DATA SECURITY

NHC Collaborates with Check Point to Launch a Security Offering

NHC | April 08, 2021

New Horizon Communications Corp. (NHC), THE Communications STACK Provider™ supporting SMB and Enterprise organizations in North America with their VoIP, UCaaS, Contact Center, Collaboration, SD-WAN, Security, Network conglomeration and Managed Services needs, has joined forces with Check Point Software Technologies® (CHKP), settled in Tel Aviv Israel, to dispatch NHC's cloud-first Security Suite.

In 2020, Gartner® named Check Point Software Technologies a pioneer in their Network Firewalls Magic Quadrant. Also, Check Point's capacity to incorporate sufficiently with NHC's SD-WAN assistance, given upstream by VMware, guided NHC to pick Check Point as their new Network Security accomplice. Designated spot's profound item seat will permit NHC to grow security capacities at the client edge while building up an entrance to the arising Secure Access Service Edge (SASE).

"The market scene has been changing so quickly, particularly with a year ago's lockdown and rotate to a dispersed labor force model. We perceived rapidly that our clients require a strong yet adaptable arrangement as it identifies with getting their organization both at the branch level and at their all-inclusive branches, á la their worker homes", said Stephen Gibbs, President and Chief Operation Officer, NHC. "The association we're declaring today permits NHC to jump recklessly into extending our client security balance with a cloud-first arrangement which viably grows our client's edge organization and gets it from dangers both known and obscure. Combined with our Managed Service, STACKGuard, which gives clients perceivability and organization occasion goal, NHC is once more at the front of conglomerating innovation with an emphasis on the client experience."

NHC's underlying business sector offering will be centered around getting the client's organization edge through the arrival of the accompanying two items:

NHC EdgeSecure™ - A little impression virtual security door with cutting edge danger counteraction that can be midway conveyed and overseen in practically no time, making it an ideal security answer for branch workplaces. EdgeSecure works as a Virtual Network Function (VNF) on our Software-characterized WAN (SD-WAN) branch office machines to give extensive danger avoidance security, zero-day assurance, coordinated conveyance, the board and robotization. Clients have full control of safety strategy and information, fulfilling security and guideline prerequisites. EdgeSecure furnishes associations of all sizes with coordinated, progressed danger counteraction, decreasing intricacy and bringing down the complete expense of possession. Dissimilar to different arrangements that just identify dangers, EdgeSecure forestalls dangers with Check Point's SandBlast Zero-Day Protection. Sandblast Zero-Day is a cloud-facilitated sandboxing innovation where records are immediately isolated and investigated, running in a virtual sandbox to find vindictive conduct before it enters your organization. Malware is identified during the adventure stage, even before programmers can apply avoidance procedures endeavoring to sidestep the sandbox. This inventive arrangement joins cloud-facilitated Edge Gateway-level investigation and OS-level sandboxing to keep contamination from the most hazardous adventures and zero-day and focused on assaults. The arrangement likewise incorporates Application Control and URL Filtering to uphold safe web use. IPS, Anti-Bot and Antivirus security from known dangers, and HTTPS assessment shields from dangers attempting to stow away inside encoded HTTPS channels. Advantages include:

• Lightweight VM intended for the WAN edge

• 1GB of memory, 1GB of plate, 1 CPU center

• Mechanized destinations on-boarding

• Cloud the board

• Inbound and outbound traffic assessment

• Keep up protection and consistence

NHC CloudSecure™ - Network security as an assistance, CloudSecure, is a cloud-facilitated network danger counteraction administration offering an upkeep free, thorough, moderate security answer for distant locales and branch workplaces. CloudSecure flawlessly conveys the most recent and most far reaching network safety accessible, shielding branch workplaces from the most recent age of focused and progressed digital dangers. CloudSecure doesn't trouble IT staff with sending or keeping up devoted equipment and supports adding progressed danger avoidance capacities on top of existing switches or SD-WAN organizations. With a straightforward and simple arrangement measure, network traffic from existing SD-WAN edge gadgets are burrowed to an essential cloud-based organization security administration at a close by area. A subsequent association gives repetition. This guarantees branch workplaces stay associated. As an Outbound organization firewall, highlights incorporate Application Control, URL Filtering (SWG), Content Awareness (DLP), IPS, Anti-Bot, Antivirus, SandBlast Threat Emulation (sandboxing) Protocols Inspected All ports, all conventions including SSL/TLS Applications and Websites 110+ classes and granular control of 8,000+ applications Data Types 40+ pre-characterized information types including PCI, PII, HIPAA, source code and that's just the beginning. Advantages include:

• Most recent and consistently forward-thinking security

• Flexible and versatile

• Under 50 milliseconds idleness

• Guarantees 99.999% uptime

• APIs computerize on-boarding new locales

• GRE or IPsec burrows guarantee security


ABOUT NHC

Established in 2002 as an enlisted public utility, NHC conveys a solitary way to all heritage and complex innovations on a solitary receipt, overseen through a solitary agony of glass, and with smoothed out 100% stateside support groups. There's no compelling reason to go elsewhere for any correspondence arrangement. NHC administration contributions include:

• VoIP

• Bound together Communications as a Service (UCaaS)

• Contact Center as a Service (CCaaS)

• Cooperation administrations

• Programming Defined Wide Area Network (SD-WAN)

• Security as-a-Service (SECaaS)

• Programming as-a-Service (SaaS)

• Regular Telephone Service (POTS)

• Fiber | Broadband

• LtE/5G Connectivity

• Equipment as-a-Service (HaaS)

• Overseen Services

NHC tailors every answer for our end client needs through a record the board model spearheaded by our authors. A genome, which remembers for profundity investigation and comprehension of an association's present basic necessities while staying aware of their future development needs. NHC Key Differentiators of NHC include:

• Underlay Network conveyance anyplace in North America

• Cloud-first Overlay administrations conveyed over any organization

• Task Management to scale from administration conveyance to Day-2 help

• Straightforward online gateway for a solitary sheet of glass see

• Administration investigation and point by point revealing of innovation use

• Organization occasion perceivability and control

• NHC is THE Communications STACK Provider™ for current SMB and Enterprise organizations, just as provincial Government Agencies.

Spotlight

In this infographic, we uncover some of the major trends in the malware industry and reveal several interesting statistics about computer viruses.  Malware is a collective term for various types of malicious software that infect a user’s computer. These include viruses, worms, Trojans, rootkits, spyware, adware, and several others. Malicious software is becoming a bigger problem with each passing year, and it is growing at an increasingly faster pace than ever before. In fact, last year there were 74,000 new computer viruses created every single day on average.

Spotlight

In this infographic, we uncover some of the major trends in the malware industry and reveal several interesting statistics about computer viruses.  Malware is a collective term for various types of malicious software that infect a user’s computer. These include viruses, worms, Trojans, rootkits, spyware, adware, and several others. Malicious software is becoming a bigger problem with each passing year, and it is growing at an increasingly faster pace than ever before. In fact, last year there were 74,000 new computer viruses created every single day on average.

Related News

DATA SECURITY

Endpoint Security of Lookout Mobile is Now StateRAMP Authorized

Lookout | March 04, 2022

Lookout, Inc., a provider of comprehensive endpoint-to-cloud security, announced today that its Lookout Mobile Endpoint Security solution had been granted StateRAMP Authorization. The Lookout solution has passed 325 security checks, indicating that it can handle sensitive, unclassified data and protect critical government networks. It gives state and local governments complete access over their entire fleet of iOS, Android, and ChromeOS endpoints, allowing them to secure agency data in real-time by detecting and responding to phishing, app, device, and network threats. Lookout is the premier provider of mobile endpoint security to the government and the first mobile security vendor to be approved by StateRAMP. In April 2020, Lookout Mobile Endpoint Security received FedRAMP approval. StateRAMP is a nonprofit organization founded by state and local government leaders, industry professionals, and private firms to offer a standard for government entities to manage cybersecurity risks from third-party suppliers. These security standards are based on NIST Special Publication 800-53, a widely accepted catalog of security and privacy controls for information systems and organizations from the National Institute of Standards and Technology (NIST). Attackers seek to breach agency networks in droves, fueled by the global epidemic and the trend to mass telework. According to a new SolarWinds and Market Connections survey of 400 decision-makers from federal, state, and municipal agencies and the education sector, endpoint security software is an important tool in managing risk. The Office of Management and Budget (OMB) M-22-01 mandates that federal agencies integrate mobile devices in their endpoint detection and response, continuous monitoring, and proactive threat hunting strategies, setting a high bar for state and local governments to meet. "In the current environment of remote work and digital transformation of government services, state and local organizations are operating with an increasing number of mobile devices that are expanding their cyber attack surface, These organizations need tools that can detect and respond to threats on iOS, Android and ChromeOS devices to secure data accessed from anywhere." Tony D'Angelo, vice president, U.S. public sector, Lookout The Lookout Security Graph, which analyses telemetry data from more than 200 million devices and 150 million apps and continually ingests and analyses millions of URLs every day, is at the heart of Lookout Mobile Endpoint Security. Lookout Mobile Endpoint Security uses machine intelligence to help state and local governments detect and respond to phishing, application, device, and network attacks while maintaining user privacy. In addition, lookout can automatically detect and respond to threats that have never been seen before, thanks to machine intelligence. Following receiving FedRAMP Joint Advisory Board (JAB) Provisional Authorization to Operate for Lookout Mobile Endpoint Security in May 2020 and Secure Access Service Edge (SASE) in February 2022, the company was added to the StateRAMP AVL. StateRAMP's compliance verification is modeled after FedRAMP, and it necessitates the submission of an independent third-party audit to the StateRAMP Program Management Office (PMO) for approval.

Read More

Research shows Boardroom investments in cybersecurity are most commonly the result of an incident or fears of compliance audit failure

prnewswire | October 08, 2020

Thycotic, provider of privileged access management (PAM) solutions to more than 10,000 organizations, including 25 of the Fortune 100, today released its CISO Decisions survey, an independent global study1 that examines what most influences the Board to invest in cybersecurity and the impact this has on CISO decision-making. Based on findings from more than 900 global CISOs/Senior IT decision-makers, the research shows Boardroom investments in cybersecurity are most commonly the result of an incident or fears of compliance audit failure. Because of this, the research shows more than half, 58 percent, of respondents say their organizations plan to add more towards security budgets in the next 12 months.

Read More

DATA SECURITY

Morphisec Announces New Incident Response Services as Enterprise Attacks Escalate

Morphisec | August 16, 2021

Morphisec, a leader in cloud-delivered endpoint and server security solutions, today announced the launch of its new incident response services at HIMSS21. The service will help organizations across the healthcare industry, and various other markets, identify, contain, and report on security incidents in progress while validating or verifying the lack of a breach. Morphisec adds this service at a time when a flood of cyber threats have placed businesses under increasing pressure, making incident response necessary for industries like healthcare and manufacturing that need to be operational 24/7. In fact, Morphisec’s Consumer Healthcare Cybersecurity Threat Index found earlier this year that 1 in 5 Americans had a healthcare provider affected by cyberattacks over the last twelve months. Morphisec’s new IR services aims to assist these organizations with containing in-progress incidents, reducing damage, providing recommendations for long-term risk reduction, and auditing critical infrastructure to ensure the lowest possible risk exposure to a cyberattack. The company's highly experienced and on-demand IR team will be led under the direct supervision of the CTO’s office. “In this worsening threat landscape, it’s vital that all businesses have access to the expertise they need to keep their business up and running in the event of a breach -- even if they lack dedicated security professionals,” said Michael Gorelik, Morphisec’s CTO and head of incident response. “Morphisec’s incident response services help every organization under attack to quickly contain the incident, ensure business continuity, and minimize direct and indirect losses. With extensive experience in security incident investigation, companies are in good hands with our talented IR team who will go above and beyond to help them protect their assets from backdoors and persistent malware.” Morphisec’s incident response services will leverage the company’s zero trust at runtime solution to quickly pinpoint and contain threats, promising immediate results before forensic activities are even finalized. Responders will also educate businesses on the root cause of the incident and, in turn, the required corrective actions to improve their current tools and processes. Forensic collection and investigation of affected assets, including the building of an activity timeline, supplying indicators of compromise (IOCs), scoping the impact, mapping of exfiltrated IP, and more Malware analysis: In-depth analysis of a given malware, backdoor, or fileless code, to identify the potential impact Working around the clock during the investigation, with availability whenever we’re needed The option to develop customized scripts to minimize follow-up impact “As cyberattackers continue to target our critical industries such as healthcare, we’re proud to offer this crucial service to organizations who simply cannot afford downtime,” added Gorelik. “Morphisec's impressive suite of cloud-delivered endpoint and server security solutions are already protecting our customers across 8 million endpoints, and the addition of our new incident response service adds a vital layer to triage critical security incidents and reduce the risk of attack for the future.” About Morphisec Morphisec is the world leader in providing advanced security solutions for midsize to small enterprises around the globe. The company’s security products simplify and automatically block modern attacks from the endpoint to the cloud. Unlike traditional security solutions relying on human intervention, Morphisec delivers operationally simple, proactive prevention. This approach protects businesses around the globe with limited security resources and training from the most dangerous and sophisticated cyber attacks.

Read More