, efficient experience. “The Middle Eastern information technology space is increasingly evolving,” said Haytham Hussein, Sales Manager at Defa3 Cyber Security. “Accelerated cloud adoption, mergers and acquisitions, and other big industry projects require new and innovative methods in digital transformation strategies for businesses.” About AirSlate airSlate is a global SaaS technology company that provides no-code workflow automation, electronic signature, and document management solutions to tens of millions of innovators worldwide. The company's award-winning products, including airSlate, pdfFiller, and signNow, enable teams to develop, innovate, and automate to digitally reinvent their companies and make them work faster and easier. About Defa3 Cyber Security Defa3 Cyber Security is a market leader in cybersecurity solutions and services, exclusively representing cutting-edge IT and security technology from around the world. Defa3 Cyber Security has developed a reputation as the chosen IT and security partner in the Middle East, Turkey, and Africa, due to a strong commitment to customer success.

Read More

DATA SECURITY

Group-IB Recognized as a Global Cyber Threat Intelligence Leader by Frost & Sullivan

Group-IB | August 13, 2021

Group-IB, one of the leading providers of solutions dedicated to detecting and preventing cyberattacks, identifying online fraud, investigation of high-tech crimes and intellectual property protection, has been named one of the leaders in the global cyber threat intelligence market by Frost & Sullivan. According to "Frost Radar: Global Cyber Threat Intelligence Market, 2021," Group-IB with its proprietary Threat Intelligence & Attribution (TI&A) platform is one of the most innovative threat intelligence vendors and the third-largest one, enjoying an over 15-percent share of the global market. Frost & Sullivan analysts particularly highlighted the growth rate of the company, having noted its average revenue growth of 72% in the course of the past three years. Group-IB TI&A system, offering customer-tailored data on threats and attackers, is trusted by leading banks and financial organizations, state agencies, telecom and FMCG companies in over 60 countries of the world. The system's broad collection capabilities covering various subsets of battleground intelligence including APTs, malware, and criminal activity gathered as part of incident response operations and international investigations enable our customers to have a tailored region-specific threat landscape that switches accordingly to the changes in the strategies of adversaries. "Group-IB is rapidly gaining mindshare in the cybersecurity industry and threat intelligence community," the report read. "Group-IB recognizes the importance of tackling cybercrime for public security and forms partnerships with law enforcement agencies and non-governmental and intergovernmental organizations worldwide. Such initiatives contribute to Group-IB's recognition as a trusted intelligence provider." The urgency of the Threat Intelligence solutions use was reflected in the updates to the information security standard of the International Organization for Standardization, ISO 2700. The latest amendments including Threat Intelligence controls highlight the TI solutions growing importance for supporting corporate security teams in proactive hunting for upcoming threats. Organizations around the world use Group-IB TI&A to prevent, deter and defeat cybersecurity incidents by analyzing and attributing cyberattacks, hunting for threats, and fortifying network infrastructure. Group-IB has gathered data from extensive cyberintelligence infrastructure from a unique range of sources including exclusive data from investigations conducted with our law enforcement partners. Group-IB traces threats and maps each data point to attribute attacks and discover who is behind them, the techniques they use, and how they identify targets. This data enables further effective investigation of cybersecurity incidents by police forces as it was the case with INTERPOL's recent operation Lyrebird that originated from the data gathered by Group-IB's TI&A. Organizations can use Group-IB's award-winning Graph network analysis to correlate and analyze threat actors and events. Alternatively, they can consume intelligence by integrating Group-IB TI&A directly into their security ecosystem thanks to numerous integration options. Organizations can augment their internal capabilities with Group-IB's in-house Digital Forensics and Incident Response (DFIR), Computer Emergency Response Team (CERT-GIB), and Investigations teams. "Developing its solutions, Group-IB has been trying to ensure a proactive protection for its customers by equipping them with tools that can foresee attackers' behavior," comments Group-IB CTO and co-founder Dmitry Volkov. "This is achieved thanks to Group-IB Threat Intelligence & Attribution's huge database containing over a billion domains, SSL-certificates, hundreds of millions IP-addresses, as well as the history of all the changes in the global network for the past 10 years. This database makes it possible to extract the digital fingerprint of a specific cybercriminal or cybercrime gang targeting our customers and determine his presumed identity. The data gathered can serve as a starting point for a further thorough investigation by law enforcement."

Read More

DATA SECURITY

Cybereason Discovers Global Botnet Campaign Using Microsoft Exchange Vulnerabilities

Cybereason | April 23, 2021

Cybereason, the market leader in future-ready attack protection, reported today the discovery of a widespread, global campaign aimed at spreading the stealthy Prometei Botnet by attacking enterprises with a multi-stage attack to harvest computing power to mine bitcoin. To infiltrate networks, the threat actors, who tend to be Russian speakers, are exploiting previously disclosed Microsoft Exchange vulnerabilities used in the Hafnium attacks. Prometei has a sophisticated infrastructure in place to guarantee its longevity on infected machines. Though Prometei was first reported in July 2020, Cybereason believes the botnet dates back to at least 2016, a year before the now-famous WannaCry and NotPetya malware attacks, which infected over 200 countries and caused billions of dollars in damage. Prometei is still evolving, with new features and tools being added daily. “Because it has gone undetected, the Prometei Botnet poses a significant danger to companies. When attackers gain possession of infected machines, they can not only mine bitcoin by stealing processing power, but they can also exfiltrate classified information. The attackers may even inject the infected endpoints with other malware and work with ransomware groups to offer access to the endpoints if they so desire. To make matters worse, crypto mining consumes vital network computing power, adversely affecting business processes as well as the performance and reliability of sensitive servers,” said Assaf Dahan, Cybereason's senior director and head of threat research. Key findings from the research, include: • Wide range of Victims: Victims have been observed across a variety of industries, including Finance, Insurance, Retail, Manufacturing, Utilities, Travel, and Construction. Infected companies are based in countries around the world, including the United States, United Kingdom, Germany, France, Spain, Italy and other European countries, South America and East Asia. • Russian Speaking Threat Actor: The threat actor appears to be Russian speaking and is purposely avoiding infections in former Soviet bloc countries. • Exploiting SMB and RDP Vulnerabilities: The main objective of Prometei is to install the Monero crypto miner on corporate endpoints. To spread across networks, the threat actor is using known Microsoft Exchange vulnerabilities, in addition to known exploits EternalBlue and BlueKeep. • Cross-Platform Threat: Prometei has both Windows-based and Linux-Unix-based versions, and it adjusts its payload based on the detected operating system on the targeted machines when spreading across the network. • Cybercrime with APT Flavor: Cybereason assesses that the Prometei Botnet operators are financially motivated and intent on generating hefty sums of bitcoin, but is likely not backed by a nation-state. • Resilient C2 Infrastructure: Prometei is designed to interact with four different C2 servers which strengthen the botnet’s infrastructure and maintain continuous communications, making it more resistant to takedowns. Recommendations to companies for minimizing the Microsoft Exchange vulnerability include constantly scanning the environment for threats and imposing stricter patch management policies to ensure that all updates are deployed regularly. Sensitive network assets should also be hardened, multi-factor authentication implemented, and endpoint detection and response tools installed. About Cybereason Cybereason is a champion for today's cyber defenders, offering future-ready attack protection that unifies security from the endpoint to the enterprise and everywhere the battle moves. The Cybereason Defense Platform incorporates the industry's best detection and response (EDR and XDR), next-generation anti-virus (NGAV), and aggressive threat hunting to provide context-rich analysis of any component of a Malop (malicious operation). As a result, defenders will stop cyberattacks from endpoints to everywhere. Cybereason is a privately owned international company based in Boston that serves clients in over 30 countries.

Read More

Spotlight

In the past, the only discussions people had about email were focused on the never-ending inbox and the amount of time wasted filtering through it. The Snowden revelations changed all that. Suddenly, every mainstream media outlet was covering email and its lack of security. Companies reconsidered how they sent intellectual property outside the office, and the public began asking about safe methods for exchanging personal data with their service providers. But like most jolts, the effect of the Snowden revelations wore off. Companies forgot about the risk of email amidst the flurry of business, and the public became distracted by everyday life.