To seamlessly incorporate digital security into the product manufacturing process, PTC and Cybellum partner

prnewswire | January 14, 2021

PTC and Cybellum, an innovator in Automotive Cybersecurity Risk Assessment, today declare an association to convey a mix between PTC's Windchill RV&S and Cybellum's foundation. The joint arrangement will give computerized network protection checking to programming created utilizing Windchill RV&S, to guarantee consistence with all the necessary wellbeing and security guidelines.

PTC's Windchill RV&S joins prerequisites designing, thorough programming setup control and test the executives to guarantee makers assemble the correct items. The product source code and assembled executables are overseen inside Windchill RV&S, and during registration, Cybellum's complete stage flawlessly directs network protection assessments. Joint clients would now be able to characterize programming security contemplations right off the bat in the item life cycle, one next to the other with their entire item designing cycle. They would then be able to design their execution, compute and deal with the related network protection chances with regards to the entire item.

Programming engineers can likewise proactively test and fix the distinguished security or wellbeing dangers utilizing the consequently created, itemized direction. This can guarantee that basic wellbeing and security weaknesses are recognized, overseen, organized and relieved all through the designing cycle, ensuring that your items are free from any and all harm.

The joint arrangement additionally encourages clients to plan for and conform to existing and forthcoming network protection guidelines, (for example, ISO 26262 Road Vehicles Functional Safety, UN WP29 (World Forum for harmonization of Vehicle Regulation), and ISO 21434 DIS Road vehicles Cybersecurity Engineering).

"We are excited about the partnership with PTC, helping product development teams shift left by embedding cybersecurity risk assessment processes and prevent vulnerabilities early in the delivery process of software-intensive products," said Michael Engestler, co-founder and CTO of Cybellum. "Through the unique integration with PTC Windchill RV&S we empower manufacturers to control, trace and mitigate safety and security issues early on, ultimately delivering safe and secure products."

"We see this integration as a significant enhancement for PTC customers who are particularly concerned about the cybersecurity of the software they manage with Windchill RV&S," said Hedley Apperly, VP SSE Products, PTC. He continued, "This automated security scanning and remediation mentoring will be invaluable to any manufacturer building software intensive products, which are vulnerable to cyber-attack."

About Cybellum

Cybellum empowers automotive OEMs and suppliers to identify and remediate security risks at scale, throughout the entire vehicle life cycle. Our agentless solution scans embedded software components without needing access to their source code, exposing all cyber vulnerabilities. Manufacturers can then take immediate actions to eliminate any cyber risk in the development and production process, before any harm is done, while continuously monitoring for emerging threats impacting vehicles on the road.

About PTC

PTC enables global manufacturers to realize double-digit impact with software solutions that enable them to accelerate product and services innovation, improve operational efficiency, and increase workforce productivity. In combination with an extensive partner network. PTC provides customers flexibility in how its technology can be deployed and drive digital transformation – on premises, in the cloud, or via its pure SaaS platform. At PTC, we don't just imagine a better world, we enable it.

Spotlight

Disruptive Technologies has prioritized security and privacy throughout every part of the design and development process for our sensing solution, including chip design, sensor design, radio protocol design, cloud services and APIs. Every layer of the Disruptive sensing solution is secure, from the individual sensors to the applications processing the data. Measurement and sensor identity data is encrypted within the sensors themselves.

Spotlight

Disruptive Technologies has prioritized security and privacy throughout every part of the design and development process for our sensing solution, including chip design, sensor design, radio protocol design, cloud services and APIs. Every layer of the Disruptive sensing solution is secure, from the individual sensors to the applications processing the data. Measurement and sensor identity data is encrypted within the sensors themselves.

Related News

DATA SECURITY,PLATFORM SECURITY,SOFTWARE SECURITY

ReasonLabs' RAV Endpoint Protection Achieves Gold OPSWAT Access Control Certification for Endpoint Security Applications

ReasonLabs | September 05, 2022

ReasonLabs, a leading cybersecurity company providing enterprise-grade protection to users all around the world, has today announced that its RAV Endpoint Protection solution has received Gold Certification from Access Technologies (OPSWAT), a leader in critical infrastructure protection. OPSWAT's Access Control Certification Program provides reliable and consistent metrics for validating the effectiveness of anti-malware products and establishing device trust. The program's Gold certification badge is awarded to applications that achieve access control compatibility. "Achieving Gold Certification in OPSWAT's Access Control Center Program further validates RAV Endpoint Protection as an industry-leading next-generation consumer solution. "The certification has created an easy way for customers to validate our solution's capabilities. End users can be assured that RAV Endpoint Protection secures endpoints with a high degree of confidence." Kobi Kalif, CEO of ReasonLabs ReasonLabs is the first Next-Generation Antivirus (NGAV) software with Endpoint Detection and Response (EDR) capabilities built specifically for home users. Whereas traditional antiviruses use a one-to-one detection technology to fight breaches and malware, ReasonLabs's intuitive engine utilizes a variety of technologies and techniques to predict and prevent virus attacks. By leveraging machine learning algorithms and AI, RAV Endpoint Protection sorts through millions of files to easily identify potentially hazardous ones and ensures proactive detection and resolution of the most complex malware. "From OPSWAT's inception, we have pioneered the concept of zero trust," said Benny Czarny, founder and CEO of OPSWAT. "The OPSWAT Access Control Certification Program extends this idea to IT System Administrators by relieving them from the daunting task of researching, testing and identifying the right endpoint anti-malware and encryption solutions by having us test it for them. We've done the work and verified applications that meet our exacting zero trust standards." Since RAV Endpoint Protection utilizes state-of-the-art EDR technology powered by artificial intelligence, ReasonLabs is able to provide the strongest defense for customers' personal assets. By utilizing an EDR approach, RAV is able to detect threats virtually anywhere, in contrast to systems built with a legacy one-to-one detection method. When coupled with its other security products including RAV VPN, RAV Safer Web, RAV Online Security, and FamilyKeeper, users can feel confident knowing every single endpoint is secured. "We developed the OPSWAT Access Control Certification Program to recognize the very best security solutions in the market, and ReasonLabs' RAV Endpoint Protection solution has met these demanding requirements," said Hamid Karimi, VP Technology Alliances and OEM at OPSWAT. "Gold certification is a badge of trust that certifies that a vendor's solutions do what they say they do and are effective against the latest emerging threats. IT professionals who are looking for the most effective antivirus solutions rely on Gold Certified vendors, and now they should consider ReasonLabs' RAV Endpoint Protection." About ReasonLabs ReasonLabs is a cybersecurity pioneer equipping tens of millions of families and individuals worldwide with the same level of cyber protection enjoyed by Fortune 500 companies. Its AI-powered, next-generation antivirus engine scans billions of files around the world to predict and prevent cyberattacks in real-time, 24/7. Its flagship product, RAV Endpoint Protection, together with its other products combine to form a multilayered solution that safeguards home users against next-generation threats. Co-Founded in 2016 by seasoned cybersecurity expert Andrew Newman—an architect of Microsoft's native cybersecurity program, Microsoft Defender—ReasonLabs is based in New York and Tel Aviv.

Read More

DATA SECURITY,SOFTWARE SECURITY,WEB SECURITY TOOLS

Phosphorus Announces New Partnership with Dewpoint to Expand Its xIoT Security Solutions and Platform in US Market

Phosphorus | September 26, 2022

Phosphorus, the leading provider of advanced and full-scope security for the extended Internet of Things (xIoT), today announced a partnership with Dewpoint. The IT and security solutions provider will act as a value-added reseller (VAR) for Phosphorus in the US market. The new partnership will see the two companies jointly delivering a new generation of xIoT security solutions in the US to meet growing enterprise demand for xIoT attack surface management and remediation capabilities. “xIoT security is a critical need for today’s enterprises, and these risks are left unaddressed by traditional IT security solutions. We look forward to working with Dewpoint to help expand our US sales channels and bring the world’s most advanced xIoT security platform to more organizations.” Kal Gajera, Director of North America Channels at Phosphorus Phosphorus’s Extended Enterprise xIoT Security Platform is the world’s first and only automated security platform capable of delivering xIoT Attack Surface Management, xIoT Hardening, and Remediation, and xIoT Detection and Response across the full range of IoT, OT, and Network-connected devices—spanning both new and legacy devices. This enables large organizations to scale xIoT technologies (which can amount to millions of devices per organization) without having to add any additional employees to find, fix, and monitor them. ABOUT PHOSPHORUS Phosphorus Cybersecurity® is the leading xTended Security of Things™ platform designed to secure the rapidly growing and often unmonitored Things across the enterprise xIoT landscape. Our Extended Enterprise xIoT Security Platform delivers Attack Surface Management, Hardening & Remediation, and Detection & Response to bring enterprise xIoT security to every cyber-physical Thing in your enterprise environment. With unrivaled xIoT discovery and posture assessment, Phosphorus automates the remediation of the biggest IoT, OT, and Network device vulnerabilities—including unknown and inaccurate asset inventory, out-of-date firmware, default credentials, risky configurations, and out-of-date certificates. ABOUT DEWPOINT Dewpoint has been bringing business and technology together since 1996. We make sure technology is solving all your business problems, providing transparency of spend for executives, and enhancing collaboration and flexibility. As the IT industry and businesses continue to change, Dewpoint provides the thought leadership and industry expertise to offer a new level of services in project management, digital innovation, infrastructure, security, cloud, and a range of tailored professional and managed service solutions for all our clients.

Read More

DATA SECURITY

Netskope Acquires Infiot, Will Deliver Fully Integrated, Single-Vendor SASE Platform

Netskope | August 03, 2022

Netskope, the leader in Security Service Edge (SSE) and Zero Trust, today announced it has acquired Infiot, a pioneer in enabling secure, reliable access with zero trust security, network and application optimization, and AI-driven operations. As Netskope Borderless WAN, the addition of Infiot's revolutionary technology will enable Netskope customers to apply uniform security and quality of experience (QoE) policies to the widest range of hybrid work needs, from employees at home or on-the-go, to branch offices, ad-hoc point-of-sale systems, and multi-cloud environments. For customers, all of these capabilities are delivered in a single architecture, using one policy framework, and one console, which dramatically simplifies operations, preserves network performance, and ensures SASE success. The Benefits of SASE Businesses and governments are rapidly adopting SASE to safeguard data wherever it moves, support digital transformation efforts, and realize better efficiency and return-on-investment from their technology. Netskope is a widely acknowledged leader in SSE, which describes the security services needed for a successful SASE architecture. Relevant to SASE growth, Gartner® notes: "By 2024, 80% of SD-WAN deployments will incorporate SSE requirements, up from less than 25% in 2022"[1] "By 2025, 80% of enterprises will adopt a strategy to unify web, cloud services, and private application access from a single vendor's SSE platform"[2] Despite SASE's popularity, however, confusing vendor messaging often accompanies piecemeal product sets that are spuriously marketed as "SASE." Most of these products are not natively integrated, nor able to simplify technology environments, and lack critical network and infrastructure transformation capabilities—all of which risk higher levels of security incidents, network downtime, and poor ROI. Netskope Borderless WAN combines with Netskope Intelligent SSE in a fully converged SASE platform, uniquely addressing these challenges. Borderless WAN Unlocks Full SASE Potential Founded in 2018 by veterans of the SD-WAN market, Infiot was one of only four vendors recognized in the 2021 Gartner "Cool Vendors™ in Cloud Networking"[3] report, was twice named to The Futuriom Top 40[4], and has been successfully deployed by customers in healthcare, retail, education, energy, manufacturing, telecommunications, and other industries. Infiot technology leverages a cloud-based, zero-touch deployment and provisioning model with multiple physical and virtual appliance form factors. The solution includes built-in routing, a transport-agnostic approach that supports both wired and wireless networking, app-aware QoE enforcement combined with policy-based traffic steering, and other integrated network security functions critical for deployment at the edge. For customers, all of this capability is delivered in a single architecture, using one policy framework, and one console, which dramatically simplifies operations for thinly-stretched networking and infrastructure teams. As the foundation of the new Netskope Borderless WAN solution, Infiot technology will allow customers to embrace modern, cloud-first networking by leveraging Netskope SASE Gateways, creating secure, optimized connections between any enterprise location, including site-to-site, or the cloud. Netskope SASE Gateways also enable end-to-end optimization for improved app performance, provide increased network resilience through real-time link monitoring and dynamic path selection, and offer identity and per-app access policies to apply zero trust principles to the network. Netskope Borderless WAN critical use cases include: Easy access to industry-leading Netskope Intelligent SSE services powered by world-class Netskope NewEdge infrastructure All-in-one intelligent access, routing, wireless WAN, network security, app assurance, and edge compute as an effective way to modernize, simplify and implement SASE architecture The ability to offload MPLS and eliminate costs by sending more traffic direct-to-net, eliminate backhauling and leverage fixed/mobile connectivity options (such as 4G/5G) Better guaranteed WAN connectivity to ensure end-to-end performance, from the "last mile" to the cloud or legacy data center Simplified operational overhead associated with running custom third-party applications "Today, leaders across IT, security, and networking and the world's best-known analyst firms agree that the explosion of data and devices, along with the numerous ways that people connect, communicate, and collaborate, make the transformation of both networking and security a critical imperative for businesses and governments. It is in this transformation where Netskope is uniquely positioned to help customers with a fully converged SASE platform. "We're very excited to introduce Borderless WAN, and to welcome Infiot to our growing team." Sanjay Beri, Netskope CEO "Today, many-to-many secure optimized connectivity is required to address any user, device, and location, in combination with a zero trust approach that integrates seamlessly with Security Service Edge," said Parag Thakore, Infiot CEO. "Netskope Intelligent SSE is the industry's leading SSE, and the combination of Infiot and Netskope will deliver on the promise of SASE like no other technology vendor can." "As we continue to transform our patient care experience, we are excited to partner with Netskope,'' said Rick Lacy, Senior Enterprise Network Engineer, CHRISTUS Health. "Netskope Borderless WAN provides adaptive, identity-aware precision access for our medical workers to deliver care from the comfort of their homes, without compromising experience, all at a significantly lower cost to our business. In the future we see many applications for Netskope, including our medical IoT deployments." "Netskope Borderless WAN is a new mindset. It's a new way of thinking about how our users access our domain and critical applications," said Robert Boopsingh, CIO, The Beacon Insurance Company. "For us, it will replace VPN for our employees and branch offices across our seven countries. We have implemented a zero trust model while delivering superior network access with this modern, secure, cloud-first implementation." "This is a great move," said Frank Dickson, Group Vice President, Security & Trust, IDC. "What Netskope will now be able to offer, thanks to its compelling security platform and Infiot's technology, is fully secure hybrid-work in-a-box, solving for both networking challenges and security challenges at the same time. It's a self-provisioning network, with security that's automatic. That's not just an abstract framework or a good idea, it's a specific set of benefits and use cases for businesses." In addition to offering Borderless WAN capabilities, Netskope integrates with key SD-WAN partners, ensuring customers benefit from Netskope Intelligent SSE in mixed environments while maintaining flexibility and choice in vendor partners. Financial terms of the acquisition are undisclosed. Parag Thakore and the Infiot product team now comprise Netskope's Borderless WAN group, and Infiot's sales team has joined Netskope's sales organization. Read the Netskope blog for more on today's acquisition news. Visit Netskope.com for more on Borderless WAN and the Netskope SASE platform. Gartner Disclaimer Gartner does not endorse any vendor, product or service depicted in its research publications and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose. GARTNER and COOL VENDORS are a registered trademark and service mark of Gartner, Inc. and/or its affiliates in the U.S. and internationally and are used herein with permission. All rights reserved. About Netskope Netskope, a global cybersecurity leader, is redefining cloud, data, and network security to help organizations apply Zero Trust principles to protect data. Fast and easy to use, the Netskope platform provides optimized access and real-time security for people, devices, and data anywhere they go. Netskope helps customers reduce risk, accelerate performance, and get unrivaled visibility into any cloud, web, and private application activity. Thousands of customers, including more than 25 of the Fortune 100, trust Netskope and its powerful NewEdge network to address evolving threats, new risks, technology shifts, organizational and network changes, and new regulatory requirements.

Read More