DATA SECURITY

Owl Cyber Defense improves advanced network security capabilities with Trident Assured Collaboration Systems Acquisition

prnewswire | January 05, 2021

Owl Cyber Defense Solutions, LLC ("Owl"), a worldwide market pioneer in online protection arrangements and administrations for safeguarding network limits and empowering secure information sharing across areas, reported today the obtaining of the Trident Assured Collaboration Systems ("ACS") product offering. ACS has the solitary U.S. government-affirmed Voice over IP ("VoIP") and Video Teleconference ("VTC") Cross Domain Solution ("CDS") just as the business' most exceptional Full Motion Video ("FMV") sifting ability – usefulness basic to CDS activities in a time of robots and cameras. The obtaining gives Owl a more extensive scope of guaranteed network border guard arrangements than any rival on the lookout.

Owl, upheld by private speculation firm DC Capital Partners, has been a main supplier of CDS to the U.S. Branch of Defense ("DoD") and Intelligence Community for over 20 years. Owl is likewise the worldwide pioneer in network safety assurance for basic framework, offering the solitary U.S. government tried and certify CDS accessible for organization inside and outside the U.S to both government and business customers.

Owl's Cross Domain Solutions offer the most elevated level of organization edge security, far surpassing the capacities of firewalls and other ordinary organization protections. Owl's items are the decision for ensuring the country's most delicate organizations and frameworks against assault. Ongoing episodes have exhibited the failure of inheritance firewalls to forestall cyberattacks against basic business and working frameworks and cloud-based applications. The blend of Owl and ACS's innovation offers a full continuum of CDS items that give equipment upheld space partition and layers of information separating confirmation instead of a solitary organization line checkpoint with insignificant substance sifting.

Arrangements like firewalls that worked 25 years back as an organization insurance approach are not, at this point compelling against country state quality assaults. As country state assaults increment, the methodologies utilized by state entertainers start to saturate the criminal side of cyberattacks. Powerful network safety presently requires a coordinated, multi-layered framework with information diode equipment parts in gatekeepers which perform escalated information assessment and confirmation. The up and coming age of insurance, coming out now and based on a mix of Owl and ACS innovation, installs CDS usefulness in incredibly low-inactivity, unmodifiable equipment.

Thomas J. Campbell, Chairman of Owl and Founder and Managing Partner of DC Capital, said, "This is another step in executing our strategic vision.  The acquisition of ACS not only places Owl ahead of other Cross Domain Solution providers, but it also plays a pivotal role in our larger strategy to offer true cybersecurity protection. The future requires solutions that are cost effective and easy to implement, use, and maintain." 

"The explosion of the Internet of Things ("IoT") demands cyber-secure devices, from those that control our critical infrastructure, to our homes and cars," said Campbell. "The technology Owl pioneered 20 years ago is now available in form factors small enough to be embedded inside devices.  Owl has always been an early mover, the first to develop hardware-enforced network protection and now the first to offer a hardware-enforced CDS that can be embedded."

"Owl has been rapidly moving towards this number one position for the last couple of years," commented Robert Stalick, President and CEO of Owl. "With the addition of ACS, the last piece has fallen into place. Owl is now the clear leader in accredited Cross Domain Solution offerings, with the widest range of capabilities and products – solving problems from tactical to enterprise in data, voice, and video; for government, critical infrastructure and commercial enterprises."

Jerry B. Chernock, Partner at DC Capital, added, "Clearly we need to address the deficiency of firewalls. There is a motivation behind why our customers demand Cross Domain Solutions and not exclusively on firewalls. Late assaults, including a security break at an unmistakable U.S. based network protection firm and a few U.S. Government organizations, have accentuated the requirement for knowledge, military, basic framework and corporate customers to rapidly develop how they secure their organizations."

"The sophistication of these technologies cannot be overstated," said Ken Walker, Chief Technology Officer at Owl. "The U.S. Government continues to set the standards for the most rigorous operational requirements and testing regimes globally, setting expectations that very few companies can meet. Owl is one of a handful of elite companies that satisfies the government-established 'Raise the Bar' requirements."

About Owl Cyber Defense Solutions

Owl has been serving the cybersecurity needs of the U.S. government since inception – providing hardware-enforced cybersecurity controls, industry leading expertise in operating system hardening, extensive device and network-based assessment services and thought-leadership in filtering/data processing disciplines. Owl Cross Domain Solutions are operating broadly in missions across both the DoD and the U.S. intelligence agencies. Globally Owl is the leader in perimeter protection for nuclear power plants, oil and gas operations, renewables and power generation and transmission, with aggressive growth occurring in the data center and cloud provider sectors. Owl continues to innovate and is bringing to market the world's first embeddable cybersecurity to serve the Internet of Things ("IoT").

Spotlight

In 2018, a large manufacturing organization experienced a ransomware attack resulting in a material security breach. The incident highlighted the need for a comprehensive cybersecurity program with greater visibility. The challenge was to implement a solution that was easy to manage and cost-effective while ensuring their sensit

Spotlight

In 2018, a large manufacturing organization experienced a ransomware attack resulting in a material security breach. The incident highlighted the need for a comprehensive cybersecurity program with greater visibility. The challenge was to implement a solution that was easy to manage and cost-effective while ensuring their sensit

Related News

DATA SECURITY, PLATFORM SECURITY, SOFTWARE SECURITY

Skyflow launches Skyflow GPT Privacy Vault

Businesswire | May 22, 2023

Today, Skyflow, the data privacy vault company, unveiled Skyflow GPT Privacy Vault, a robust privacy solution that enables organizations to safely and securely leverage the full power of large language models such as GPT. Companies are rushing to adopt AI, whether to increase productivity, enhance decision-making powered by data-driven insights, or to improve customer experience. However, privacy concerns hinder organizations from fully embracing AI. The Skyflow GPT Privacy Vault can provide enterprises with unparalleled data protection throughout the entire lifecycle of GPT models, and offers a comprehensive range of features tailored to meet the evolving needs of enterprises: Data Privacy and Security: Skyflow GPT Privacy Vault establishes a secure environment for sensitive data, protecting it from unauthorized access, breaches, and data leaks. Granular Data Control: Organizations can maintain strict control over sensitive data, ensuring that only authorized individuals or entities can access specific data sets or functionalities within GPT systems. Privacy-Preserving AI: Sensitive data is redacted and anonymized during data collection, model training, and interactions, enabling organizations to maximize AI capabilities without compromising privacy. Compliance and Regulatory Requirements: With Skyflow GPT Privacy Vault, global companies can leverage AI while complying with data residency requirements, such as GDPR, LGPD, and others. Here’s how organizations can leverage Skyflow GPT Privacy Vault: Data Collection and Preparation: Redact or tokenize sensitive information as it flows through GPT without lessening the value of the output. Skyflow’s proprietary polymorphic encryption technique enables the model to seamlessly handle protected data as if it were plaintext. Model Training: Safely train GPT models on content where sensitive data is redacted and anonymized. Robust multi-party training is also available, so that two or more entities can share anonymized datasets and safely use AI to unlock substantial insights. Interaction with GPT Models: De-identify sensitive data during interactions with GPT models, ensuring that privacy is preserved throughout the entire user interaction process. Secure Deployment and Integration: Seamlessly integrate Skyflow GPT Privacy Vault into existing data infrastructures to add a robust layer of data protection. Skyflow GPT Privacy Vault will protect all sensitive data flowing into GPT models and only reveal sensitive information to authorized parties once it has been processed by the model and returned. Skyflow GPT Privacy Vault delivers significant value across industries. Here are two specific use cases: Pharmaceutical Research: Pharmaceutical companies rely on Skyflow GPT Privacy Vault to protect sensitive data throughout the drug development lifecycle. It ensures the privacy and security of clinical trial data, safeguards proprietary research and intellectual property, and enables secure collaborations with external partners. Additionally, it supports personalized medicine initiatives by preserving the privacy of genetic data. Online Travel Booking: Online travel booking companies utilize Skyflow GPT Privacy Vault to protect customer data while leveraging AI models for personalized recommendations and enhanced customer experiences. It allows them to anonymize and protect personally identifiable information (PII) and payment data, ensuring compliance with privacy regulations while delivering superior travel experiences. “Generative AI can be a powerful tool for teams to maximize their output and scale their products. But the risk of a sensitive data leak is high, and with other providers, the cost of deploying a private GPT can be 10x what it is in a shared environment,” said Anshu Sharma, co-founder and CEO of Skyflow. “Skyflow can offer world-class data privacy throughout the lifecycle of GPT models, seamlessly and affordably.” The Global Partner in Cybersecurity and Privacy at Infosys, Joseph Williams, said, "Companies are eager to adopt ChatGPT and other generative AI platforms but they need to solve for privacy and regulatory compliance. Like we laid out in our seminal paper on the future of privacy engineering, data privacy vault architecture is a right way to go about this." Read more about Skyflow for GPT here. About Skyflow Skyflow is a data privacy vault company built to radically simplify how companies isolate, protect and govern their customers’ most sensitive data. With its global network of data privacy vaults, Skyflow helps companies meet complex data localization requirements. Skyflow customers span verticals like fintech, retail, travel, and healthcare. Skyflow is headquartered in Palo Alto, California and was founded in 2019. For more information, visit www.skyflow.com or follow on Twitter and LinkedIn.

Read More

ENTERPRISE SECURITY, PLATFORM SECURITY, SOFTWARE SECURITY

N-able Announces Cove Data Protection with Disaster Recovery as a Service, Introducing Microsoft Azure Recovery Option

Businesswire | May 12, 2023

N-able, Inc. (NYSE: NABL), a global software company helping IT services providers deliver remote monitoring and management, data protection as a service, and security solutions, today announced that it has expanded the Continuity features in Cove Data Protection™ with the introduction of Standby Image recovery in Microsoft Azure. This new feature delivers smarter disaster recovery as a service (DRaaS), helping MSPs and IT professionals provide a full range of recovery services to end users—from fast, straightforward file-level restore to flexible, affordable disaster recovery, now including recovery in Microsoft Azure. Cove’s innovative SaaS architecture reduces the time and costs associated with data protection and improves ransomware readiness by providing backup storage isolation by default. Cove’s cloud-first approach keeps primary backup storage in the cloud, out of the reach of ransomware on the local network. Cove’s Continuity features provide proactive recovery options to deliver higher service levels, including automated Recovery Testing and Standby Image. With the addition of Azure support, Standby Image now offers even more recovery location flexibility: to a local device onsite, to a secondary location, or to the Azure cloud—all without the need for expensive proprietary backup appliances. “Azure and Cove offer a smarter way to solve the issue of failing over to the cloud,” commented Chris Groot, general manager of Cove Data Protection. “It’s free to send data into an Azure tenant, and you only pay for Azure compute when you boot up the virtual machine (VM). Cove allows you to create a bootable image after every backup and store it there until it’s needed. In the case of an outage, Azure gives you full control over compute resources, and the cost of running in Azure during an outage is more affordable than buying and maintaining an expensive backup and disaster recovery (BDR) appliance you may never use. You can also continue to run your VM in Azure, if you choose, as part of a larger cloud-first IT strategy.” Previously, many IT professionals thought they needed to bear the heavy cost burden of proprietary appliances to meet customer expectations around DRaaS. With Cove’s Standby Image recovery in Azure, it’s possible to deliver enhanced disaster recovery while experiencing up to 60% cost savings over traditional appliances. “We looked at the various disaster recovery options, including very expensive BDR appliances, and realized that as an MSP, we wanted a rock-solid product that would also help us keep our costs down. We found that with Cove,” said Lionel Naidoo, director at Dragon IS. “The IT landscape continues to change, and you have to stay agile and take the time to investigate new and fresher approaches in order to stay ahead.” About N-able N-able fuels IT services providers with powerful software solutions to monitor, manage, and secure their customers’ systems, data, and networks. Built on a scalable platform, we offer secure infrastructure and tools to simplify complex ecosystems, as well as resources to navigate evolving IT needs. We help partners excel at every stage of growth, protect their customers, and expand their offerings with an ever-increasing, flexible portfolio of integrations from leading technology providers. n-able.com

Read More

DATA SECURITY, PLATFORM SECURITY, SOFTWARE SECURITY

Illumio Launches Zero Trust Segmentation ROI Calculator to Help Organizations Maximize Cyber Investments

Globenewswire | April 18, 2023

Illumio, Inc., the Zero Trust Segmentation company, today launched the Illumio Zero Trust Segmentation ROI Calculator, a self-service tool that quantifies what an organization’s return on investment (ROI) on Illumio’s Zero Trust Segmentation (ZTS) platform would be, bringing more clarity into their decision-making process. In a difficult economy, organizations need to understand and be able to show the impact of every dollar they spend, and they need solutions that deliver a reliable return on investment. By answering a few simple questions related to their specific business environment, respondents will receive a written assessment of the quantitative impact Illumio ZTS would have on their organization, which will arm decision makers with data to support further investment in cybersecurity initiatives that reduce risk and increase resilience to breaches. Illumio recently commissioned a Total Economic ImpactTM of Illumio Zero Trust Segmentation (ZTS) study from Forrester Consulting, who interviewed Forrester analysts, Illumio stakeholders, and Illumio customers from organizations of varying sizes and industries to inform their findings. The study found that Illumio delivered a total benefit of $10.2 million over three years and paid for itself in six months for a composite organization. Additionally, over three years Illumio ZTS: Reduced a cyberattack’s blast radius by 66 percent by restricting lateral movement, which saved $1.8 million via decreased overall risk exposure. Drove $3 million in savings via tool consolidation and reduced firewall costs. Saved $3.8 million by limiting unplanned downtime. Increased InfoSec’s operational efficiency by $1.6 million by reducing the time and effort needed to implement security policy. Delivered 111 percent return on investment. “The security industry is moving from the prevention and detection eras to the breach containment era to minimize the impact of breaches on the broader organization,” said PJ Kirner, CTO and co-founder at Illumio. “With a challenging economy, CFOs and boards are asking security teams to quantify the return on their investments. With this ROI calculator, leaders can validate the impact ZTS would have on their specific organization, accelerating the implementation of core security strategies that augment prevention and detection technologies to reduce risk and increase resilience to breaches more quickly.” To measure the impact Illumio ZTS could have on your organization, use the Illumio Zero Trust Segmentation ROI Calculator. Learn more about The Forrester Total Economic ImpactTM of Illumio Zero Trust Segmentation here. About Illumio Illumio, the Zero Trust Segmentation Company, stops breaches and ransomware from spreading across the hybrid attack surface. The Illumio ZTS Platform visualizes all traffic flows between workloads, devices, and the internet, automatically sets granular segmentation policies to control communications, and isolates high-value assets and compromised systems proactively or in response to active attacks. Illumio protects organizations of all sizes, from Fortune 100 to small business, by stopping breaches and ransomware in minutes, saving millions of dollars in application downtime, and accelerating cloud and digital transformation projects.

Read More