DATA SECURITY, PLATFORM SECURITY, SOFTWARE SECURITY
Lookout | January 31, 2023
Lookout, Inc., a business specializing in endpoint-to-cloud security, has announced enhanced capabilities and feature updates to its award-winning Lookout Cloud Security Platform, the only endpoint-to-cloud security solution available on the market. In addition to cloud, internet, and private applications, the cloud-native platform now includes a single policy architecture for administration and enforcement across all mobile devices.
A single agent and a single control plane for mobile and cloud security services are also new platform upgrades, providing IT and security professionals with a cost-effective, streamlined administration experience. In addition, the Lookout Cloud Security Platform combines security service edge (SSE) with endpoint security to secure users and data regardless of location.
It constantly monitors the risk posture of devices and users to provide dynamic and granular zero-trust access based on the sensitivity level of applications and data. As a result, it enables organizations to protect their workers, devices, applications, and data from unauthorized access and modern internet-based threats. In addition, the extended platform enables clients to make more educated choices about cloud security services using threat data from mobile endpoints.
Lookout CEO, Jim Dolce, said, "Digital transformation and the significant adoption of the cloud have accelerated remote work and the use of mobile and unmanaged devices, which in turn exposes organizations to new security gaps that are ripe for exploitation from bad actors." He added, "Lookout's mission is to secure and empower the digital future where mobility and cloud are essential to all that we do for work and play; our endpoint to cloud security platform ensures that your data is protected – regardless of device, user or location."
(Source – PR Newswire)
The Award-Winning Lookout Platform
The Lookout Cloud Security Platform integrates security services based on the company's unique technologies:
Lookout Secure Private Access
Lookout Secure Cloud Access
Lookout Mobile Endpoint Security
Lookout Secure Internet Access
About Lookout, Inc.
Lookout, Inc. is a cybersecurity firm that merges endpoint security with SASE technology to protect data while maintaining user privacy. Its single, cloud-native security platform protects data across devices, applications, networks, and clouds—a solution as fluid and adaptable as the current digital environment. Giving companies and people more control over their data empowers them to maximize its value and flourish. Lookout is trusted by organizations of all sizes, government agencies, and millions of individuals to safeguard sensitive data, allowing them to live, work, and connect freely and securely.
Read More
PLATFORM SECURITY,SOFTWARE SECURITY
Phosphorus | December 13, 2022
Phosphorus, the leading provider of proactive and full-scope security for the extended Internet of Things (xIoT), today announced new security features that will enable organizations to discover and monitor their networks for the presence of xIoT devices that the U.S. government deems a significant security risk. The new features also include the capability to remotely disable and remove the devices from the network.
Phosphorus’s security update follows the FCC’s ban on the sale or importation of devices made by several Chinese manufacturers that it considers to pose “an unacceptable risk to national security of the United States or the security or safety of United States persons.” The Covered List includes video surveillance and telecommunications equipment produced by Huawei Technologies, ZTE Corporation, Hytera Communications, Hangzhou Hikvision Digital Technology, and Dahua Technology (and their subsidiaries and affiliates).
“The Phosphorus xIoT Security Platform is the industry’s only solution that can discover the presence of these prohibited devices and remotely render them inert at scale. “These unique capabilities will empower enterprises and government organizations across the U.S. to discover, disable, and remove banned or potentially dangerous devices from their enterprise environments.”
John Vecchi, Chief Marketing Officer at Phosphorus
Advanced Discovery Capability
A recent study by Phosphorus’s global research division, Phosphorus Labs, found that organizations consistently struggle to identify all of their xIoT devices – this means many companies may not realize they have banned devices lurking inside their networks. According to its research, 80% of enterprise security teams can’t identify the majority of their xIoT devices and customer estimates of xIoT inventories are consistently off by 40-60%.
Phosphorus’s Enterprise xIoT Security Platform has unique capabilities for discovering xIoT assets, and it is the only technology platform able to communicate with these devices (ranging from security cameras to PLCs) in their native languages. This enables a high degree of accuracy, granularity, and speed when discovering and analyzing these devices to create comprehensive inventories of xIoT assets that include device type, brand, model, firmware version, credential status, default/enabled protocols, certificate status, and more.
Disabling and Isolating High-Risk Devices
Phosphorus empowers organizations by giving them direct control over every single device in their wide-ranging xIoT deployments. Through the platform’s Hardening and Remediation capabilities, organizations can update and rotate a device’s credentials, manage firmware, disable remote services, turn off unnecessary connectivity features, check for valid certificates, and reboot the device.
For organizations that have detected banned xIoT technologies in their networks, specific device-level actions such as changing passwords, disabling services and reducing connectivity will be critical for limiting the potential risks of these devices prior to their removal from the network.
World’s First and Only Proactive xIoT Security Platform
Phosphorus’s Enterprise xIoT Security Platform is the industry’s only consolidated xIoT security offering, delivering state-of-the-art Attack Surface Management, Hardening and Remediation, and Detection and Response across the full range of IoT, OT, and Network-connected devices – spanning both new and legacy devices.
For the first time in industry history, teams in IT, Facilities, and Security are able to collaborate on a single platform to safely discover, assess, remediate, and monitor their xIoT devices. Phosphorus is now the solution of choice for enterprises to secure devices that were previously unknown or overlooked, beginning with fundamental xIoT security hygiene.
The company’s Enterprise xIoT Security Platform is currently deployed in Fortune 100, Fortune 500, and government networks.
ABOUT PHOSPHORUS
Phosphorus Cybersecurity® is the leading xTended Security of Things™ platform designed to secure the rapidly growing and often unmonitored Things across the enterprise xIoT landscape. Our Enterprise xIoT Security Platform delivers Attack Surface Management, Hardening & Remediation, and Detection & Response to bring enterprise xIoT security to every cyber-physical Thing in your enterprise environment. With unrivaled xIoT discovery and posture assessment, Phosphorus automates the remediation of the biggest IoT, OT, and Network device vulnerabilities—including unknown and inaccurate asset inventory, out-of-date firmware, default credentials, risky configurations, and out-of-date certificates.
Read More
ENTERPRISE SECURITY,PLATFORM SECURITY,SOFTWARE SECURITY
Nozomi Networks | January 25, 2023
On January 24, 2023, Nozomi Networks Inc., one of the leaders in OT and IoT security, announced Nozomi ArcTM, the industry's first IoT and OT endpoint security sensor, intended to accelerate time to full operational resilience exponentially. Nozomi Arc is designed to automatically deploy across a large number of locations and devices anywhere a company needs visibility, and it provides vital data and insights about essential assets and network endpoints. This data is utilized to better analyze and prevent attacks, as well as correlate user behavior, without straining existing resources or interrupting mission-critical networks.
Arc is a game-changer in terms of comprehensive asset visibility, deployment speed, and network coverage across complex and remote OT and IT networks. Nozomi Arc is designed to:
Be deployed remotely
Analyze endpoint vulnerabilities
Accelerate monitoring deployments in mission-critical systems; and
Identify compromised hosts
Nozomi Networks Co-founder and CPO, Andrea Carcano, said, "Operational resiliency is the top business priority for critical infrastructure organizations, which can only be achieved by lowering cyber risks and increasing security." He added, "Nozomi Arc accelerates time to resiliency by transforming every computer on the network into an OT security sensor. It quickly extends visibility to attack surfaces and threats inside endpoint hosts and their local networks. With Nozomi Arc, users can quickly corollate more information from more sources for better diagnostics and faster time to response."
(Source – GlobeNewswire)
With Nozomi Arc, users get the following advantages:
Faster time to resiliency: Nozomi Arc removes time, resource, geographic, and internal policy limits from network-based deployments.
Lower cyber risk and increased security: The only OT solution in the market that can identify malicious hardware.
Extended visibility and context: In addition to illuminating additional assets, devices, and possible vulnerabilities, Arc detects process irregularities and questionable user behavior.
Lower operational overhead: Because Arc can be remotely deployed through a software download, Nozomi Arc does not need extensive network adjustments to be implemented anywhere in the world, even in the most remote locations.
About Nozomi Networks
Nozomi Networks, with headquarters in San Francisco, California, accelerates digital transformation by defending the world's critical infrastructure, industrial enterprises, and government enterprises from cyber-attacks. Its technology provides OT and IoT environments with superior network and asset monitoring, threat detection, and analytics. As a result, customers rely on the company's solution to reduce risk and complexity while increasing operational resiliency. In addition, the organization provides zero-trust security by delivering contextual data for policy decisions, such as endpoint posture checks, baseline monitoring, and device role data.
Read More