Enterprise Security, Platform Security, Software Security

Gamania Group Implements CyberArk Identity Security Platform to Protect Over 10 Million Gamers, Customers and Employees

Businesswire | May 19, 2023 | Read time : 05:00 min

Gamania Group Implements CyberArk Identity Security Platform

CyberArk (NASDAQ: CYBR), the global leader in Identity Security, announced today that Taiwan-based Gamania Group has implemented the CyberArk Identity Security Platform to strengthen its cybersecurity defenses. Gamania Group’s businesses span payment services, e-commerce, online media, original content and IT and serves over 10 million gamers, customers and employees.

Gamania Group’s flagship business – Gamania, an online and mobile games publisher – developed and runs some of the world’s most popular online games. With its large customer base, Gamania must balance a positive and rewarding gaming experience, while protecting users from being victimized by malicious actors who could be seeking to cause damage or extract money from the business and its customers. Other businesses in the group, such as the GASH online payment system and GAMA PAY e-payment service – the first of its kind in Taiwan – have also been prime targets for cyber attackers.

Gamania Group tasked Digicentre, an IT services business specializing in cybersecurity and borne out of Gamania’s former IT and security department, to build a robust cybersecurity defense strategy for the entire group. After extensive research, CyberArk was selected for its robust privileged access management and endpoint privilege management capabilities.

“Protecting privileged access has become a core component of Gamania Group’s cybersecurity strategy,” said Paul Ding, general manager of Digicentre. “We believe the focus now should be on individual identity and access, especially since the traditional perimeter no longer exists.”

CyberArk Privileged Access Manager and CyberArk Endpoint Privilege Manager, part of the CyberArk Identity Security Platform, will enable Gamania Group to:

  • Automatically discover and onboard human identities, privileged credentials and secrets
  • Centralize policy management so admins can manage passwords and user access securely and efficiently
  • Remove local admin rights and enforce least privilege across the group
  • Implement foundational endpoint security controls across multiple platforms

The CyberArk Identity Security Platform has helped reduce the potential impact of cyberattacks by quickly detecting, analyzing and containing potential threats and protecting access to critical data and assets to reduce services disruption.

“CyberArk has allowed Gamania Group to significantly improve its cybersecurity posture,” said Ding. “We now have greater insight about what is needed to mitigate risks. In addition, we have seen improvements to our security management operations with better efficiency and productivity from the significantly reduced number of alerts the systems generate. We look forward to experiencing more benefits as we extend the implementation of CyberArk across our group.”

Built for the dynamic enterprise, the CyberArk Identity Security Platform enables secure access for any identity — human or machine — to any resource or environment from anywhere, using any device.

“CyberArk is pleased to help Gamania Group boost defenses against cyber threats across its businesses, detecting and mitigating incidents to keep gamers, customers and employees better protected,” said Vincent Goh, president, APJ at CyberArk. “We look forward to continuing our support of Gamania in its journey towards implementing an increasingly pervasive, robust and efficient cybersecurity platform.”

To read more about this customer story, visit: https://www.cyberark.com/customer-stories/gamania/

About CyberArk

CyberArk (NASDAQ: CYBR) is the global leader in Identity Security. Centered on privileged access management, CyberArk provides the most comprehensive security offering for any identity – human or machine – across business applications, distributed workforces, hybrid cloud workloads and throughout the DevOps lifecycle. The world’s leading organizations trust CyberArk to help secure their most critical assets. To learn more about CyberArk, visit https://www.cyberark.com, read the CyberArk blogs or follow on Twitter via @CyberArk, LinkedIn or Facebook.

Spotlight

Risk-Based Authorization solves two challenges: it allows users to gain access from anywhere and ensures that access is secure. Find out how to frustrate attackers, not users with RBA in this guide

Spotlight

Risk-Based Authorization solves two challenges: it allows users to gain access from anywhere and ensures that access is secure. Find out how to frustrate attackers, not users with RBA in this guide

Related News

Enterprise Security, Web Security Tools

Netskope Achieves AWS Security Competency Status for Infrastructure Protection

PR Newswire | August 28, 2023

Netskope, today announced that it has achieved Amazon Web Services (AWS) Security Competency status in the Infrastructure Protection category. As a widely recognized industry leader in secure access service edge (SASE), Security Service Edge (SSE), and modern connectivity and performance, Netskope works with AWS and other cloud providers to secure and optimize the most demanding cloud-first environments. Achieving the AWS Security Competency differentiates Netskope as an AWS Partner Network (APN) member that meets rigorous security specifications on AWS. In addition, Netskope was recently recognized as a "finalist" for the AWS US Rising Star Partner of the Year at this year's AWS New York Partner Summit. With the rapid migration of critical workloads to the cloud, the increase in the hybrid workforce, and today's complex cybersecurity landscape, the need for robust cloud security solutions is more critical than ever before. Netskope has helped thousands of customers, including more than 25 of the Fortune 100, improve their security posture. Netskope helps customers address AWS's shared responsibility model of cloud security for several important use cases: Provide secure remote access to private applications on AWS - Remote and hybrid workers need to access business-critical applications from anywhere. Netskope Private Access (NPA), Netskope's zero trust network access (ZTNA) solution, provides secure, granular access based on adaptive trust principles. This means that users can only access the applications and resources they need when they need them. NPA also improves security by replacing outdated VPN gateways and concentrators that expose their IP addresses to the public internet. Private resources are not visible on the public internet and are shielded from attackers. Discover shadow IT and block data exfiltration and threats - Netskope can act in real-time to block movement of sensitive data, threats, unauthorized users, and access to rogue accounts. Netskope Cloud Access Security Broker (CASB) Inline monitors traffic to and from AWS resources and applications to expose suspicious or malicious activity. Netskope's Zero Trust Engine decodes activities in real-time to place activity-level restrictions on users, groups, and organizational units across more than 270 AWS services. Netskope's Next Generation Secure Web Gateway (SWG) blocks malware, detects advanced threats, and controls cloud apps and services for users located anywhere, using any device. Discover sensitive data and malware in Amazon Simple Storage Service (Amazon S3) - Netskope CASB API scans Amazon S3 buckets to identify sensitive data and protect it from misuse. It also discovers malware and generates alerts to help prevent threats from spreading. Extensive integrations provide visibility and information sharing across cloud and hybrid environments - Netskope integrates with a variety of AWS services including AWS CloudTrail, AWS CloudTrail Lake, Amazon Security Lake, Amazon S3, and Amazon GuardDuty to share logs, alerts, events, and threat information. Netskope Cloud Exchange (CE) offers a wide variety of plug-ins and modules to facilitate exchange of information between cloud services, security tools, and data lakes, and automate remediation. CE can be deployed on Amazon Elastic Container Service (Amazon ECS) using AWS Fargate. Netskope also integrates with AWS Control Tower for customers needing automated deployment and consistent security policy across multi-account AWS customer environments. "We are thrilled to achieve the AWS Security Competency in the Infrastructure Protection category, as it highlights our ongoing commitment to help organizations provide secure access to applications and resources, protect data, and reduce risk in the cloud," said Andy Horwitz, Vice President, Business Development and Technology Alliances, Netskope. "This achievement demonstrates our commitment to AWS customers through our team's hard work and dedication to providing cutting-edge security solutions that address the evolving challenges of secure cloud adoption." AWS is enabling scalable, flexible, and cost-effective solutions from startups to global enterprises. To support the seamless integration and deployment of these solutions, AWS established the AWS Competency Program to help customers identify AWS Partners with deep industry experience and expertise. About Netskope Netskope, a global SASE leader, helps organizations apply zero trust principles and AI/ML innovations to protect data and defend against cyber threats. Fast and easy to use, the Netskope platform provides optimized access and real-time security for people, devices, and data anywhere they go. Netskope helps customers reduce risk, accelerate performance, and get unrivaled visibility into any cloud, web, and private application activity. Thousands of customers trust Netskope and its powerful NewEdge network to address evolving threats, new risks, technology shifts, organizational and network changes, and new regulatory requirements. Learn how Netskope helps customers be ready for anything on their SASE journey, visit netskope.com.

Read More

Cloud Security

IBM Broadens its Cloud Security Services and Compliance Center

IBM | September 08, 2023

IBM has announced the expansion of its Cloud Security and Compliance Center to help enterprises protect data and mitigate risk across their hybrid, multi-cloud environments and workloads. With the addition of the latest solutions, IBM's solution suite now goes beyond compliance posture management and workload protection. It now includes application-level security capabilities. IBM Cloud Security and Compliance Center suite offers benefits, including intelligent automation technology, expanded compliance, and visibility into third- and fourth-party risk posture, among others. IBM, a global technology innovator at the forefront of automation, AI, and hybrid cloud solutions, has unveiled the expansion of the IBM Cloud Security and Compliance Center. This suite offers a range of updated cloud security and compliance solutions carefully designed to aid enterprises in mitigating risk and safeguarding data within their hybrid, multi-cloud environments and workloads. As organizations grapple with emerging threats along the supply chain and navigate evolving global regulations, this solution suite stands as a pillar of support for their resilience, performance, security, and compliance requirements, all while aiding in the reduction of operational costs. IBM's newly introduced Cloud Security and Compliance Center Data Security Broker solution offers a transparent data encryption layer. It utilizes format-preserving encryption and anonymization technology to safeguard sensitive data used in business applications and AI workloads. Rohit Badlaney, General Manager at IBM Cloud Product and Industry Platform, said, The expansion of the IBM Cloud Security and Compliance Center displays our continued focus on industry-specific capabilities that assist in addressing real world business challenges for our clients. For ex., clients have the ability to employ the IBM Cloud Framework for Financial Services, which can enable them to address evolving rules, laws and regulations surrounding cloud risk. The new capabilities demonstrate our commitment to supporting clients on their hybrid cloud modernization journeys, designed for security, privacy, compliance, and trust at the forefront of our product roadmap. [Source – Cision PR Newswire] IBM Cloud has a long history of working with client companies in financial services and other highly regulated sectors, especially when it comes to assisting them to drive innovation while securing their sensitive data, added Badlaney. In combination with the IBM Cloud Security and Compliance Center Data Security Broker, the upgraded suite of the IBM Cloud Security and Compliance Center will introduce a number of new features. These additions are intended to aid clients, especially those operating in regulated industries, in meeting security, compliance, and data residency requirements specific to their industry. Key features due to the expansion of IBM Cloud Security and Compliance Center: Intelligent automation technology Expanded compliance Enhanced Cloud Security Posture Management (CSPM) Optimized Cloud Workload Protection Platform (CWPP) Improved Cloud Infrastructure Entitlements Management (CIEM) Enhanced visibility into third- and fourth-party risk posture Frank Dickson, VP of Security and Trust at IDC, said, As more companies adopt a hybrid, multi-cloud approach to managing applications of all sorts across PaaS, SaaS, IaaS and on-premises, centrally automated and managed technologies that can execute security and compliance capabilities at scale are required. The IBM Security and Compliance Center addresses this requirement for holistic protection – which is especially crucial for organizations in highly regulated sectors that manage sensitive data, such as financial services – regardless of the application within which the data may live. [Source – Cision PR Newswire]

Read More

Enterprise Security, Platform Security, Software Security

Conceal Unveils MSP Community Program

Business Wire | August 01, 2023

Conceal, the leader in browser security for managed service providers, today announced the launch of its Conceal MSP Community Program. A significant highlight of this initiative is the offer of a free NFR license for Managed Service Providers (MSPs), demonstrating Conceal's commitment to strengthening its partnerships within the MSP community. Conceal continues to build on its significant traction within the MSP ecosystem, always responsive to partner feedback and striving to simplify and enhance the effectiveness of its deployment process. The Conceal MSP Community Program marks a new chapter in this ongoing dialogue, with the free NFR license aimed at enabling MSPs to fully experience and understand the power of the ConcealBrowse solution, thus facilitating its integration into their service offerings. “Our partnership with Conceal has empowered us to offer a comprehensive cybersecurity package that's second to none," declared Dave Thompson of TeamLogic IT of San Ramon, CA. "Their ConcealBrowse solution, with its cutting-edge isolation technology, has been instrumental in defending our clients against malware and ransomware. The fact that it can be easily integrated into our existing security offerings has enhanced the overall value we deliver to our clients. We're proud to work with a partner who shares our commitment to cybersecurity resilience.” Furthermore, Conceal recognizes the cybersecurity challenges small to mid-sized companies face, notably ransomware and credential theft. Through the Conceal MSP Community Program, MSPs will be in a stronger position to offer innovative solutions to these threats. ConcealBrowse can easily be integrated into existing security packages or function as a standalone solution for companies lacking protection, thereby increasing overall cybersecurity resilience within limited budgets. About Conceal Conceal’s primary offering, ConcealBrowse, harnesses a sophisticated intelligence engine that works at machine speed with near-zero latency. It dynamically and transparently pre-processes and analyzes code, migrating suspicious, unknown, and risky browser activity to a secure cloud-based isolation environment. Conceal enables organizations to protect users from malware and ransomware at the edge. The Conceal Platform employs Zero Trust isolation technology to defend against sophisticated cyber threats. Globally, organizations of all sizes depend on Conceal to ensure their users and IT operations remain secure and isolated from potential attacks. For more information, visit https://conceal.io/. About TeamLogic IT TeamLogic IT is a national provider of advanced technology solutions for companies of all sizes. Local offices provide clients with the IT support they need to run their businesses more efficiently by leveraging the latest technology solutions, including managed IT services, cybersecurity, business continuity, cloud services, mobility solutions, unified communications, and consulting and support. With more than 150 independently owned and operated locations across North America, TeamLogic IT helps companies minimize downtime and improve productivity.

Read More