DATA SECURITY

HUB Security acquires the leading Cyber Security Comsec for NIS 70M

HUB Security | September 30, 2021

HUB Security ("HUB" or the "Company"), announces today the acquisition of Comsec Global for NIS 70 million, of which HUB will pay NIS 40 million in cash and NIS 30 million in its own shares. The Shares consideration are under a share sale lock-up provision for a period of 6 months post closing of the transaction.

The main goal of the acquisition is to dramatically increase HUB Security's global sales and distribution infrastructure by over 40 countries, which will enable the Company to more than double its revenues and significantly accelerate penetration of HUB's unique cyber-security solutions in global enterprises.

HUB has developed a technology that can cause a paradigm shift in the Cyber Security market, HUB's solution was considered to be the Holy Grail long awaited by governments and enterprises worldwide. The combination between the two companies creates a unique entity that has a strong foundation of global cyber business coupled with an unparalleled growth potential that leverages upon a 40-country sales infrastructure. In our opinion, this is a classic case of 1+1 equals 10 and not two.

Mr. Rony Sternbach, Comsec Chairman and controlling shareholder.

Comsec is one of the leading companies in Israel's cybersecurity sector. Founded in 1987, the company was a pioneer in data security and now has an extensive customer base spanning over a thousand leading companies in 40 countries across five continents. It operates four consulting and distribution companies and has subsidiaries in the UK and the Netherlands.

The company offers a broad spectrum of services to its clients, providing comprehensive solutions in application security, security, and source code testing. These include application lifecycle development consulting, infrastructure security, and communication security. It further provides security auditing via several models; Threat Modeling, penetration tests, Black Box and comprehensive White Box audit Design Review, and more.

Comsec's annual sales turnover is approx NIS 120 million. Its customers include banking, insurance, hi-tech, communications, industrial, retail, large-scale infrastructures, and local and central government bodies and ministries. Comsec is a one-stop shop for all their cybersecurity needs.

HUB Security was established in 2017 by veterans of the IDF's 8200 and 81 intelligence units. The company specializes in protecting sensitive commercial information and has an advanced encrypted computing solution for companies and organizations aimed at preventing hostile intrusions and the theft of sensitive commercial information.

Hub offers cybersecurity solutions to, amongst others, the AI, Fintek, and critical infrastructure sectors. The company employs 400 employees, and its offices are located in Israel and the United States.

Spotlight

Current BYOD solutions either jeopardize corporate data by allowing data to reside on the device, or they sacrifice the user experience. ZixOne is a mobile app that simplifies the BYOD challenge by enabling easy access to the most used business application on mobile devices - email. The ZixOne app combines a familiar look and feel for the corporate interface with greater speed and security creating an unrivaled user and most importantly does not keep corporate data on the device.

Spotlight

Current BYOD solutions either jeopardize corporate data by allowing data to reside on the device, or they sacrifice the user experience. ZixOne is a mobile app that simplifies the BYOD challenge by enabling easy access to the most used business application on mobile devices - email. The ZixOne app combines a familiar look and feel for the corporate interface with greater speed and security creating an unrivaled user and most importantly does not keep corporate data on the device.

Related News

SOFTWARE SECURITY

Green Hills Software Expands Leadership in Automotive Cybersecurity

prnewswire | October 28, 2020

Green Hills Software, the worldwide leader in embedded safety and security, announced today it has adopted the two new international security standards and regulations for automotive cybersecurity – ISO/SAE 21434 and UNECE WP.29 for the INTEGRITY real-time operating system (RTOS) and associated products and services. For decades, Green Hills has been an industry-recognized leader helping electronics manufacturers create and deploy embedded systems at the highest levels of safety and security. By offering compliant products and associated evidence reports for these new standards, Green Hills will build upon its proven pedigree as the foundational run-time software provider trusted by OEMs and their Tier 1 suppliers for automotive electronics. Utilizing these new security standards enables manufacturers to design and deploy purpose-built, secure, software-defined systems in connected vehicles, including highly automated driving, high performance compute clusters, domain controllers, vehicle gateways, telematics, keyless entry, diagnostic connections and electric vehicle charging stations, to name a few. As reliance on vehicle connectivity grows and demand for software-defined services rises, the risk of cyberattacks against connected vehicles continues to rise. With over 100 ECUs and hundreds of millions of lines of code, connected vehicles are a target-rich platform for cyberattacks. Multiple points of entry to modern connected vehicles provide opportunities for malicious vehicle control, fraud, and data-breaches that threaten companies, drivers, and road users. A single exploited security vulnerability could put an entire fleet of vehicles at risk, numbering in the millions. With nearly 80% of new cars connected1 to the internet, cybersecurity breaches have the potential to put billions of dollars in sales and lawsuits at risk – not to mention the damage to brand reputation. As a result, governmental bodies and independent regulators are drafting two related measures for managing cybersecurity threats throughout a connected vehicle's lifecycle. Green Hills is collaborating with its customers and adopting cybersecurity assessment policies for the following: The draft ISO/SAE 21434 "Road vehicles – Cybersecurity engineering" Standard was recently published by SAE International and ISO (Organization for Standardization). It is a baseline for vehicle manufacturers and suppliers to ensure cybersecurity risks are managed efficiently and effectively from both a product lifecycle and organizational perspective spanning concept, development, production, operation, maintenance, and decommissioning. The WP.29 regulations from the United Nations Economic Commission for Europe (UNECE) make OEMs responsible for cybersecurity mitigation in four cybersecurity areas spanning the entire vehicle lifecycle: managing cyber risks; securing vehicles by design; detecting and responding to security incidents; and providing safe and secure over-the-air (OTA) software updates. While WP.29 defines concrete examples of threats and mitigations, OEMs can choose how they show the threats are addressed, such as complying with ISO/SAE 21434. The regulation is expected to be finalized in early 2021 and applied initially to many member nations including European nations, South Korea, UK, and Japan, and will likely influence vehicle homologation polices in the US, Canada and China. WP.29 will be legally binding within adopting countries, and while the ISO/SAE 21434 standard is not a regulation, it is expected to be widely accepted in the global industry like ISO 26262 is today. "Connected cars bring significant risks and rewards to OEMs and their suppliers," said Chris Rommel, Executive Vice President, IoT & Industrial Technology at VDC Research. "Green Hills has earned a high stature in the industry for supplying security-critical foundational software to companies building life-critical systems like aircraft avionics, vehicle ADAS and medical equipment, and its support of these new cybersecurity standards is noteworthy." "ISO/SAE 21434 and WP.29 are valuable additional steps towards protecting connected vehicles from cybersecurity vulnerabilities," said Dan Mender, VP of Business Development at Green Hills Software. "Green Hills has decades of experience developing and delivering security-certified technologies at the highest levels. Adopting these standards expands our offerings to global automotive OEMs and their suppliers bringing the industry's leading secure software run-time environment to next-generation connected vehicle electronics." Reference (1) Source: VDC Research Group, Inc.: Automotive Cybersecurity Software & Services Market report, 2019 Strategic Insights Security & The Internet of Things Research Program. About Green Hills Software Founded in 1982, Green Hills Software is the worldwide leader in embedded safety and security. In 2008, the Green Hills INTEGRITY-178 RTOS was the first and only operating system to be certified by NIAP (National Information Assurance Partnership comprised of NSA & NIST) to EAL 6+, High Robustness, the highest level of security ever achieved for any software product. Our open architecture integrated development solutions address deeply embedded, absolute security and high-reliability applications for the military/avionics, medical, industrial, automotive, networking, consumer and other markets that demand industry-certified solutions. Green Hills Software is headquartered in Santa Barbara, CA, with European headquarters in the United Kingdom. Green Hills, the Green Hills logo and INTEGRITY are trademarks or registered trademarks of Green Hills Software in the U.S. and/or internationally. All other trademarks are the property of their respective owners.

Read More

DATA SECURITY

Optiv and NightDragonto work together to Fast-trackDelivery of Technology to Cybersecurity Market

Optiv | January 05, 2022

The cyber advisory and solutions leader, Optive, and the cybersecurity, safety, security, and private investment and advisory firm, NightDragon, have announced their innovation-driven alliance. They have decided to work together to make the technology suitable for the next-gen and serve the clients better. With the alliance, Optive will have access to a portfolio of innovative, future-focused companies from NightDragon. They will also get access to thoroughly vetted cybersecurity products and solutions. In addition,NightDragon will also have access to lot of benefits from the alliance, such as access to Optiv's unmatched ecosystem of people, products, partners, and programs. This will help the clients of NightDragon accelerate business progress. "In an increasingly complex and fast-moving threat landscape, speed to innovate and speed to market are valuable business differentiators. Our alliance with NightDragon provides both, along with tremendous value to our clients and NightDragon's portfolio of companies,As a destination for co-innovation, we have a front-row seat to the incubation of the newest security innovations, helping ensure we stay at the cutting-edge of technology so we can solve the problems of tomorrow." Optiv CEO Kevin Lynch "The threat we face today in cybersecurity is immense, and we know we stand against this storm alone. Optiv is unmatched when it comes to helping put the right technologies and solutions in the hands of the companies that need them. NightDragon is proud to work with Optiv to help our portfolio companies hyper-scale their businesses and become viable defenders against the offensive threats we are seeing in the marketplace," said Dave DeWalt, founder and managing director, NightDragon. Optiv, as the market leader, offers various platforms of cybersecurity products and solutions, such as Managed XDR (MXDR), Zero Trust, Threat Management, Data Governance, Privacy and Protection. "We are proud to work with Optiv and NightDragon, which recognize the importance of innovation and are investing in the next generation of cybersecurity solutions," said Karen Kukoda, vice president of strategic partnerships at SafeGuard Cyber, a NightDragon portfolio company. "We have already seen Optiv's ability to accelerate our business and look forward to seeing that potential continue to increase."

Read More

PLATFORM SECURITY

Vectra Becomes AWS Security Competency Partner

Vectra | June 30, 2022

Vectra AI, a pioneer in threat detection and response, said today that it has been an Amazon Web Services (AWS) Security Competency Partner, proving its technical knowledge and demonstrated customer success when it comes to further protecting AWS environments. The competence designation acknowledges Vectra's strong cloud security experience and proven technology, which assists clients in further enhancing their security measures across hybrid architectures and cloud environments. Vectra's AWS Security Competency distinguishes it as an AWS Partner Network (APN) member that delivers specialized threat detection technologies to assist organizations in adopting, developing, and deploying complex security projects on AWS. To be eligible for this distinction, APN members must have extensive AWS knowledge and be able to offer solutions on AWS effortlessly. Vectra earned AWS Security Competency accreditation after a thorough qualification process based on references and customer feedback. "Becoming an AWS Security Competency Partner is an exciting milestone for Vectra and for many of our customers who leverage AWS as a critical component in their everyday operations. Solving threat detection and response challenges for our customers is top priority and this competency further validates our ability to do that in the cloud and wherever organizations choose to configure their environments." Michael Porat, Vectra SVP, Corporate and Business Development "We are an AWS shop. Using AWS VPC Traffic Mirroring, Vectra gives us full visibility into our Nitro-based instances," said Mirza Baig, IT Security Manager at Municipal Property Assessment Corporation (MPAC). To monitor all infrastructure-as-a-service traffic, the Vectra platform interfaces with AWS Virtual Private Cloud (VPC) traffic mirroring. It also integrates with AWS Security Hub to publish Vectra detections as findings, enabling security teams to correlate Vectra attacker detections with other data sources for faster threat hunting and incident investigations. "Achieving the AWS Security Competency validates Vectra for its technical expertise and ability by enabling customers to further secure their journey through the different stages of cloud adoption—from migration through day-to-day management," said Dudi Matot, Security Segment Lead at AWS.

Read More