DATA SECURITY

To boost customer defences against cybersecurity threats, Cybereason chooses Oracle Cloud infrastructure

prnewswire | December 21, 2020

Prophet today reported that Cybereason, an innovator in future-prepared insurance, received Oracle Cloud Infrastructure (OCI) as its favored stage to control the Cybereason Defense Platform and backing its worldwide extension. The two organizations are cooperating to help secure endeavors against cutting edge online protection dangers at each endpoint and across the undertaking.

With Oracle Cloud Infrastructure's worldwide versatility, quick, microsecond dormancy organization and ease, the Cybereason Defense Platform is to convey ground-breaking danger counteraction and discovery capacities through cutting edge conduct investigation and profound logical connections.

Controlled by Oracle Cloud, Cybereason clients will profit by a cloud-local design that makes sure about endpoints on a worldwide scale, and quick sending through Oracle's help of industry standard, open source instruments like Terraform and Ansible.

"We're excited to collaborate with Oracle to enhance our company's cloud infrastructure for our award-winning unified protection platform. We chose Oracle Cloud Infrastructure because of its security-first approach and performance. Together, we will deliver unmatched visibility and risk reduction to our global customer base. Additionally, the Oracle Cloud global footprint will enable Cybereason to offer in-country hosting in more locations for meeting regulatory data sovereignty requirements," said Lior Div, Cybereason CEO and cofounder.

Not at all like other endpoint security arrangements that depend on caution driven ways to deal with insurance, Cybereason offers an activity driven methodology that empowers security groups to quit pursuing alarms and naturally pick up perceivability into vindictive tasks by aggressors. Cybereason conveys a main proportion of one investigator to 200,000 endpoints, empowering endeavor security groups to acknowledge expanded operational effectiveness. The Cybereason arrangement improves the productivity in identification and reaction of dangers by 93%1 and takes out arising dangers very quickly versus days.

"Cybereason joins a growing roster of companies adopting Oracle Cloud Infrastructure for its leading security and price performance advantages delivered across its global cloud footprint," said Clay Magouyrk, executive vice president, Oracle Cloud Infrastructure. "Adopting Oracle Cloud Infrastructure will enhance Cybereason's ability to deliver insights into threats across thousands of endpoints and enable customers to stay one step ahead of today's most nefarious attacks."
Prophet and Cybereason likewise went into an organization to together market and sell arrangements. Cybereason's driving endpoint insurance stage is advanced for conveyance by means of Oracle's second-age worldwide cloud districts. The arrangement is accessible through Cybereason and in the Oracle Cloud Marketplace, where clients can look for accessible applications and administrations to locate the best business answers for their associations.

About Cybereason
Cybereason is the champion for today's cyber defenders providing future-ready attack protection that unifies security from the endpoint, to the enterprise, to everywhere the battle moves. The Cybereason Defense Platform combines the industry's top-rated detection and response (EDR and XDR), next-gen anti-virus (NGAV), and proactive threat hunting to deliver context-rich analysis of every element of a Malop (malicious operation). The result: defenders can end cyber attacks from endpoints to everywhere. Cybereason is a privately held, international company headquartered in Boston with customers in more than 30 countries.

Spotlight

Dashlane Business supports login with single sign-on (SSO), using any SAML 2.0 enabled IdP. In a single-sign-on setup, the user doesn’t have to input UserMP . Instead, a random key is generated at account creation. This key (the data encryption key) is delivered to the Dashlane app after the user successfully logs in to the IdP, and it is used as a symmetric encryption key to encrypt and decrypt the user data.

Spotlight

Dashlane Business supports login with single sign-on (SSO), using any SAML 2.0 enabled IdP. In a single-sign-on setup, the user doesn’t have to input UserMP . Instead, a random key is generated at account creation. This key (the data encryption key) is delivered to the Dashlane app after the user successfully logs in to the IdP, and it is used as a symmetric encryption key to encrypt and decrypt the user data.

Related News

ENTERPRISE SECURITY, PLATFORM SECURITY, SOFTWARE SECURITY

Check Point Software Technologies Bolsters Endpoint Security with Enhanced Posture Management to Tackle Escalating Vulnerability Exploits

Globenewswire | May 15, 2023

Check Point® Software Technologies Ltd. (NASDAQ: CHKP), a leading provider of cybersecurity solutions globally announced today the expansion of its Check Point Harmony Endpoint protections solution by incorporating vulnerability and automated patch management capabilities. This enhancement addresses the mounting number of cyberattacks that exploit unpatched system vulnerabilities for unauthorized access. To deliver this advanced feature, Check Point has joined forces with Ivanti, integrating Ivanti Patch Management to assess and remediate software vulnerabilities from cloud to edge, into Check Point's Harmony Endpoint protection solution. The National Vulnerability Database reported over 25,000 vulnerabilities in 2022, with this figure expected to rise. Furthermore, a recent Dark Reading report revealed that 57% of ransomware attacks capitalize on unpatched vulnerabilities, highlighting the necessity of addressing this issue to defend against such threats. However, vulnerability patching is often a complex and time-consuming process. Many organizations lack insight into their environment's vulnerability status, and even when they do, patching takes an average of 97 days, according a report of the Ponemon Institute. This delay provides ample opportunities for attackers to exploit these weaknesses. To tackle this challenge, Check Point is enhancing its endpoint security solution, Harmony Endpoint, with vulnerability assessment and automated patch management capabilities. This will equip Harmony Endpoint users with an intelligent, automated process that minimizes the attack surface and boosts operational efficiency by: Automatically scanning organizational endpoints with minimal performance impact Providing comprehensive visibility into the status of all devices, saving valuable time for IT and security teams Auto-patching vulnerabilities and implementing security policies to ensure a secure and uninterrupted workflow. "We are excited to enhance our endpoint security solution with vulnerability assessment and automated patch management capabilities," says Ofir Israel, VP of Threat Prevention at Check Point, "This added value complements Harmony Endpoint's existing offerings of Endpoint Protection Platform (EPP), Endpoint Detection and Response (EDR), and other advanced security features. Our customers now have the tools they need to swiftly identify and remediate vulnerabilities before they can be exploited, all from a unified platform." “We are thrilled to partner with Check Point and collaborate to offer customers the highest level of endpoint protection,” said Michelle Hodges, Senior Vice President of Global Channels and Alliances at Ivanti. “We both understand that patch management is a critical component of any cybersecurity program and enhances the overall security posture for our customers by ensuring all systems are updated with the latest application updates, fixes, and patches. At Ivanti, we are committed to providing innovative solutions that empower our partners to strengthen their businesses and safeguard our customers.” By delivering a comprehensive endpoint security solution, Check Point enables organizations to defend against a broad spectrum of cyber threats and stay ahead of the ever-evolving threat landscape. About Check Point Software Technologies Ltd. Check Point Software Technologies Ltd. (www.checkpoint.com) is a leading provider of cyber security solutions to corporate enterprises and governments globally. Check Point Infinity's portfolio of solutions protects enterprises and public organisations from 5th generation cyber-attacks with an industry leading catch rate of malware, ransomware and other threats. Infinity comprises three core pillars delivering uncompromised security and generation V threat prevention across enterprise environments: Check Point Harmony, for remote users; Check Point CloudGuard, to automatically secure clouds; and Check Point Quantum, to protect network perimeters and datacenters, all controlled by the industry’s most comprehensive, intuitive unified security management. Check Point protects over 100,000 organizations of all sizes. About Ivanti Ivanti elevates and secures Everywhere Work so that people and organizations can thrive. We make technology work for people, not the other way around. Today’s employees use a wide range of corporate and personal devices to access IT applications and data over multiple networks to stay productive, wherever and however they work. Ivanti is one of the only technology companies that finds, manages and protects each IT asset and endpoint in an organization. Over 40,000 customers, including 88 of the Fortune 100, have chosen Ivanti to help them deliver an excellent digital employee experience and improve IT and security team productivity and efficiency. At Ivanti, we strive to create an environment where all perspectives are heard, respected and valued and are committed to a more sustainable future for our customers, partners, employees and the planet. For more information, visit www.ivanti.com and follow @GoIvanti.

Read More

DATA SECURITY, PLATFORM SECURITY, SOFTWARE SECURITY

Databricks Ventures Invests in Data Security Leader Immuta

Businesswire | May 05, 2023

Immuta, a leader in data security, today announced a new strategic investment from Databricks Ventures, the investment arm of the data and AI company and pioneer of the lakehouse. The investment builds on a longstanding partnership between the two companies and positions Immuta as one of Databricks’ trusted partners of choice for data security and access control. The investment will go towards product innovation to strengthen the integration between both platforms and new go-to-market initiatives to increase enterprise adoption. “Immuta is a trusted data security partner,” said Ali Ghodsi, CEO and Co-founder of Databricks. “Over the last six years, we've been successfully collaborating to serve global enterprise customers like ADP, Swedbank, and many others. By integrating directly with Databricks Unity Catalog, Immuta provides a seamless way for our joint customers to protect their data in the Databricks Lakehouse.” “Through our joint partnership with Databricks, Immuta is now embedded in some of the largest and most complex cloud data projects across industries," said Matt Carroll, CEO of Immuta. "With this new investment, we're going to make our tight integration with Databricks Unity Catalog even better so that our customers can take data security to a new level and continue to unlock more value from their data.” This investment comes after a year of immense growth for Immuta during which the company reported a 200% increase in Annual Recurring Revenue (ARR) for its Data Security Platform SaaS offering as it expanded globally into EMEA and APAC. This strong and consistent growth has been fueled by an equally strong track record of funding that includes investments from ServiceNow and NightDragon to support the growing demand for data security from customers around the globe. “As a company with over a million clients doing payroll for millions of people, ADP processes a large amount of data,” said Jack Berkowitz, Chief Data Officer at ADP. “Databricks helps us to manage that data and Immuta plays an important role in administering security and access control. As we look to innovate with new products and implement a multi-cloud strategy, we must treat the data properly – it must be governed.” “Swedbank needed to build an enterprise-scale advanced analytics platform that would also enforce trust in our security, management, and access to data internally, while protecting our customers’ assets and data,” said Vineeth Menon, Head of Data Lake Engineering at Swedbank. “Immuta and Databricks have been instrumental in helping us build that vision and we are excited to see their partnership go to the next level.” Forrester Consulting recently conducted a Total Economic ImpactTM study that found Immuta provided benefits totaling $6.08M and an ROI of 175% over three years for a composite organization, which was based on interviews with six Immuta customers. According to the commissioned Forrester study, “The efficiencies the organizations experienced with Immuta coupled with the ability to meet stricter compliance standards enabled them to scale data access across the organizations to better serve internal innovation efforts and, thereby, better meet external customer needs.” For more information about Immuta’s partnership with Databricks and the new integration between Immuta and Databricks Unity Catalog, please visit https://www.immuta.com/partners/databricks/. About Immuta Immuta enables organizations to unlock value from their cloud data by protecting it and providing secure access. The Immuta Data Security Platform provides sensitive data discovery, security and access control, data activity monitoring, and has deep integrations with the leading cloud data platforms. Immuta is now trusted by Fortune 500 companies and government agencies around the world to secure their data. Founded in 2015, Immuta is headquartered in Boston, MA. To learn more about Immuta, click here. About Databricks Ventures Databricks Ventures is the strategic investment arm of Databricks, the data and AI company. Databricks Ventures invests in innovative companies that align with our view of the future for data, analytics and AI; and are committed to extending the lakehouse ecosystem or using the lakehouse architecture to create the next generation of data and AI-powered companies.

Read More

PLATFORM SECURITY, SOFTWARE SECURITY, API SECURITY

Traceable AI Introduces World’s First Zero Trust API Access (ZTAA) Solution

Businesswire | April 28, 2023

Traceable AI, the industry’s leading API security company, today announced the launch of its innovative solution, Zero Trust API Access, to help organizations better protect sensitive data, stop API abuse, and align data security programs with broader innovation and business objectives. As the industry’s first and only solution in the market, Traceable’s Zero Trust API Access actively reduces your attack surface by minimizing or eliminating implied and persistent trust for your APIs. “You cannot have true Zero Trust without API security,” said Sanjay Nagaraj, CTO of Traceable. “Traceable’s Zero Trust API Access provides a guiding principle for API security architectures for enhanced data protection, security posture and resiliency. APIs are the universal attack vector, and if companies truly want to take the Zero Trust framework seriously, protect their data and create an environment that enables the ability to grow securely, they need a solution that is both strategic and tactical.” Zero Trust API Access (ZTAA) provides enterprises considerable business benefits including: Dynamic Data Access policies stop data breaches in their tracks: With Traceable, you can detect and classify the data that APIs are handling, to apply proper policies. These policies define which users and roles can access different data types, at what times, from what geolocations and from what client types. With dynamic data access policies, you can quickly and easily create policies with out-of-the-box templates or customize policies based on organization needs. Continuous Adaptive Trust for real-time threat prevention: Traceable’s ZTAA provides security that continuously adjusts to the organization’s threat landscape. This is achieved through real-time, context-based authentication and authorization for API access (both user and machine). Traceable can stitch APIs, as well as the data and user context, via flexible data collection options. This ensures that adaptive trust is enforced for APIs at the edge, as well as for all internal services, for-service APIs and 3rd party APIs. The result is the right access for the right users and entities, at the right time, thereby protecting the business and its sensitive customer data. Intelligent Rate Limiting for API abuse prevention: API rate limiting enables organizations to control the incoming traffic to an API by automatically limiting the number of requests that the API can receive within a given period of time. After the limit is reached, the policy rejects all requests, thereby avoiding any additional load on the backend API. Intelligent rate limiting factors in the rates for users, proxies, bots, and the business function of APIs. This provides enhanced protection against API DDoS attacks, reduces load on backend APIs, honors SLAs, and reduces costs often associated with 3rd party APIs. Access to APIs and sensitive data is therefore proactive and automatic, preventing API abuse. Security becomes a business enabler: When combined, Zero Trust Security and API Security create a holistic and robust security approach that actively mitigates the risks associated with accessing sensitive data via APIs. This comprehensive approach helps protect sensitive information and fosters a secure environment for innovation and growth. Organizations can now confidently offer new products and services, turning security from a hindrance, to a catalyst for accelerated growth. Traceable’s Zero Trust API Access is essential to aligning Zero Trust implementations with the realities of today’s application architectures and extending the Zero Trust Security model to the full application stack. To learn more about Zero Trust API Access from Traceable, visit the team at RSA South Hall, Booth 2133 or request a demo with a security expert. About Traceable Traceable is the industry’s leading API Security company that helps organizations achieve API protection in a cloud-first, API-driven world. With an API Data Lake at the core of the platform, Traceable is the only intelligent and context-aware solution that powers complete API security – security posture management, threat protection and threat management across the entire Software Development Lifecycle – enabling organizations to minimize risk and maximize the value that APIs bring to their customers. To learn more about how API security can help your business, book a demo with a security expert.

Read More