SOFTWARE SECURITY

Lookout and CipherCloud Together are Ready to Redefine Security from Endpoint to Cloud

Lookout | March 15, 2021

In the current event, Lookout, Inc announced that it had acquired CipherCloud. Lookout, Inc is a leading cybersecurity company. It is now joining hands with CipherCloud, a leading cloud-native security company, operates in the emerging Secure Access Service Edge (SASE) market. They both blaze a new path together to combine and create an integrated endpoint-to-cloud security solution. By this combination, Lookout will be in a unique position to deliver the industry's first end-to-end platform that will secure an organization's entire data path from an endpoint to the cloud. This will later empower customers with a single source of unified policies and provide end-to-end security to accelerate their digital transformation.

CipherCloud solutions are related to several developing SASE categories. This includes Secure Web Gateway (SWG), Zero-Trust Network Access (ZTNA), Cloud Access Security Broker (CASB), and Data Loss Prevention (DLP). Together these solutions will deliver data security, comprehensive visibility, threat protection, and compliance for cloud-based applications. Familiar to this, CipherCloud has already been providing services to many of the world's largest global enterprises and government institutions seeking protection and security through cloud technology.

The purpose of this integrated endpoint-to-cloud security solution is accelerated by the adoption of cloud applications, proliferation of remote users, data transitioning of the corporate data center into the cloud, and more network traffic flowing to public cloud services. To tackle the security challenges caused by the above trends, businesses in this industry need a cohesive platform that can track activity and enforce policies from the endpoint device to cloud-based applications. And the need to stop zero-day attacks on data information across the entire end-to-end path, this integrated solution can fill the gaps immediately, keeping all information secured in one place.

Jim Dolce, CEO of Lookout, highlights this acquisition. Gartner forecasts that the SASE market will nurture at a CAGR of 42% over the next five years and would reach almost $11 billion by 2024. With the acquisition of CipherCloud, Lookout is head-on with the transformation to cloud infrastructure and is in a unique position to deliver value to its customers.

Besides all, the integration of CipherCloud and Lookout technologies will also remove friction, augment usability and convenience, enable user freedom and reduce operational costs compared to a collection of siloed point products. The integrated Lookout platform will authorize a growing number of businesses to deliver critical applications to users working anywhere securely.

Jim Dolce, CEO, Lookout, puts his words expressing his version about this acquisition. He says that "We couldn't be more excited to welcome the CipherCloud team to Lookout. Our two organizations share a common passion for accelerating cloud adoption with cloud-native solutions that secure critical data." Joining hands with CipherCloud is the next phase of our enterprise market expansion. By this, we will be extending our reach from endpoint into cloud, where the applications and data reside. Through this combination, we will deliver endpoint-to-cloud security by keeping elements of our solutions together into a single cloud-delivered offering."

Apart from this, Pravin Kothari, Founder, and CEO, CipherCloud, also speaks, "as a pioneer of the Cloud Access Security Broker market, CipherCloud has allowed organizations worldwide to achieve their digital transformation. Today, we take the exciting next step on the road to SASE by integrating our strengths with Lookout to deliver endpoint-to-cloud security for the modern workforce."

Spotlight

The Cybersecurity and Infrastructure Security Agency (CISA) leads the nation’s effort to understand, manage, and reduce cybersecurity risk, including by supporting Federal Civilian Executive Branch agencies in evolving and operationalizing cybersecurity programs and capabilities. CISA’s Zero Trust Maturity Model (ZTMM) provides an approach to achieve continued modernization efforts related to zero trust within a rapidly evolving environment and technology landscape. This ZTMM is one of many paths that an organization can take in designing and implementing their transition plan to zero trust architectures in accordance with Executive Order (EO) 14028 “Improving the Nation’s Cybersecurity” § (3)(b)(ii),1 which requires that agencies develop a plan to implement a Zero Trust Architecture (ZTA). While the ZTMM is specifically tailored for federal agencies as required by EO 14028, all organizations should review and consider adoption of the approaches outlined in this document.

Spotlight

The Cybersecurity and Infrastructure Security Agency (CISA) leads the nation’s effort to understand, manage, and reduce cybersecurity risk, including by supporting Federal Civilian Executive Branch agencies in evolving and operationalizing cybersecurity programs and capabilities. CISA’s Zero Trust Maturity Model (ZTMM) provides an approach to achieve continued modernization efforts related to zero trust within a rapidly evolving environment and technology landscape. This ZTMM is one of many paths that an organization can take in designing and implementing their transition plan to zero trust architectures in accordance with Executive Order (EO) 14028 “Improving the Nation’s Cybersecurity” § (3)(b)(ii),1 which requires that agencies develop a plan to implement a Zero Trust Architecture (ZTA). While the ZTMM is specifically tailored for federal agencies as required by EO 14028, all organizations should review and consider adoption of the approaches outlined in this document.

Related News

ENTERPRISE SECURITY, PLATFORM SECURITY, SOFTWARE SECURITY

Netskope Intelligent SSE Integrates with Amazon Security Lake to Enable Faster Threat Detection and Response in Hybrid Work Environments

Prnewswire | May 31, 2023

Netskope, a leader in Secure Access Service Edge (SASE), today announced an integration between Netskope's Intelligent Security Service Edge (SSE) platform and Amazon Security Lake from Amazon Web Services (AWS). Amazon Security Lake is a service that automatically centralizes an organization's security data from across their AWS environments, leading SaaS providers, on-premises, and cloud sources into a purpose-built data lake, so customers can act on security data faster and simplify security data management across hybrid and multi cloud environments. Organizations want more visibility across all their security data sources, including on-premises and cloud, to quickly identify and respond to potential threats. To do this, they must enable logging across their security infrastructure, but often face challenges with incompatible data formats and no centralized place to store the logs for useful analysis. To help solve these challenges, Netskope customers can now export logs from the Netskope Intelligent SSE platform to Amazon Security Lake. Amazon Security Lake manages data throughout its lifecycle with customizable data retention settings and converts and conforms incoming security data to the Open Cybersecurity Schema Framework (OCSF), an open community schema. This makes it easier to automatically normalize security data from AWS and combine it with dozens of pre-integrated third-party security data sources. Netskope and AWS can help customers detect and investigate threats faster, by providing: Centralized Visibility: Organizations can now export logs, events and alerts collected by Netskope Cloud Exchange to Amazon Security Lake to get a holistic view of threats and vulnerabilities in their overall environment. Centralize years of cloud and on-premises security data at petabyte scale for detailed analysis. Stronger Security Posture: Organizations can use Netskope logs and Amazon Security Lake analysis tools to quickly discover and remediate threats and vulnerabilities across their environment to strengthen their security posture. Centralized Threat Remediation: Organizations can use Netskope and AWS services to respond to alerts and remediate threats from the centralized Amazon Security Lake console. "As security threats increase along with the ongoing shift to hybrid work, organizations want to be confident that their data, employees, and resources are safe from potential attacks and other nefarious activities," said Andy Horwitz, Vice President of Business Development, Netskope. "Netskope has helped thousands of customers improve their security posture through the use of our Netskope Intelligent SSE platform. By meeting the rigorous standards in support of Amazon Security Lake, organizations can have greater confidence in Netskope's deep technical expertise on AWS and our proven track record in securing even the most complex cloud environments." To learn more about how Netskope helps organizations further strengthen their security posture by sharing security-related logs and threat information with Amazon Security Lake, visit here. About Netskope Netskope, a global SASE leader, is redefining cloud, data, and network security to help organizations apply zero trust principles to protect data. Fast and easy to use, the Netskope platform provides optimized access and real-time security for people, devices, and data anywhere they go. Netskope helps customers reduce risk, accelerate performance, and get unrivaled visibility into any cloud, web, and private application activity. Thousands of customers, including more than 25 of the Fortune 100, trust Netskope and its powerful NewEdge network to address evolving threats, new risks, technology shifts, organizational and network changes, and new regulatory requirements. Learn how Netskope helps customers be ready for anything on their SASE journey, visit netskope.com.

Read More

DATA SECURITY, ENTERPRISE SECURITY, SOFTWARE SECURITY

CyberArk Workforce Password Management to Provide Advanced Protection

CyberArk | March 15, 2023

On March 14, 2023, CyberArk, the world leader in Identity Security, announced advancements to Workforce Password Management. The cloud-based business password management solution from CyberArk allows businesses to capture, store, and manage password-based apps and other secrets in a secure manner. Added features offer administrators with increased flexibility and power to minimize risk and enhance security for web-based applications. Workforce Password Management is developed for business environments and offers the privacy, availability and security organizations require, including support for current corporate directories and passwordless authentication controls, unlike personal password managers. Some of the new things are: Application Access Controls Based on Usernames Support for CAPTCHA-Enabled Web Apps Enhanced Reporting for User-Added Applications CyberArk Secure Web Sessions and Workforce Password Management can be used together to further fortify access to critical systems. With the newest release, Secure Web Sessions provides an additional layer of defense called Session Control. Session Control enables administrators to define notification and enforcement rules for specific text fields in business applications that are accessed with credentials stored in Workforce Password Management. For example, administrators can set up a rule to stop users from transferring more than pre-set threshold within their corporate banking applications and notify the IT security team of the attempt. Gil Rapaport, General Manager, Access Management at CyberArk, said, “Traditional password managers typically lack controls and functionalities that enterprises need to secure end-user credentials, which are constantly targeted by attackers.” He added, “Password management must be dynamic to evolve with attacker innovation. We are continuously investing in new features and functionalities for Workforce Password Management to deliver greater usability, security and control for all users within an organization – from developers and business users to IT administrators.” (Source – Business Wire) About CyberArk Founded in Newton, MA, CyberArk is the worldwide leader in identity security solutions. The company is the most comprehensive security solution for any identity, machine or human, across business apps, remote employees, hybrid cloud workloads, and the complete DevOps lifecycle, thanks to its emphasis on privileged access management. The world’s largest organizations entrust CyberArk to help secure their most vital assets.

Read More

ENTERPRISE SECURITY, PLATFORM SECURITY, SOFTWARE SECURITY

AttackIQ Launches Breach and Attack Simulation-as-a-Service, Delivering Breach and Attack Simulation Solutions to Everyone

Businesswire | April 03, 2023

AttackIQ®, the leading independent vendor of Breach and Attack Simulation (BAS) solutions, today announced the availability of AttackIQ Ready!, a fully managed breach and attack simulation service that leverages years of advanced content and actionable reporting to improve organizations’ security posture and security program performance. The service was designed to simplify the execution of a continuous security validation program, showing results in real-time and orchestrating faster remediation – all through one automated platform – for everyone who wants it. Absent real data, teams lack clarity about their capabilities and performance and cannot confidently operate against the adversary. AttackIQ has found that security controls only stop the adversary 39% of the time in the real world due to misconfigurations and security control degradation. To solve this problem, AttackIQ Ready! delivers clear reporting and analysis so that security leaders know how well their controls perform against the adversary. AttackIQ Ready! provides weekly reports, monthly executive-focused reports, and insurance-focused reports that can be used to communicate to the executive team, the board, insurance companies, and regulators alike. “We know that automated testing provides a path to better security and business outcomes. With this announcement, we are making AttackIQ’s advanced testing capabilities available to a much broader section of the market,” said Carl Wright, Chief Commercial Officer, AttackIQ. “Many organizations lack the resources to operationalize the MITRE ATT&CK framework or conduct red team assessments of their cyberdefenses. We are very excited to release AttackIQ Ready! to help teams of all sizes maximize return on investment and improve operational readiness.” With AttackIQ Ready!, organizations can expect the following: Easy and Immediate Use: From day one, AttackIQ Ready! provides an easy-to-use and immediate baseline understanding of your security coverage as well as continuous visibility into your security posture. It helps you to identify gaps and issues surrounding your overall cybersecurity hygiene. Weekly and Monthly Reporting: Weekly and monthly reports about your security controls’ performance, including against specific adversaries curated by the AttackIQ Adversary Research Team (APT29, FIN6, etc.). Monthly Adversary Curation: Every month, the AttackIQ Adversary Research Team introduces a new set of adversarial campaigns to test your security controls against that specific adversary. Continuous Automated Testing: The AttackIQ Ready! team conducts weekly tests of your security controls using MITRE ATT&CK-aligned assessments drawn from the full AttackIQ research library. Actionable Remediation Guidance: Generates tailored, easy-to-use remediation guidance so that you can close gaps and address issues quickly to improve performance. Detection Engineering: AttackIQ Ready! introduces the option of detection testing for companies that have a security operations center or a SIEM structured to respond to alerts and attacks. In-App Threat Intelligence and Analysis: Gain immediate in-app analysis about emerging and advanced threats and how to prepare your defenses to withstand attacks. AttackIQ Ready! will help an even broader range of customers to achieve these results. A security operations center is not required to use AttackIQ Ready!. All that is needed are existing security controls to validate, either through cloud services like AWS or Azure or security providers. What kind of results might companies expect? One security leader at a premier biosciences company recently used the AttackIQ platform to prove to an insurance company that his security controls were performing as intended and negotiate a peg to his insurance premium, saving his organization hundreds of thousands of dollars in fees. As he said, “When we can prove that our solutions and controls are not just adequate, but they're rock solid, there's much value there. The investments in our firewalls, endpoint controls, and network security controls help build the program's reputation and instill more confidence. Then when we go to the board for requesting a large sum of funding for maybe a new project, there are not as many questions.” “AttackIQ has helped companies from the Fortune 10 to Global 2000 elevate their security effectiveness, including JetBlue, Bupa and the Department of Defense,” Wright continued. “This service will help companies hone security analyst and security operations team performance, find redundancies in security controls, validate security controls for insurers, decrease the impact of breaches, and much more. You can’t manage what you can't measure, and we look forward to helping organizations measure their defenses against the adversary.” Pricing and Availability AttackIQ Ready! is available now. More details are available at: www.attackiq.com/ready. For pricing or to schedule a demo, contact AttackIQ. About AttackIQ AttackIQ, the leading independent vendor of breach and attack simulation solutions, built the industry’s first Security Optimization Platform for continuous security control validation and improving security program effectiveness and efficiency. AttackIQ is trusted by leading organizations worldwide to plan security improvements and verify that cyberdefenses work as expected, aligned with the MITRE ATT&CK framework. The Company is committed to giving back to the cybersecurity community through its free award-winning AttackIQ Academy, open Preactive Security Exchange, and partnership with MITRE Engenuity’s Center for Threat-Informed Defense.

Read More