NETWORK THREAT DETECTION

JMP Securities Recognizes Contrast Security as an Elite 80 Cybersecurity Company

Contrast Security | June 20, 2022

Contrast Security
Contrast Security announced that it has been recognized for the fourth year to the JMP Securities Elite 80, a list of the hottest, most fascinating, most strategically positioned privately-owned cybersecurity and IT infrastructure firms. The eighth annual JMP Securities Elite 80 study includes not just technological industry leaders but also the future giants of the cybersecurity and IT infrastructure industries.

Contrast was recognized as an Elite 80 company for its Contrast Secure Code Platform, accelerating innovation speed. It moves secure code across the application development pipeline and constantly safeguards applications throughout the entire software lifecycle. As a result, Contrast is relied upon by many of the world's foremost corporate and public companies to secure their apps in development and extend protection to the cloud and on-premises applications in production.

"Being named a JMP Elite 80 company for the fourth consecutive year is validation that our technology is very unique and in high demand. Our platform provides actionable findings that developers can use to find code vulnerabilities, remediate them quickly and then ship business critical software that is safe from ongoing cyber attacks."

Alan Naumann, Chief Executive Officer at Contrast Security

The JMP Elite 80 report states, "One clear data point validating our thesis that now is the time for new vendors to emerge is the funding environment, as venture capital and private equity investors dramatically stepped up their investing in 2021. More specifically, the companies in our Elite 80 report raised almost $7 billion in 2021, whereas the Elite 80 raised $3 billion in 2020, which was the prior record. Those vendors that are astute enough to recognize the opportunity at hand and that can capitalize on differentiated technologies not only position themselves to survive the pandemic but are in position to become dominant market leaders."

It is time to cease distributing software with significant security flaws. The Contrast Protect Code Platform provides 10x quicker scan times, 3x more accurate results, and 45x faster defect resolution, enabling developers to secure their code as they write it.

Spotlight

As investors increasingly use web-based investment accounts, it is critical that they take steps to safeguard those accounts.This Infograph provides everyday investors with a set of useful tips to help protect themselves from cyber-criminals and online fraud.

Spotlight

As investors increasingly use web-based investment accounts, it is critical that they take steps to safeguard those accounts.This Infograph provides everyday investors with a set of useful tips to help protect themselves from cyber-criminals and online fraud.

Related News

PLATFORM SECURITY

Uptycs Unveils Advanced Container and Kubernetes Capabilities

Uptycs | May 27, 2022

Uptycs, the first cloud-native security analytics platform that enables both cloud and endpoint security from a single platform, today unveiled expanded container and Kubernetes security posture management (KSPM) features for its cloud workload protection platform (CWPP). These features enable real-time identification of containerized workloads, proactive scanning of container images in the CI/CD pipeline, constant compliance monitoring, and Kubernetes security policy audit and enforcement. According to Gartner, by 2026, over 90% of the world's enterprises will be operating containerized apps in production, up from less than 40% currently. Businesses, on the other hand, struggle to manage and maintain these transitory assets. Misconfigurations in the control plane and insecure policies at the single container layer are used by attackers to escalate permissions, conduct container escapes, and compromise nodes for executing code. "Organizations are rapidly scaling their Kubernetes environments and seeing tremendous gains in optimization, availability, and developer productivity, but too often Security teams are left playing catch up. With telemetry from Kubernetes systems supported by our analytics platform, Security teams know immediately what resources they have and the security posture of those resources—across public and private clouds, scaling to tens of thousands of pods. Combined with our industry-leading container security capabilities, this gives Security teams confidence that they have the proper controls in place to minimize risk while enabling innovation." Ganesh Pai, CEO and Co-founder of Uptycs Uptycs offers both fully managed (AWS EKS, Azure AKS, Google GKE) and self-managed Kubernetes environments, such as VMware Tanzu and Google Anthos. Uptycs contains a range of container runtimes (Docker, containerd, CRI-O). The latest KSPM capabilities offered by the Uptycs platform are now readily accessible and will be shown at the 2022 RSA Conference (booth #435) from June 6-9. Learn more about the Uptycs container and Kubernetes security service by visiting the Uptycs blog.

Read More

DATA SECURITY

Cyware Achieves SOC 2 Type 2 Compliance for Data Security

Cyware | June 24, 2022

Cyware, the industry's leading provider of the technology platform for building Cyber Fusion Centers for businesses and threat intelligence sharing for ISACs and ISAOs, announces the successful completion of the System and Organization Controls (SOC) 2 Type 2 Audit for the trust services criteria relevant to Security ("applicable trust services criteria") set forth in TSP section 100, Trust Services Criteria for Security, Availability, Processing Integrity, Confidentiality, and Integrity, Confidentiality, and Integrity, Confident (AICPA, Trust Services Criteria). The result demonstrates the company's dedication to the highest levels of data protection. The American Institute of Certified Public Accountants (AICPA) developed SOC 2 as a reporting framework that establishes guidelines for Software-as-a-Service (SaaS) enterprises that manage customer and user data. The accreditation confirms that the organization's internal systems and controls are in ongoing conformity with the SOC 2 audit criteria. Schellman & Company, a worldwide-recognized attestation and compliance services provider, performed the audit for Cyware. “Commitment to the highest levels of data security has always been one of our foremost business priorities. The SOC 2 Type 2 certification process is not easy to achieve but our team was fully committed and prepared to ensure we check all the required boxes. The new milestone will further strengthen the confidence of our current and future customers in our robust compliance with industry benchmark data security standards including SOC 2 (Type 1 and Type 2) and ISO/IEC 27001:2013.” Anuj Goel, CEO, Cyware Cyware unifies previously compartmentalized security operations, allowing firms to more efficiently automate and exchange threat data, as well as cooperate on threat response inside their security divisions and with other enterprises within their network.

Read More

SOFTWARE SECURITY

Hub Security Signs Agreement With Leading Cyber System Integrators

Hub Security | July 01, 2022

HUB Cyber Security (Israel) Limited, a developer of Confidential Computing cybersecurity solutions and services, announced today an agreement to sell HUB's Confidential Compute solutions to US enterprises and telecommunications companies with one of the largest US cyber security system integrators. In the United States, the integrator focuses on supplying equipment and services for 5G networks and edge computing. The engagement is for two years and can be extended by mutual consent between both parties. This is HUB's first strategic partnership in the US market, and the company expects it will improve product sales in the US and have a major influence on revenues over the next 24 months. "We are on a path to hyper growth in the sales of our Confidential Computing solutions worldwide over the next five years to establish ourselves as a leader in this space. The U.S. is a prime target and we intend to build a string of partnerships for rapid introductions and deployments of our solutions in Fortune 500 companies and government agencies." Eyal Moshe, CEO of HUB Security

Read More