DATA SECURITY

Tammy Moskites, a Veteran CISO, has been Appointed to AppViewX's Advisory Board

AppViewX | May 04, 2021

AppViewX, the leader in next-gen machine identity management via automation and application delivery automation, today announced the appointment of Tammy Moskites, CEO and founding father of CyAlliance®, as Executive Board Advisor. Tammy joins the AppViewX planning board to supply strategic cybersecurity guidance to customers and across go-to-market channels to drive awareness, growth, and customer success.

With over 30 years of technology experience, security acumen and leadership Tammy may be a result-driven and passionate executive who helped create the Machine Identity Management market category and enterprise requirements to raised govern keys and certificates. As a distinguished career CISO, Tammy actively guides peer CISOs and security architects worldwide to assist defend their organizations from cyber attacks, unplanned outages, and failed audits. Tammy has previously held executive security and technology leadership roles at Accenture, Venafi, Time Warner Cable, and residential Depot.

"We're delighted to possess Tammy Moskites to join AppViewX as an Executive Board Advisor," said Gregory Webb, AppViewX CEO. As cryptographic keys and certificates became the critical infrastructure for DevOps, SecOps, and NetOps, the importance of Machine Identity Management to an organization's overall security posture and digital transformation has become a top priority. As a highly experienced and influential executive, Tammy will add significant value to our team. Her experience as a successful career CISO is invaluable to us as we still accelerate growth and supply the foremost comprehensive, next-gen machine identity management solution for global enterprises."

Tammy may be a highly recognized cyber and ladies in technology social influencer. Amongst the various things she is involved in, she may be a Ventture Advisor to YL Ventures, a Distinguished Fellow with the Ponemon Institute, and volunteers her time with many technology organizations. She is an internationally recognized keynote/speaker, not only on security and governance but also on career building, women in technology, and leadership mentoring. She is currently an executive company board advisor to Blue Lava, Raxis, RiskIQ, and SecureAuth and a seed investor at Grip Security.

"I was an early voice, champion, and adopter of what's now, Machine Identity Management, which dates back nearly 10 years," said Tammy Moskites, Executive Board Advisor at AppViewX. "As a career CISO, I even have always had a passion and expressed the need to manage your keys and certificates and shared that zeal worldwide. I even have certainly been excited to observe the expansion and maturity during this cybersecurity space as an entire. I feel that AppViewX is maturing Machine Identity Management and also within the areas of IoT Key/Certificate Lifecycle Automation, PKI Management/PKIaaS, and Application Delivery Automation. I'm truly impressed by their dedication, focus, and most significantly, their passion for 'doing the proper things right' – which has allowed them to require Machine Identity and Automation to a subsequent level! I'm super excited to be an Executive Board Advisor at AppViewX and appearance forward to their partnership with CyAlliance® and welcome them to our Cy'Alliance' portfolio of partners!"

According to Gartner's Top Security and Risk Management Trends for 2021, Machine identity Management may be a top trend for 2021. "Machine identity management aims to determine and manage trust within the identity of a machine interacting with other entities, like devices, applications, cloud services, or gateways. Increased numbers of nonhuman entities are now present in organizations, which suggests managing machine identities has become an important part of the safety strategy."

About AppViewX

AppViewX is revolutionizing the way NetOps and DevSecOps teams deliver Machine Identity Management and Application Delivery Automation solutions services to Enterprise IT. The AppViewX Platform may be a modular software application that permits the automation and orchestration of network infrastructure using an intuitive, context-aware, visual workflow. It quickly and simply translates business requirements into automation workflows that improve agility, enforces compliance, eliminate errors, and reduce cost. AppViewX customers are among the world's most demanding Fortune 1000 organizations in financial services and banking, healthcare, oil and gas, manufacturing, and high tech.

Spotlight

"Whether by tethered or mobile device, widespread access to the web, social media and applications continues to expose businesses to new risks and creates an ever-larger attack surface. Meanwhile, attackers are getting more sophisticated, their exploits persist longer and IT security response is being stretched beyond current capabilities. According to the most recent Verizon 2015 Data Breach Investigations report, attackers are able to compromise an organization in minutes in 60 percent of cases. The report also found that half of exploited vulnerabilities were seen within just one month of the vulnerability’s publication. It is clear that attackers are moving faster than ever, and security teams are not able to keep pace."

Spotlight

"Whether by tethered or mobile device, widespread access to the web, social media and applications continues to expose businesses to new risks and creates an ever-larger attack surface. Meanwhile, attackers are getting more sophisticated, their exploits persist longer and IT security response is being stretched beyond current capabilities. According to the most recent Verizon 2015 Data Breach Investigations report, attackers are able to compromise an organization in minutes in 60 percent of cases. The report also found that half of exploited vulnerabilities were seen within just one month of the vulnerability’s publication. It is clear that attackers are moving faster than ever, and security teams are not able to keep pace."

Related News

DATA SECURITY,PLATFORM SECURITY,SOFTWARE SECURITY

BeyondTrust Introduces New Intelligent Identity and Access Security Platform

BeyondTrust | August 23, 2022

BeyondTrust, the leader in intelligent identity and access security, today announced the BeyondTrust Platform, featuring a modern architecture that delivers unprecedented visibility of identities and access across an organization’s entire digital estate, from on-premises to cloud, hybrid and operational technology environments. The BeyondTrust Platform delivers the most powerful intelligent identity and access security through an elegant, unified platform and interface that removes friction and drives unparalleled insights for organizations of all sizes. Today, organizations are being asked to do more with less, while facing an expanding threat landscape. They know they cannot solve emerging security problems with a disjointed patchwork of solutions or a poorly integrated ecosystem. “Our customers have told us they want a single platform that removes complexity and the risk created by fragmented infrastructure,” said Raj Cherukuri, Chief Product Officer at BeyondTrust. “They need solutions that accelerate time to value with easy deployments and deliver a robust set of common capabilities to reduce security risk, while accelerating their digital transformation initiatives.” The BeyondTrust Platform leverages a single interface to discover, manage, and protect identities, control access, as well as proactively detect anomalous activity. This new solution reduces complexity and management burden through a revolutionary single agent approach and unified management console across all BeyondTrust apps. Along with the platform, BeyondTrust also announced: BeyondTrust’s new Endpoint Security App, a modern privilege management solution that enables better policy management, access control, aggregated application monitoring, and threat detection; these integrated capabilities prevent attackers from elevating privileges, mitigating cyberattacks. The initial release of BeyondTrust’s new Cloud Privilege Manager App, which provides visibility and management of entitlements across multicloud environments from a single pane of glass. Together, with the Endpoint Security App, it enables broad visibility of identities across an organization’s on-premises and cloud footprint. By adopting a natively integrated and unified solution for identity and access security, organizations can better tackle existing use cases and expand to emerging ones, further reducing their attack surface. The BeyondTrust Platform provides a unified view of an organization’s identity landscape. This visibility helps organizations: Better manage, control, and protect their identity landscape More effectively control access to critical resources Easily meet security and compliance targets Key features and benefits include: Breakthrough User Experience – Unprecedented ease of use by leveraging natively integrated common capabilities, which can be activated as needed with a new trial and self-service approach Unified Management – A single console and unified dashboard deliver navigation, management, and reporting across all apps A Universal Agent – Streamlined deployment and straightforward maintenance with automatic installs and upgrades with no reboot required Asset Discovery – Gain unified cross domain visibility with scanning across the entire environment Unified Policy Management - Proactively manage drift with a policy advisor, a common policy framework, out-of-the-box policy templates and version control Centralized Reporting - Leverage information holistically across apps to support better decision-making, with easy customization options Holistic Visibility – Gain insight into privileges in use across the entire IT environment – on-premises, cloud, hybrid Identity Security Insights – Use identity-centric and cross app analytics for better decision making and prevent problems before they happen Health Monitoring – Keep track of the health and status of your endpoints and assets with proactive analytics Multitenant Deployment – Create multiple tenants within a deployment with complete isolation to match the organization’s structure About BeyondTrust BeyondTrust is the worldwide leader in intelligent identity and access security, empowering organizations to protect identities, stop threats, and deliver dynamic access to empower and secure a work-from-anywhere world. Our integrated products and platform offer the industry's most advanced privileged access management (PAM) solution, enabling organizations to quickly shrink their attack surface across traditional, cloud and hybrid environments.

Read More

DATA SECURITY,PLATFORM SECURITY,SOFTWARE SECURITY

Tanium Expands Collaboration with Microsoft as It Joins the Microsoft Intelligent Security Association (MISA)

Tanium | August 17, 2022

Tanium, the industry’s first provider of converged endpoint management (XEM), today announced that it has been nominated to join the Microsoft Intelligent Security Association (MISA), an ecosystem of independent software vendors and managed security service providers (MSSPs) that have integrated their solutions with Microsoft security technology to help customers better defend themselves against increasingly sophisticated cyber threats. “I believe that Microsoft and Tanium's partnership is going to transform the future of IT security and operations for my organization,” said Mark Wantling, CIO at the University of Salford. “By combining Tanium's real-time visibility and control with Microsoft's advanced threat intelligence, orchestration, and analytics services, I can quickly and easily identify and address vulnerabilities, remediate threats, and manage my estate across a multitude of platforms — and I don't need dozens of point solutions to do it.” As hybrid work and other digital transformations expand organizations’ IT assets and attack surfaces, customers benefit by consolidating security platforms to more seamlessly deliver security, performance, and automation, without needless complexity and alert fatigue. “I am excited to see that Tanium and Microsoft are working together,” said Andy Lawrence, cyber security improvements manager, Willis Towers Watson. “Combining Tanium’s real-time data and control with Microsoft’s services will allow my team to more effectively manage and secure my entire IT estate.” Tanium was nominated for MISA membership in part as a result of an integration with Microsoft Sentinel, soon to be available via the Sentinel Content Hub. Currently, Tanium is available in the Microsoft Commercial Marketplace, an online store providing applications and services for use on Azure. Customers can purchase and provision Tanium directly from the marketplace and apply the purchase to their Microsoft Azure Consumption Commitments (MACC). Every day, Tanium customers around the world take advantage of the Azure cloud platform, including streamlined deployment and provisioning, to accelerate their security strategies. “The largest and most sophisticated organizations trust Tanium to manage and secure their digital estates. “Combining Microsoft's security solutions with Tanium's real-time data, distribution, and control not only enables effective automation and resilient security, but it also creates accelerated savings for customers converging multiple point solutions into fewer, more comprehensive, and robust solutions.” Rob Jenks, senior vice president of corporate strategy at Tanium Together, Tanium’s integrations with Microsoft’s technology deliver the capabilities customers need to manage and secure IT estate from cloud to the edge, including active threat hunting, faster remediation, real-time patching, and the automated delivery of detailed real-time data. “Members of the Microsoft Intelligent Security Association – like Tanium – integrate their security solutions with Microsoft’s technology to gain more signal, increase visibility and better protect against threats. By extending Microsoft’s security capabilities across the ecosystem, we help our shared customers to succeed.” – Maria Thomson, Microsoft Intelligent Security Association Lead. About Tanium Tanium, the industry’s only provider of converged endpoint management (XEM), leads the paradigm shift in legacy approaches to managing complex security and technology environments. Only Tanium protects every team, endpoint, and workflow from cyber threats by integrating IT, Compliance, Security, and Risk into a single platform that delivers comprehensive visibility across devices, a unified set of controls, and a common taxonomy for a single shared purpose: to protect critical information and infrastructure at scale. Tanium has been named to the Forbes Cloud 100 list for six consecutive years and ranks on Fortune’s list of the Best Large Workplaces in Technology. In fact, more than half of the Fortune 100 and the U.S. armed forces trust Tanium to protect people; defend data; secure systems; and see and control every endpoint, team, and workflow everywhere.

Read More

SOFTWARE SECURITY

RangeForce introduces cloud-based security team threat exercises

RangeForce | June 29, 2022

RangeForce, a provider of team cyber defense readiness at scale, announced that it has improved its platform for team threat exercises with new features that make it simpler for organizations to hasten the development of their security teams' skills through multi-user detection and response drills involving simulated attacks. Through the use of RangeForce team threat exercises, security teams can set up the security stack to be defended, select an attack scenario, carry out the threat exercise, analyze the post-exercise data, and create a customized training program. RangeForce threat exercises produce realistic digital artifacts of both signal and noise that demand teams to demonstrate their cyber preparedness. They use high-intensity, real-world assault scenarios that call security experts to work in teams to discover and neutralize cyber threats. "RangeForce threat exercises are based on years of running hundreds of live cyber events and deliver the most realistic experience for teams using headline making attack scenarios and the same security tools they use every day. They provide participants the opportunity to acquire hands-on skills so they build the muscle memory to meet threat actors head on." Ben Langrill, Senior Director of Product Engineering for RangeForce RangeForce exercises take place in a cyber-environment that goes beyond the standard tabletop exercise, forcing participants to use well-known security tools like Splunk and Fortigate to identify and address threats. Instead, events follow the NIST cybersecurity architecture and combine threat intelligence, threat hunting, digital forensics, and system hardening expertise to reduce threats depending on current malware patterns.

Read More