UL Joins ISA Global Cybersecurity Alliance as a Founding Member to Advance Industrial Cybersecurity

prnewswire | October 22, 2020

UL, a leading global safety science company, today announced that it is joining the International Society of Automation (ISA) Global Cybersecurity Alliance (ISAGCA) as a founding member. UL brings more than 125 years of safety and 20 years of cybersecurity experience to help accelerate ISAGCA's mission to advance state-of-the-art cybersecurity for industrial automation and control systems globally. UL's cybersecurity expertise includes a global network of security experts and advisers, industry-leading customer partners, specialized expertise in global security standards, frameworks and best practices, and independent third party experience in cybersecurity evaluation, testing and certification for industry 4.0. UL's broad experience in industrial IoT (IIoT) cybersecurity brings value to the alliance's primary goals of structuring cybersecurity in a globally consistent manner and promoting adoption of the ISA/IEC 62443 series of standards.

Spotlight

Despite the need for effective document collaboration in the enterprise, many organizations are failing to provide their employees with the right tools to get the job done. Today's knowledge worker wants platform-agnostic, on-demand access to their files whenever and wherever they need them... and they'll bring this functionality into the organization whether IT approves of it or not. As a result, end-users are driving the adoption of cloud-based file sharing solutions such as Dropbox and Box, while corporate IT departments tend to dismiss these tools due to security concerns - both perceived and real.

Spotlight

Despite the need for effective document collaboration in the enterprise, many organizations are failing to provide their employees with the right tools to get the job done. Today's knowledge worker wants platform-agnostic, on-demand access to their files whenever and wherever they need them... and they'll bring this functionality into the organization whether IT approves of it or not. As a result, end-users are driving the adoption of cloud-based file sharing solutions such as Dropbox and Box, while corporate IT departments tend to dismiss these tools due to security concerns - both perceived and real.

Related News

PLATFORM SECURITY

Deloitte Launches Zero Trust Access, a New Managed Security Service

Deloitte | July 12, 2022

To help organizations adopt zero trust more quickly and efficiently, Deloitte is launching a new managed service – Zero Trust Access— that offers a cloud-native approach to securing communications between users, on any device, and enterprise applications, wherever they may reside. The Zero Trust concept commits to removing implicit trust within an information technology (IT) ecosystem and replacing it with a risk-based approach to accessing organizational resources across identities, workloads, data, networks and devices. This trend is gaining momentum, given legacy approaches to security architecture are no longer suitable to secure the ubiquitous nature of the modern enterprise. Part of the newly expanded Zero Trust by Deloitte, Zero Trust Access facilitates zero trust adoption and the evolving needs of organizations in protecting their applications, infrastructure, and data. Following the integration of recently acquired talent and technology into existing Deloitte services, the Zero Trust Access managed service connects users to applications through a frictionless cloud-native solution that is inherently scalable, resilient, agile, and secure. Further, the managed service is available standalone, integrated with other Deloitte offerings, or as part of a broader solution leveraging technologies from Deloitte's alliances ecosystem. "As perimeter-based approaches are no longer suitable to secure the modern enterprise, many organizations are working to enhance protection for their IT ecosystems via zero trust. "Zero Trust Access was built as a turnkey managed service helping ourselves and our clients accelerate adoption of this transformative security framework. Our goal was to create a cost-effective solution that can be delivered standalone or complementary to a broader ecosystem and ultimately help decrease the burden on IT and security teams who likely need to manage multiple heterogenous solutions to achieve similar outcomes." Andrew Rafla, Deloitte Risk & Financial Advisory's zero trust offering leader and principal, Deloitte & Touche LLP With innovative data protection leveraging device-level secure microcontainer technology, Zero Trust Access helps protect infrastructure while also enabling organizations to protect sensitive enterprise data and enforce least privilege through dynamic access control to enterprise assets. The managed service can replace remote access solutions inclusive of virtual private network (VPN), virtual desktop infrastructure (VDI), and desktop as a service (DaaS), all of which typically require significant capital expenditure for infrastructure, high operating costs, and technology management overhead. Zero Trust Access includes features such as ephemeral connectivity built upon secure peer-to-peer (P2P) communication, conditional access and continuous authorization, as well as robust data protection for data at-rest, in-use, and in-transit are consistently applied to each session, regardless of the type or location of the applications being accessed (e.g., legacy hosted applications, software as a service (SaaS), thick-client, web-based applications). Implementation of Zero Trust Access can help organizations leverage outcome-based solutions that improve business agility, enhance user productivity, and reduce cost and complexity of security operations. "Beginning zero trust adoption isn't simple, fast or easy for most organizations," Deborah Golden, Deloitte Risk & Financial Advisory Cyber and Strategic Risk leader and principal, Deloitte & Touche LLP. "We're launching Zero Trust Access as the first in many adoption-enabling services and solutions to come, so that our clients are better able to modernize their security programs, enable agile operations and confidently advance with emerging technologies and transformative risk management principles that can build more resilient security practices." About Deloitte Deloitte provides industry-leading audit, consulting, tax and advisory services to many of the world's most admired brands, including nearly 90% of the Fortune 500® and more than 7,000 private companies. Our people come together for the greater good and work across the industry sectors that drive and shape today's marketplace — delivering measurable and lasting results that help reinforce public trust in our capital markets, inspire clients to see challenges as opportunities to transform and thrive, and help lead the way toward a stronger economy and a healthier society. Deloitte is proud to be part of the largest global professional services network serving our clients in the markets that are most important to them.

Read More

NETWORK THREAT DETECTION

Chariton Valley Commits To Protecting All Customers From Growing Cybersecurity Threats With Calix ProtectIQ Home Network Security

Calix | July 15, 2022

Calix, Inc. (NYSE: CALX) announced today that Chariton Valley Telephone Corporation (Chariton Valley) expects to double its customer connections after providing ProtectIQ® home network security to all customers at no cost. Chariton Valley leverages the full power of Calix Revenue EDGE to transform its value proposition and improve the customer experience. In May, the 70-year-old broadband service provider (BSP) launched ProtectIQ, part of Calix Revenue EDGE Suites, as it continues to roll out GigaSpire® BLAST systems across its Midwestern communities. In a climate of increased cybersecurity concerns, Chariton Valley has equipped all GigaSpire BLAST customers with effortless access to robust home network security. In doing so, the BSP increases customer loyalty across rural regions and nearby cities in north-central and northeast Missouri. Many Chariton Valley customers have sophisticated internet habits—half identify as gamers and almost 40 percent work from home. By evolving its value proposition, the innovative BSP has also fortified itself against billion-dollar market cap competition in Palmyra and Hannibal. In its first two months of offering ProtectIQ to all customers, Chariton Valley blocked more than 48,000 web threats, intrusions, malware, and viruses from entering home networks—proving the immediate value of its investments. The comprehensive Revenue EDGE platform enables BSPs of all sizes to easily and quickly launch differentiating turnkey, managed offerings. Chariton Valley continues to evolve its value proposition and strengthen its growing customer connections by: Transforming its business to help communities thrive for decades. Chariton Valley is on track to complete a historic five-year, $42 million fiber-to-the-home (FTTH) buildout in its member service territory, and another $40 million in expansion opportunities next year by leveraging the secure broadband access network platform, Calix Intelligent Access EDGE™. In May, it began rolling out turnkey, managed offerings in EDGE Suites, starting with ProtectIQ, recently recognized by the cybersecurity industry as “Best in Anti-Phishing, Network Security & Management,” at no cost to its customers. As a result, Chariton Valley blocked thousands of web threats in only two months—further proving the value of its investment in the region. Creating internet experiences that grow with customers’ needs. After the successful rollout of ProtectIQ, Chariton Valley is now taking a targeted approach to introduce its second EDGE Suite, the advanced parental controls in ExperienceIQ®. Calix-partnered BSPs have seen a 178 percent increase in people using ExperienceIQ since the beginning of the year. Both ProtectIQ and ExperienceIQ are accessed through the BSP’s branded subscriber-facing mobile app, built on CommandIQ®, giving customers more control over their home networks. Leveraging data and insights to offer services that meet each customer’s unique needs. Using the insights and analytics in Calix Marketing Cloud (Marketing Cloud), even a small BSP like Chariton Valley can successfully leverage data for segmenting and targeting. For example, Chariton Valley uses Marketing Cloud to uncover which of its customers are most likely to need the advanced parental controls of ExperienceIQ. Now their marketing team can quickly identify the right people for the new service. This enables Chariton Valley to get maximum ROI from every dollar invested in marketing. “As a member-owned organization, the customer experience informs everything we do,” said Kirby J. Underberg, president and chief executive officer at Chariton Valley. “Chariton Valley is committed to the region’s future—the investment we made building a secure fiber network will benefit people living in north-central and northeast Missouri for the next three decades. However, we also understand that we are responsible for protecting our customers from the increasing threat of digital dangers that come along with the positive generational impact of secure, fast Wi-Fi. By adding critical services like home network security and advanced parental controls, we will continue to invest in our customers by providing superior internet experiences long after the latest deals from our competitors expire.” Along with ProtectIQ and ExperienceIQ, EDGE Suites also includes connected home camera security systems (Arlo Secure). Additionally, Calix is launching two new managed offerings this summer: social media monitoring (Bark) and connected device protection (Servify Care). “Chariton Valley’s incredible first two months offering ProtectIQ to all customers underlines why today’s successful broadband business must be about more than just fast Wi-Fi, ProtectIQ has helped BSPs of all sizes block millions of digital threats in 2022. The Missouri-based market leader competes against a billion-dollar market cap company and wins because it leverages the full power of the Revenue EDGE platform to easily and quickly launch turnkey, managed offerings like ProtectIQ that improve the customer experience. We look forward to supporting Chariton Valley’s continued growth as they evolve their value proposition to reflect their commitment to protecting customers in north-central and northeast Missouri.” Matt Collins, executive vice president of commercial operations and chief marketing officer at Calix About Calix Calix, Inc. Calix cloud and software platforms enable service providers of all types and sizes to innovate and transform. Our customers utilize the real-time data and insights from Calix platforms to simplify their businesses and deliver experiences that excite their subscribers. The resulting growth in subscriber acquisition, loyalty, and revenue create more value for their businesses and communities. This is the Calix mission: to enable broadband service providers of all sizes to simplify, excite, and grow. This press release contains forward-looking statements that are based upon management’s current expectations and are inherently uncertain. Forward-looking statements are based upon information available to us as of the date of this release, and we assume no obligation to revise or update any such forward-looking statement to reflect any event or circumstance after the date of this release, except as required by law. Actual results and the timing of events could differ materially from current expectations based on risks and uncertainties affecting Calix’s business. The reader is cautioned not to rely on the forward-looking statements contained in this press release. Additional information on potential factors that could affect Calix’s results and other risks and uncertainties are detailed in its quarterly reports on Form 10-Q and Annual Report on Form 10-K filed with the SEC.

Read More

DATA SECURITY,ENTERPRISE IDENTITY,SOFTWARE SECURITY

Tanium Unveils Groundbreaking Integration with Microsoft Sentinel

Tanium | September 16, 2022

Tanium, the industry’s only provider of converged endpoint management (XEM), today announced the first of several powerful integrations between Microsoft and the Tanium XEM platform. The integration marks the latest expansion in a relationship that includes Tanium’s membership in the Microsoft Intelligent Security Association (MISA) and its availability in the Microsoft Azure Marketplace. By making Tanium’s rich, real-time endpoint data accessible directly from the Sentinel console, the integration enables IT organizations to comprehensively detect, investigate, triage, prioritize, and remediate threats automatically, extending Sentinel’s advanced security and analytics capabilities, reducing the number of false positives that require disposition, and allowing security practitioners to better identify threats that might otherwise be missed. “Environments like ours are complex — there’s a great diversity of the types of devices and a large number of users accessing sensitive information,” said Mark Wantling, CIO the University of Salford. “It‘s a lot for my relatively small InfoSec team to manage, so I'm very excited about Tanium's integration with Microsoft Sentinel. Now my team can investigate, identify, triage, and remediate threats quickly without even leaving the Sentinel console, and that's a gamechanger.” The Tanium integration with Sentinel also enables active threat hunting. With Tanium’s detailed real-time data taken directly from the endpoint, security practitioners are better able to contextualize and correlate alerts sourced from both Microsoft and Tanium with almost no delay across an entire IT environment. They get accurate real-time data rather than information that may no longer be correct as a result of inherent latency. Additionally, Tanium gives incident responders the ability to take immediate action on alerts as they happen including quarantining a device, deploying a patch, or updating software, all from the Sentinel console. Customers benefit from proactive, predictive, automated management of their entire IT stack. Tanium + Sentinel gives Microsoft customers the ability to monitor and ensure their Microsoft’s solutions are highly available and operate at optimal health. With its real-time distributed architecture, Tanium can independently verify that all Microsoft services are deployed and up-to-date and validate that it is fully performant on every endpoint. If needed, customers can easily deploy a patch or quarantine a device in seconds to ensure they get the most out of their Microsoft investments. “We’re excited to continue to expand our relationship with Microsoft. “Already we work together to make Microsoft environments healthier and more secure by reducing risks for customers and protecting their investments in Azure, and soon we’ll be releasing a series of powerful integrations with Microsoft tools in addition to our Sentinel Integration.” Rob Jenks, SVP of corporate strategy at Tanium In addition to joining MISA, Tanium is available in the Microsoft Azure Marketplace, an online store providing applications and services for use on Azure. Customers can purchase and provision Tanium directly from the marketplace and apply the purchase to their Microsoft Azure Consumption Commitments (MACC). Tune in now to hear Tanium CEO Orion Hindawi and Microsoft Corporate VP of Cybersecurity Ann Johnson discuss the vision for the partnership and how Tanium’s real-time data and control can enhance security, performance, and automation for today’s growing enterprises. You can also visit www.youtube.com/watch?v=S-gZC9M3lkE. About Tanium Tanium, the industry’s only provider of converged endpoint management (XEM), leads the paradigm shift in legacy approaches to managing complex security and technology environments. Only Tanium protects every team, endpoint, and workflow from cyber threats by integrating IT, Compliance, Security, and Risk into a single platform that delivers comprehensive visibility across devices, a unified set of controls, and a common taxonomy for a single shared purpose: to protect critical information and infrastructure at scale. Tanium has been named to the Forbes Cloud 100 list for seven consecutive years and ranks on Fortune’s list of the Best Large Workplaces in Technology. In fact, more than half of the Fortune 100 and the U.S. armed forces trust Tanium to protect people; defend data; secure systems; and see and control every endpoint, team, and workflow everywhere. That’s the power of certainty.

Read More