SOFTWARE SECURITY

Talon Launches First Corporate Secure Browser for the Hybrid Work Era Backed by Renowned Cyber Security Industry Leaders

Talon | October 08, 2021

Talon Cyber Security, the leader in browser-based security solutions for the distributed workforce, launched TalonWork, a first-of-its-kind browser-based endpoint solution created to address the unique threats imposed by the hybrid workforce and designed with employee experience in mind.

Talon also announced investment from top cyber security global leaders: George Kurtz, CEO of CrowdStrike, John Thompson, until recently Microsoft's Chairman of the Board and former CEO of Symantec, and Mark Anderson, CEO of Alteryx and previously the President of Palo Alto Networks.

"Today's work from anywhere world demands a flexible and secure working environment, and as a result, modern security must be frictionless by design," said George Kurtz, co-founder and CEO of CrowdStrike. "Talon's browser-based security solution takes a fresh approach, putting the user experience front and center while extending the security of the enterprise."

Talon is working with some of the largest employers in the US to protect their evolving global hybrid workforce via its unique patent-pending technology. Talon's corporate browser can be deployed across the organization in less than an hour, empowering security leaders to make the browser their first line of defense with minimum complexity, cost and without additional hardware. With hassle-free operation, Talon allows organizations to better secure and control access to sensitive data and resources, accelerates onboarding in multiple work scenarios and enables rapid and efficient endpoint disaster recovery.

"With the shift towards a hybrid workforce, more known and unknown devices are accessing the organization's most sensitive data on premise and in the cloud. Therefore, we must ensure frictionless and secure access to the data, no matter the device or the employee location. Talon provides exactly that," explained John Thompson, recent former Microsoft Chairman.

"It is equally important that the next generation of cyber solutions are designed for ease of use, and optimized for a remote work environment," explained Mark Anderson, former President of Palo Alto Networks. "In this regard, Talon's solution is spot on."

The workforce revolution and increasing reliance on SaaS services, accelerated by the pandemic, made the browser a main gateway to the organization. The browser is also the most vulnerable application according to CVE; and the industry has witnessed info-stealers extracting credentials stored in browsers, malicious extensions stealing corporate data and browser zero-days exploited in the wild. Earlier this month, Google issued a critical fix for 2 billion Chrome users, Chrome's 11th 'zero day' exploit reported this year. On top of it all, malicious downloads and phishing attacks, which are the means for ransomware, are most likely to occur in the browser, where the user is more susceptible to these attacks.

Talon's multi-layered approach provides enterprise-grade security regardless of the endpoint: resilience against malware on the device, browser hardening against zero-day exploits and data leakage prevention mechanisms integrated in the browser. With Talon, security leaders gain full context-aware visibility into all work-related activity in the browser, gaining better control and governance across sanctioned and unsanctioned SaaS services as well as internal web applications.

To enable this instant shift to distributed workforce, many organizations were forced to quickly patch security gaps using their current IT stack. Talon offers a new and first to market approach and a strategic alternative that is practical and more sustainable,We are honored to have the leaders who shaped the face of cybersecurity on board with us, sharing our vision and mission.

Ofer Ben Noon, Talon's Co-founder and CEO

About Talon Cyber Security 
Talon Cyber Security is the pioneer in cyber security solutions for the hybrid workforce. Talon's browser-centric security approach is redefining enterprise cyber security by making the browser the organization's first-line of defense and leveraging it to enable and secure the distributed workforce. Deployed in less than one-hour, Talon provides security leaders with unprecedented visibility into all employee corporate activity across locations, devices and SaaS services. Talon's technology is built with employee-experience and privacy in mind, providing a native and frictionless experience, on top of superior enterprise-grade security. Talon's founders include proven entrepreneurs and former leaders of Unit 8200, Israel's elite military technology and intelligence unit.

Spotlight

"Network IDS/IPS has long been a mainstay for detecting malicious activity and continues to be a very important piece of the security puzzle. Unfortunately for security professionals, that puzzle continues to evolve and is becoming increasingly large and complex.

The Solutionary white paper, Malware Detection with Network Monitoring, discusses  the approaches taken, and relative success, of several  intrusion detection methods, including intrusion detection systems (IDS)/intrusion prevention systems (IPS), endpoint solutions (anti-virus/anti-malware), network devices and advanced monitoring solutions."

Spotlight

"Network IDS/IPS has long been a mainstay for detecting malicious activity and continues to be a very important piece of the security puzzle. Unfortunately for security professionals, that puzzle continues to evolve and is becoming increasingly large and complex.

The Solutionary white paper, Malware Detection with Network Monitoring, discusses  the approaches taken, and relative success, of several  intrusion detection methods, including intrusion detection systems (IDS)/intrusion prevention systems (IPS), endpoint solutions (anti-virus/anti-malware), network devices and advanced monitoring solutions."

Related News

DATA SECURITY

Radiflow's New Version of CIARA - OT Risk Platform Transforms Industrial Cybersecurity

Radiflow | May 31, 2021

Radiflow has received extensive industry appreciation for its one-of-a-kind, fully IEC62443-compliant Cyber Industrial Automated Risk Analysis Platform (CIARA), enabling CISOs to optimize their cybersecurity expenditure non-intrusively simulating breach attempts in industrial automation networks and prioritizing the most effective mitigation measures. In accordance with Radiflow's ongoing mission of "Taking the guesswork out of OT cybersecurity," the latest edition of CIARA allows users to further customize their cybersecurity optimization with additional operational and budgetary criteria. Ilan Barda, CEO of Radiflow, announced the new features: "CIARA was warmly received in the market as the first-of-its-kind OT BAS solution (breach attack simulation). Since its release, we have seen an increase in demand for risk prioritization in the dynamic OT/ICS threat landscape. Our new edition responds to the critical need for data-driven decision-making. We are delighted to assist CISOs in developing the best budget-driven mitigation strategy." Users of the updated version of CIARA can now: Customize their OT-security optimization: Users can now choose from a wide range of factors to find a balance between security, compliance, and budget. CIARA prioritizes security requirements for mitigation measures (SRs) that match the chosen criterion to maximize their cybersecurity ROI. Among the current optimization criteria are: • Zone impact: What is the financial impact of a disruption in that zone? • Which zone has the lowest tolerated risk (as specified by the user)? • Which zones have the highest disparity between real security measures and those prescribed by the IEC62443 standard? New supply chain threats are included in attack simulations: Supply chain attacks, such as the SolarWinds breach, take advantage of vendor networks' vulnerabilities. In addition to the fundamental requirement control groups in IEC62443, CIARA users can now add a security control group for Supply Chain attacks (NIST 800-161) to CIARA's breach simulations, including such attack strategies prioritize the effectiveness of relevant mitigation measures. Budget and Plan : CIARA's new OT security project planner generates a complete quarterly mitigation plan based on the user's optimization preferences, balancing the estimated cost of mitigation controls against the quarterly budget constraints. About Radiflow These new features enhance Radiflow's objective to eliminate the guesswork from OT security. Radiflow is committed to assisting CISOs in prioritizing their activities by providing industrial threat detection and risk management solutions.

Read More

DATA SECURITY

NERC CIP Security Assessment Secures OT Remote Operations at XONA

XONA | April 26, 2021

XONA, the world's initial zero-trust distant activities stage for basic foundation, was discovered agreeable with NERC CIP appraisal, including an engineering survey, gadget survey, and counterfeit review. Cybersecurity has taken on restored significance in 2021 as organizations progressively depend on distant admittance to screen, survey, and connect with basic OT framework. This the truth was on full presentation in February 2021 when a programmer distantly got to a water treatment framework in Oldsmar, Florida, highlighting the potential weaknesses related with far off activities limit. XONA NERC CIP Compliance Demonstrates Readiness to Secure Against Cybersecurity Risks at Crucial Time Understanding the centrality of cybersecurity while sending distant tasks limit, XONA's review shows the organization's digital preparation. XONA's CSG apparatus was evaluated from both an inspector's and SCADA designer's points of view. Simultaneously, manual and robotized checking was performed to gather, recognize, and examine potential weaknesses that may affect NERC CIP consistence and data security pose. Moreover, XONA mentioned an arrangement and approach assessment, guaranteeing that the organization's inner conventions are reliable with progressing consistence orders. Securicon discovered XONA agreeable with necessities surveyed and tracked down no basic high, medium, or okay weaknesses identified with the XONA CSG. Regions and Critical Infrastructures Expanding Remote Operations Rely on XONA as Secure, Compliant Solution "We are eager to impart our consistence confirmation to our clients. This certificate mirrors the XONA group's diligent effort and our persistent obligation to ensuring our clients' IT framework," clarifies Bill Moore, author and CEO of XONA. He adds, "As districts and other basic framework OT administrators seek after or grow far off activities abilities, we need to routinely show that XONA is a protected, secure arrangement." Continuous financial vulnerability and restricted admittance to cybersecurity faculty makes it more significant than any other time that basic framework tasks can depend on distant activities answers for secure their OT climate. To find out about XONA's client access arrangement worked for OT that sets these exercises in motion, plan a demo. About XONA As the world's initial zero-trust far off tasks stage for basic framework, industry-driving associations all throughout the planet in energy, oil and gas, assembling and government trust XONA to guarantee basic and secure admittance to their operational innovation from anyplace. XONA consistently and safely empowers secure versatile admittance to your most basic frameworks and applications while likewise lessening operational and digital dangers and expanding operational effectiveness.

Read More

RevBits declares the issuance of a U.S. patent for a special product protection system using encryption with zero information

prnewswire | September 08, 2020

Cybersecurity software provider RevBits today has announced that the United States Patent and Trademark Office (USPTO) has issued U.S. Patent No.US10579542B2 covering technology which provides the security of zero-knowledge encryption for data in transit and at rest, while providing the ease and efficiency of implementation of encryption within the user's browser. "As part of our ongoing commitment to provide our customers with the most advanced cybersecurity software solutions to protect their most valuable assets, we are continuously investing to improve the internal security of our solutions.

Read More