SOFTWARE SECURITY

Talon Launches First Corporate Secure Browser for the Hybrid Work Era Backed by Renowned Cyber Security Industry Leaders

Talon | October 08, 2021

Talon Cyber Security, the leader in browser-based security solutions for the distributed workforce, launched TalonWork, a first-of-its-kind browser-based endpoint solution created to address the unique threats imposed by the hybrid workforce and designed with employee experience in mind.

Talon also announced investment from top cyber security global leaders: George Kurtz, CEO of CrowdStrike, John Thompson, until recently Microsoft's Chairman of the Board and former CEO of Symantec, and Mark Anderson, CEO of Alteryx and previously the President of Palo Alto Networks.

"Today's work from anywhere world demands a flexible and secure working environment, and as a result, modern security must be frictionless by design," said George Kurtz, co-founder and CEO of CrowdStrike. "Talon's browser-based security solution takes a fresh approach, putting the user experience front and center while extending the security of the enterprise."

Talon is working with some of the largest employers in the US to protect their evolving global hybrid workforce via its unique patent-pending technology. Talon's corporate browser can be deployed across the organization in less than an hour, empowering security leaders to make the browser their first line of defense with minimum complexity, cost and without additional hardware. With hassle-free operation, Talon allows organizations to better secure and control access to sensitive data and resources, accelerates onboarding in multiple work scenarios and enables rapid and efficient endpoint disaster recovery.

"With the shift towards a hybrid workforce, more known and unknown devices are accessing the organization's most sensitive data on premise and in the cloud. Therefore, we must ensure frictionless and secure access to the data, no matter the device or the employee location. Talon provides exactly that," explained John Thompson, recent former Microsoft Chairman.

"It is equally important that the next generation of cyber solutions are designed for ease of use, and optimized for a remote work environment," explained Mark Anderson, former President of Palo Alto Networks. "In this regard, Talon's solution is spot on."

The workforce revolution and increasing reliance on SaaS services, accelerated by the pandemic, made the browser a main gateway to the organization. The browser is also the most vulnerable application according to CVE; and the industry has witnessed info-stealers extracting credentials stored in browsers, malicious extensions stealing corporate data and browser zero-days exploited in the wild. Earlier this month, Google issued a critical fix for 2 billion Chrome users, Chrome's 11th 'zero day' exploit reported this year. On top of it all, malicious downloads and phishing attacks, which are the means for ransomware, are most likely to occur in the browser, where the user is more susceptible to these attacks.

Talon's multi-layered approach provides enterprise-grade security regardless of the endpoint: resilience against malware on the device, browser hardening against zero-day exploits and data leakage prevention mechanisms integrated in the browser. With Talon, security leaders gain full context-aware visibility into all work-related activity in the browser, gaining better control and governance across sanctioned and unsanctioned SaaS services as well as internal web applications.

To enable this instant shift to distributed workforce, many organizations were forced to quickly patch security gaps using their current IT stack. Talon offers a new and first to market approach and a strategic alternative that is practical and more sustainable,We are honored to have the leaders who shaped the face of cybersecurity on board with us, sharing our vision and mission.

Ofer Ben Noon, Talon's Co-founder and CEO

About Talon Cyber Security 
Talon Cyber Security is the pioneer in cyber security solutions for the hybrid workforce. Talon's browser-centric security approach is redefining enterprise cyber security by making the browser the organization's first-line of defense and leveraging it to enable and secure the distributed workforce. Deployed in less than one-hour, Talon provides security leaders with unprecedented visibility into all employee corporate activity across locations, devices and SaaS services. Talon's technology is built with employee-experience and privacy in mind, providing a native and frictionless experience, on top of superior enterprise-grade security. Talon's founders include proven entrepreneurs and former leaders of Unit 8200, Israel's elite military technology and intelligence unit.

Spotlight

For the third consecutive year, Keyfactor and The Ponemon Institute have collaborated on the State of Machine Identity Management report —an in-depth look at the role of PKI and machine identities in establishing digital trust and securing modern enterprises. This year’s report provides an analysis of 1,280 survey responses from

Spotlight

For the third consecutive year, Keyfactor and The Ponemon Institute have collaborated on the State of Machine Identity Management report —an in-depth look at the role of PKI and machine identities in establishing digital trust and securing modern enterprises. This year’s report provides an analysis of 1,280 survey responses from

Related News

PLATFORM SECURITY, SOFTWARE SECURITY, CLOUD SECURITY

Orca Security is First CNAPP to Integrate with Microsoft Azure OpenAI GPT-4

Businesswire | May 05, 2023

Orca Security, the pioneer of agentless cloud security, today announced its full integration with Microsoft Azure OpenAI GPT-4. The integration builds on the ChatGPT implementation in the Orca Cloud Security platform announced in January and makes it the first cloud-native application protection platform (CNAPP) to support GPT-4 through the Azure OpenAI Service. In addition to the integration, Orca announced several new features for its ChatGPT integration. The Microsoft Azure OpenAI Service provides REST API access to OpenAI's ChatGPT technology. With this new Microsoft integration, Orca Security customers can benefit not only from the greatly improved functionality in GPT-4, but also from the security and enterprise support that Microsoft provides. This includes the benefits of privacy of customer data submitted to the service, compliance with key regulations such as HIPAA and SOC2, an uptime SLA of 99.9%, and regional availability for lower latency and increased reliability. Since introducing GPT-3 support in the Orca Platform in January, customers have used it to dramatically reduce their mean-time-to-remediation (MTTR). Security practitioners can instantly generate high-quality remediation instructions for each alert straight from the Orca Platform. These instructions can simply be copied and pasted into platforms such as Terraform, Pulumi, AWS CloudFormation, AWS Cloud Development Kit, Azure Resource Manager, Google Cloud Deployment Manager, and Open Policy Agent. If more information is needed, users can ask ChatGPT follow-up questions directly from the Orca Platform. With the transition to GPT-4, customers will benefit from the model’s improved accuracy as well as its ability to generate code snippets. “The customer response to our integration with GPT has been incredibly positive,” said Gil Geron, CEO at Orca Security. “It’s been amazing to see customers embrace it in so many ways to gain dramatic efficiency improvements. With our integration with GPT-4 through the Azure OpenAI Service, we continue to improve accuracy and ensure privacy to protect our customers’ data while maximizing its benefit.” In addition to transitioning from GPT-3 to Azure OpenAI GPT-4, Orca made several other enhancements to its integration, including prompt improvements to ensure further optimization of remediation responses; a new Open Policy Agent (OPA) remediation method; and the ability to include remediation steps in Jira tickets when assigning cloud security issues. The Azure OpenAI GPT-4 integration is available immediately. To learn more, please read the blog post published today. About Orca Security Orca Security is the pioneer of agentless cloud security that is trusted by hundreds of enterprises globally. Orca makes cloud security possible for enterprises moving to and scaling in the cloud with its patented SideScanning™ technology and Unified Data Model. The Orca Cloud Security Platform delivers the world’s most comprehensive coverage and visibility of all risks across the cloud. With continuous first-to-market innovations and expertise, the Orca Platform ensures security teams quickly identify and remediate risks to keep their businesses secure. Connect your first account in minutes: https://orca.security or take the free cloud risk assessment.

Read More

DATA SECURITY, PLATFORM SECURITY, SOFTWARE SECURITY

Axonius Successfully Completes the Australian Information Security Registered Assessors Program (IRAP) Assessment

Globenewswire | May 04, 2023

Axonius, the leader in cybersecurity asset management, today announced the successful completion of the Australian Information Security Registered Assessors Program (IRAP) assessment, giving the Australian public sector confidence in the security of the Axonius Cybersecurity Asset Management solution. The Australian government recently made changes to the Securing of Critical Infrastructure Act. One of the core focus areas for the Act is Risk Analysis, which is impossible without comprehensive asset visibility. By aggregating and correlating data from all deployed IT tools, Axonius provides a holistic view of each unique asset, and the ability to more accurately assess the Risk associated with that asset. The Information Security Registered Assessors Program (IRAP) enables Australian government customers to validate that appropriate controls are in place and determine the appropriate responsibility model for addressing the requirements of the Australian government Information Security Manual (ISM) produced by the Australian Cyber Security Centre (ACSC). “Axonius continually monitors both hardware and software assets, giving government agencies the asset visibility and intelligence they need to accelerate their security programs,” said Vern Fernhout, Country Manager, Australia for Axonius. “With the IRAP assessment complete, Australian government agencies can now confidently adopt Axonius to discover security gaps and enforce security policies – two critical components of complying with new and existing government security requirements.” Axonius already works with several Australian government agencies on both the state and federal level, and completing the IRAP assessment will accelerate its ability to serve additional customers in the space. In addition to IRAP, Axonius has also been certified by the National Information Assurance Partnership (NIAP)having passed Common Criteria validation in the United States, further emphasising its commitment to the public sector. The completion of both assessments enables Axonius to help government agencies improve their cybersecurity posture and gain more visibility into their IT and security environments. To learn more about Axonius, visit the website or request a demo. About Axonius Axonius gives customers the confidence to control complexity by mitigating threats, navigating risk, automating response actions, and informing business-level strategy. With solutions for both cyber asset attack surface management (CAASM) and SaaS management, Axonius is deployed in minutes and integrates with hundreds of data sources to provide a comprehensive asset inventory, uncover gaps, and automatically validate and enforce policies. Cited as one of the fastest-growing cybersecurity startups, with accolades from CNBC, Forbes, and Fortune, Axonius covers millions of assets, including devices and cloud assets, user accounts, and SaaS applications, for customers around the world. For more, visit Axonius.com.

Read More

DATA SECURITY, ENTERPRISE SECURITY, WEB SECURITY TOOLS

Verimatrix Launches New Cybersecurity Microsite, VMX Labs and Enhanced User Experience for Extended Threat Defense

Businesswire | April 10, 2023

Verimatrix, (Euronext Paris: VMX) (Paris:VMX), the leader in powering the modern connected world with people-centered security, today announced its launch of a new cybersecurity microsite (verimatrixcybersecurity.com), a new UX for its Extended Threat Defense (XTD) product, and a new VMX Labs research team offering cyber threat advisories and insights. “I am excited to unveil a new UX for our cybersecurity product, Extended Threat Defense, along with new services from Verimatrix to help our customers secure their mobile app ecosystems, and rapidly detect and respond to threats – including zero day attacks,” said Asaf Ashkenazi, CEO at Verimatrix. “Today, most companies interact with their customers via mobile applications. If that app is compromised, the connection between the company and their customers is at risk. Verimatrix XTD protects the connection of businesses to their consumers -- and there is nothing more important than that.” Just this year, large mobile-app breaches made headlines through their new use of overlay attacks within mobile app attacks, leading users to believe they were interacting with legitimate apps when they’re really arming bad actors with sensitive information and even their personal banking details. CISOs, SOC teams, fraud departments and developers can now turn to VerimatrixCybersecurity.com for the latest information surrounding mobile app security and the extended ecosystem of connected devices and lurking threats. Today’s launch includes: New cybersecurity microsite – Verimatrix also launched VerimatrixCybersecurity.com to offer a centralized destination and resource center for its XTD cloud platform. The microsite includes a host of new resources, including videos and white papers. New VMX Labs – Led by Klaus Schenk, Verimatrix’s senior vice president of security and threat research, VMX Labs aims to provide ongoing cyber threat advisories, as well as insights and commentary from VMX Lab team members who investigate threat types and information helpful to application developers and even users. New Product UX for Verimatrix XTD - Verimatrix delivers an amazing new user experience for its Extended Threat Defense product; a revamped UX and design that allows customers to more easily prevent, detect, respond and predict threats to mobile applications and the devices that connect to the critical infrastructure. The company has expanded its detection capabilities to the network, in addition to the application and device data. New capabilities include the ability to access network risk per application to protect the connection to the company’s critical infrastructure, and this is all available now. About Verimatrix Verimatrix (Euronext Paris: VMX) helps power the modern connected world with security made for people. We protect digital content, applications, and devices with intuitive, people-centered, and frictionless security. Leading brands turn to Verimatrix to secure everything from premium movies and live streaming sports to sensitive financial and healthcare data, and mission-critical mobile applications. We enable the trusted connections our customers depend on to deliver compelling content and experiences to millions of consumers around the world. Verimatrix helps partners get to market faster, scale easily, protect valuable revenue streams, and win new business. Visit www.verimatrix.com and www.verimatrixcybersecurity.com

Read More