SOFTWARE SECURITY

KLAS and Censinet Partner to Reduce Healthcare CISOs, CIOs and IT Vendor Community Cybersecurity Risk

businesswire | December 01, 2020

KLAS, a medical care exploration and bits of knowledge firm, and Censinet, the main astute danger network for medical care, today reported an association to help medical services IT sellers and administrations firms improve their general danger and security profile and give more noteworthy straightforwardness to a huge number of medical services suppliers. As a feature of the association, KLAS, which has led profound examination and investigation on in excess of 900 medical care IT items and administrations, will present another Cybersecurity Readiness Assessment.

The organization will likewise incorporate community oriented exploration, knowledge sharing, unique report access, and cybersecurity best works on, equipping medical care leaders with crucial data to improve their cybersecurity act and at last, cultivate a safer and beneficial medical care biological system.

While the enormous endeavor to execute electronic wellbeing records over the previous decade has prodded a period of advanced wellbeing development, it has likewise significantly extended the assault surface for digital crooks to target medical care associations. What's more, presently, the COVID-19 pandemic has both expanded dependence on computerized wellbeing and given aggressors considerably more motivating force to target suppliers, payers and others in the medical care industry.

Spotlight

In its March 2013 report, "2013 Mobile Security Predictions," Forrester Research says that "seamless, on-demand mobile 'virtualization' will overtake MDM [mobile-device management]" as a core technology that IT professionals will turn to as a way "to segregate business content and data from the personal environment" in mobile devices.

Spotlight

In its March 2013 report, "2013 Mobile Security Predictions," Forrester Research says that "seamless, on-demand mobile 'virtualization' will overtake MDM [mobile-device management]" as a core technology that IT professionals will turn to as a way "to segregate business content and data from the personal environment" in mobile devices.

Related News

DATA SECURITY

IBM to Expand Security Portfolio with Plans to Acquire ReaQta

IBM | November 03, 2021

IBM Security today announced an expansion of its cybersecurity threat detection and response capabilities with its plans to acquire ReaQta. ReaQta's endpoint security solutions are designed to leverage AI to automatically identify and manage threats, while remaining undetectable to adversaries. This move will expand IBM's capabilities in the extended detection and response (XDR) market, aligning with IBM's strategy to deliver security with an open approach that extends across disparate tools, data and hybrid cloud environments. As part of today's announcement, IBM also detailed a new suite of XDR offerings under the QRadar brand. IBM QRadar XDR helps security analysts break down the silos between the proliferation of point products in the industry – providing comprehensive visibility across security tools and data sources, whether in the cloud or on-premises, and equipping security teams with the insights and automation they need to act quickly. Upon closing, ReaQta's offerings will become part of this portfolio, adding expanded native XDR capabilities to IBM's security portfolio aimed at helping clients adopt continuous monitoring and rapid response as part of a zero trust approach. Companies today are struggling to secure increasingly dispersed IT environments, with the proliferation of devices, users, and technologies spreading across clouds and on-premises infrastructure. As a result, security events are becoming more difficult and costly to detect and contain, with data breaches costing over $4 million per incident and taking an average of 212 days to identify, according to the 2021 Cost of a Data Breach Report from IBM and Ponemon Institute. "Complexity has created a cloak that attackers are operating under, furthering their ability to circumvent defenders,The future of security is open, using technologies that can connect the security insights that are buried across disparate tools and advanced AI to identify and automatically respond to threats more quickly across their entire infrastructure, from endpoint to cloud. With our expanded capabilities via QRadar XDR and the planned addition of ReaQta, IBM is helping clients get ahead of attackers with the first XDR solution that reduces vendor lock-in via the use of open standards." Mary O'Brien, General Manager, IBM Security IBM Announces Intent to Acquire ReaQta IBM's planned acquisition of ReaQta further differentiates the company's portfolio of connected, open security tools to unify and speed response to security threats. ReaQta, whose primary business office is located in the Netherlands with headquarters in Singapore, will join the IBM Security business unit upon closing. ReaQta was built by an elite group of cybersecurity experts and researchers with AI and machine learning expertise and extensive backgrounds in security operations. Financial terms were not disclosed. The transaction is expected to close later this year, subject to customary closing conditions and required regulatory reviews. ReaQta's behavioral-based platform helps stop known and unknown threats in real-time and can be deployed in a hybrid model – on premise or in the cloud as well as air gapped environments. Through deep learning done natively on the endpoint the platform constantly improves on defining threat behavior tailored to each business per endpoint, allowing it to block any abnormal behavior. ReaQta's platform also leverages a unique 'Nano OS' that monitors the operating systems from the outside, helping to prevent interference by adversaries. "Our mission at ReaQta has been to better equip the defenders, who are tirelessly striving to stay ahead of cyber threats, with advanced technology to quickly identify and block new attacks," said Alberto Pelliccione, CEO at ReaQta. "Joining forces with IBM will enable us to enhance and scale our unique AI capabilities across all types of environments via a proven platform for threat detection and response." QRadar XDR Suite: Open, Connected Approach to XDR An evolution of the IBM QRadar security intelligence portfolio, IBM QRadar XDR is a suite of security software built on IBM's open, cloud-native security platform, Cloud Pak for Security. IBM QRadar XDR spans the core foundational capabilities of threat detection, investigation, and response to help organizations modernize their existing IT and security infrastructure. IBM is implementing an open connected approach to XDR, leveraging its commitment to open security and the Open Cybersecurity Alliance, as well as alliances and integrations with 200 plus cloud and security vendors, creating the industry's largest XDR ecosystem. The QRadar XDR suite also includes IBM native security technologies that customers can choose to leverage for Security Information and Event Management (SIEM), Network Detection and Response (NDR), and Security Orchestration Automation and Response (SOAR). Now with the addition of ReaQta, the QRadar XDR suite will also include an option for Endpoint Detection and Response (EDR), allowing IBM to provide native capabilities for all core XDR functions, while also providing clients the option to leverage existing investments and third-party tools across IBM's broad partner ecosystem. IBM QRadar XDR will also be designed to deliver more accurate alerts while helping reduce manual processes via pre-built detection and response automations. IBM QRadar XDR is also designed to be deployed by managed security service providers, including IBM and others. Connecting Existing Investments Building further on IBM's open approach to XDR, the company also introduced XDR Connect, which helps companies connect and automate threat detection and response across existing toolsets. Part of the QRadar XDR suite, XDR Connect provides a unified streamlined workflow for alert triage, investigation and threat hunting, automated root cause analysis, and response, by connecting to organizations' existing tools or IBM's own XDR technologies. XDR Connect offers a centralized management of security incidents with pre-defined detection and response rules via more than 30 open source, pre-built integrations, and data connectors. It also provides access to the latest threat intelligence insights and data from IBM and third parties. This unique approach allows companies to better capitalize on existing security investments, modernize with new security tools and data sources, and simplify their overall security operations with unified, AI-driven workflows designed for faster, streamlined response. About ReaQta ReaQta is a top-tiered AI Autonomous Detection & Response platform, built by an elite group of cyber security experts and AI/ML researchers. Built with advanced automated threat-hunting features, ReaQta allows organizations to eliminate the most advanced threats in real-time. As experts in AI and behavioral analysis, ReaQta's proprietary dual-AI engines provide organizations across all industries with autonomous, real-time and fully customizable endpoint security, minus the complexity. As a result of automation coupled with intuitive design, ReaQta's customers and partners benefit from performance improvements and are now able to manage and secure more endpoints without the need for highly skilled staff. About IBM Security IBM Security offers one of the most advanced and integrated portfolios of enterprise security products and services. The portfolio, supported by world-renowned IBM Security X-Force® research, enables organizations to effectively manage risk and defend against emerging threats. IBM operates one of the world's broadest security research, development and delivery organizations, monitors 150 billion+ security events per day in more than 130 countries, and has been granted more than 10,000 security patents worldwide.

Read More

DATA SECURITY

Code42 and Okta Collaborate to speed up the Right Response During insider Risk Investigations.

Code42 | April 07, 2021

Code42, the pioneer in Insider Risk Management, today reported that its IncydrTM data risk detection and response product has been integrated with Okta Identity Cloud, the leading user identity management solution. The integration combines Code42's unique data-centric approach to insider risk with Okta's leading approach to identity and access, making it easier for security buyers to build Zero Trust data security environments. Since the integration automates access controls, provides additional user context, and automates response workflows for departing or high-risk users, security teams can execute smoother, more effective investigations. Today's distributed and remote workforces, enabled by the advancement of collaboration technology, have generated an exponential risk of data leakage by shifting the perimeter from the network to the endpoint,” said Ananth Appathurai, senior vice president of strategic partnerships and ecosystem at Code42. “The Code42-Okta integration is a powerful way to pair access controls with best practices for insider threats to enhance security postures.” Without proper access controls, data can be deliberately or accidentally exfiltrated. Users that exhibit potentially risky file behavior will have their permissions lowered so they no longer have access to confidential files thanks to the integration. Around the same time as permissions are restricted, a security investigation is conducted to review suspicious file movements so that effective response measures can be taken. Okta administrators and information security teams will use this mechanism to accelerate and coordinate cross-functional initiatives to reduce insider risk in their organizations. “Identity is crucial in KNOWING who is accessing data and where they are accessing it,” said Stephen Lee, vice president, technical strategy and partnerships at Okta, Inc. “Okta's goal is to enable everyone to use any technology safely. This integration begins in that direction, enabling enterprises to use access controls as an important tool for protecting data through their distributed workforces.” Using the Code42-Okta integration, security teams will use user identity to track high-risk users and optimize insider risk management platforms, as well as: • Reduce the risk of insider threats by automating and applying conditional user access controls based on predefined risk tolerance. • To identify behavior risk factors such as remote operation, off-hour file events, and attempts to hide exfiltration, provide additional useful information by provisioning role-based user attributes. • To accelerate investigations and efficiently mitigate insider threats, streamline and simplify response workflows for departing and high-risk employees. About Code42 Code42 is the market leader in Insider Risk Management. The Code42 Incydr solution, which is cloud-native, detects data loss, leaks, and theft quickly and speeds incident response – all without involving extensive implementations, complex policy management, or interfering with employee efficiency. Security experts will use Code42 to secure organizational data and reduce insider risks, all while fostering an open and inclusive atmosphere among employees. Code42's Insider Risk solution is FedRAMP authorized and can be configured for GDPR, HIPAA, PCI, and other regulatory frameworks. It is backed by security best practices and control requirements.

Read More

DATA SECURITY

Data Protection Platform, Protegrity to introduce dynamic monitoring and data masking capabilities

helpnetsecurity | June 11, 2021

Version 8.1 of Protegrity, the latest version of the Protegrity Data Protection Platform, is released. This has the features such as monitoring capabilities and dynamic data masking. It provides all the customers, from a single data store, multiple data-protection methods. The company has also introduced Protegrity Cloud API and a redesigned logging architecture. Monitoring and dynamic data masking provide visibility and control for sensitive data access With this functionality, version 8.1 of the Protegrity Data Protection Platform gives a greater level of control and choice to meet the data protection they need to run their business smoothly. Monitoring capabilities provide customers standard visibility into how data is being retrieved and used across the company. Customers can utilize dynamic data masking of Protegrity for a greater level of control over their sensitive data. Unicode tokenization delivers language-preserving data security for global businesses Unicode is a standard for the consistent handling, encoding, and representing text expressed in the world's writing systems. Protegrity, with version 8.1, now brings all the benefits of its tokenization to all text encoded in the one- and two-byte Unicode standards. New cloud API and logging architecture enhance platform functionality Along with new data-protection methods, including data masking, monitoring, and Unicode tokenization, version 8.1 of Protegrity has revealed the following essential platform enhancements: • Protegrity Cloud API • Redesigned logging architecture

Read More