ENTERPRISE SECURITY, PLATFORM SECURITY, SOFTWARE SECURITY

Neustar Introduces UltraDDR for Enhanced DNS-based User Protection

Neustar Security Services | February 06, 2023 | Read time : 04:00 min

Neustar Introduces UltraDDR for Enhanced DNS-based User Protection

Neustar Security Services, a renowned cloud-based security services provider that enables global businesses to thrive online, is launching UltraDDR (DNS Detection and Response), a recursive DNS-based protection service aimed at combating ransomware attacks, network breaches, supply chain compromise and phishing while enforcing enterprise acceptable use policies for its users.

UltraDDR provides a Protective DNS solution that allows businesses to move ahead of attacks by preventing communication before any harm can be done. Protective DNS analyzes DNS queries and responds to mitigate threats. UltraDDR offers real-time observability of outbound network communication using years of historical domain data, allowing organizations to detect and prevent malware, ransomware, phishing, and supply chain attacks before any damage can occur.

UltraDDR can meet organizations' recursive DNS requirements. UltraDDR contains a highly dependable global recursive DNS resolution network with 27 nodes across the world, allowing for lightning-fast responses everywhere. UltraDDR is a comprehensive DNS resolver solution that includes advanced security features, including DNS over HTTPS (DoH), DNSSEC and DNS over TLS (DoT). Furthermore, the service features built-in DNS DDoS protection through Neustar Security Services' UltraDDoS Protect solution to instantly fight against attacks towards the UltraDDR DNS resolver network, guaranteeing that DNS resolution availability is not jeopardized.

UltraDDR has extensive DNS firewall features to enforce acceptable usage policies for business users. For example, administrators can designate categories of internet traffic, such as gaming, adult, gambling, social media, etc., that violate business policy and block or flag this traffic to give a simple, unobtrusive means of enforcing policy.

UltraDDR can be deployed within minutes to enhance a corporation's security investments, such as by integrating always-on DNS intelligence into event management and security information systems, endpoint solutions, firewalls, and more. The solution supports a client that can be installed on Windows, iOS, macOS, and Android devices that enables DNS settings to persist regardless of network connectivity and continues to provide both web categorization and threat protection.

About Neustar Security Services

Founded in 1996, Neustar Security Services is a leading cloud-based security services provider. The company is trusted by businesses worldwide to protect their digital infrastructure and online presence. Neustar Security Services provides a range of cloud-based services that are always safe, dependable, and accessible, allowing multinational enterprises to prosper online. The Ultra Secure portfolio of products from the firm safeguards companies' networks and apps against dangers and downtime, making sure that businesses and their customers have great and uninterrupted daily interactions.

Spotlight

This document describes data that is exchanged between the Hardware Management Console (HMC) and the IBM Service Delivery Center (SDC). In addition, it also covers the methods and protocols for this exchange. This includes the configuration of “Call Home” (Electronic Service Agent) on the HMC for automatic hardware error reporting. All the functionality that is described herein refers to Power Systems HMC and the HMC that is used for the IBM Storage System DS8000.

Spotlight

This document describes data that is exchanged between the Hardware Management Console (HMC) and the IBM Service Delivery Center (SDC). In addition, it also covers the methods and protocols for this exchange. This includes the configuration of “Call Home” (Electronic Service Agent) on the HMC for automatic hardware error reporting. All the functionality that is described herein refers to Power Systems HMC and the HMC that is used for the IBM Storage System DS8000.

Related News

ENTERPRISE SECURITY, SOFTWARE SECURITY, WEB SECURITY TOOLS

Ambient.ai Launches AI-driven Forensics Tool to Improve Security

Ambient.ai | March 06, 2023

Ambient.ai, the company evolving physical security with computer vision intelligence, recently introduced its AI-Powered Forensics solution to power incident investigations in near real-time. New event-based and entity search capabilities enable teams to search by objects, complex actions, and non-biometric person descriptors such as shirt color, thereby reducing investigation times by over 90%. Security investigations require operators to analyze individual camera streams with search options limited to basic motion or person/object search, log into multiple applications, and wait for time-consuming video processing, which can take hours or days. Ambient's AI-Powered Forensics is wholly integrated with the camera system, enabling near-instantaneous search across camera networks when an incident occurs – eliminating lengthy wait times and processing, thereby reducing security investigations from hours to minutes. Entity Search builds upon Ambient.ai's first-of-its-kind event-based search and filtering capabilities, utilizing non-biometric identifiers for objects and people to locate key footage and sophisticated event signatures. Additionally, Conjunction Search enables users to filter footage by two or more entities, events, or attributes, thereby expanding the search parameter's scope. One-click sharing and archiving allow teams to instantly share footage to build detailed reports on incident timelines, speed up internal and external investigations and responses, and ensure security protocol compliance. With streamlined investigations, security teams can analyze footage to determine security efficacy, threat incidence, and vulnerabilities. The Ambient.ai Context GraphTM uses computer vision to identify entities, objects, and their connections across surveillance feeds and PACS alarms in the new AI-Powered Forensics. The platform uses the extensible graph for threat detection, signals intelligence, and response. In addition, the company continuously adds event and entity recognition signatures and uses human-in-the-loop feedback to improve performance. Ambient's AI-Powered Forensics capabilities have been tested in high-security environments, such as world-renowned museums and Fortune 500 companies. Today, innovative companies such as Adobe, Impossible Foods, and VMware rely on the company to improve their physical security. About Ambient.ai Ambient.ai offers cutting-edge computer vision intelligence solutions to transform enterprise security operations. Its platform utilizes AI to enable continuous physical security monitoring and automate the immediate dispatch of human resources, preventing security incidents before they occur. Ambient.ai is trusted by large enterprises, schools, and organizations worldwide and is the first platform to go beyond basic motion detection and image recognition, achieving near-human perception with automated situational context. Based in Palo Alto, California, Ambient.ai is leading the way in advancing physical security solutions.

Read More

DATA SECURITY, ENTERPRISE SECURITY, SOFTWARE SECURITY

Edgio Enhances Its Security Platform Capabilities to Improve Edge Security

Edgio | February 28, 2023

On February 27, 2023, Edgio, Inc. announced major enhancements to its security platform to enable enterprises to better identify and respond to emerging threats while ensuring the integrity, confidentiality, and availability of their data and applications. The platform's new capabilities aim to reduce the damage caused by the upsurge in the severity of Distributed Denial of Service (DDoS) and other advanced application attacks. Edgio's DDoS scrubbing solution delivers dedicated DDoS mitigation capacity that safeguards all protocols and direct-to-origin attacks, complementing Edgio's 250+ Tbps edge network to provide full-spectrum DDoS protection. Furthermore, the new enhancements to its Web Application and API Protection (WAAP) capabilities include advanced outbound data leak prevention, rule customizer, enhanced configurability, proxy detection and region code support to help customers comply with geographical compliance rules. DDoS attacks are on the rise, and according to the 2022 Verizon Data Breach Investigations Report, the top security threat is a DDoS attack. The addition of Edgio's DDoS scrubbing solution ensures maximum resiliency and uptime of customers' networks and applications by providing full-spectrum protection against all networks and applications, including direct-to-origin network attacks against non-web applications. Moreover, the new outbound security rules with added outbound traffic scan prevent attackers from causing a data breach by exploiting known vulnerabilities, thereby offering an additional layer of protection for confidential customer data and preventing the customer from executing malicious code. Additionally, Edgio can now detect and block requests originating from anonymous proxies, therefore allowing additional control over access to customers' applications. Edgio's advanced rules customizer allows customers to control the sensitivity of individual security rules and increases its accuracy while minimizing false positives. Finally, enhanced configuration management enables developers to directly import and export configuration JSON via UI and API to deploy protection for new applications rapidly. Edgio also enables clients to control access to their applications through advanced access control rules. The latest enhancements now support more profound regional control, down to the province or region level, in its custom security rules and WAAP's access rules, supporting ongoing compliance requirements in the modern geopolitical environment. About Edgio Headquartered in Phoenix, AZ, Edgio helps companies deliver online experiences and content safer, faster and with more control. Its globally scaled edge network and integrated media and application solutions provide businesses with the tools necessary to deliver high-performance, secure web properties and streaming content quickly and securely. The company's platform and suite of edge services enable enterprises to boost their revenue and overall business value by delivering their content more efficiently and securely. Companies across various industries, including entertainment, technology, retail, and finance, depend on Edgio's technology and services to defend and accelerate their online properties.

Read More

ENTERPRISE SECURITY,PLATFORM SECURITY,SOFTWARE SECURITY

Nozomi Networks Introduces the Industry’s First OT and IoT Endpoint Security Sensor

Nozomi Networks | January 25, 2023

On January 24, 2023, Nozomi Networks Inc., one of the leaders in OT and IoT security, announced Nozomi ArcTM, the industry's first IoT and OT endpoint security sensor, intended to accelerate time to full operational resilience exponentially. Nozomi Arc is designed to automatically deploy across a large number of locations and devices anywhere a company needs visibility, and it provides vital data and insights about essential assets and network endpoints. This data is utilized to better analyze and prevent attacks, as well as correlate user behavior, without straining existing resources or interrupting mission-critical networks. Arc is a game-changer in terms of comprehensive asset visibility, deployment speed, and network coverage across complex and remote OT and IT networks. Nozomi Arc is designed to: Be deployed remotely Analyze endpoint vulnerabilities Accelerate monitoring deployments in mission-critical systems; and Identify compromised hosts Nozomi Networks Co-founder and CPO, Andrea Carcano, said, "Operational resiliency is the top business priority for critical infrastructure organizations, which can only be achieved by lowering cyber risks and increasing security." He added, "Nozomi Arc accelerates time to resiliency by transforming every computer on the network into an OT security sensor. It quickly extends visibility to attack surfaces and threats inside endpoint hosts and their local networks. With Nozomi Arc, users can quickly corollate more information from more sources for better diagnostics and faster time to response." (Source – GlobeNewswire) With Nozomi Arc, users get the following advantages: Faster time to resiliency: Nozomi Arc removes time, resource, geographic, and internal policy limits from network-based deployments. Lower cyber risk and increased security: The only OT solution in the market that can identify malicious hardware. Extended visibility and context: In addition to illuminating additional assets, devices, and possible vulnerabilities, Arc detects process irregularities and questionable user behavior. Lower operational overhead: Because Arc can be remotely deployed through a software download, Nozomi Arc does not need extensive network adjustments to be implemented anywhere in the world, even in the most remote locations. About Nozomi Networks Nozomi Networks, with headquarters in San Francisco, California, accelerates digital transformation by defending the world's critical infrastructure, industrial enterprises, and government enterprises from cyber-attacks. Its technology provides OT and IoT environments with superior network and asset monitoring, threat detection, and analytics. As a result, customers rely on the company's solution to reduce risk and complexity while increasing operational resiliency. In addition, the organization provides zero-trust security by delivering contextual data for policy decisions, such as endpoint posture checks, baseline monitoring, and device role data.

Read More