DATA SECURITY

SCADAfence Partners with Keysight Technologies To Provide Visibility and Industrial Cyber Security for OT Infrastructures

SCADAfence | September 23, 2021

SCADAfence, the global leader in cybersecurity for Operational Technology (OT) & Internet of Things (IoT) environments, today announced a partnership with Keysight Technologies, Inc. (NYSE: KEYS), a leading technology company that delivers advanced design and validation solutions to help accelerate innovation to connect and secure the world, to amplify network visibility and cybersecurity to some of the world's most complex OT networks. This new partnership will help organizations gain better control over their industrial environments and detect malicious activities, reducing risk through continuous monitoring and proactive mitigation.

As more critical network infrastructures adopt advanced automation systems to integrate their OT and SCADA technologies, securing the increased attack surface from threats has become more challenging with each attack. Managing these risks has become extremely complicated due to the fact that most OT network environments and devices are not monitored directly by security personnel. Consequently, the Industrial Control System (ICS) networks are harder to monitor and secure as they’re very diverse, and most of the time, they operate with an increased risk of industrial-specific vulnerabilities.

This new partnership between SCADAfence and Keysight will allow organizations to have amplified visibility into OT and IT networks and increased detection and response capabilities in their OT environments. SCADAfence’s non-intrusive platform for deep packet inspection (DPI) together with Keysight’s network test access points (TAPs) and Network Packet Brokers (NPB) solutions will work together to provide complete traffic visibility, security, and asset inventory management in real-time to their industrial customers.Protecting and securing OT environments from security threats and anomalies has become a top priority for the industrial sector and we provide deep packet-level visibility with accurate real-time analytics

Elad Ben-Meir, CEO of SCADAfence. 
 
"We're excited to partner with Keysight Technologies to help industrial organizations leverage both solutions for better visibility and more advanced packet information within OT environments.”

The deployment of SCADAfence and Keysight Technologies together provides increased real-time visibility into OT environments, detailed asset visibility and continuous threat detection for oil and gas facilities, manufacturing sites, water and wastewater environments, automotive, and other industrial infrastructures. With the ability to collect different data across all OT environments, Keysight will be able to provide more actionable insights for customers on the threats affecting their IT environments and SCADAfence will map out the connections between IT and OT to assess the potential impacts to operational environments.

“Critical infrastructures are being targeted more than ever and are facing more security threats in the OT and IoT networks. The mitigation process can take from weeks to possibly months to patch vulnerabilities within the more complex environments,” said Taran Singh, vice president, enterprise solutions, Keysight. “Our joint-partnership with SCADAfence will allow our customers and other industrial organizations to speed up that process from weeks to a few days.”

About SCADAfence:
SCADAfence is the global technology leader in OT & IoT cybersecurity. SCADAfence offers a full suite of industrial cybersecurity products that provides full coverage of large-scale networks, offering best-in-class network monitoring, asset discovery, governance, remote access, and IoT device security. A Gartner “Cool Vendor” in 2020, SCADAfence delivers proactive security and visibility to some of the world’s most complex OT networks, including the largest manufacturing facility in Europe. SCADAfence enables organizations in critical infrastructure, manufacturing, and building management industries to operate securely, reliably, and efficiently.

Spotlight

Hybrid work changes the way people use applications. In this video, learn about how Netskope Cloud Firewall delivers the protection you need everywhere your business operates.

Spotlight

Hybrid work changes the way people use applications. In this video, learn about how Netskope Cloud Firewall delivers the protection you need everywhere your business operates.

Related News

DATA SECURITY, PLATFORM SECURITY, SOFTWARE SECURITY

Illumio Launches Zero Trust Segmentation ROI Calculator to Help Organizations Maximize Cyber Investments

Globenewswire | April 18, 2023

Illumio, Inc., the Zero Trust Segmentation company, today launched the Illumio Zero Trust Segmentation ROI Calculator, a self-service tool that quantifies what an organization’s return on investment (ROI) on Illumio’s Zero Trust Segmentation (ZTS) platform would be, bringing more clarity into their decision-making process. In a difficult economy, organizations need to understand and be able to show the impact of every dollar they spend, and they need solutions that deliver a reliable return on investment. By answering a few simple questions related to their specific business environment, respondents will receive a written assessment of the quantitative impact Illumio ZTS would have on their organization, which will arm decision makers with data to support further investment in cybersecurity initiatives that reduce risk and increase resilience to breaches. Illumio recently commissioned a Total Economic ImpactTM of Illumio Zero Trust Segmentation (ZTS) study from Forrester Consulting, who interviewed Forrester analysts, Illumio stakeholders, and Illumio customers from organizations of varying sizes and industries to inform their findings. The study found that Illumio delivered a total benefit of $10.2 million over three years and paid for itself in six months for a composite organization. Additionally, over three years Illumio ZTS: Reduced a cyberattack’s blast radius by 66 percent by restricting lateral movement, which saved $1.8 million via decreased overall risk exposure. Drove $3 million in savings via tool consolidation and reduced firewall costs. Saved $3.8 million by limiting unplanned downtime. Increased InfoSec’s operational efficiency by $1.6 million by reducing the time and effort needed to implement security policy. Delivered 111 percent return on investment. “The security industry is moving from the prevention and detection eras to the breach containment era to minimize the impact of breaches on the broader organization,” said PJ Kirner, CTO and co-founder at Illumio. “With a challenging economy, CFOs and boards are asking security teams to quantify the return on their investments. With this ROI calculator, leaders can validate the impact ZTS would have on their specific organization, accelerating the implementation of core security strategies that augment prevention and detection technologies to reduce risk and increase resilience to breaches more quickly.” To measure the impact Illumio ZTS could have on your organization, use the Illumio Zero Trust Segmentation ROI Calculator. Learn more about The Forrester Total Economic ImpactTM of Illumio Zero Trust Segmentation here. About Illumio Illumio, the Zero Trust Segmentation Company, stops breaches and ransomware from spreading across the hybrid attack surface. The Illumio ZTS Platform visualizes all traffic flows between workloads, devices, and the internet, automatically sets granular segmentation policies to control communications, and isolates high-value assets and compromised systems proactively or in response to active attacks. Illumio protects organizations of all sizes, from Fortune 100 to small business, by stopping breaches and ransomware in minutes, saving millions of dollars in application downtime, and accelerating cloud and digital transformation projects.

Read More

NETWORK THREAT DETECTION, SOFTWARE SECURITY

ZeroFox Partners with Google Cloud to Disrupt Phishing Attacks and Malicious URLs

Globenewswire | April 11, 2023

Delivering on its mission to make the digital world a safer place, ZeroFox, a leading external cybersecurity provider is partnering with Google Cloud to disrupt phishing campaigns by quickly warning users of malicious URLs and fake websites. ZeroFox is utilizing the Google Cloud Web Risk Submission API, a service that verifies unsafe URLs and shows warnings across 5 billion devices using browser, social media, and other technology integrations. According to APWG, there has been an almost 75% increase in unique phishing websites detected in the last year. As the recognized leader in digital risk protection and domain takedowns serving over 2,000 global enterprises and brands, ZeroFox leverages deep expertise and advanced AI to rapidly uncover and take down malicious domains used in phishing attacks. With this new integration, ZeroFox automatically detects phishing domains for customers and submits verified, malicious URLs through Google Cloud’s Web Risk Submission API, disrupting attacks and warning users of malicious content on billions of devices using browser warnings. ZeroFox finds what others miss by leveraging global intelligence collection and analysis across a broad set of data sources, delivering continuous domain monitoring to accurately detect instances of phishing and fraud. Combined with the scope and scale of Web Risk, which warns users of malicious domains across five billion devices, users will have unmatched protection against a wide range of digital threats. “Partnering with an industry leader such as Google Cloud to support the Google Cloud Web Risk Submission API further demonstrates that ZeroFox is an innovative leader in protecting organizations beyond the perimeter,” said James C. Foster, Founder and CEO of ZeroFox. “External cyber threats are only growing more prevalent as the world becomes increasingly digital, creating an increased need for external cybersecurity. This partnership aligns well with our strategy of partnering with a global network of partners to defend against these threats and accelerate the disruption of malicious actors from hours and days to minutes.” “Securing cloud environments and devices from cyber threats is critical,” said Jenn Buchanan, Product Manager at Google Cloud. “We are happy to partner with ZeroFox to protect against malicious digital activity and make the internet a safer place.” ZeroFox will be onsite at RSAC, visit Booth #1527 to learn more about this partnership and our unified external cybersecurity platform. This partnership with ZeroFox and Google Cloud’s Web Risk Submission API service is operational as of January 2023. About ZeroFox ZeroFox, an enterprise software-as-a-service leader in external cybersecurity, has redefined security outside the corporate perimeter on the internet, where businesses operate, and threat actors thrive. The ZeroFox platform combines advanced AI analytics, digital risk and privacy protection, full-spectrum threat intelligence, and a robust portfolio of breach, incident and takedown response capabilities to expose and disrupt phishing and fraud campaigns, botnet exposures, credential theft, impersonations, data breaches, and physical threats that target your brands, domains, people, and assets. Join thousands of customers, including some of the largest public sector organizations as well as finance, media, technology and retail companies to stay ahead of adversaries and address the entire lifecycle of external cyber risks.

Read More

PLATFORM SECURITY, SOFTWARE SECURITY, CLOUD SECURITY

Keeper Security Launches Multi-Cloud Password Rotation, Enabling Organizations to Update Privileged Credentials Automatically

Prnewswire | May 25, 2023

Keeper Security, the leading provider of cloud-based zero-trust and zero-knowledge cybersecurity software protecting passwords, secrets, connections and privileged access, today announced the launch of password rotation, a new feature that allows organizations to securely rotate service accounts and other privileged credentials on-demand or on an automated schedule. Keeper's new password rotation capability enables organizations to automate the changing and resetting of system credentials including Active Directory service accounts, Azure AD accounts, AWS IAM accounts, SSH keys, database passwords, Windows local users, Linux users, Mac users and more. Password rotation is the latest enhancement to Keeper's next-generation Privileged Access Management (PAM) solution. Recognized as the 2023 Gold Winner by the Cybersecurity Excellence Awards and named Most Comprehensive PAM Solution by the Global Infosec Awards, KeeperPAM is revolutionizing privileged access management by providing comprehensive PAM capabilities including enterprise-grade password, secrets and connection management in one unified platform. With the addition of automated password rotation, KeeperPAM's capabilities continue to grow. KeeperPAM was designed to address the cybersecurity industry's growing demand for modern solutions that are cost-effective, easy to implement and engaging for end users. Keeper's recent Privileged Access Management Survey: User Insights on Cost & Complexity revealed that more than half of all IT and security leaders (56%) have tried to deploy a traditional PAM solution but never fully implemented it. Of those, a staggering 92% said it was because the solution was too complex. Unlike traditional PAM solutions, Keeper's Password Rotation architecture is managed through the cloud-based vault and admin console interface, with a lightweight component that's installed in the customer's cloud and on-prem environment, called the Keeper Gateway service. The Gateway service and Keeper's new multi-cloud routing infrastructure does not require security teams to make any firewall changes, and it uses native protocols for implementing rotation. "Administrative passwords must be updated regularly and automatically to reduce the risk of password-based breaches and cyberattacks. Traditional PAM tools with password rotation capabilities are often expensive and difficult to deploy," said Craig Lurey, CTO and co-founder of Keeper Security. "This leaves organizations that cannot afford or have never fully deployed those solutions vulnerable. We are excited to help minimize this risk with an affordable, modern and elegant solution that protects every user and every device in an organization." Password rotation enables customers to: Automatically rotate credentials for machines, service accounts and user accounts across their infrastructure, and schedule rotations to occur at any time or on-demand. Perform post-rotation actions such as restarting services or running other applications as needed. Securely store all credentials in the Keeper Vault, and control and audit access to credentials. Log all actions to Keeper's Advanced Reporting and Alerts Module (ARAM) and third party SIEM providers. Create compliance reporting on shared privileged accounts. Password Rotation through KeeperPAM is available through the web vault, desktop app for Windows/Mac/Linux and the admin console. The feature enables admins to seamlessly manage rotation for users and records, create gateways, configure cloud environments and enforce least-privilege access. Password Rotation as part of KeeperPAM supports Keeper's zero-knowledge, zero-trust architecture, which always encrypts and decrypts data at the local device level. About Keeper Security Keeper Security is transforming cybersecurity for organizations around the world with next-generation privileged access management. Keeper's zero-trust and zero-knowledge cybersecurity solutions are FedRAMP and StateRAMP Authorized, FIPS 140-2 validated, as well as SOC 2 and ISO 27001 certified. Keeper deploys in minutes, not months, and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance. Trusted by thousands of organizations to protect every user on every device, Keeper is the industry leader for best-in-class password management, secrets management, privileged access, secure remote access and encrypted messaging. Learn more at KeeperSecurity.com.

Read More