DATA SECURITY

Palo Alto Networks Launches Complete Zero Trust Network Security

Palo Alto Networks | May 22, 2021

Palo Alto Networks, a leader in the Forrester Wave Zero Trust eXtended Ecosystem Platform Providers, Q3 2020, today introduced five key innovations that make it easier for patrons to adopt Zero Trust across their network security stack.

Today's introductions of SaaS Security, Advanced URL Filtering, DNS Security, Cloud Identity Engine, and new ML-Powered Firewalls allow organizations to simply and effectively implement Zero Trust Network Security with four key benefits:

• Secure access to the proper applications: the primary integrated Cloud Access Security Broker (CASB) that permits customers to proactively extend secure access to all or any SaaS applications, including those never seen before.

• Secure access for the proper users: The industry's first Cloud Identity Engine allows customers to simply authenticate and authorize their users across enterprise networks, clouds, and applications, regardless of where their identity stores live.

• Enhanced security: The Advanced URL Filtering service offers industry-first prevention of zero-day web attacks with inline machine learning capabilities. The expanded DNS Security capabilities prevent emerging DNS attacks that no other solution protects against.

• Making secure access universally available: These new capabilities are designed to be available on all firewall form factors: hardware, software, and cloud-delivered, making safe access universally available, no matter where users are located. additionally, to the prevailing firewalls, these innovations will run on new ML-Powered Next-Generation Firewall models to enable Zero Trust Network Security across your enterprise — from the littlest branch offices (with the PA-400 Series) to the most important campuses and hyperscale data centers (with the PA-5450 platform).

Most of the hardware and every one of the new features are going to be available in June. the littlest desktop firewall, the PA-410, is going to be available in late summer.

About Palo Alto Networks

Palo Alto Networks, the worldwide cybersecurity leader, is shaping the cloud-centric future with technology that's transforming the way people and organizations operate. Our mission is to be the cybersecurity partner of choice, protecting our digital way of life. We help address the world's greatest security challenges with continuous innovation that seizes the newest breakthroughs in AI, analytics, automation, and orchestration. By delivering an integrated platform and empowering a growing ecosystem of partners, we are at the forefront of protecting tens of thousands of organizations across clouds, networks, and mobile devices. Our vision may be a world where every day is safer and safer than the one before.

Spotlight

The market for Cyber Threat Intelligence (CTI) is growing rapidly, but it is not altogether that new. Leading organizations across government and the private sector already rely on CTI every day in their workflows. These companies are bridging the gaps between security and the business, enhancing the power of legacy technologies and driving better prioritization and response. Download now to learn: - The best definition for CTI and 7 criteria for actionable intelligence - Helpful points to consider when evaluating a partner in this space - The benefits that leading companies are deriving from the use of CTI - How models used by the Military and National Intelligence communities should be applied to CTI - How iSIGHT Partners drives accurate, timely, and actionable intelligence for use from the Board Room to the SoC - Case studies in the use of CTI from iSIGHTs global client base of Government and Fortune 1,000 companies.

Spotlight

The market for Cyber Threat Intelligence (CTI) is growing rapidly, but it is not altogether that new. Leading organizations across government and the private sector already rely on CTI every day in their workflows. These companies are bridging the gaps between security and the business, enhancing the power of legacy technologies and driving better prioritization and response. Download now to learn: - The best definition for CTI and 7 criteria for actionable intelligence - Helpful points to consider when evaluating a partner in this space - The benefits that leading companies are deriving from the use of CTI - How models used by the Military and National Intelligence communities should be applied to CTI - How iSIGHT Partners drives accurate, timely, and actionable intelligence for use from the Board Room to the SoC - Case studies in the use of CTI from iSIGHTs global client base of Government and Fortune 1,000 companies.

Related News

DATA SECURITY

WafCharm on Microsoft Azure Launches Cyber Security Cloud

businesswire | December 01, 2020

Cyber Security Cloud, Inc. (CSC) is pleased to announce the availability of WafCharm on Microsoft Azure. Already available to over one million Amazon AWS users around the world, this launch provides Azure users with AI operation of Web Application Firewall (WAF) rules, expanding WafCharm’s availability to 60% of the world’s cloud users. Microsoft Azure users now have access to the same WafCharm benefits for securing their web applications in the cloud as do their Amazon AWS counterparts. By making WafCharm available on two of the industry’s top cloud platforms, businesses benefit by being able to select the cloud service that best fits their needs while enjoying the ease-of-use WafCharm offers. “WafCharm automates WAF rules using machine learning and big data without requiring security experts to customize the system,” CSC’s CTO, Yoji Watanabe, stated. “With CSC’s expertise in the cloud-WAF industry, Azure users can optimize their cloud functionality and focus resources on their businesses instead of constantly fine-tuning WAF rules to the latest security threats.” WafCharm automatically customizes WAF rules based on their applications and system, and continuously adjusts and manages them. Users can now focus on business operations with fewer security worries as WafCharm takes care of: building, testing and tuning rules; researching vulnerabilities, and creating new rules. “Deploying and operating WAF without a purpose-built tool like WafCharm is a time- and resource-intensive operation. And companies with limited resources are not able to respond immediately when problems happen,” said Yosuke Matsuura, Infrastructure Team Leader of CAST PLATFORM at Hachidori, Inc., developer of chatbot and shift and attendance tools. “With CSC’s WafCharm, we've been able to maximize WAF's security features in a hassle-free way. I highly recommend it to anyone deploying WAF.”

Read More

Cyber-related ransomware and business interruption top concerns of risk managers

prnewswire | October 19, 2020

Zurich North America Insurance and Advisen Ltd. has released the tenth annual Advisen cyber survey of corporate risk managers and insurance buyers revealing current views about information security and cyber risk management. This year's survey features the highest percentage of cyber insurance buyers ever – nearly 80 percent carry some level of cyber insurance (55 percent of respondents with cyber coverage have a stand-alone policy). This take-up rate for cyber insurance has steadily climbed since 2011, the first year of the survey, when just 34 percent of respondents bought some type of cyber coverage.

Read More

DATA SECURITY

Online Gaming is according to Nexusguard Research, a hotbed for DDoS attacks

businesswire | December 15, 2020

The expansion in web based gaming stood out from assailants, coming about in almost 77% of digital assaults focusing on internet gaming and betting enterprises in Q3 2020, as per the Nexusguard Q3 2020 Threat Report. In excess of 33% of these amusement assaults zeroed in on internet gaming targets. Nexusguard experts likewise revealed a 287% expansion altogether DDoS assaults in the second from last quarter contrasted with a similar period a year ago. Web based gaming stages' affectability to idleness and accessibility issues makes them ideal DDoS assault targets, and the internet gaming climate is target-rich for culprits to underwrite during the pandemic. The lockdown and social separating measures upheld during the pandemic caused commitment in home diversion—internet gaming, specifically—to take off while films, bars and other regular amusement scenes stayed shut. Gamers have become a powerful objective for aggressors, especially in light of the fact that they are genuinely connected with, socially dynamic, and regularly spend discretionary cashflow on their gaming accounts. Albeit web based gaming is profoundly touchy to idleness and bundle misfortune, Nexusguard scientists caution delicate discovery and high-limit alleviation alone are inadequate to defeat enormous DDoS assaults. Gaming ventures and specialist organizations should team up to battle assault strategies through a blend of innovation, information sharing and best security rehearses. “Online gaming is snowballing in part due to the growth of cloud computing as well as the limited options for home entertainment during the pandemic, providing cyber attackers with a wide population of targets to exploit,” said Juniman Kasman, chief technology officer for Nexusguard. “Game service providers, CSPs and other organizations should take steps to safeguard service, including segregating applications to minimize collateral damage or rehearsing incident response drills to reduce service disruption during attacks.” Concerning internet gaming, 99.5% of digital assaults were volumetric in nature, with 99.4% of assaults comprising of single vector assaults. Culprits expect to devour all transmission capacity so gamers endure the symptoms of idleness and afterward change to game worker has with quicker and more steady network. Nexusguard's DDoS danger research provides details regarding assault information from botnet examining, honeypots, CSPs and traffic moving among aggressors and their objectives to assist organizations with distinguishing weaknesses and remain educated about worldwide network protection patterns. Peruse the full Nexusguard Q3 2020 Threat Report for additional subtleties. About Nexusguard Founded in 2008, Nexusguard is a leading cloud-based distributed denial of service (DDoS) security solution provider fighting malicious internet attacks. Nexusguard ensures uninterrupted internet service, visibility, optimization and performance. Nexusguard is focused on developing and providing the best cybersecurity solution for every client across a range of industries with specific business and technical requirements. Nexusguard also enables communications service providers to deliver DDoS protection solution as a service. Nexusguard delivers on its promise to provide you with peace of mind by countering threats and ensuring maximum uptime. Visit www.nexusguard.com for more information.

Read More