DATA SECURITY

Infotecs' ViPNet Cyber-Security Solutions at GISEC

Infotecs ViPNet | May 21, 2021

Infotecs, a number one international cybersecurity, and threat intelligence platform provider will present its ViPNet IT security solutions at GISEC from May 31 to June 2, 2021, in Dubai, United Arab Emirates.

The number of cyber-attacks has increased since 2020. Cybercriminals are taking advantage of the uncertainty of a worldwide pandemic and remote work. That's why protecting the transmission of sensitive data via mobile devices also as all IP-enabled devices are important today. the danger for companies is just too great that data of any form (voice or text messages, IP video data, exchanged business-critical documents, etc.) are going to be intercepted or may be manipulated by cybercriminals.

At GISEC in Dubai at the top of May, Infotecs will present ViPNet mobile security solution. It provides market-leading secure enterprise communication tools with the strongest available encryption combined with maximum convenience, functionality, and usefulness. ViPNet provides fast, easy to use, reliable yet secure communication via email, chat, video, and voice calls (VOIP). Our pure software-based solutions deliver superior security intentionally supported symmetric key and point-to-point encryption approaches. The "Always On" solution provides fast & reliable secure connectivity even over low bandwidth or mobile networks.

"The pandemic accelerated the increase of the digital economy and made governments around the world rethink how various industries operate. headquarters workspace became the New Normal," explained Josef Waclaw, CEO of Infotecs GmbH. "With our innovative solutions like ViPNet Threat Detection & Response or ViPNet Mobile Security solutions, we will help many business players build a strong, cyber-resistant ecosystem."

The Gulf Information Security Expo and Conference (GISEC), the Gulf region's largest cybersecurity forum, has been held annually at the Dubai World Trade Centre since 2013. GISEC provides web security professionals from around the world the chance to seek out innovative solutions, share insights with industry experts, and equip themselves with the proper tools to guard their businesses against ever-increasing cyber-attacks.

Spotlight

Answer the Demand for Certified Professionals Prepping for an (ISC)² credential, like the CISSP, is a big commitment. Maybe you’ve started, but life got in the way of your goal… We get it. That’s why we created the (ISC)² Exam Action Plan to help keep you on track for success. Because we need talented, skilled people like you w

Spotlight

Answer the Demand for Certified Professionals Prepping for an (ISC)² credential, like the CISSP, is a big commitment. Maybe you’ve started, but life got in the way of your goal… We get it. That’s why we created the (ISC)² Exam Action Plan to help keep you on track for success. Because we need talented, skilled people like you w

Related News

ENTERPRISE SECURITY, PLATFORM SECURITY, SOFTWARE SECURITY

N-able Announces Cove Data Protection with Disaster Recovery as a Service, Introducing Microsoft Azure Recovery Option

Businesswire | May 12, 2023

N-able, Inc. (NYSE: NABL), a global software company helping IT services providers deliver remote monitoring and management, data protection as a service, and security solutions, today announced that it has expanded the Continuity features in Cove Data Protection™ with the introduction of Standby Image recovery in Microsoft Azure. This new feature delivers smarter disaster recovery as a service (DRaaS), helping MSPs and IT professionals provide a full range of recovery services to end users—from fast, straightforward file-level restore to flexible, affordable disaster recovery, now including recovery in Microsoft Azure. Cove’s innovative SaaS architecture reduces the time and costs associated with data protection and improves ransomware readiness by providing backup storage isolation by default. Cove’s cloud-first approach keeps primary backup storage in the cloud, out of the reach of ransomware on the local network. Cove’s Continuity features provide proactive recovery options to deliver higher service levels, including automated Recovery Testing and Standby Image. With the addition of Azure support, Standby Image now offers even more recovery location flexibility: to a local device onsite, to a secondary location, or to the Azure cloud—all without the need for expensive proprietary backup appliances. “Azure and Cove offer a smarter way to solve the issue of failing over to the cloud,” commented Chris Groot, general manager of Cove Data Protection. “It’s free to send data into an Azure tenant, and you only pay for Azure compute when you boot up the virtual machine (VM). Cove allows you to create a bootable image after every backup and store it there until it’s needed. In the case of an outage, Azure gives you full control over compute resources, and the cost of running in Azure during an outage is more affordable than buying and maintaining an expensive backup and disaster recovery (BDR) appliance you may never use. You can also continue to run your VM in Azure, if you choose, as part of a larger cloud-first IT strategy.” Previously, many IT professionals thought they needed to bear the heavy cost burden of proprietary appliances to meet customer expectations around DRaaS. With Cove’s Standby Image recovery in Azure, it’s possible to deliver enhanced disaster recovery while experiencing up to 60% cost savings over traditional appliances. “We looked at the various disaster recovery options, including very expensive BDR appliances, and realized that as an MSP, we wanted a rock-solid product that would also help us keep our costs down. We found that with Cove,” said Lionel Naidoo, director at Dragon IS. “The IT landscape continues to change, and you have to stay agile and take the time to investigate new and fresher approaches in order to stay ahead.” About N-able N-able fuels IT services providers with powerful software solutions to monitor, manage, and secure their customers’ systems, data, and networks. Built on a scalable platform, we offer secure infrastructure and tools to simplify complex ecosystems, as well as resources to navigate evolving IT needs. We help partners excel at every stage of growth, protect their customers, and expand their offerings with an ever-increasing, flexible portfolio of integrations from leading technology providers. n-able.com

Read More

ENTERPRISE SECURITY, PLATFORM SECURITY, SOFTWARE SECURITY

Check Point Software Technologies Bolsters Endpoint Security with Enhanced Posture Management to Tackle Escalating Vulnerability Exploits

Globenewswire | May 15, 2023

Check Point® Software Technologies Ltd. (NASDAQ: CHKP), a leading provider of cybersecurity solutions globally announced today the expansion of its Check Point Harmony Endpoint protections solution by incorporating vulnerability and automated patch management capabilities. This enhancement addresses the mounting number of cyberattacks that exploit unpatched system vulnerabilities for unauthorized access. To deliver this advanced feature, Check Point has joined forces with Ivanti, integrating Ivanti Patch Management to assess and remediate software vulnerabilities from cloud to edge, into Check Point's Harmony Endpoint protection solution. The National Vulnerability Database reported over 25,000 vulnerabilities in 2022, with this figure expected to rise. Furthermore, a recent Dark Reading report revealed that 57% of ransomware attacks capitalize on unpatched vulnerabilities, highlighting the necessity of addressing this issue to defend against such threats. However, vulnerability patching is often a complex and time-consuming process. Many organizations lack insight into their environment's vulnerability status, and even when they do, patching takes an average of 97 days, according a report of the Ponemon Institute. This delay provides ample opportunities for attackers to exploit these weaknesses. To tackle this challenge, Check Point is enhancing its endpoint security solution, Harmony Endpoint, with vulnerability assessment and automated patch management capabilities. This will equip Harmony Endpoint users with an intelligent, automated process that minimizes the attack surface and boosts operational efficiency by: Automatically scanning organizational endpoints with minimal performance impact Providing comprehensive visibility into the status of all devices, saving valuable time for IT and security teams Auto-patching vulnerabilities and implementing security policies to ensure a secure and uninterrupted workflow. "We are excited to enhance our endpoint security solution with vulnerability assessment and automated patch management capabilities," says Ofir Israel, VP of Threat Prevention at Check Point, "This added value complements Harmony Endpoint's existing offerings of Endpoint Protection Platform (EPP), Endpoint Detection and Response (EDR), and other advanced security features. Our customers now have the tools they need to swiftly identify and remediate vulnerabilities before they can be exploited, all from a unified platform." “We are thrilled to partner with Check Point and collaborate to offer customers the highest level of endpoint protection,” said Michelle Hodges, Senior Vice President of Global Channels and Alliances at Ivanti. “We both understand that patch management is a critical component of any cybersecurity program and enhances the overall security posture for our customers by ensuring all systems are updated with the latest application updates, fixes, and patches. At Ivanti, we are committed to providing innovative solutions that empower our partners to strengthen their businesses and safeguard our customers.” By delivering a comprehensive endpoint security solution, Check Point enables organizations to defend against a broad spectrum of cyber threats and stay ahead of the ever-evolving threat landscape. About Check Point Software Technologies Ltd. Check Point Software Technologies Ltd. (www.checkpoint.com) is a leading provider of cyber security solutions to corporate enterprises and governments globally. Check Point Infinity's portfolio of solutions protects enterprises and public organisations from 5th generation cyber-attacks with an industry leading catch rate of malware, ransomware and other threats. Infinity comprises three core pillars delivering uncompromised security and generation V threat prevention across enterprise environments: Check Point Harmony, for remote users; Check Point CloudGuard, to automatically secure clouds; and Check Point Quantum, to protect network perimeters and datacenters, all controlled by the industry’s most comprehensive, intuitive unified security management. Check Point protects over 100,000 organizations of all sizes. About Ivanti Ivanti elevates and secures Everywhere Work so that people and organizations can thrive. We make technology work for people, not the other way around. Today’s employees use a wide range of corporate and personal devices to access IT applications and data over multiple networks to stay productive, wherever and however they work. Ivanti is one of the only technology companies that finds, manages and protects each IT asset and endpoint in an organization. Over 40,000 customers, including 88 of the Fortune 100, have chosen Ivanti to help them deliver an excellent digital employee experience and improve IT and security team productivity and efficiency. At Ivanti, we strive to create an environment where all perspectives are heard, respected and valued and are committed to a more sustainable future for our customers, partners, employees and the planet. For more information, visit www.ivanti.com and follow @GoIvanti.

Read More

ENTERPRISE SECURITY, PLATFORM SECURITY, SOFTWARE SECURITY

Blackpoint Launches New Product Expanding Security Ecosystem

Prnewswire | May 26, 2023

Blackpoint Cyber, the elite technology-focused cybersecurity company providing its streamlined security suite via managed service providers (MSPs), announced today the launch of its newest product, Managed Application Control, continuing Blackpoint's investment in building out the most comprehensive MSP security ecosystem available. The new solution goes beyond traditional approaches to application control, simplifying security management and improving productivity for MSPs and the businesses they serve. Threat actors often evade endpoint protection systems by "living off the land," or misusing legitimate IT tools native to the target environment. Managed Application Control protects from these attacks with a uniquely curated, constantly updated block list of applications by Blackpoint's threat intelligence team. The approach stands in contrast to pure zero-trust or deny-all methods of application control, which produce operational bottlenecks. With Managed Application Control, organizations can still create custom rules and allow exceptions. But with Blackpoint's newest offering, IT administrators can reduce time spent on allowlists and endless verification requests. "Our team knows the attacker tradecraft, so introducing another layer of security to our already robust ecosystem through Managed Application Control, at no additional cost, just makes sense," said Jon Murchison, CEO and founder of Blackpoint Cyber. "Protecting our partners and their customers is our primary goal, and we are committed to providing MSPs with an easily accessible bundle of solutions. It comes down to providing our partners with the most value on the market, including this new product, so they can protect their customers and focus on their margins and operations. It's extra productivity with no extra cost." Blackpoint's team of top-tier experts and products focus on blocking risky and malicious applications. When an application is blocked, Blackpoint's security operations center (SOC) intervenes to investigate and stop any intrusion attempts, providing unparalleled protection and peace of mind for MSPs and their clients. "At Blackpoint, we have always focused on threat actor mentality so we can stop threats as early in the attack cycle as possible," said David Rushmer, director of Blackpoint Cyber's Adversary Pursuit Group. "With Managed Application Control, the ability to dynamically respond to potential intrusions across the threat landscape means improved protection for our customers." The offering is the latest addition to Blackpoint Response, a packaged bundle of integrated cybersecurity solutions that includes Managed Detection and Response (MDR), Managed Defender for Endpoint, Vulnerability Management, and Cloud Response for a unified defense against cyber threats. ABOUT BLACKPOINT CYBER Blackpoint Cyber offers a world-class, nation-state-grade cybersecurity ecosystem serving the MSP community. Using its own software and Security Operations Center (SOC), Blackpoint's true 24/7 Managed Detection & Response (MDR) service not only detects breaches earlier than any other solution on the market, but also provides an actual response rather than just an alert to keep MSPs and their clients' networks safe from widespread damage.

Read More