PLATFORM SECURITY, SOFTWARE SECURITY, WEB SECURITY TOOLS

ReasonLabs Unveils Dark Web Monitoring Feature As Part Of Its RAV Online Security Solution

Prnewswire | March 31, 2023 | Read time : 05:00 min

ReasonLabs Unveils Dark Web Monitoring Feature

ReasonLabs, the cybersecurity pioneer equipping families and individuals worldwide with the same level of cyber protection utilized by Fortune 500 companies, today announced the addition of a Dark Web Monitoring feature to its RAV Online Security solution, a web extension that provides real-time, 24/7 protection against a range of malicious online activity. The Dark Web Monitoring feature scans tens of thousands of combination lists, leaked databases, and malware data hidden from the surface net—the publicly accessible internet—for mentions of users' personal data, and instantly notifies users when breaches occur.

The dark web, a part of the internet that can only be accessed via an anonymizing browser and is invisible to search engines, is frequently used by cybercriminals to engage in illicit online activity. Malicious actors use the dark web to find, buy and sell user data. This can include usernames and passwords; financial information including traditional banking data, cryptocurrency wallets, and credit card numbers; and a range of personally identifiable information such as names, phone numbers, emails, social security numbers, locations, and more.

"The dark net is a hotbed of cybercrime where cyberattackers regularly find people's important personal and financial data. It is critical that users be protected at all times, which calls for monitoring the dark web for data breaches and alerting users immediately as and when breaches occur," said Kobi Kalif, CEO of ReasonLabs. "ReasonLabs' Online Security tool, is fully integrated with RAV Endpoint Protection and is now equipped with the Dark Web Monitoring capability, The extension scans both the surface net and dark web around the clock to identify malicious activity impacting our users to ensure they are always protected."

"As technology progresses, our digital presence becomes increasingly important as we store valuable information and financial assets online. Unfortunately, the risk of exposure also increases, making it crucial to promptly detect any leaks and take appropriate action to prevent negative consequences in the real world," said Omri Gabai, VP Security Products at ReasonLabs. "That's why we've made the decision to offer our users a critical tool for monitoring the dark web."

RAV Online Security protects against threats on the surface net such as URLs, phishing, harmful extensions, suspicious downloads, intrusive cookies and trackers, unauthorized notifications, and pop-ups. Dark Web Monitoring scans keep users up-to-date on any data breaches they may be involved with, and users receive an alert once a new breach occurs. RAV Online Security has more than five million users worldwide and is available as a free download.

About ReasonLabs

ReasonLabs is a global pioneer in cybersecurity detection and prevention. Powered by machine learning, ReasonLabs' cutting-edge technology is revolutionizing consumer-focused cybersecurity, bringing enterprise-grade protection into the homes of tens of millions of users worldwide. Its innovative engine scans over 2 billion files in 180 countries a day, delivering fast, comprehensive data while providing 24/7 real-time threat detection. Founded in 2016, ReasonLabs is based in New York and Tel Aviv.

Spotlight

The Cybersecurity and Infrastructure Security Agency (CISA) leads the nation’s effort to understand, manage, and reduce cybersecurity risk, including by supporting Federal Civilian Executive Branch agencies in evolving and operationalizing cybersecurity programs and capabilities. CISA’s Zero Trust Maturity Model (ZTMM) provides an approach to achieve continued modernization efforts related to zero trust within a rapidly evolving environment and technology landscape. This ZTMM is one of many paths that an organization can take in designing and implementing their transition plan to zero trust architectures in accordance with Executive Order (EO) 14028 “Improving the Nation’s Cybersecurity” § (3)(b)(ii),1 which requires that agencies develop a plan to implement a Zero Trust Architecture (ZTA). While the ZTMM is specifically tailored for federal agencies as required by EO 14028, all organizations should review and consider adoption of the approaches outlined in this document.

Spotlight

The Cybersecurity and Infrastructure Security Agency (CISA) leads the nation’s effort to understand, manage, and reduce cybersecurity risk, including by supporting Federal Civilian Executive Branch agencies in evolving and operationalizing cybersecurity programs and capabilities. CISA’s Zero Trust Maturity Model (ZTMM) provides an approach to achieve continued modernization efforts related to zero trust within a rapidly evolving environment and technology landscape. This ZTMM is one of many paths that an organization can take in designing and implementing their transition plan to zero trust architectures in accordance with Executive Order (EO) 14028 “Improving the Nation’s Cybersecurity” § (3)(b)(ii),1 which requires that agencies develop a plan to implement a Zero Trust Architecture (ZTA). While the ZTMM is specifically tailored for federal agencies as required by EO 14028, all organizations should review and consider adoption of the approaches outlined in this document.

Related News

DATA SECURITY, ENTERPRISE SECURITY, SOFTWARE SECURITY

Qumulo Bolsters Customers’ Security and Ransomware Defenses with Varonis Integration and New Snapshot-Locking Capabilities

Businesswire | May 11, 2023

Qumulo, the simple way to manage exabyte-scale data anywhere, today announced integration with the Varonis Data Security Platform and introduced their new Snapshot-Locking capability to protect customers against ransomware. With an increasing number of ransomware attacks on private businesses, public agencies, and healthcare organizations, managing cybersecurity risk is a bigger priority than ever before. The ongoing threat of cyberattacks forces IT organizations to constantly evolve their ability to detect ransomware and malware outbreaks across petabytes of data, in real time, and respond quickly to minimize the damage inflicted. Qumulo and Varonis have partnered to provide an end-to-end solution that protects Qumulo customers from ransomware in both cloud and on-premises environments. The Varonis Data Security Platform provides real-time visibility and control over cloud and on-premises data and automatically remediates risk. Varonis’ behavior-based threat models detect abnormal activity proactively and can stop threats to data before they become breaches. In the storage layer, Qumulo offers data protection by cryptographically locking snapshots, allowing administrators a simple mechanism to stop attackers from infecting valuable customer data. “Securing unstructured data can be very challenging due to its sheer volume, and the expansive number of places it is stored and used by companies,” said Kiran Bhageshpur, Chief Technology Officer, Qumulo. “Our new integration with Varonis will help our customers have complete visibility into where their most valuable data and key vulnerabilities are, especially for threats like ransomware.” The combined solution operates across three areas to protect against bad actors’ attempts to spread ransomware and malware within Qumulo: Prevention through continuous data exposure and risk monitoring with automatic remediation and least privilege enforcement Detection of anomalous activity and activity patterns that resemble ransomware across data stored in Qumulo Rapid recovery of data in the event of a successful attack Varonis uses Qumulo’s APIs and granular audit logging to monitor user logins, permissions changes, file and folder activity, and pattern detection to warn against suspicious activity that may indicate threat actors or malicious insiders. Qumulo’s Snapshot-Locking feature uses cryptographic protection, where only the customer has access to the cryptographic key-pair required to unlock the snapshot. Together, the Qumulo-Varonis solution offers enterprise IT organizations a simple, secure, and scalable way to manage data anywhere. “Organizations face an uphill climb when it comes to securing vast amounts of data across the cloud — in fact, we surveyed more than 700 companies and found that 81 percent had sensitive SaaS data exposed,” said David Bass, Executive Vice President of Engineering and Chief Technology Officer, Varonis. “We’re pleased to be teaming with Qumulo to provide greater visibility and control for companies looking to secure their critical data and proactively help mitigate the impact of a potential attack.” About Qumulo, Inc. Qumulo is the simple way to manage exabyte-scale data anywhere — edge, core, or cloud — on the platform of your choice. In a world with trillions of files and objects comprising 100+ zettabytes worldwide, companies need a solution that combines the ability to work anywhere with simplicity. This is precisely what Qumulo was founded to accomplish. About Varonis Varonis is a pioneer in data security and analytics, fighting a different battle than conventional cybersecurity companies. Varonis focuses on protecting enterprise data: sensitive files and emails; confidential customer, patient, and employee data; financial records; strategic and product plans; and other intellectual property. The Varonis Data Security Platform detects cyber threats from both internal and external actors by analyzing data, account activity, and user behavior; prevents and limits disaster by locking down sensitive and stale data; and efficiently sustains a secure state with automation. Varonis products address additional important use cases including data protection, data governance, Zero Trust, compliance, data privacy, classification, and threat detection and response. Varonis started operations in 2005 and has customers spanning leading firms in the financial services, public, healthcare, industrial, insurance, technology, consumer and retail, energy and utilities, construction and engineering, and education sectors. Qumulo, Scale Anywhere(™) and the Qumulo logo are registered trademarks or trademarks of Qumulo, Inc. All other marks and names herein may be trademarks of other companies. Copyright © 2023. All Rights Reserved.

Read More

DATA SECURITY, PLATFORM SECURITY, SOFTWARE SECURITY

WinMagic partners with Lumen Technologies to offer mission-critical cybersecurity solutions

Globenewswire | May 29, 2023

WinMagic Inc. (the "Company" or "WinMagic") is proud to announce that it is now a member of the Lumen Technologies (NYSE: LUMN) Channel Partner program. WinMagic offers powerfully simple and seamless authentication and encryption solutions that use the endpoint to deliver unbeatable security. This partnership will enable the Company to leverage Lumen’s extensive network and cloud and security solutions to expand capabilities to existing WinMagic customers and enter new markets through access to Lumen’s comprehensive partner program. As a Lumen Channel Partner, WinMagic can draw on Lumen’s integrated portfolio of global solutions to enable greater product adaptability regarding network services, infrastructure and applications. Lumen’s solutions and infrastructure, combined with WinMagic’s innovative authentication and endpoint encryption products, provide customers with a complete portfolio of cybersecurity solutions. “This is a game-changer for customers. Paired with WinMagic’s next-gen security, Lumen’s edge compute infrastructure and portfolio of advanced solutions gives customers real power,” said Sara Seegers, regional vice president of indirect channel sales at Lumen. “Customers want to scale their operations as quickly as possible. They know this is the key to increasing their efficiency and growing their business. Together, we can bring results that exceed customer expectations.” "This partnership with Lumen brings users WinMagic’s most secure authentication technology to date with an incredible user experience," said Rahul Kumar, vice president of sales at WinMagic. "Our MagicEndpoint provides real-time, continuous authentication of the user plus endpoint device without requiring any user action. This strategy delivers the ‘always verify’ element of zero-trust security. We're excited to extend our next-gen security solutions to the Lumen network." WinMagic’s MagicEndpoint passwordless authentication solution delivers preboot authentication, Windows login and passwordless authentication to online services and applications. The software’s zero-trust security design complements government and commercial environments while delivering an end-to-end secure user experience. SecureDoc endpoint encryption enables organizations to secure all their data at the same time, keeping it safe from cyberattacks without disrupting productivity. About Lumen Technologies Lumen connects the world. We are dedicated to furthering human progress through technology by connecting people, data and applications — quickly, securely and effortlessly. Everything we do at Lumen takes advantage of our network strength. From metro connectivity to long-haul data transport to our edge cloud, security and managed service capabilities, we meet our customers' needs today and as they build for tomorrow. For more information, visit www.lumen.com. About WinMagic WinMagic is a leading developer of cybersecurity solutions that, for 25 years, has raised the bar for endpoint encryption. Over 2,500 businesses and government agencies trust the company with over 3 million active licenses globally. The WinMagic authentication and encryption suite protects your company's data, on-premises or in the cloud. WinMagic delivers a seamless authentication and encryption experience that increases productivity while protecting users and data. For more information, visit www.winmagic.com.

Read More

DATA SECURITY, PLATFORM SECURITY, SOFTWARE SECURITY

Axonius Successfully Completes the Australian Information Security Registered Assessors Program (IRAP) Assessment

Globenewswire | May 04, 2023

Axonius, the leader in cybersecurity asset management, today announced the successful completion of the Australian Information Security Registered Assessors Program (IRAP) assessment, giving the Australian public sector confidence in the security of the Axonius Cybersecurity Asset Management solution. The Australian government recently made changes to the Securing of Critical Infrastructure Act. One of the core focus areas for the Act is Risk Analysis, which is impossible without comprehensive asset visibility. By aggregating and correlating data from all deployed IT tools, Axonius provides a holistic view of each unique asset, and the ability to more accurately assess the Risk associated with that asset. The Information Security Registered Assessors Program (IRAP) enables Australian government customers to validate that appropriate controls are in place and determine the appropriate responsibility model for addressing the requirements of the Australian government Information Security Manual (ISM) produced by the Australian Cyber Security Centre (ACSC). “Axonius continually monitors both hardware and software assets, giving government agencies the asset visibility and intelligence they need to accelerate their security programs,” said Vern Fernhout, Country Manager, Australia for Axonius. “With the IRAP assessment complete, Australian government agencies can now confidently adopt Axonius to discover security gaps and enforce security policies – two critical components of complying with new and existing government security requirements.” Axonius already works with several Australian government agencies on both the state and federal level, and completing the IRAP assessment will accelerate its ability to serve additional customers in the space. In addition to IRAP, Axonius has also been certified by the National Information Assurance Partnership (NIAP)having passed Common Criteria validation in the United States, further emphasising its commitment to the public sector. The completion of both assessments enables Axonius to help government agencies improve their cybersecurity posture and gain more visibility into their IT and security environments. To learn more about Axonius, visit the website or request a demo. About Axonius Axonius gives customers the confidence to control complexity by mitigating threats, navigating risk, automating response actions, and informing business-level strategy. With solutions for both cyber asset attack surface management (CAASM) and SaaS management, Axonius is deployed in minutes and integrates with hundreds of data sources to provide a comprehensive asset inventory, uncover gaps, and automatically validate and enforce policies. Cited as one of the fastest-growing cybersecurity startups, with accolades from CNBC, Forbes, and Fortune, Axonius covers millions of assets, including devices and cloud assets, user accounts, and SaaS applications, for customers around the world. For more, visit Axonius.com.

Read More