DATA SECURITY

NERC CIP Security Assessment Secures OT Remote Operations at XONA

XONA | April 26, 2021

XONA, the world's initial zero-trust distant activities stage for basic foundation, was discovered agreeable with NERC CIP appraisal, including an engineering survey, gadget survey, and counterfeit review.

Cybersecurity has taken on restored significance in 2021 as organizations progressively depend on distant admittance to screen, survey, and connect with basic OT framework. This the truth was on full presentation in February 2021 when a programmer distantly got to a water treatment framework in Oldsmar, Florida, highlighting the potential weaknesses related with far off activities limit.

XONA NERC CIP Compliance Demonstrates Readiness to Secure Against Cybersecurity Risks at Crucial Time

Understanding the centrality of cybersecurity while sending distant tasks limit, XONA's review shows the organization's digital preparation.

XONA's CSG apparatus was evaluated from both an inspector's and SCADA designer's points of view. Simultaneously, manual and robotized checking was performed to gather, recognize, and examine potential weaknesses that may affect NERC CIP consistence and data security pose.

Moreover, XONA mentioned an arrangement and approach assessment, guaranteeing that the organization's inner conventions are reliable with progressing consistence orders. Securicon discovered XONA agreeable with necessities surveyed and tracked down no basic high, medium, or okay weaknesses identified with the XONA CSG.

Regions and Critical Infrastructures Expanding Remote Operations Rely on XONA as Secure, Compliant Solution

"We are eager to impart our consistence confirmation to our clients. This certificate mirrors the XONA group's diligent effort and our persistent obligation to ensuring our clients' IT framework," clarifies Bill Moore, author and CEO of XONA.

He adds, "As districts and other basic framework OT administrators seek after or grow far off activities abilities, we need to routinely show that XONA is a protected, secure arrangement."

Continuous financial vulnerability and restricted admittance to cybersecurity faculty makes it more significant than any other time that basic framework tasks can depend on distant activities answers for secure their OT climate.

To find out about XONA's client access arrangement worked for OT that sets these exercises in motion, plan a demo.

About XONA

As the world's initial zero-trust far off tasks stage for basic framework, industry-driving associations all throughout the planet in energy, oil and gas, assembling and government trust XONA to guarantee basic and secure admittance to their operational innovation from anyplace.

XONA consistently and safely empowers secure versatile admittance to your most basic frameworks and applications while likewise lessening operational and digital dangers and expanding operational effectiveness.

Spotlight

During the last few years server security has become a key building block for end-to-end security. We see strongly increasing cyber-attacks on server infrastructure, which results in an intense need for server security. This whitepaper presents an overview of the security features which are available for PRIMERGY server.

Spotlight

During the last few years server security has become a key building block for end-to-end security. We see strongly increasing cyber-attacks on server infrastructure, which results in an intense need for server security. This whitepaper presents an overview of the security features which are available for PRIMERGY server.

Related News

ENTERPRISE SECURITY, PLATFORM SECURITY, SOFTWARE SECURITY

BigID Automates Data Minimization & Accelerates Data Cleanup with Industry-First ML for Finding Duplicate and Similar Data Content

Prnewswire | April 12, 2023

BigID, the leading platform for data security, compliance, privacy, and governance, today announced a breakthrough in data cleanup with the launch of its industry-first ML-powered solution for finding duplicate and similar data content. The innovative technology uses groundbreaking AI to locate both similar and duplicate data on any data set, enabling organizations to easily identify duplicate data as well as redundant, obsolete, or trivial (ROT) data. These transformative capabilities mean that organizations can reduce their storage cost, accelerate compliance, and improve cybersecurity across their environment. Duplicate and redundant data are a treasure trove for cybercriminals - exponentially increasing the risk of data leaks, data breaches, and compromised data. By reducing the attack surface and reducing duplicate and redundant data, organizations can improve their system hygiene, reduce insider risk, and get more value from their data. With BigID's powerful data minimization and cleanup capabilities, organizations can now automatically find duplicate data quickly and delete it in accordance with retention policies - enabling full data lifecycle management across all of their data, everywhere. This not only helps reduce risk and improve security posture, but also saves time and resources that would otherwise be spent manually sorting through large amounts of data. With BigID's data minimization capabilities, organizations can: Quickly and accurately identify duplicate, similar, and redundant data Automatically discover dark data and shadow data Manage and de-risk their data by type, sensitivity, and policy Implement data retention and remediate duplicate, sensitive, and redundant data Deleted data that's no longer needed Streamline data lifecycle management from collection to destruction "Data minimization is critical to any data management strategy, and BigID's ML-powered solution makes it easier and faster than ever before," said Dimitri Sirota, CEO of BigID. "By automating the process of identifying and deleting duplicate data, we're helping our customers reduce their risk and improve their overall security posture." The ML-powered solution is a key component of BigID's comprehensive data management platform, which provides a range of capabilities including data discovery, classification, compliance, risk management, privacy, and governance. About BigID BigID's data intelligence platform enables organizations to know their enterprise data and take action for privacy, security, and governance. Customers deploy BigID to proactively discover, manage, protect, and get more value from their regulated, sensitive, and personal data across their data landscape. BigID has been recognized for its data intelligence innovation as a 2019 World Economic Forum Technology Pioneer, named to the 2021 Forbes Cloud 100, the 2021 Inc 5000 as the #19th fastest growing company and #1 in Security, a Business Insider 2020 AI Startup to Watch, and an RSA Innovation Sandbox winner. Find out more at https://bigid.com.

Read More

ENTERPRISE SECURITY, PLATFORM SECURITY, SOFTWARE SECURITY

NordLocker introduces easier secure sharing option

Globenewswire | May 26, 2023

NordLocker has launched a new feature that allows users to securely share a password-protected locker, otherwise known as a folder, of files. In order to receive the sent files, the recipient doesn’t even need to be a NordLocker user. This convenient sharing feature is incredibly easy to use. The files are shared via a link, and the recipient needs a password to access the files. For security purposes, once the set expiration date passes, the link becomes inaccessible. Thanks to NordLocker’s end-to-end encryption, files are fully protected throughout their journey. “Whether it’s holiday videos or a client contract – here at NordLocker we believe that all files should be shared securely. With this new feature, we make secure sharing that much easier,” says Aivaras Vencevicius, head of product at NordLocker. Currently, this feature is available on NordLocker’s web application. Other improvements In addition, NordLocker has introduced biometrics on iOS, which allows a more convenient and quicker login. iOS users are now also able to download NordLocker application logs for more information on their app. As privacy is at NordLocker’s core, it’s worth noting that these activity logs are encrypted and stored on the customer’s side. NordLocker’s customer support can only see it if the user decides to share it with the NordLocker team. “With cybercrime rising every year, file encryption is becoming essential. We see that threats are becoming more sophisticated – phishing emails are becoming harder to detect, and malware is becoming more dangerous and advanced. Therefore I strongly recommend to treat your digital belongings just like you’d treat your physical assets – keep them locked up and secure,” says Aivaras Vencevicius, head of product at NordLocker. ABOUT NORDLOCKER NordLocker is the world’s first end-to-end file encryption tool with a private cloud. It was created by the cybersecurity experts behind NordVPN – one of the most advanced VPN service providers in the world. NordLocker is available for Windows, macOS, Android, iOS, supports all file types, offers a fast and intuitive interface, and guarantees secure sync between devices. With NordLocker, files are protected from hacking, surveillance, and data collection. For more information: nordlocker.com.

Read More

ENTERPRISE SECURITY, PLATFORM SECURITY, SOFTWARE SECURITY

CyberMaxx Launches Next Generation Managed Detection and Response (MDR) Solution MaxxMDR

Prnewswire | May 19, 2023

CyberMaxx, Inc., a tech-enabled cybersecurity services company, today introduced MaxxMDR, its revamped managed detection and response (MDR) solution. MaxxMDR provides enhanced protection through an advanced detection library proprietary to CyberMaxx developed through the company's comprehensive DFIR, offensive security, and threat hunting research. Traditional MDR tools and processes only provide a base-level of protection. By supplementing a SIEM or EDR tool's default detections library with advanced insights gained from its offensive and DFIR work, MaxxMDR strengthens an organization's defenses and enables them to catch more advanced threats. This provides customers with a strong partnership for a comprehensive offensive and defensive approach to securing their environments. MaxxMDR empowers organizations to monitor and manage cyber risk through: 24 x 7 x 365 SOC: around-the-clock monitoring and response by CyberMaxx Security Operations Center of experts Custom Detection Library: derived from years of experience and working closely with our DFIR and Offensive security teams across a diverse set of customers Purpose-built: purpose-built platforms designed with SOAR in mind Endpoint security (EDR): partnership with industry-leading endpoint security providers like SentinelOne and Crowdstrike Proprietary Advanced Analytics Platform: cloud-native analytics platform for better integration with SAAS and IAAS Full Visibility: full stack visibility of your assets both on-premise and in the cloud Faster & Better Quality: improved mean time to recovery (MTTR) and reduced false positives through automation and orchestration Additionally, MaxxMDR is offered through a flexible deployment model available in both managed and co-managed environments. The managed solution is delivered on a proprietary analytics engine for organizations looking for a fully outsourced solution. The co-managed solution is delivered on a third-party SIEM either licensed by CyberMaxx or the customer and allows the customer more control and access. "The speed and pace of evolving threats today requires a new approach to defensive security," said Michael Quattrochi, CyberMaxx's SVP of Defensive Security. "Traditional MDR solutions too often aren't able to detect modern threats because they are based on legacy insights. By empowering MaxxMDR with real-time insights into active threats from our offensive and DFIR work we are enabling customers to better keep pace with their adversaries and strengthen their defensive posture." MaxxMDR bundles CyberMaxx helps customers strengthen their security posture by offering both offensive and defensive security solutions together. The MDR bundles strengthen MDR detection with insights from offensive solutions and provides a uniform customer experience at a competitive investment level. MaxxMDR: provides monitoring + Alert Escalation and containment through EDR API. MaxxMDR Advanced: builds on monitoring, alerting, and containment by including an annual Security Configuration Assessment (M365/Azure, Active Directory, AWS & GCP), semi-annual Hunt & Detect in EDR, annual IR or BCDR Tabletop, Password Hash Strength Testing, Deception Tokens Deployment and Monitoring, and Discounted Advanced DFIR Rates. MaxxMDR Premium: builds on MaxxMDR Advanced and includes monthly Hunt & Detect in EDR, Endpoint Purple Team, annual External Penetration Test, annual VIP Public Data Reconnaissance, additional discounts on advanced DFIR Rates. You can learn more about the MaxxMDR solution at www.cybermaxx.com/mdr and learn about MaxxMDR bundles here: www.cybermaxx.com/mdrbundles About CyberMaxx CyberMaxx, Inc., founded in 2002, is a tech-enabled cybersecurity service provider headquartered in Nashville, TN. Through a comprehensive set of services CyberMaxx empowers customers to Assess, Monitor, and Manage cyber risk and stay ahead of emerging threats. CyberMaxx expanded its capabilities through the 2022 acquisition of CipherTechs, an international cybersecurity company providing a complete cybersecurity portfolio across MDR Services, Offensive Security, Governance, Risk & Compliance, DFIR, and 3rd party security product sourcing. CyberMaxx's managed detection and response solution (MAXX MDR) is designed to be scalable for clients of all sizes, providing protection and improving the organization's security posture, ultimately giving customers peace of mind that their systems and data are secure.

Read More