DATA SECURITY

NHC Collaborates with Check Point to Launch a Security Offering

NHC | April 08, 2021

New Horizon Communications Corp. (NHC), THE Communications STACK Provider™ supporting SMB and Enterprise organizations in North America with their VoIP, UCaaS, Contact Center, Collaboration, SD-WAN, Security, Network conglomeration and Managed Services needs, has joined forces with Check Point Software Technologies® (CHKP), settled in Tel Aviv Israel, to dispatch NHC's cloud-first Security Suite.

In 2020, Gartner® named Check Point Software Technologies a pioneer in their Network Firewalls Magic Quadrant. Also, Check Point's capacity to incorporate sufficiently with NHC's SD-WAN assistance, given upstream by VMware, guided NHC to pick Check Point as their new Network Security accomplice. Designated spot's profound item seat will permit NHC to grow security capacities at the client edge while building up an entrance to the arising Secure Access Service Edge (SASE).

"The market scene has been changing so quickly, particularly with a year ago's lockdown and rotate to a dispersed labor force model. We perceived rapidly that our clients require a strong yet adaptable arrangement as it identifies with getting their organization both at the branch level and at their all-inclusive branches, á la their worker homes", said Stephen Gibbs, President and Chief Operation Officer, NHC. "The association we're declaring today permits NHC to jump recklessly into extending our client security balance with a cloud-first arrangement which viably grows our client's edge organization and gets it from dangers both known and obscure. Combined with our Managed Service, STACKGuard, which gives clients perceivability and organization occasion goal, NHC is once more at the front of conglomerating innovation with an emphasis on the client experience."

NHC's underlying business sector offering will be centered around getting the client's organization edge through the arrival of the accompanying two items:

NHC EdgeSecure™ - A little impression virtual security door with cutting edge danger counteraction that can be midway conveyed and overseen in practically no time, making it an ideal security answer for branch workplaces. EdgeSecure works as a Virtual Network Function (VNF) on our Software-characterized WAN (SD-WAN) branch office machines to give extensive danger avoidance security, zero-day assurance, coordinated conveyance, the board and robotization. Clients have full control of safety strategy and information, fulfilling security and guideline prerequisites. EdgeSecure furnishes associations of all sizes with coordinated, progressed danger counteraction, decreasing intricacy and bringing down the complete expense of possession. Dissimilar to different arrangements that just identify dangers, EdgeSecure forestalls dangers with Check Point's SandBlast Zero-Day Protection. Sandblast Zero-Day is a cloud-facilitated sandboxing innovation where records are immediately isolated and investigated, running in a virtual sandbox to find vindictive conduct before it enters your organization. Malware is identified during the adventure stage, even before programmers can apply avoidance procedures endeavoring to sidestep the sandbox. This inventive arrangement joins cloud-facilitated Edge Gateway-level investigation and OS-level sandboxing to keep contamination from the most hazardous adventures and zero-day and focused on assaults. The arrangement likewise incorporates Application Control and URL Filtering to uphold safe web use. IPS, Anti-Bot and Antivirus security from known dangers, and HTTPS assessment shields from dangers attempting to stow away inside encoded HTTPS channels. Advantages include:

• Lightweight VM intended for the WAN edge

• 1GB of memory, 1GB of plate, 1 CPU center

• Mechanized destinations on-boarding

• Cloud the board

• Inbound and outbound traffic assessment

• Keep up protection and consistence

NHC CloudSecure™ - Network security as an assistance, CloudSecure, is a cloud-facilitated network danger counteraction administration offering an upkeep free, thorough, moderate security answer for distant locales and branch workplaces. CloudSecure flawlessly conveys the most recent and most far reaching network safety accessible, shielding branch workplaces from the most recent age of focused and progressed digital dangers. CloudSecure doesn't trouble IT staff with sending or keeping up devoted equipment and supports adding progressed danger avoidance capacities on top of existing switches or SD-WAN organizations. With a straightforward and simple arrangement measure, network traffic from existing SD-WAN edge gadgets are burrowed to an essential cloud-based organization security administration at a close by area. A subsequent association gives repetition. This guarantees branch workplaces stay associated. As an Outbound organization firewall, highlights incorporate Application Control, URL Filtering (SWG), Content Awareness (DLP), IPS, Anti-Bot, Antivirus, SandBlast Threat Emulation (sandboxing) Protocols Inspected All ports, all conventions including SSL/TLS Applications and Websites 110+ classes and granular control of 8,000+ applications Data Types 40+ pre-characterized information types including PCI, PII, HIPAA, source code and that's just the beginning. Advantages include:

• Most recent and consistently forward-thinking security

• Flexible and versatile

• Under 50 milliseconds idleness

• Guarantees 99.999% uptime

• APIs computerize on-boarding new locales

• GRE or IPsec burrows guarantee security


ABOUT NHC

Established in 2002 as an enlisted public utility, NHC conveys a solitary way to all heritage and complex innovations on a solitary receipt, overseen through a solitary agony of glass, and with smoothed out 100% stateside support groups. There's no compelling reason to go elsewhere for any correspondence arrangement. NHC administration contributions include:

• VoIP

• Bound together Communications as a Service (UCaaS)

• Contact Center as a Service (CCaaS)

• Cooperation administrations

• Programming Defined Wide Area Network (SD-WAN)

• Security as-a-Service (SECaaS)

• Programming as-a-Service (SaaS)

• Regular Telephone Service (POTS)

• Fiber | Broadband

• LtE/5G Connectivity

• Equipment as-a-Service (HaaS)

• Overseen Services

NHC tailors every answer for our end client needs through a record the board model spearheaded by our authors. A genome, which remembers for profundity investigation and comprehension of an association's present basic necessities while staying aware of their future development needs. NHC Key Differentiators of NHC include:

• Underlay Network conveyance anyplace in North America

• Cloud-first Overlay administrations conveyed over any organization

• Task Management to scale from administration conveyance to Day-2 help

• Straightforward online gateway for a solitary sheet of glass see

• Administration investigation and point by point revealing of innovation use

• Organization occasion perceivability and control

• NHC is THE Communications STACK Provider™ for current SMB and Enterprise organizations, just as provincial Government Agencies.

Spotlight

DDoS mitigation is paramount for businesses to protect against the growing threat of DDoS attacks. Learn about the ever increasing threat of DDoS attacks, the potential impact on businesses, and mitigation techniques to safeguard against them.

Spotlight

DDoS mitigation is paramount for businesses to protect against the growing threat of DDoS attacks. Learn about the ever increasing threat of DDoS attacks, the potential impact on businesses, and mitigation techniques to safeguard against them.

Related News

PLATFORM SECURITY, SOFTWARE SECURITY, WEB SECURITY TOOLS

AnChain.AI Integrates with Stellar to Bring Enhanced Security and Compliance to Developers

Prnewswire | May 09, 2023

AnChain.AI, a leading Web3 digital asset security, and risk monitoring firm, today announced its integration with Stellar, the pioneering decentralized open-source blockchain network for cross-border payments and asset issuance. This integration paves the way for Stellar's thriving developer community to leverage AnChain.AI's AI-powered Web3 risk management and security solutions to enhance their security posture as they drive innovation. As digital assets and cross-border payments continue to rise, the need for fraud prevention solutions has become increasingly apparent. AnChain.AI's CISO Investigation platform provides an additional layer of trust to institutions developing on Stellar. By utilizing AnChain.AI's Open Blockchain Ecosystem Intelligence (OpenBEI), Stellar developers can prioritize security and customer safety from the earliest phases of building. "As the Web3 ecosystem continues to expand, it's becoming increasingly clear that security is not a luxury, but a necessity," said Dr. Victor Fang, CEO & Co-founder of AnChain.AI. "We are committed to providing cutting-edge security and risk monitoring solutions that enable Web3 platforms to operate with confidence. We're excited to build a more secure and sustainable Web3 future on Stellar." AnChain.AI utilizes AI digital asset risk assessment and early detection of suspicious activity. AnChain.AI's technology solutions underpin the regulatory efforts of leading government agencies, financial institutions, and enterprises worldwide, including the United States Securities and Exchange Commission (SEC). Through this integration, AnChain.AI continues demonstrating its commitment to a more secure blockchain ecosystem, ensuring that all participants in the Stellar community can confidently engage. "Having AnChain.AI integrate with Stellar is a breath of fresh air for the thriving community of Stellar projects," said Mark Heynen, Vice President of Partnerships at Stellar Development Foundation. "These types of solutions help equip developers and enterprises with the necessary tools to prioritize security and compliance from the get-go. This integration lays a sturdy foundation for Stellar ecosystem innovators to create more secure cross-border payment and asset issuance solutions." This integration represents a significant step towards increasing community awareness of the risks associated with rapidly evolving Web3 technology, particularly as regulatory scrutiny in the digital asset space intensifies. By solidifying a shared commitment to sustainable and secure development, this integration lays the foundation for the next-generation Web3 innovation on the Stellar network. Join the growing number of enterprises, financial institutions, government agencies, and users and developers who trust AnChain.AI for their Web3 and digital asset security needs. If you're a user or developer on Stellar looking to enhance your security and compliance posture, get started today. About AnChain.AI AnChain.AI (HQ in San Francisco) is an award-winning AI-powered cybersecurity company enhancing Web3 security, risk, and compliance strategies. AnChain.AI was founded in 2018 by cybersecurity and enterprise cloud veterans. Backed by both Silicon Valley and Wall Street VCs, and selected in the Berkeley Blockchain Xcelerator, we are trusted by 100+ customers from over 10+ countries in sectors: VASPs, financial institutions, and government, including the U.S. SEC (Securities and Exchange Commission). AnChain.AI Web3 Security Suite protects over $50 billion Web3 crypto assets. RSA Innovation Sandbox Finalist 2023. CNBC Top Startups Award 2022.

Read More

ENTERPRISE SECURITY, PLATFORM SECURITY, SOFTWARE SECURITY

Check Point Software Technologies Bolsters Endpoint Security with Enhanced Posture Management to Tackle Escalating Vulnerability Exploits

Globenewswire | May 15, 2023

Check Point® Software Technologies Ltd. (NASDAQ: CHKP), a leading provider of cybersecurity solutions globally announced today the expansion of its Check Point Harmony Endpoint protections solution by incorporating vulnerability and automated patch management capabilities. This enhancement addresses the mounting number of cyberattacks that exploit unpatched system vulnerabilities for unauthorized access. To deliver this advanced feature, Check Point has joined forces with Ivanti, integrating Ivanti Patch Management to assess and remediate software vulnerabilities from cloud to edge, into Check Point's Harmony Endpoint protection solution. The National Vulnerability Database reported over 25,000 vulnerabilities in 2022, with this figure expected to rise. Furthermore, a recent Dark Reading report revealed that 57% of ransomware attacks capitalize on unpatched vulnerabilities, highlighting the necessity of addressing this issue to defend against such threats. However, vulnerability patching is often a complex and time-consuming process. Many organizations lack insight into their environment's vulnerability status, and even when they do, patching takes an average of 97 days, according a report of the Ponemon Institute. This delay provides ample opportunities for attackers to exploit these weaknesses. To tackle this challenge, Check Point is enhancing its endpoint security solution, Harmony Endpoint, with vulnerability assessment and automated patch management capabilities. This will equip Harmony Endpoint users with an intelligent, automated process that minimizes the attack surface and boosts operational efficiency by: Automatically scanning organizational endpoints with minimal performance impact Providing comprehensive visibility into the status of all devices, saving valuable time for IT and security teams Auto-patching vulnerabilities and implementing security policies to ensure a secure and uninterrupted workflow. "We are excited to enhance our endpoint security solution with vulnerability assessment and automated patch management capabilities," says Ofir Israel, VP of Threat Prevention at Check Point, "This added value complements Harmony Endpoint's existing offerings of Endpoint Protection Platform (EPP), Endpoint Detection and Response (EDR), and other advanced security features. Our customers now have the tools they need to swiftly identify and remediate vulnerabilities before they can be exploited, all from a unified platform." “We are thrilled to partner with Check Point and collaborate to offer customers the highest level of endpoint protection,” said Michelle Hodges, Senior Vice President of Global Channels and Alliances at Ivanti. “We both understand that patch management is a critical component of any cybersecurity program and enhances the overall security posture for our customers by ensuring all systems are updated with the latest application updates, fixes, and patches. At Ivanti, we are committed to providing innovative solutions that empower our partners to strengthen their businesses and safeguard our customers.” By delivering a comprehensive endpoint security solution, Check Point enables organizations to defend against a broad spectrum of cyber threats and stay ahead of the ever-evolving threat landscape. About Check Point Software Technologies Ltd. Check Point Software Technologies Ltd. (www.checkpoint.com) is a leading provider of cyber security solutions to corporate enterprises and governments globally. Check Point Infinity's portfolio of solutions protects enterprises and public organisations from 5th generation cyber-attacks with an industry leading catch rate of malware, ransomware and other threats. Infinity comprises three core pillars delivering uncompromised security and generation V threat prevention across enterprise environments: Check Point Harmony, for remote users; Check Point CloudGuard, to automatically secure clouds; and Check Point Quantum, to protect network perimeters and datacenters, all controlled by the industry’s most comprehensive, intuitive unified security management. Check Point protects over 100,000 organizations of all sizes. About Ivanti Ivanti elevates and secures Everywhere Work so that people and organizations can thrive. We make technology work for people, not the other way around. Today’s employees use a wide range of corporate and personal devices to access IT applications and data over multiple networks to stay productive, wherever and however they work. Ivanti is one of the only technology companies that finds, manages and protects each IT asset and endpoint in an organization. Over 40,000 customers, including 88 of the Fortune 100, have chosen Ivanti to help them deliver an excellent digital employee experience and improve IT and security team productivity and efficiency. At Ivanti, we strive to create an environment where all perspectives are heard, respected and valued and are committed to a more sustainable future for our customers, partners, employees and the planet. For more information, visit www.ivanti.com and follow @GoIvanti.

Read More

DATA SECURITY, SOFTWARE SECURITY, WEB SECURITY TOOLS

Interos Enhances Industry-First Operational Resilience Score

Interos Inc | March 10, 2023

On March 9, 2023, Interos, one of the leading operational resilience companies creating the world's strongest, safest, and most secure supply chains, announced the introduction of its upgraded cyber risk factor, a part of its i-ScoreTM measurement of operational resilience. The Interos i-Score is the first of its kind resilience score that assesses the health of extended supply chains against multiple risk factors, such as restriction, financial, geopolitical, operations/catastrophe, ESG, and cyber. The i-Score update includes an innovative cyber behavior model to detect potentially harmful cyber activity irrespective of public disclosure, commercial cyber ratings, threat assessment (Mitre ATT&CK®), vulnerability information (CVEs), regulatory compliance, cyber events, and operating country issues into a single score. This advancement directs cyber risk and procurement managers to their multi-tiered vendors most exposed to ransomware, breaches, data leakage, and other cyber-attacks carried out by malicious attackers who target suppliers concealed in the extended global supply chain. Interos's 2022 Resilience study of 1,500 cybersecurity and procurement leaders found that cyber incidents cause supply chain disruptions that cost businesses $37M each year. Andrea Little Limbago, SVP, Research & Analysis, Interos, said, "This is another crucial step forward in helping organizations achieve operational resilience." She further mentioned, "We've added new, proprietary models that integrate and assess data on cloud-based risk exposure, evaluate anomalous cyber behavior, measure regulatory compliance risks and more. It's designed to deliver better and faster information to CPOs partnering with CISOs — who are increasingly being held accountable for collective cyber resilience — to respond to more frequent and severe supply chain cyberattacks, with enhanced monitoring of vendors and third-party service providers." (Source – Cision PR Newswire) About Interos Inc Founded in 2005, Interos is one of the leading operational resilience companies. The company's first-of-its-kind scoring and relationship discovery technologies automate evaluation, detection, and response to risks. As the only operational resilience platform in the world, it protects customers from unethical labor, regulatory violations, cyberattacks, disasters, bankruptcy, and other supplier vulnerabilities. Interos is based in Washington, DC, and has clients all over the world, including NASA, the U.S. Department of Defense, and a number of Global Fortune 500 companies.

Read More