SOFTWARE SECURITY

Partner of FireMon and DLT Solutions to provide public sector Agile Network Security Policy Management

businesswire | December 10, 2020

FireMon, the main organization security strategy the executives organization that brings visibility, control, nimbleness, and mechanization to enterprise cloud and half and half organization infrastructure, today declared it has signed with DLT Solutions, the chief government innovation solutions aggregator. The partnership will encourage FireMon's commitment to public sector clients, simplify purchasing for government agencies, and give DLT's channel partners access to its dexterous organization security strategy the board stage's full capabilities.

As government organizations move to the cloud and zero trust networks, they must oversee security policies over increasingly heterogeneous cross breed networks. Using FireMon, they can quicken their migrations with the certainty that they will stay secure and consistent even notwithstanding increasing rates of progress. Recently, FireMon was considered basic to public security by the United States Treasury, a world class designation which points to the significance FireMon solutions play to public sector customers.

"As the public sector continues its digital transformation to modernize aging systems and infrastructure, new network security considerations and risks are introduced," said Chris Wilkinson, president, DLT Solutions, a Tech Data company. "Adding FireMon's solutions to our cybersecurity portfolio provides our channel partners and their public sector customers with an agile approach to managing network security policy that helps secure our nation's most critical networks."

"As the move to the cloud accelerates, government agencies are challenged with securing complex hybrid networks and implementing zero trust architectures," said Andrew Warren, VP of Global Channel Sales for FireMon. "Working with DLT and its partners, FireMon lets them secure these networks seamlessly, without compromising agility or responsiveness."

About FireMon

FireMon is the only agile network security policy platform for firewalls and cloud security groups providing the fastest way to streamline network security policy management, which is one of the biggest impediments to IT and enterprise agility. Since creating the first-ever network security policy management solution, FireMon has delivered command and control over complex network security infrastructures for more than 1,700 customers located in nearly 70 countries around the world. For more information, visit www.firemon.com.

Spotlight

The Cybersecurity and Infrastructure Security Agency (CISA) leads the nation’s effort to understand, manage, and reduce cybersecurity risk, including by supporting Federal Civilian Executive Branch agencies in evolving and operationalizing cybersecurity programs and capabilities. CISA’s Zero Trust Maturity Model (ZTMM) provides an approach to achieve continued modernization efforts related to zero trust within a rapidly evolving environment and technology landscape. This ZTMM is one of many paths that an organization can take in designing and implementing their transition plan to zero trust architectures in accordance with Executive Order (EO) 14028 “Improving the Nation’s Cybersecurity” § (3)(b)(ii),1 which requires that agencies develop a plan to implement a Zero Trust Architecture (ZTA). While the ZTMM is specifically tailored for federal agencies as required by EO 14028, all organizations should review and consider adoption of the approaches outlined in this document.

Spotlight

The Cybersecurity and Infrastructure Security Agency (CISA) leads the nation’s effort to understand, manage, and reduce cybersecurity risk, including by supporting Federal Civilian Executive Branch agencies in evolving and operationalizing cybersecurity programs and capabilities. CISA’s Zero Trust Maturity Model (ZTMM) provides an approach to achieve continued modernization efforts related to zero trust within a rapidly evolving environment and technology landscape. This ZTMM is one of many paths that an organization can take in designing and implementing their transition plan to zero trust architectures in accordance with Executive Order (EO) 14028 “Improving the Nation’s Cybersecurity” § (3)(b)(ii),1 which requires that agencies develop a plan to implement a Zero Trust Architecture (ZTA). While the ZTMM is specifically tailored for federal agencies as required by EO 14028, all organizations should review and consider adoption of the approaches outlined in this document.

Related News

DATA SECURITY, PLATFORM SECURITY, SOFTWARE SECURITY

ActZero Teams with UScellular to Secure Mobile Devices from Ransomware Attacks

Prnewswire | May 18, 2023

ActZero®, a leading cybersecurity provider for small and mid-sized enterprises, announced it is teaming with UScellular, making it the first and only wireless carrier to offer the ActZero Managed Detection and Response (MDR) service. Together the two organizations make it easier for businesses to secure mobile devices from ransomware and phishing attacks. UScellular Business Ultimate and Business Premium unlimited handset plans now include ActZero MDR for Mobile. "UScellular and ActZero share a common goal: to bring better performance and better security to businesses at a fair price," said Sameer Bhalotra, chief executive officer for ActZero. "With ActZero's on-device cyberdefense technology plus 24x7 security operations staff, UScellular business customers can stop mobile threats quickly, before they spread into the corporate network." With 24/7 threat coverage, ActZero stops breaches on mobile devices and networks, with a 90% block rate and response time of 15 minutes for critical alerts. Customers can easily deploy ActZero MDR for Mobile within minutes to their employees' iOS, Android, or Chrome mobile phones, tablets, and laptops. On-device protection and real-time notifications eliminate delays if a mobile device is compromised. ActZero's patent-pending AI means better cyberdefense and fewer false alarms. "ActZero delivers a powerful and affordable cybersecurity service businesses need to prioritize threat and vulnerability management," said Kim Kerr, senior vice president, enterprise sales and operations for UScellular. "Our customers often don't have the IT resources to ensure they are protecting their network and devices from malware, phishing, and ransomware attacks. The unique artificial intelligence and machine learning from ActZero intelligently pinpoints threats so less time is spent filtering noise and more time is focused on the action that should be taken, when it's truly important." About ActZero ActZero is a Gartner-recognized provider of Managed Detection and Response (MDR) services that delivers a powerful and affordable cybersecurity service to protect small and mid-sized enterprises against ransomware attacks. By continuously testing defenses against the latest attack techniques and variants, ActZero ensures AI detections and human threat hunters quickly stop threats. The company brings deep roots and expertise in cybersecurity to deliver measurable ransomware defense, reducing false alerts and responding quickly on a customer's behalf. Combined with exceptional service, ActZero empowers businesses with confidence that the company and customers are protected. For more information, please visit actzero.com. About UScellular Business UScellular is the fourth-largest full-service wireless carrier in the United States, providing national network coverage and industry-leading innovations designed to elevate the customer experience. The Chicago-based carrier provides a strong, reliable network supported by the latest technology and plays a critical role in helping businesses of all sizes navigate the wireless ecosystem, delivering advanced technology, increased network security and reliability. To learn more about UScellular's business solutions, visit one of its retail stores or uscellular.com/business.

Read More

DATA SECURITY, PLATFORM SECURITY, SOFTWARE SECURITY

Illumio Launches Zero Trust Segmentation ROI Calculator to Help Organizations Maximize Cyber Investments

Globenewswire | April 18, 2023

Illumio, Inc., the Zero Trust Segmentation company, today launched the Illumio Zero Trust Segmentation ROI Calculator, a self-service tool that quantifies what an organization’s return on investment (ROI) on Illumio’s Zero Trust Segmentation (ZTS) platform would be, bringing more clarity into their decision-making process. In a difficult economy, organizations need to understand and be able to show the impact of every dollar they spend, and they need solutions that deliver a reliable return on investment. By answering a few simple questions related to their specific business environment, respondents will receive a written assessment of the quantitative impact Illumio ZTS would have on their organization, which will arm decision makers with data to support further investment in cybersecurity initiatives that reduce risk and increase resilience to breaches. Illumio recently commissioned a Total Economic ImpactTM of Illumio Zero Trust Segmentation (ZTS) study from Forrester Consulting, who interviewed Forrester analysts, Illumio stakeholders, and Illumio customers from organizations of varying sizes and industries to inform their findings. The study found that Illumio delivered a total benefit of $10.2 million over three years and paid for itself in six months for a composite organization. Additionally, over three years Illumio ZTS: Reduced a cyberattack’s blast radius by 66 percent by restricting lateral movement, which saved $1.8 million via decreased overall risk exposure. Drove $3 million in savings via tool consolidation and reduced firewall costs. Saved $3.8 million by limiting unplanned downtime. Increased InfoSec’s operational efficiency by $1.6 million by reducing the time and effort needed to implement security policy. Delivered 111 percent return on investment. “The security industry is moving from the prevention and detection eras to the breach containment era to minimize the impact of breaches on the broader organization,” said PJ Kirner, CTO and co-founder at Illumio. “With a challenging economy, CFOs and boards are asking security teams to quantify the return on their investments. With this ROI calculator, leaders can validate the impact ZTS would have on their specific organization, accelerating the implementation of core security strategies that augment prevention and detection technologies to reduce risk and increase resilience to breaches more quickly.” To measure the impact Illumio ZTS could have on your organization, use the Illumio Zero Trust Segmentation ROI Calculator. Learn more about The Forrester Total Economic ImpactTM of Illumio Zero Trust Segmentation here. About Illumio Illumio, the Zero Trust Segmentation Company, stops breaches and ransomware from spreading across the hybrid attack surface. The Illumio ZTS Platform visualizes all traffic flows between workloads, devices, and the internet, automatically sets granular segmentation policies to control communications, and isolates high-value assets and compromised systems proactively or in response to active attacks. Illumio protects organizations of all sizes, from Fortune 100 to small business, by stopping breaches and ransomware in minutes, saving millions of dollars in application downtime, and accelerating cloud and digital transformation projects.

Read More

ENTERPRISE SECURITY, PLATFORM SECURITY, SOFTWARE SECURITY

Check Point Software Technologies Bolsters Endpoint Security with Enhanced Posture Management to Tackle Escalating Vulnerability Exploits

Globenewswire | May 15, 2023

Check Point® Software Technologies Ltd. (NASDAQ: CHKP), a leading provider of cybersecurity solutions globally announced today the expansion of its Check Point Harmony Endpoint protections solution by incorporating vulnerability and automated patch management capabilities. This enhancement addresses the mounting number of cyberattacks that exploit unpatched system vulnerabilities for unauthorized access. To deliver this advanced feature, Check Point has joined forces with Ivanti, integrating Ivanti Patch Management to assess and remediate software vulnerabilities from cloud to edge, into Check Point's Harmony Endpoint protection solution. The National Vulnerability Database reported over 25,000 vulnerabilities in 2022, with this figure expected to rise. Furthermore, a recent Dark Reading report revealed that 57% of ransomware attacks capitalize on unpatched vulnerabilities, highlighting the necessity of addressing this issue to defend against such threats. However, vulnerability patching is often a complex and time-consuming process. Many organizations lack insight into their environment's vulnerability status, and even when they do, patching takes an average of 97 days, according a report of the Ponemon Institute. This delay provides ample opportunities for attackers to exploit these weaknesses. To tackle this challenge, Check Point is enhancing its endpoint security solution, Harmony Endpoint, with vulnerability assessment and automated patch management capabilities. This will equip Harmony Endpoint users with an intelligent, automated process that minimizes the attack surface and boosts operational efficiency by: Automatically scanning organizational endpoints with minimal performance impact Providing comprehensive visibility into the status of all devices, saving valuable time for IT and security teams Auto-patching vulnerabilities and implementing security policies to ensure a secure and uninterrupted workflow. "We are excited to enhance our endpoint security solution with vulnerability assessment and automated patch management capabilities," says Ofir Israel, VP of Threat Prevention at Check Point, "This added value complements Harmony Endpoint's existing offerings of Endpoint Protection Platform (EPP), Endpoint Detection and Response (EDR), and other advanced security features. Our customers now have the tools they need to swiftly identify and remediate vulnerabilities before they can be exploited, all from a unified platform." “We are thrilled to partner with Check Point and collaborate to offer customers the highest level of endpoint protection,” said Michelle Hodges, Senior Vice President of Global Channels and Alliances at Ivanti. “We both understand that patch management is a critical component of any cybersecurity program and enhances the overall security posture for our customers by ensuring all systems are updated with the latest application updates, fixes, and patches. At Ivanti, we are committed to providing innovative solutions that empower our partners to strengthen their businesses and safeguard our customers.” By delivering a comprehensive endpoint security solution, Check Point enables organizations to defend against a broad spectrum of cyber threats and stay ahead of the ever-evolving threat landscape. About Check Point Software Technologies Ltd. Check Point Software Technologies Ltd. (www.checkpoint.com) is a leading provider of cyber security solutions to corporate enterprises and governments globally. Check Point Infinity's portfolio of solutions protects enterprises and public organisations from 5th generation cyber-attacks with an industry leading catch rate of malware, ransomware and other threats. Infinity comprises three core pillars delivering uncompromised security and generation V threat prevention across enterprise environments: Check Point Harmony, for remote users; Check Point CloudGuard, to automatically secure clouds; and Check Point Quantum, to protect network perimeters and datacenters, all controlled by the industry’s most comprehensive, intuitive unified security management. Check Point protects over 100,000 organizations of all sizes. About Ivanti Ivanti elevates and secures Everywhere Work so that people and organizations can thrive. We make technology work for people, not the other way around. Today’s employees use a wide range of corporate and personal devices to access IT applications and data over multiple networks to stay productive, wherever and however they work. Ivanti is one of the only technology companies that finds, manages and protects each IT asset and endpoint in an organization. Over 40,000 customers, including 88 of the Fortune 100, have chosen Ivanti to help them deliver an excellent digital employee experience and improve IT and security team productivity and efficiency. At Ivanti, we strive to create an environment where all perspectives are heard, respected and valued and are committed to a more sustainable future for our customers, partners, employees and the planet. For more information, visit www.ivanti.com and follow @GoIvanti.

Read More