DATA SECURITY

Synack launches an app store experience for more flexible, smarter cybersecurity solutions

Synack | October 20, 2021

Synack, the premier crowdsourced platform for on-demand security expertise, today is giving customers the easiest, most flexible and most innovative approach for deploying critical cybersecurity solutions to defend against today's digital threats.

Synack Campaigns  empowers organizations with on-demand access to a community of 1,500 skilled and trusted ethical hackers to perform a range of tasks, from targeted security checks to cloud configuration assessments. Customers can take advantage of Campaigns through the Synack Catalog, which provides customers with an app store-like experience, to deploy Security Operations activities.

These additions complement Synack's market-leading approach to crowdsourced cybersecurity with unparalleled abilities to integrate penetration testing — and other key security tasks — into organizations' security operations. This expansion lets customers extract more value from the Synack Platform and the Synack Red Team (SRT), Synack's network of the world's most skilled and trusted ethical hackers.

This is a game changer,Cybersecurity shouldn't ever be a one-size-fits-all solution. We're expanding our platform to make it truly customizable, on-demand and seamless. Some customers need vigorous penetration testing while others may want a hacker to perform an emergency assessment. Now, they can do all of that on one easy-to-use platform.

Jay Kaplan, Synack CEO

SYNACK CAMPAIGNS
Synack Campaigns  give customers on-demand access to the SRT to meet specific needs and solve unique security issues. Campaigns deliver actionable security intelligence for application security, compliance, vulnerability management and more. Each Campaign consists of a group of Missions, or security tasks, which researchers perform. These can range from checking for OWASP Top 10 vulnerabilities, to cloud configuration checks, to get a hacker's perspective on an asset.

SYNACK CATALOG
The Synack Catalog allows customers to browse, launch and track Campaigns directly in the Synack Portal. It also enables organizations to take full advantage of SRT talent through the Synack Platform and gain critical security insights and knowledge to improve security across the entire enterprise.

SYNACK CREDITS
With Synack Credits, customers will have more flexibility than ever to purchase Campaigns that best suit their testing needs and take advantage of new and existing offerings at any given time. The options built into this approach mean organizations can utilize Synack's integrated and controlled platform as needed to supplement their own teams and technologies.

"It's a simple, smarter, more agile and manageable approach to security," said Peter Blanks, Chief Product Officer at Synack. "We looked at what customers needed, and we delivered. This is a better approach to cybersecurity that's the most adaptable and accessible. We'll continuously innovate at the scale and speed our clients require to accommodate the dynamic threat landscape. Ultimately, this will make organizations more secure and, as a result, improve cybersecurity for everyone."

ABOUT SYNACK:
Synack is the premier crowdsourced platform for on-demand security expertise. The Synack Platform delivers 24/7 penetration testing, vulnerability management, and vulnerability assessment from a global network of trusted researchers, enabled by smart technology, to accelerate global organizations' critical cybersecurity missions. Headquartered in Silicon Valley with regional teams around the world, Synack protects leading global banks, federal agencies, DoD classified assets, and more than $6 trillion in Fortune 500 and Global 2000 revenue. A 4-time CNBC Disruptor 50 company, Synack was founded in 2013 by former NSA security experts Jay Kaplan, CEO, and Dr. Mark Kuhr, CTO.

Spotlight

2014 was a year of high profile cloud breaches that were examples of aggressive data driven strategic cyber crime. These include the eBay hack in March, which affected 145 million eBay customers and the hacking of high profile Hollywood celebrities Apple iCloud accounts in September.

Spotlight

2014 was a year of high profile cloud breaches that were examples of aggressive data driven strategic cyber crime. These include the eBay hack in March, which affected 145 million eBay customers and the hacking of high profile Hollywood celebrities Apple iCloud accounts in September.

Related News

DATA SECURITY

CyCognito Teams with Intel 471 to Bolster Cyber Threat Intelligence Capabilities

CyCognito | December 13, 2021

CyCognito, the leading provider of external attack surface management and attack surface protection solutions, today announced that it has established a new alliance with Intel 471, a premier cybercrime intelligence provider. CyCognito addresses a fundamental security gap created when organizations use the internet to create IT ecosystems that span on-premises, cloud, partner and subsidiary environments. In licensing the threat intelligence collected by Intel 471, CyCognito is further enabling enterprise customers to strengthen their cybersecurity postures through the proactive detection and containment of targeted and advanced threats. “CyCognito is committed to helping businesses prevent breaches by providing them with unparalleled attack surface visibility, data exposure, and risk detection across previously unknown and unmanaged assets,Our partnership with Intel 471 expands these capabilities, giving us the ability to provide our customers and partners with curated data and insights around new and emerging cyber threats, that are both richer and more relevant to their businesses. This in turn will help them customize their cyber defenses and improve their ability to successfully identify and address cyber risk within their organizations.” Rob Gurzeev, CEO and co-founder of CyCognito Intel 471 CEO Mark Arena says, “As we’ve witnessed, businesses often find themselves falling behind the onslaught of threats and victim to cyber attacks—regardless of preparedness and adequate defenses. This alliance between Intel 471 and CyCognito will arm organizations worldwide with threat intelligence to combat sophisticated cybercriminals by identifying, prioritizing, and preventing attacks before they happen.” About CyCognito CyCognito solves one of the most fundamental business problems in cybersecurity: seeing how attackers view your organization, where they are most likely to break in, what systems and assets are at risk and how you can eliminate the exposure. Founded by national intelligence agency veterans, CyCognito has a deep understanding of how attackers exploit blind spots and a path of least resistance. The Palo Alto-based company is funded by leading Silicon Valley venture capitalists, and its mission is to help organizations protect themselves from even the most sophisticated attackers. It does this with a category-defining, transformative platform that automates offensive cybersecurity operations to provide reconnaissance capabilities superior to those of attackers. About Intel 471 Intel 471 empowers enterprises, government agencies, and other organizations to win the cybersecurity war using near-real-time insights into the latest malicious actors, relationships, threat patterns, and imminent attacks relevant to their businesses. The company’s TITAN platform collects, interprets, structures, and validates human-led, automation-enhanced results. Clients across the globe leverage this threat intelligence with our proprietary framework to map the criminal underground, zero in on key activity, and align their resources and reporting to business requirements. Intel 471 serves as a trusted advisor to security teams, offering ongoing trend analysis and supporting your use of the platform.

Read More

SOFTWARE SECURITY

Mandiant Recognized as a Large Provider of Cyber Security Incident Response Services by Independent Research Firm

Mandiant | December 03, 2021

-Mandiant, Inc. the leader in dynamic cyber defense and response, today announced its inclusion in the new Forrester report “Now Tech: Cybersecurity Incident Response Services, Q4 2021.” The report provides an overview of 36 cyber security incident response vendors segmented by capabilities, size, vertical focus and geographic footprint. The purpose of the report is to help security leaders better understand the value organizations can expect from incident response vendors and make more informed procurement decisions. Since 2004, Mandiant has been at the forefront of cyber security and cyber threat intelligence, enabling a deep understanding of both existing and emerging threat actors, as well as their rapidly changing tactics, techniques and procedures. Its expertise derived from more than 200,000 hours responding to attacks per year as well as its proven track record of working on large and highly publicized incidents uniquely qualifies the company to assist clients with all aspects of an incident response—from technical response to crisis management. With Mandiant, organizations can confidently investigate and remediate incidents faster and more efficiently, allowing them to quickly get back to what matters most—their business. “In today’s ever-evolving threat environment, it’s not a question of if an organization will become a target of a cyber attack, but rather when,And with attacks becoming more sophisticated, speed to detection and remediation are key to ensuring business continuity. Mandiant services combined with our cyber security SaaS platform—Mandiant Advantage—enable early threat insights, ensuring our customers can quickly identify, respond to and defend against cyber threats.” Jurgen Kutscher, Executive Vice President, Service Delivery, Mandiant About Mandiant, Inc. Since 2004, Mandiant has been a trusted partner to security-conscious organizations. Effective security is based on the right combination of expertise, intelligence, and adaptive technology, and the Mandiant Advantage SaaS platform scales decades of frontline experience and industry-leading threat intelligence to deliver a range of dynamic cyber defense solutions. Mandiant’s approach helps organizations develop more effective and efficient cyber security programs and instills confidence in their readiness to defend against and respond to cyber threats.

Read More

DATA SECURITY

To Strengthen AI-Powered XDR across MSP Security Solutions, Barracuda Selects SentinelOne

SentinelOne | January 31, 2022

Barracuda Networks, Inc., a valued partner and leading provider of cloud-first security solutions, has selected the Singularity XDR platform of SentinelOne to enable MSPs to prevent, identify, and autonomously respond to threats at machine speed with AI-powered XDR. Barracuda protects over 200,000 customers worldwide from attacks on their data and personnel. Due to SentinelOne's better API capabilities, flexible workflow integrations, and platform efficacy, Barracuda chose SentinelOne to strengthen its endpoint protection and response portfolio. Additionally, MSPs who use SKOUT Managed XDR and SentinelOne will benefit from streamlined analysis, detection, and incident reporting due to the connection. “Security teams are challenged with monitoring and protecting every edge of their network, yet are drowning in data and alerts,There aren’t enough skilled people to operate cybersecurity products at scale. Our alliance with SentinelOne will empower MSPs to stay one step ahead of attackers and address intrusion attempts in real-time.” Neal Bradbury, SVP, Barracuda MSP Organizations benefit from SentinelOne's capabilities, including more preventative measures, faster response times, and automated workflows throughout their dynamic, technology-bound perimeter. In addition, SentinelOne's AI-powered Singularity XDR platform replaces classical antivirus (AV), endpoint detection and response (EDR), next-generation antivirus (NGAV), and a variety of point solutions. “Every place where data resides is vulnerable from device to server to the cloud,” said Brandon Andrews, VP Worldwide MSP, SentinelOne. “Combining SentinelOne’s AI-powered XDR and Barracuda’s SKOUT Managed XDR helps MSPs close security gaps and simplify their cybersecurity stack, eliminating the inefficiencies associated with legacy and crowd-powered solutions.”

Read More