SOFTWARE SECURITY

NETSCOUT Introduces forensic cybersecurity for AWS Cloud Workloads

businesswire | December 16, 2020

NETSCOUT SYSTEMS, INC a main supplier of administration affirmation, security, and business examination, today reported the expansion of its Smart Perimeter Protection to AWS. The blend of NETSCOUT's Cyber Investigator (NCI) and CyberStream programming with new AWS parcel access administrations contains costs and accomplish better efficiencies in moderating novel security dangers as undertakings move applications to the cloud. As the danger surface extends, the arrangement utilizes parcel information and incredible digital examination to get to the main driver of network protection issues rapidly.

NETSCOUT has teamed up with AWS on bundle access arrangements by acquainting numerous imaginative ways with access parcel traffic for network safety and end-client experience use cases. This incorporates the as of late declared Gateway Load Balancer (GWLB), which gives commonsense, reasonable, and adaptable admittance to parcel traffic for security and execution the board. Utilizing GWLB, clients can coordinate traffic from any Virtual Private Cloud (VPC) to CyberStream and Cyber Investigator without leaving the cloud. The new Smart Perimeter Protection arrangement consistently coordinates with AWS.

“NETSCOUT is committed to providing the most cost-effective and consistent visibility and control regardless of where an application runs,” said Paul Barrett, CTO, Enterprise, NETSCOUT. “NCI and CyberStream extend security forensics capabilities into the cloud, unlike any other solution. Armed with NETSCOUT’s smart data, security, and IT operations teams benefit from a shared perspective and a cost-effective solution that scales to the needs of the cloud.”

About NETSCOUT

NETSCOUT SYSTEMS, INC. (NASDAQ: NTCT) helps assure digital business services against disruptions in availability, performance, and security. Our market and technology leadership stems from combining our patented smart data technology with smart analytics. We provide real-time, pervasive visibility and insights customers need to accelerate and secure their digital transformation. Our approach transforms the way organizations plan, deliver, integrate, test, and deploy services and applications. Our nGenius™ service assurance solutions provide real-time, contextual analysis of service, network, and application performance. Arbor Smart DDoS Protection by NETSCOUT products help protect against attacks that threaten availability and advanced threats that infiltrate networks to steal critical business assets. To learn more about improving service, network, and application performance in physical or virtual data centers, or in the cloud, and how NETSCOUT’s performance and security solutions powered by service intelligence can help you move forward with confidence.

Spotlight

The current landscape for industrial control systems’ (ICS) cybersecurity is best described as turbulent, as system owners struggle to protect systems that were never intended to be interconnected. The systems have long existed in many industrial and manufacturing settings but were traditionally isolated. Technological advances and convergence with traditional information and communications technology (ICT) necessitate unparalleled security for the critical services theyprovide. Headline stories such as those about Stuxnet, Duqu and Flame revealed certain fallibilities surrounding ICS and serve as constant reminders for vigilance about vulnerabilities and attack vectors. ICS security incidents have become more frequent and attack vectors have expanded in the brief period since Stuxnet’s 2010 discovery by antivirus vendor VirusBlokAda.

Spotlight

The current landscape for industrial control systems’ (ICS) cybersecurity is best described as turbulent, as system owners struggle to protect systems that were never intended to be interconnected. The systems have long existed in many industrial and manufacturing settings but were traditionally isolated. Technological advances and convergence with traditional information and communications technology (ICT) necessitate unparalleled security for the critical services theyprovide. Headline stories such as those about Stuxnet, Duqu and Flame revealed certain fallibilities surrounding ICS and serve as constant reminders for vigilance about vulnerabilities and attack vectors. ICS security incidents have become more frequent and attack vectors have expanded in the brief period since Stuxnet’s 2010 discovery by antivirus vendor VirusBlokAda.

Related News

DATA SECURITY

CompTIA ISAO Adds Real-time Cybersecurity Threat Analysis and Intelligence Resources from Sophos

CompTIA | August 05, 2021

Advanced cybersecurity threat analysis and intelligence capabilities are now available from the CompTIA Information Sharing and Analysis Organization (ISAO) through an expanded collaboration with global next-generation cybersecurity leader Sophos and it industry-leading and highly acclaimed threat research lab, SophosLabs. The announcement of the new cyber capabilities was made today by CompTIA, the nonprofit association for the information technology (IT) industry and workforce. CompTIA ISAO members can directly submit suspicious URLs and files through the ISAO's Cyber Forum to SophosLabs Intelix™ for rapid analysis to determine if they are known or zero-day cybersecurity threats. SophosLabs Intelix combines petabytes of threat intelligence derived from decades of SophosLabs threat research with Sophos AI tools and techniques, bringing a powerful new source of threat intelligence to the CompTIA ISAO and its managed services provider (MSP), vendor, distributor, and associate members. "SophosLabs research illustrates how adversaries are constantly changing their tactics, techniques and procedures (TTPs) to breach targets, move laterally and carry out ransomware and other attacks," said Simon Reed, senior vice president, SophosLabs. "The only way to effectively fight modern cybercrime is if we do it together. That's why Sophos is committed to sharing actionable threat intelligence with the CompTIA community. This new integration gives member organizations advanced abilities to quickly investigate suspicious URLs and files to determine their risk and to understand what happens if they are opened or executed. Powered by machine learning, SophosLabs Intelix predictively convicts never-before-seen threats, and is constantly improving based on the collective input of community intelligence." "This is a real differentiator for our members, who can access a powerful analysis resource to identify, classify and prevent threats, further protecting themselves and more importantly, their customers," said MJ Shoer, senior vice president and executive director of the CompTIA ISAO. The new integration expands Sophos' support of the CompTIA ISAO. As a Silver Industry Partner, Sophos has been contributing detailed threat analysis from SophosLabs Uncut to the CompTIA ISAO. "This is a significant addition to the resources available to our members," Shoer added. "It is the latest example of the support that industry partners such as Sophos have for the CompTIA ISAO, and the commitment we all have to make the industry more secure." The CompTIA ISAO is a community of nearly 1,200 member companies that share best practices, cyber threat intelligence, educational content and more to help address ever-evolving cyber threats. Working closely with public and private cybersecurity agencies and organizations, the CompTIA ISAO is helping its members understand the threat landscape, defend against current and future attacks and raise cybersecurity awareness throughout the global tech industry. About CompTIA The Computing Technology Industry Association (CompTIA) is a leading voice and advocate for the $5 trillion global information technology ecosystem; and the estimated 75 million industry and tech professionals who design, implement, manage, and safeguard the technology that powers the world's economy. Through education, training, certifications, advocacy, philanthropy, and market research, CompTIA is the hub for advancing the tech industry and its workforce. About Sophos Sophos is a worldwide leader in next-generation cybersecurity, protecting more than 500,000 organizations and millions of consumers in more than 150 countries from today's most advanced cyberthreats. Powered by threat intelligence, AI and machine learning from SophosLabs and SophosAI, Sophos delivers a broad portfolio of advanced products and services to secure users, networks and endpoints against ransomware, malware, exploits, phishing and the wide range of other cyberattacks. Sophos provides a single integrated cloud-based management console, Sophos Central – the centerpiece of an adaptive cybersecurity ecosystem that features a centralized data lake that leverages a rich set of open APIs available to customers, partners, developers, and other cybersecurity vendors. Sophos sells its products and services through reseller partners and managed service providers (MSPs) worldwide. Sophos is headquartered in Oxford, U.K.

Read More

DATA SECURITY

SGS Cybersecurity Services can help you take advantage of digital opportunities while also protecting you from cyber threats.

SGS | March 09, 2021

SGS, the world's driving review, confirmation, testing and certificate organization, assists customers with taking advantage of advanced freedoms while alleviating hazards with its SGS Cybersecurity Services, a coordinated cybersecurity arrangement. Innovation has numerous advantages. It makes individuals' lives more secure and more advantageous, expands wellbeing potential, and offers new encounters at work, home and when voyaging. In any case, there are huge difficulties as well. At the point when innovation is abused it can make weaknesses, is difficult to anticipate, and can contrarily affect individuals' regular daily existences. For organizations, cybercrime can have disastrous impacts, for example, information and security breaks, prompting monetary harm and reputational obliteration. To defy this advancing cybersecurity scene, governments and partners around the globe are chipping away at setting up new guidelines and guidelines. It is basic for associations to build their cybersecurity development to support their market position. A digital secure culture should be inserted and cycles and conventions ought to be created to help it. This can require some serious energy, yet hoodlums won't stand by, thus brief activity is required.

Read More

SOFTWARE SECURITY

Group-IB Included Among Major Cybersecurity Consulting Companies by Independent Research Firm

Group-IB | August 26, 2021

Group-IB, one of the leading providers of solutions dedicated to detecting and preventing cyberattacks, identifying online fraud, investigation of high-tech crimes and intellectual property protection, has been included in the Forrester overview of the global cybersecurity consulting providers "Now Tech: Global Cybersecurity Consulting Providers, Q3 2021". The report covers 36 major global cybersecurity consulting firms. The demand for superior cybersecurity consulting services continues to increase every year. According to the Forrester's Analytics Business Technographics Security Survey, 31% of enterprise security decision-makers expect to increase spending on cybersecurity consultants and systems integrators by 5% or more in 2021. Digital transformation challenges brought by pandemic have spurred this demand further. To reinforce their cybersecurity risk programs, CISO are tapping into purpose-built strategic and tactical cybersecurity expertise. The Forrester analysts included Group-IB service offering in the category of consultancies – the providers which "offer clients a broad range of audit, consulting, and advisory services, including cybersecurity consulting. They have a diverse set of assets and intellectual property to help clients solve security problems." Cybersecurity services have always been the key drivers of Group-IB's technological leadership enriching the company's global threat intelligence and hunting ecosystem with first-hand understanding of adversary tactics. The company's contribution to high-profile cyber investigations in partnership with international law enforcement, and incident response engagements in more than 60 countries bring in-depth knowledge of criminal schemes. Group-IB's battle-tested experts carried out more than 1,200 successful investigations over 18 years around. While many corporate cybersecurity teams struggle to manage multiple vendors, Group-IB offers its customers a single point of accountability and security consulting expertise trusted by the international automotive, fintech, retail companies. The company provides consulting services at every stage of the attack lifecycle: before (Security Assessment, Compromise Assessment, Incident Response Readiness Assessment), during (Incident Response and Incident Response Retainer), and after the attack (Digital Forensics and Cyber Investigation). About Group-IB Group-IB is one of the leading providers of solutions dedicated to detecting and preventing cyberattacks, identifying online fraud, investigation of high-tech crimes and intellectual property protection, headquartered in Singapore. The company's threat intelligence and research centers are located in the Middle East (Dubai), the Asia-Pacific (Singapore), Europe (Amsterdam), and Russia (Moscow). Group-IB's Threat Intelligence & Attribution system has been named one of the best in class by Gartner, Forrester, and IDC. Group-IB's Threat Hunting Framework (earlier known as TDS) intended for the proactive search and the protection against complex and previously unknown cyberthreats has been recognized as one of the leaders in Network Detection and Response by the leading European analyst agency KuppingerCole Analysts AG, while Group-IB itself has been recognized as a Product Leader and Innovation Leader. Gartner identified Group-IB as a Representative Vendor in Online Fraud Detection for its Fraud Hunting Platform. In addition, Group-IB was granted Frost & Sullivan's Innovation Excellence award for its Digital Risk Protection (DRP), an Al-driven platform for identifying and mitigating digital risks and counteracting brand impersonation attacks with the company's patented technologies at its core.

Read More