Flowmon and Paessler Bring a Symbiosis of IT Infrastructure, Performance, and Security Monitoring

prnewswire | September 08, 2020

Flowmon and Paessler Bring a Symbiosis of IT Infrastructure, Performance, and Security Monitoring
Flowmon Networks, a network intelligence company, has today announced an alliance with Paessler AG, an IT monitoring specialist. The integrated solution brings together broad IT infrastructure monitoring and advanced performance and security analysis to ensure a healthy and secure run of digital environments.Managing today's ever-changing IT environment requires a bullet-proof certainty that all assets are reliable, well-functioning and protected. Enhancing the symbiosis of IT infrastructure monitoring with advanced NetSecOps technology is only a natural step along the path to reaching this goal. Flowmon and Peassler's PRTG integrated solution brings together the excellence of both worlds.

Spotlight

Long-time readers of Healthcare IT Today will know that we love good infographics here at the office. There is nothing better than interesting statistics delivered in a compact, visually appealing format. The Center for Connected Medicine (CCM), based in Pittsburgh and part of UPMC, recently released a “State of Cloud Cybersecurity in Health Care” infographic based on a survey of healthcare business and IT leaders.

Spotlight

Long-time readers of Healthcare IT Today will know that we love good infographics here at the office. There is nothing better than interesting statistics delivered in a compact, visually appealing format. The Center for Connected Medicine (CCM), based in Pittsburgh and part of UPMC, recently released a “State of Cloud Cybersecurity in Health Care” infographic based on a survey of healthcare business and IT leaders.

Related News

SOFTWARE SECURITY

Minimize Cybersecurity Risk and Relieve Overstretched Security Teams with Trend Micro Support and Service Bundles

Trend Micro Incorporated | September 07, 2021

Trend Micro Incorporated a global cybersecurity leader, today announced the launch of Trend Micro Service One, consolidating its managed services to optimize enterprise threat management. The new services bundles, which can include premium support, an early warning service, Managed XDR and incident response, help customers prevent, detect and respond to cyber threats faster by supplementing internal resources. The prevalence of cybersecurity threats and the dynamic threat landscape leave businesses vulnerable and put security experts in high demand to triage and investigate incidents. According to Aaron Sherrill, Senior Research Analyst at 451 Research, part of S&P Global Market Intelligence[1], "Security teams are struggling to understand the right approach or strategy to employ to detect and respond to advanced threats. While most organizations have a plethora of security tools at their disposal, they are creating enormous amounts of data that must be explored and inspected. It is becoming increasingly difficult to distinguish between the noise and indicators of serious threats – especially complex, distributed threats that operate low and slow to avoid detection." Over half of Security Operations Center (SOC) teams feel overwhelmed by alerts and aren't confident in their abilities to prioritize or respond to these alerts, according to a recent Trend Micro survey. Outsourcing security management significantly lightens the workloads and saves businesses from catastrophic breaches. "The weight of the world was felt by our security team as we work tirelessly to enable organization success in the digital transformation journey," said Andre Castleberry, cybersecurity manager of Hall County, Georgia. "Trend Micro's managed services have empowered our small team to manage risk and compliance at scale. Having threat experts support day-to-day detection and response for our security platform allows our employees to focus resources on serving our constituents." Trend Micro's expert threat analysis and monitoring via its different services helps fortify business risk management plans. Managed threat detection and response across a complete security platform takes the burden of threat data triage off of stretched security teams, allowing internal resources to focus on business enablement. "Security teams are stretched to the max while the business risk of cybersecurity continues to increase," said Wendy Moore, vice-president of product marketing for Trend Micro. "We want to help make our customers' lives easier while also minimizing their risk of attack. Providing better insight across the entire security platform, from product enablement, to risk monitoring and mitigation, to attack detection and response is one way we're doing that. Our proactive services that cross the threat lifecycle enables more advanced visibility and protection, helping businesses manage threats most effectively." Enterprise security requires streamlined operations with a broader perspective, including better context to hunt, detect and contain threats to best manage the business risk introduced by cyber threats. Trend Micro's powerful cybersecurity platform detects malicious activities, with threat intelligence from various sources, helping catch threats faster and improve investigations, analysis, and response times, while eliminating pressure from the SOC team so they can focus on high value activities. Leveraging Trend Micro's services adds business value by combining premium customer support with such options as: Early Warning Service scans for early indicators of compromise and then alert customers of potential threats before they cause system harm. Incident Response provides expert resources in case of a critical, active attack. Managed Detection and Response monitors alerts and logs across the entire environment, identifying and investigating events and providing ongoing threat expertise. Trend Micro is committed to supporting customers through their digital transformation journey, supporting internal resources, so customers get the most out of their security platform. About Trend Micro Trend Micro, a global cybersecurity leader, helps make the world safe for exchanging digital information. Fueled by decades of security expertise, global threat research, and continuous innovation, Trend Micro's cybersecurity platform protects thousands of organizations and millions of individuals across clouds, networks, devices, and endpoints. As a leader in cloud and enterprise cybersecurity, the platform delivers a powerful range of advanced threat defense techniques optimized for environments like AWS, Microsoft, and Google, and central visibility for better, faster detection and response. With 7,000 employees across 65 countries, Trend Micro enables organizations to simplify and secure their connected world.

Read More

Keysight Technologies Earns Security New Certifications to strengthen Network Visibility and Security

Keysight Technologies | August 17, 2020

Keysight Technologies, Inc., a leading technology company that helps enterprises, service providers and governments accelerate innovation to connect and secure the world, announced that the company has earned new security certifications for its full Vision portfolio of network packet brokers (NPB) which enable Federal and Regulated industries to strengthen network visibility and security. Cybersecurity has become a critical component of government and industry systems as societies reliance on a digital infrastructure continues to escalate. These security certifications allow Keysight to provide government agencies with advanced network visibility for protecting systems, networks and programs from digital attacks. Cyberattacks are usually aimed at accessing, changing or destroying sensitive information; extorting money from users; or interrupting normal business processes.

Read More

Google Top Choice for Cybercriminals for Brand-Impersonation Spear-Phishing Campaigns

Google | May 28, 2020

Phishing campaigns are now regarded as among the most prevalent cybersecurity threats as COVID-19 strands people at home, but after months of isolation, official data has confirmed it. A new report from Barracuda released today shows 100,000 attacks impersonating reputable brands, including Google and Microsoft, have targeted remote workers. More generally, 4% of all spear-phishing attacks in the period between January and April were made up by Google-brand impersonations, with that number expected to climb. It’s no secret that phishing campaigns are now regarded as among the most prevalent cybersecurity threats as COVID-19 strands people at home, but after months of isolation, official data has confirmed it. A new report from Barracuda released today shows 100,000 attacks impersonating reputable brands, including Google and Microsoft, have targeted remote workers between January 1 and April 30 2020. 65% of this figure impersonated Google, mostly via file-sharing and storage websites – including storage.googleapis.com (25%) docs.google.com (23%), storage.cloud.google.com (13%), and drive.google.com (4%). More generally, 4% of all spear-phishing attacks in the period between January and April were made up by Google-brand impersonations, with that number expected to climb. Brand-impersonation spear-phishing attacks have always been a popular and successful method of harvesting a user’s login credentials, and with more people than ever working from home, it’s no surprise that cyber criminals are taking the opportunity to flood people’s inboxes with these scams,” says Barracuda Networks UK systems engineer manager Steve Peake. “The sophistication of these attacks has accelerated in recent times: now, hackers can even create an online phishing form or page using the guise of legitimate services, such as forms.office.com, to trick unsuspecting users." Barracuda reported that Microsoft brands were targeted in 13% of attacks: onedrive.live.com (6%), sway.office.com (4%), and forms.office.com (3%). Learn more: GOOGLE AND KPMG SECURITY EXPERTS SHARE THEIR INSIGHTS ON COVID-19 RELATED CYBER SCAMS . “Brand-impersonation spear-phishing attacks have always been a popular and successful method of harvesting a user’s login credentials, and with more people than ever working from home, it’s no surprise that cyber criminals are taking the opportunity to flood people’s inboxes with these scams,” ~ Steve Peake Barracuda Networks UK systems This comes as Microsoft warned its userbase this week of a new widespread COVID-19 themed phishing campaign that installs the NetSupport Manager remote administration tool to completely take over a user's system and execute commands on it remotely. Microsoft’s Security Intelligence team claimed the campaign involved the usage of malicious Excel attachments to infect user's devices with a remote access trojan (RAT), with the initial attack beginning with an email impersonating the Johns Hopkins Center, a major source of credible COVID-19 news. Spear-phishing campaigns like this, which trick victims into sharing login credentials, have enjoyed massive success during the pandemic. “The sophistication of these attacks has accelerated in recent times: now, hackers can even create an online phishing form or page using the guise of legitimate services, such as forms.office.com, to trick unsuspecting users." Fortunately, there are ways to protect oneself against these cyber, such as implementing multi-factor authentication steps on all log-in pages so that hackers will require more than just a password to gain access to your data,”says Peake. “Other, more sophisticated methods of cyber protection include using email security software, such as API based inbox defence, which uses artificial intelligence to detect and block attacks.” Attackers use many tricks, including by leveraging enterprise brand assets, such as company names and logos, to develop phishing websites that appear authentic and lure internet users to enter valuable information such as user names and passwords. Phishing Protection helps prevent users from accessing phishing sites by identifying various signals associated with malicious content, including the use of your brand assets, classifying malicious content that uses your brand and reporting the unsafe URLs to Google Safe Browsing. This is through a combination of factors, including heightened fears over a globally penetrating issue and the worldwide trend of remote working, which increases risk landscapes generally. Google's Threat Analysis Group (TAG) works to counter targeted and government-backed hacking against Google and our users. This is an area we have invested in deeply for over a decade. Our daily work involves detecting and defeating threats, and warning targeted users and customers about the world’s most sophisticated adversaries, spanning the full range of Google products including Gmail, Drive and YouTube .In the past, we’ve posted on issues like phishing campaigns vulnerabilities and disinformation. Going forward, we’ll share more technical details and data about the threats we detect and how we counter them to advance the broader digital security discussion. Learn more: NEW CYBER THREAT INDEX SHOWS INDUSTRIES ARE UNDER ATTACK IN UNCERTAIN TIMES .

Read More