DATA SECURITY,PLATFORM SECURITY,SOFTWARE SECURITY
Beyond Identity | December 09, 2022
Beyond Identity, the leading provider of phishing-resistant multi-factor authentication (MFA), has expanded its integration offerings to include cloud security leader Zscaler. The joint solution strengthens a zero trust architecture and reduces the attack surface by continuously validating the user and device and enabling secure access to applications.
As threat actors’ attacks increase in scope, using freely available tools that simplify the task, legacy MFA solutions that rely on penetrable passwords and codes no longer guarantee protection throughout an active session. As such, Gartner recommends companies adjust their zero trust initiatives as “credentials and signals must be continuously reevaluated post login.”
To provide enterprises with continuous identity and device inspection and verification, Beyond Identity’s integration with the Zscaler Zero Trust Exchange™ platform enables the real-time exchange of risk signals that are incorporated prior to initial user authentication and monitored continuously thereafter, increasing the security of the entire user session. Further, ongoing risk signal exchange between the solutions allows for near real-time notification and enforcement should a device fall out of compliance during an active session, and for session termination and remediation to ensure both user and device are ready for re-authentication.
“Beyond Identity is committed to delivering the industry’s most secure and robust phishing-resistant authentication solution while removing the user friction that has stalled enterprise rollout of existing MFA solutions,” said Kurt Johnson, Chief Strategy Officer and Head of Corporate Development at Beyond Identity. “To achieve this objective, Beyond Identity is building an ecosystem of like-minded leaders, like Zscaler, where real-time information exchange can raise the level of application and system security and form the foundation of an enterprise’s journey to zero trust security.”
”As cyberattacks become more sophisticated and users work from everywhere, removing the silos of security solutions is key for implementing zero trust. “With Beyond Identity integrating into the Zscaler Zero Trust Exchange platform, customers have another strong option to enforce device-driven conditional access continuously, and adapt to their risk policies and application sensitivity.”
Amit Raikar, VP of Tech Alliances and Business Development at Zscaler
This integration empowers Beyond Identity and Zscaler customers to easily modernize their MFA strategies, minimize the risk of password-based and MFA-bypass breaches and extend the footprint of existing cybersecurity investments. By eliminating the need for a password from this process, usability and user satisfaction are ultimately improved while removing entire authentication attack vectors.
“Lowering the risk of password-based breaches and secure application access are key business drivers for security leadership teams.stated Mick Coady, WWT, Global VP of Cyber Security Solutions at World Wide Technology. “The Zscaler, Beyond Identity integration enables organizations to achieve both.”
About Beyond Identity
Beyond Identity is revolutionizing secure digital access for workforces, contractors, customers and developers. Our Universal Passkey Architecture provides the industry’s most secure and frictionless multifactor authentication that prevents credential-based breaches, ensures device trust, and delivers secure and frictionless digital access, eliminating passwords entirely. Industry leaders like Snowflake, Unqork and Roblox rely on Beyond Identity to solve their access security challenges for their customers, employees, contractors and developers and to advance their journey toward Zero Trust Security.
ENTERPRISE SECURITY,PLATFORM SECURITY,SOFTWARE SECURITY
Swimlane | November 15, 2022
Swimlane, the low-code security automation company, today announced the formation of the first operational technology (OT) security automation solution ecosystem tailored to meet the combined OT and IT security requirements within critical infrastructure environments.
The Biden Administration designated November as Critical Infrastructure Security and Resilience Month, drawing attention to the need for “fortifying our information technology and cybersecurity across sectors.” As cyber threats grow in frequency and severity, security operations teams within industrial organizations are regularly targeted due to the importance of their systems and infrastructure.
Given the limited resources at their disposal, security teams within these organizations are struggling to keep up with rapidly evolving threats. The cybersecurity skills gap poses a particularly difficult challenge for organizations with OT environments due to the unique skill set required to navigate the convergence of OT and IT technologies. This is where modern Security Orchestration, Automation and Response (SOAR) plays an instrumental role.
“Our public utilities and critical infrastructure face unique cybersecurity challenges to detect and respond to the convergence of threats targeting their combined OT and IT environments, and cyber-physical systems. “Swimlane is bringing together the best of OT security with our extensible security automation platform to create a robust system of record and control for security operations teams to more quickly process large amounts of security telemetry without needing more resources to defend against breaches.”
Cody Cornell Co-founder and Chief Strategy Officer of Swimlane
Swimlane’s security automation ecosystem for OT environments currently includes the following:
Nozomi Networks for OT and IoT Security: Swimlane and Nozomi Networks, the leader in OT and IoT security, also announced today a technology integration that combines low-code security automation with OT and Internet of Things (IoT) security. The combined solution makes it possible for industrial and critical infrastructure security operations to maintain continuous asset compliance and mitigate the risks of attacks from combined OT and IT entry points.
Dataminr Tackles Physical Risk: Swimlane’s integration with Dataminr leverages automated processes to mitigate risks and warn at-risk employees as soon as possible to ensure their safety. The cyber-physical threat response solution saves organizations crucial minutes when connecting with staff members who might be affected by a natural disaster, accident, or social unrest, or other types of physical risk.
1898 & Co. for Managed Threat Detection: 1898 & Co., a preeminent industrial control system (ICS) cybersecurity solutions provider, has selected Swimlane as the core automation platform for their managed threat detection services. These services include the detection of both OT and IT-born threats, machine-speed threat validation and scoring, and rapid remediation of threats using OT response methods.
“Security teams chartered with protecting OT environments are struggling to keep pace with emerging threats given their limited resources,” said Joshua Magady, Practice Technical Lead at 1898 & Co. “As cyberattacks on critical infrastructure continue to rise and the cybersecurity skills shortage prevails, we are excited to be working with Swimlane to provide automation solutions that give these important organizations the tools to defend against rising cyber threats effectively.”
Working with each technology partner, Swimlane will develop a portfolio of pre-integrated solutions that customers can quickly deploy either through managed services or add to their existing environment.
Swimlane is the leader in cloud-scale, low-code security automation. Swimlane unifies security operations in-and-beyond the SOC into a single system of record that helps overcome process and data fatigue, chronic staffing shortages, and quantifying business value. The Swimlane Turbine platform combines human and machine data into actionable intelligence for security leaders.
PLATFORM SECURITY,SOFTWARE SECURITY
VIPRE Security Group | January 19, 2023
VIPRE Security Group, an award-winning data, cybersecurity, privacy, and user protection company, recently announced the launch of its latest cybersecurity product, VIPRE Endpoint Detection & Response (EDR). VIPRE EDR is built to assist small and medium-sized businesses including their IT partners navigate the intricacies of EDR management with a single, simple-to-use console.
VIPRE EDR provides a sophisticated high-performance, cloud-based solution while overcoming the problems users typically expect from an EDR solution. . This advanced technology detect better and uncovers more unusual behavior than a standalone antivirus file, process, and networking analysis solutions, while offering investigation and remediation tools to accelerate response times.
The VIPRE EDR solution is based on the fundamental pillars of Detection, Investigation, Containment, and Remediation, transforming threats into intelligence and suggesting next steps for security professionals, as simply detecting a threat is insufficient.
Advantages of VIPRE's Endpoint Detection and Response (EDR) System:
Exploit prevention – It helps to prevent network threats with built-in DNS , intrusion protection and in-browser exploit prevention
EPP/Next-generation Antivirus - VIPRE EDR, constantly scans processes, files, and network activity for known and undiscovered threats
Correlated Behavior Engine - Examine endpoint behavior in greater depth to identify emergent or suspicious behavior connected across all engines
Endpoint Isolation – Quickly isolates an afflicted device to prevent threat spreading
Threat Incident Visualization – View and respond to all threat activity from a central location. Understand all aspects of endpoint activity related to the threat, including every user, process, file, and network activity
Remote Shell - VIPRE EDR's click-button reporting enables admins instant remote access to the endpoint for a deeper look
Suspicious file/link sandboxing - Detonates files and links in a private cloud sandbox for comprehensive examination and forensic investigation
Integrated Vulnerability Management - App scanning and vulnerability management to close potential security gaps
Built on the foundation of VIPRE's top-ranked Endpoint Security Cloud (EPP) platform, protection begins with extensive monitoring and automated blocking of malicious behavior across all endpoint processes, files, and network activity. This protection includes web, DNS and network monitoring, as well as AI-driven hostile process behavior detection.
About VIPRE Security Group
A part of Ziff Davis, Inc., VIPRE Security Group is a global organization specializing in cybersecurity, privacy, and data protection. It protects millions of people and businesses globally, including some very well-known brands. . For nearly 30 years, VIPRE Security Group's primary mission has been to provide easy solutions to protect against existing and potential internet threats in an ever-expanding, digitally connected world.