SessionGuardian Enterprise Reduces Work from Home Cyber-Security Threats for Businesses

prnewswire | September 21, 2020

Remote work is a fact of life. COVID-19 restrictions increase #WFH security risks. SecureReview now offers SessionGuardian Enterprise, a cost-effective cybersecurity solution for small to medium enterprises. SessionGuardian Enterprise protects the last 18 inches of the internet by plugging into existing hosted virtual machine infrastructure. The biometric AI-powered solution integrates with AWS, Azure, Citrix, VMware, and other main line virtualization platforms at significant cost savings. In 2020, SecureReview rolled out SessionGuardian. It's groundbreaking end-point protection software for sensitive data. With SessionGuardian and Session Guardian Enterprise, only an authorized user can view the document. When the user looks away, the screen blurs. If someone looks over the user's shoulder, the screen blurs. If the user points a smartphone at the screen, it blurs. Screenshots and screen shares are blocked and disabled.

Spotlight

"You think your environment is secure, but it isn't. Employees are stealing data, committing fraud, and leaking information - all putting your business at risk. How do they do it? Can you stop it? Discover more in this white paper.

So, you've got your environment set up to fend off most external attacks. That's great - except that you probably haven't begun to address the biggest threat to your business: the threat from within. Employee fraud, corporate espionage and plain old theft are constant threats to your business, and they all come from within your walls. Removable storage devices, cloud-based file sharing and Webmail, among other common technologies, give your workers free rein to steal from you and put your operation at risk. But it doesn't have to be that way."

Spotlight

"You think your environment is secure, but it isn't. Employees are stealing data, committing fraud, and leaking information - all putting your business at risk. How do they do it? Can you stop it? Discover more in this white paper.

So, you've got your environment set up to fend off most external attacks. That's great - except that you probably haven't begun to address the biggest threat to your business: the threat from within. Employee fraud, corporate espionage and plain old theft are constant threats to your business, and they all come from within your walls. Removable storage devices, cloud-based file sharing and Webmail, among other common technologies, give your workers free rein to steal from you and put your operation at risk. But it doesn't have to be that way."

Related News

DATA SECURITY

75% of IT Leaders are Unconvinced About the Security of their Web Applications

Cymatic | April 12, 2021

Today, Cymatic released new research on the state of web application security. While IT leaders tend to be somewhat confident in their existing solutions, relying on various products renders smooth adoption of emerging tools—and therefore overall cyber threat prevention—a major task. Pulse conducted a study of C-suite and VP-level executives in information technology and cybersecurity and discovered that the most common approaches to web application safety fail to engender the trust necessary for effective cyber attack protection. Among the key findings are: • While 91% of executives spend up to a third of their web app technology budget on security, privacy, and compliance activities, they continue to rely heavily on strong password standards to protect against cyber threats. • MFA, WAFs, and CAPTCHAs are the top technologies used to protect web apps, with 75%, 74%, and 63%, respectively. • Account takeovers are the threat scenarios that most concern 73% of respondents. “After spending twenty-five years spending time and money cleaning up after breaches and hackers whose creativity was still at least one step ahead of network protections, I was able to see where all the security holes are,” said Cymatic Founder and CEO Jason Hollander. “We created the CymaticONE platform to fill those holes and reduce the complexity of existing web application solutions, making it simpler and easier to defend against modern-day attack vectors.” The Cymatic platform provides universal in-session visibility and control to minimize risk across web applications, networks, and users, while also reducing network traffic loads and removing user friction. Unlike standard WAFs, which only defend against network-based threats, Cymatic employs advanced artificial intelligence and machine-learning algorithms to detect page mutations and user anomalies. The platform protects against user-generated and device-based risks such as poor credential hygiene, dark web vulnerabilities, and potentially risky devices. It is completely invisible to users, deploys in minutes, and has an absolute time-to-value. Although many respondents defined obstacles to change their existing web application firewall (WAF) installations, nearly 90% expect to reconsider their investments within the next six to 18 months. Cymatic provides the first web application firewall to combine client-side WAF protection with a proprietary vulnerability, awareness, detection, and response (VADRTM) AI engine to avoid user- and app-based threats in their tracks, making it simple for any company to bridge gaps in their installations. Unlike other products that make static decisions based on siloed threat signals, Cymatic correlates and evaluates thousands of signals around a dozen threat vectors in real-time to provide a higher level of security accuracy without compromising user experience or application efficiency. Only Cymatic provides full real-time visibility and protection against all code-injection attacks, user risk, and session fraud—all with a single line of javascript. About Cymatic Cymatic is the only company that provides a web application firewall (WAF) solution that combines client-side WAF protections with a proprietary vulnerability, awareness, detection, and response (VADRTM) engine to provide immediate and continuous in-session intelligence regarding devices, users, and locations. Cymatic's first-look, the first-strike capability is the first in the kill chain, reducing risk across applications, networks, and users while ensuring organizations comply with today's security-driven regulations. The solution is undetectable to users, deploys in minutes, and operationalizes in seconds. Cymatic is based in Raleigh, North Carolina, and has branches in California and New York.

Read More

DATA SECURITY

Safe-T Acquires CyberKick, a Provider of Privacy Solutions and SaaS Security

Safe-T | July 07, 2021

Safe-T Group Ltd., a provider of secure access solutions and intelligent data collection, announced the acquisition of CyberKick Ltd. The closing of the transaction is anticipated next week, subject to assured customary closing situations, with delivering all mandatory documents and endorsements. Its cash concern will be funded with inner cash properties. CyberKick is a supplier of Software-as-a-Service (SaaS) security and privacy tools, intended to decrease users’ susceptibility to threats when making them stronger in their online action, to stop and protect against a broad range of cyber intimidations as well as to deliver consumers with control of their accounts and organization of access to complex data. The acquisition will accompaniment Safe-T’s safe access assortments for establishments with clarifications against recognized and unidentified threats and enlarge its footmark in the remote users’ cybersecurity marketplace. Conferring to unaudited consequences provided to Safe-T, the acquired business produced revenues of around $4.2 million in 2020 and was cost-effective. CyberKick’s confidentiality solution, which was lately launched and in a little time, previously purchased by thousands of end-users, lets users to achieve their online confidentiality with a influential, safe and encoded linking, providing harmless online browsing and keeping them harmless from hackers when using indiscreet Wi-Fi networks. iShield, CyberKicks’s security solution, is a protective online security tool that recognizes, removes, and helps avoid security and data threats that occur unknowingly to many users while browsing online. The solution provides strong, complete safety from online cyber-attacks such as phishing, ransomware, malware, data scams, identity theft, and viruses, all on the internet gateway contact level. By recognizing the dangers and blocking the gateway in advance, the solution secures consumers before any harm is done. About CyberKick CyberKick was built to fight that battle to make the internet a safer place for everyone. CyberKick has a talented and ambitious team of developers who work in harmony together with experienced product enthusiasts to complete its mission a reality. CyberKick’s products consist of two critical fields of cybersecurity are Online Cyber Security and Online Privacy Protection About Safe-T Group Ltd Safe-T Group Ltd. (Nasdaq, TASE: SFET) is a provider of access solutions and intelligent data collection. We also offer competent data collection cloud service based on our world’s fastest and most advanced & secured business proxy network, enabling clients to collect accurate, transparent, & sensitive data from public online sources.

Read More

DATA SECURITY

Elisity to Close $26-Million Round for Cognitive Trust CyberSecurity Platform

Elisity | June 17, 2021

The new platform for behavior and identity-based enterprise cybersecurity, Elisity, Inc., the pioneer of Cognitive Trust™, has announced a Series A funding round totaling $26 million. It is co-led by AllegisCyber Capital and Two Bear Capital. Atlantic Bridge, the previous seed investor, is participating. The present subsidizing will scale Elisity to satisfy customer needs for its cloud-delivered cybersecurity stage that can investigate the identity and context of individuals, applications, and gadgets—including IoT and OT—any place they're working. The platform can comprehend, engage and progressively adjust security from the edge to the cloud by learning conduct to review hazards, consequently and constantly streamline security assurance. Elisity is the principal organization to offer a solitary online protection stage that is adequately astute to see how resources and individuals associate past corporate edges and powerfully adjust security for each client, gadget, information, and application from the edge to the cloud. Elisity's Cognitive Trust stage wires character and AI-driven social insight to ceaselessly evaluate hazard and quickly upgrade access, availability, and security arrangements that follow resources and individuals any place they go. Elisity helps endeavor class associations, everything being equal, and ventures get through the present siloed systems administration and-security bunch difficulties by incorporating resource the board, availability, and security. Three co-founders began Elisity: Burjiz Pithawala, chief product officer; Sundher Narayan, chief architect; and Srinivas Sardar, vice president of engineering, who all previously held leadership roles product development, engineering, and architecture at Cisco. The chief group is driven by James Winebrenner, CEO, who drove the go-to-market procedure for Viptela from pre-dispatch through the deal to Cisco in 2017, having additionally held influential leader positions at Cisco, Aviatrix, and Checkpoint Software. Strategic advisors include security and networking leaders such as Greg Akers (former SVP Advanced Security Research and Governments at Cisco), Khalid Raza (co-founder of Viptela and CEO and founder of Graphient), Brian Long (co-founder and managing partner at Atlantic Bridge and on Elisity's Board of Directors), and Jeff Tantsura (Internet Architecture Board). Spencer Tall and Mike Goguen will join Brian Long on the Elisity board due to today's transaction. About Elisity Elisity understands behaviors and identity to simplify connectivity, asset and user access, and security from the initiative edge to the cloud. Elisity invented the AI-powered Cognitive Trust platform to learn behavior, measure risk enthusiastically, and promptly adapt apparent access policies for people, devices, data, and applications. Elisity is based in San Jose. The company is backed by AllegisCyber Capital, Two Bear Capital, and Atlantic Bridge.

Read More