Data Security

To speed up the distribution of cyber insurance for small companies, Cowbell Cyber Partners with Mylo

prnewswire | November 05, 2020

Cowbell Cyber, the business' first AI-controlled digital protection supplier for little to moderate sized organizations (SMBs), today declared it has cooperated with Mylo – the advanced specialist dispatched by the world's biggest free merchant, Lockton – to empower expanded dispersion of Cowbell's independent digital protection to the private company market, a territory customarily underserved by digital protection.

Organizations of all sizes are getting more dependent on an advanced climate given the present far off setting, regularly leaving them presented to expanded online protection weaknesses including information penetrates, ransomware assaults, digital wrongdoing, and then some. Along these lines, the interest in digital inclusion has definitely expanded as organizations acknowledge digital protection is currently a need, not an extravagance.

Mylo chose Cowbell Cyber in light of the fact that Cowbell Prime – Cowbell's independent, conceded digital protection programs – addresses the difficulties looked by private companies while considering protection including:

Lucidity of the arrangement terms: entrepreneurs can now quickly comprehend the insurance they will get

Importance: Quote and strategies are adjustable in a couple of snaps for higher significance for the policyholder

Conceded program: Ensures that everything has been altogether verified by state level offices

Prevalent danger the board apparatuses: Free danger appraisal and moderation devices increase the value of private venture on the very first moment of the strategy
"We are excited to partner with Mylo to deliver on the promise of customized cyber coverage and easy-to-use risk management tools for their expanding client base," said Dan Law, Head of National Accounts at Cowbell Cyber. "Partnering with Mylo will allow us to better distribute cyber insurance to the currently underserved markets, ultimately helping customers with their cyber resilience."

"As an advocate for small business owners, we care about helping them prepare for a cyberattack that could threaten everything they've worked so hard to build," said Mylo COO, Belen Tokarski. "Mylo and Cowbell Cyber are a great fit because we both focus on using technology to give businesses the protection they need to anticipate and recover from serious risks."

The association carries critical efficiencies to Mylo's operators including:

Speed: Cowbell Prime empowers operators to set up different, tweaked cites in a couple of snaps

Usability and straightforwardness: Selling of digital protection is rearranged with inclusions that are introduced to policyholders in a straightforward way, alongside Cowbell Factors to recognize hazard deviation from the business normal

No coupling delays: Every statement gave by Cowbell Prime can be momentarily bound

About Cowbell Cyber
Cowbell Cyber is dedicated to providing standalone, admitted, individualized and easy-to-understand cyber insurance for small and mid-size businesses. In its unique AI-based approach to risk selection and pricing, Cowbell's continuous underwriting platform, powered by Cowbell Factors, compresses the insurance process from submission to issue to less than 5 minutes. Cowbell Insurance Agency is currently licensed in 34 U.S. states and provides SMBs with admitted cyber insurance on AM Best "A" rated paper with up to $15 Million in coverage.
About Mylo
Mylo is a digital one-stop-shop that makes it easy for businesses and individuals to compare and purchase top-rated insurance products from multiple carriers, including business, small group benefits, home, auto, life and individual health. Launched in 2015 by Lockton, the world's largest privately held independent insurance broker, Mylo offers expert insurance recommendations online or on the phone with licensed agents. Mylo can be easily integrated into a partner's customer experience, providing a proven boost in customer engagement.

Spotlight

Risk-Based Authorization solves two challenges: it allows users to gain access from anywhere and ensures that access is secure. Find out how to frustrate attackers, not users with RBA in this guide

Spotlight

Risk-Based Authorization solves two challenges: it allows users to gain access from anywhere and ensures that access is secure. Find out how to frustrate attackers, not users with RBA in this guide

Related News

Web Security Tools

Laminar Launches Two New Solutions to Become First Full Data Security Platform for Multi-Cloud and SaaS Environments

Businesswire | July 13, 2023

Laminar, the leading agile data security platform provider, today announced new data access governance (DAG) and data detection and response (DDR) functions to its Laminar Data Security Platform, making it the first solution on the market to deliver complete identify, protect, detect, and respond capabilities for multi-cloud and SaaS data security. Laminar is now the only data security provider to integrate all critical data security functions – data landscape intelligence, data security posture management (DSPM), DAG, DDR, and privacy and compliance – in a single, integrated platform. Data security and governance professionals need agile data security solutions that automatically scale with the business to combat the growing divergence between the dynamic and ever-growing activities that contribute to innovation while also fighting the lagging data security efforts intended to protect the business — that are becoming increasingly insufficient. The foundation of agile data security begins with cloud-native data discovery and classification which detects all known and unknown, or “shadow,” data to help organizations understand what data resides where, how sensitive the data is, and who or what has access to it. With this context, security posture can be assessed and appropriately enforced. From there, it's critical to have the ability to continually monitor and protect against emerging threats. The addition of DAG and DDR to the Laminar Data Security Platform provides the following benefits to organizations: Data Access Governance (DAG) reduces exposure and minimizes the blast radius from data leaks by controlling user and machine access to sensitive data and ensuring least privilege. Data Detection and Response (DDR) alerts on data breaches and other anomalies as they occur to quickly contain any active threats and minimize the potential damage for businesses. The new DAG and DDR services complement the following capabilities already existing in the Laminar Data Security Platform: Data Landscape Intelligence: Provides a holistic view of asset and data inventory with contextual intelligence from autonomous discovery and classification of all known and unknown cloud data. Data Security Posture Management (DSPM): Enforces policies and safeguards sensitive data with risk-based prioritization, enabling organizations to focus on what matters most. Privacy & Compliance: Ensures data security practices align with regulations and standards to streamline audits, avoid fines and reduce audit costs. Laminar is the only data security provider to now integrate all five elements of an agile platform architecture for a complete data security solution. This integrated design provides more accurate detection, comprehensively protects data, and streamlines remediation. “Security-in-depth best practices have historically needed the ability to identify, protect, detect, and respond to threats. Cloud data security is no different,” said Amit Shaked, CEO and co-founder, Laminar. “Our new DAG and DDR features make our platform the reference model for achieving agile data security in the cloud. All five components work in conjunction to deliver a unified, streamlined experience.” “Protecting data in the cloud requires different tools than are used to protect on-premises data, and organizations need a purpose-built cloud data security solution. Enterprise Strategy Group recommends organizations explore solutions like Laminar that provide a holistic approach to the entire process of securing data in the cloud and provide unified and integrated data security across multiple clouds,” said Jack Poller, Senior Analyst, Enterprise Strategy Group. About Laminar Laminar is the leading agile data security platform and provides organizations with the visibility and control they need to achieve data security, governance, and privacy in the cloud. Our cloud-native data security solution continuously discovers and classifies all cloud data, structured and unstructured, across managed and self-hosted data stores, including unknown shadow data, without the data ever leaving your environment. It analyzes access, usage patterns, and security posture, and provides actionable, guided remediation for data security risk. Laminar connects to your multi-cloud environment including AWS, Azure, GCP, Snowflake, BigQuery and SaaS applications via APIs and is agentless, asynchronous, and completely autonomous.

Read More

Data Security, Cloud Security

Concentric AI Announces Multi-Lingual Support to Address Growing Global Demand for its Leading Data Security Posture Management Solution

Business Wire | August 24, 2023

Concentric AI, a leading vendor of intelligent AI-based solutions for autonomous data security posture management (DSPM), today announced support for data in German, Spanish, Italian, French, and Dutch languages, enabling it to meet rapidly growing global demand for its leading DSPM solution. As a result, today’s update to Concentric AI’s Semantic Intelligence™ DSPM solution enables multinational customers to discovery, classify, categorize, and secure their data in these newly supported languages. It also accelerates Concentric AI’s international expansion by addressing the data security needs of new customers that have a significant amount of private data in these languages. “We have seen a significant amount of interest from international customers, and with today’s announcement we are bringing our groundbreaking AI-enabled DSPM solution to more customers and countries,” said Karthik Krishnan, Founder and CEO, Concentric AI. “The way Concentric AI understands the content and context of data using Large Language Models (LLMs) differentiates us from competitors in the Data Access Governance and DSPM space. These new advancements will fuel our expansion into new markets as well as expand support for non-English data for our existing multinational customers.” Concentric AI’s Semantic Intelligence solution is enabled by LLMs that understand clients’ data to enable the industry’s most accurate data classification and DSPM solution. Now the LLMs developed by Concentric AI can read and understand the context of files, documents, and data in these new languages to provide the most accurate data discovery and classification solution to unmet needs in new markets. “This update is also important for our partners because many of their customers are either internationally based or they have customers who have data in multiple languages,” added Krishnan. “It also enables us to grow our partner ecosystem in these important new markets.” Concentric AI’s DSPM solution scans organizations’ data, detects sensitive or business critical content, identifies the most appropriate classification category, and automatically tags the data. Concentric AI uses artificial intelligence (AI) to improve discovery and classification accuracy and efficiency to avoid endless regex rules and inaccurate end user labeling. In addition, Concentric AI can monitor and autonomously identify risk to financial and other data from inappropriate permissioning, wrong entitlements, risky sharing, and unauthorized access. It can automatically remediate permissions and sharing issues or leverage other security solutions and cloud APIs to quickly and continuously protect exposed data. Concentric AI’s Semantic Intelligence™ automates unstructured and structured data security using deep learning to categorize data, uncover business criticality and reduce risk. Its Risk Distance™ analysis technology uses the baseline security practices observed for each data category to spot security anomalies in individual files. It compares documents of the same type to identify risk from oversharing, third-party access, wrong location, or misclassification. Organizations benefit from the expertise of content owners without intrusive classification mandates, with no rules, regex, or policy maintenance needed. About Concentric AI With Concentric AI, organizations can finally address their unmet data security needs by discovering and protecting business-critical content. Concentric AI protects intellectual property, financial data, PII/PCI content, customer data, business confidential content and more, across on-premises and cloud-based data stores, as well as messaging and communication applications. The Concentric AI Semantic Intelligence™ Data Security Posture Management (DSPM) solution uses deep learning and Risk Distance™ analysis to accurately categorize data, assess risk, and remediate security issues – without relying on upfront rules or complex configuration. Concentric AI is venture-backed by leading Silicon Valley VCs and is headquartered in San Jose, Calif.

Read More

Enterprise Security, Platform Security, Software Security

Detectify Improves Attack Surface Risk Visibility With New IP Addresses View

Business Wire | August 14, 2023

Detectify, the leading External Attack Surface Management platform powered by elite ethical hackers, today announced enhancements to its platform that can significantly help to elevate an organization’s visibility into its attack surface. Many organizations need help gaining visibility into the IP addresses across their whole environment. Detectify's new capabilities enable organizations to uncover unauthorized assets and ensure regulatory compliance. The attack surface has grown exponentially, not least in how decentralized organizations have become. Over 10% of Detectify customers are hosting data across three continents, illustrating how their products and services are more global than ever. Detectify also notes that 30% of their customer base is leveraging more than 5 service providers, which reflects the growing trend in vulnerabilities as a result of human errors, like server misconfigurations. Moreover, organizations are quickly expanding their digital footprint, with 73% of Detectify customers using IPv6 addresses. With the introduction of the new IP Addresses view, Detectify users gain seamless access to a comprehensive list of all IPs associated with their domains, accompanied by valuable insights, including hosting provider details, geographical locations, and Autonomous System Numbers (ASNs). This update is further complemented by interactive charts, enabling users to detect outlier countries or providers, and streamlining the process of identifying potential security concerns. "It's not uncommon for our customers to encounter instances where unauthorized geolocations are used to spin up new machines or witness sudden spikes in hosting activities from approved countries,” said Danwei Tran Luciani, Interim VP of Product at Detectify. “These anomalies can expose organizations to risk, particularly when traditional automated detection methods fall short. Our new IP Addresses view empowers security teams to proactively address these challenges, strengthening their overall cybersecurity posture." Detectify's new IP Addresses view provides security teams with tangible benefits to navigate complex attack surfaces, such as: Uncovering unauthorized assets: For organizations with large attack surfaces, this capability allows users to identify unauthorized assets hosted by unapproved vendors. By instantly detecting an asset being hosted by a non-approved provider, security teams can take swift action and mitigate potential threats. Ensuring regulatory compliance: For businesses operating in highly regulated environments where compliance is paramount, the new view is critical in determining the hosting locations of specific customer data. This enhanced visibility ensures adherence to regulatory requirements and fortifies data privacy measures. The new IP Addresses view is now available to all Detectify customers, reinforcing the company's commitment to empowering security teams with cutting-edge solutions to safeguard organizations’ ever-evolving attack surfaces. For more information visit www.detectify.com About Detectify Detectify sets the standard for External Attack Surface Management (EASM), providing 99.7% accurate vulnerability assessments. Product security and AppSec teams trust Detectify to expose exactly how attackers will exploit their Internet-facing applications. The Detectify platform automates continuous real-world, payload-based attacks crowdsourced through its global community of elite ethical hackers, exposing critical weaknesses before it’s too late. Go hack yourself: detectify.com.

Read More