PLATFORM SECURITY

Vectra Becomes AWS Security Competency Partner

Vectra | June 30, 2022

Vectra
Vectra AI, a pioneer in threat detection and response, said today that it has been an Amazon Web Services (AWS) Security Competency Partner, proving its technical knowledge and demonstrated customer success when it comes to further protecting AWS environments. The competence designation acknowledges Vectra's strong cloud security experience and proven technology, which assists clients in further enhancing their security measures across hybrid architectures and cloud environments.

Vectra's AWS Security Competency distinguishes it as an AWS Partner Network (APN) member that delivers specialized threat detection technologies to assist organizations in adopting, developing, and deploying complex security projects on AWS. To be eligible for this distinction, APN members must have extensive AWS knowledge and be able to offer solutions on AWS effortlessly. Vectra earned AWS Security Competency accreditation after a thorough qualification process based on references and customer feedback.

"Becoming an AWS Security Competency Partner is an exciting milestone for Vectra and for many of our customers who leverage AWS as a critical component in their everyday operations. Solving threat detection and response challenges for our customers is top priority and this competency further validates our ability to do that in the cloud and wherever organizations choose to configure their environments."

Michael Porat, Vectra SVP, Corporate and Business Development

"We are an AWS shop. Using AWS VPC Traffic Mirroring, Vectra gives us full visibility into our Nitro-based instances," said Mirza Baig, IT Security Manager at Municipal Property Assessment Corporation (MPAC).

To monitor all infrastructure-as-a-service traffic, the Vectra platform interfaces with AWS Virtual Private Cloud (VPC) traffic mirroring. It also integrates with AWS Security Hub to publish Vectra detections as findings, enabling security teams to correlate Vectra attacker detections with other data sources for faster threat hunting and incident investigations.

"Achieving the AWS Security Competency validates Vectra for its technical expertise and ability by enabling customers to further secure their journey through the different stages of cloud adoption—from migration through day-to-day management," said Dudi Matot, Security Segment Lead at AWS.

Spotlight

"Next-generation sequencing has fundamentally altered biomedical research, generating large amounts of analytical data. This large-scale data requires a scalable, robust, and secure storage and analysis solution. BaseSpace is a genomics cloud analysis built by Illumina on Amazon’s Web Services (AWS). Illumina has chosen to work with AWS as the leader in cloud-based infrastructure, hosting customer-facing services and critical operations for both private industry and government departments including Treasury, DOE, and State. "

Spotlight

"Next-generation sequencing has fundamentally altered biomedical research, generating large amounts of analytical data. This large-scale data requires a scalable, robust, and secure storage and analysis solution. BaseSpace is a genomics cloud analysis built by Illumina on Amazon’s Web Services (AWS). Illumina has chosen to work with AWS as the leader in cloud-based infrastructure, hosting customer-facing services and critical operations for both private industry and government departments including Treasury, DOE, and State. "

Related News

SOFTWARE SECURITY

Fusion Connect Introduces Extensive Security Portfolio to Help Enterprises Take Control of Their IT Environment

Fusion Connect | July 22, 2022

Fusion Connect, a leading provider of managed security and collaboration services, has launched a comprehensive security offering with a new endpoint management and security service that allows businesses to identify, control, and secure devices and applications at a time when security threats continue to disrupt companies globally. The new portfolio enables organizations to better understand the complete picture of their security risks and take action to mitigate them. Fusion Connect provides a complete solution that secures against threats while also hunting for unknown vulnerabilities that can upend a business from managing network components with advanced edge security for unified threat management (UTM) and remote access VPN to device level management. Additionally, the new portfolio helps organizations to improve reaction time to threats by connecting and securing any element in the organization's environment. The centralized platform enables enterprises to take swift action by providing a wide range of capabilities to improve IT efficiency and security hygiene. Fusion Connect's enhanced security measures come at a time when a massive talent shortage persists globally. According to (ISC)², the size of the cybersecurity workforce is 65% below what it needs to be. "Heavier workloads, unfilled positions, and security employee burnout are making things especially chaotic in cybersecurity. "With cyberattacks becoming more common, more sophisticated, and more costly, businesses need to quickly fill gaps and stop just simply firefighting. Using artificial intelligence and strategic managed services partners are ways to ensure organizations are protected and can mitigate threats before the attack occurs. And that's what our latest offering addresses." Ken Morford, Vice President of Security at Fusion Connect Fusion Connect plans to continue expanding its comprehensive security portfolio to empower CISOs to gain the control, visibility, and speed needed to thwart cyber threats and keep their networks and organizations secure. About Fusion Connect Fusion Connect manages, orchestrates, and secures the critical technology infrastructure that enables the connected enterprise. We tailor our highly available and secure cloud communication, collaboration, security, and network management platforms to meet the unique needs of our mid-market and enterprise customers. Our AI-based management systems, along with our highly skilled technicians, dynamically ensure world-class application performance under any conditions.

Read More

PLATFORM SECURITY

SilverSky and NRTC Announce Cybersecurity Partnership

SilverSky | June 03, 2022

SilverSky, a cybersecurity innovation that provides advanced managed detection and response (MDR) services, and NRTC, a member-driven and technology-focused organization located in Herndon, Virginia, announced today an agreement to provide cybersecurity services to NRTC members. NRTC, which already offers a wide range of managed services to its energy and telecom members will now add SilverSky's award-winning MDR services to its portfolio, allowing the cooperative to offer its members the most up-to-date managed cybersecurity services. Managed endpoint protection, multi-factor authentication, and security awareness training are among the services provided, as are vulnerability assessments, penetration testing, and email security. "Accompanying our ongoing emphasis on serving frequently underserved healthcare organizations and educational institutions, this partnership with NRTC helps expand that effort with a distinct focus on the needs of our nation's rural communities. SilverSky's MDR services are powerful, yet easy to deploy and affordable – offering an appealing mix for NRTC's members. We look forward to working with the NRTC Managed Services team to provide these valuable services." Jason McGinnis, President and COO at SilverSky Jon Bartleson, President of NRTC's Managed Services division said that "Our members provide essential electric and telecommunications services to rural America and thus are obvious targets for hackers. It is vital we arm them with comprehensive cybersecurity tools and resources. Cybersecurity is a top priority for our members and staffing for these types of roles is a major challenge. We chose to partner with SilverSky to make sure we could offer comprehensive, affordable managed cybersecurity to our members." On June 7 at 2 p.m. Eastern, SilverSky and NRTC will offer a webinar for NRTC members. On the NRTC website, members can subscribe for Managed Cybersecurity Made Simple, Affordable, and Accessible for Telcos and Electric Cooperatives.

Read More

PLATFORM SECURITY

Delinea Publishes Guide for Server Security

Delinea | June 01, 2022

Delinea, a leading supplier of PAM solutions for seamless security, released "Conversational Server Access Security" to assist enterprises safeguard hybrid infrastructure against assaults. The free eBook from Conversational Geek illustrates how to use Zero Trust to adhere with Least Privilege and decrease risk. Cybercriminals target Windows, UNIX, and Linux servers on-premise and in the cloud to exploit vulnerabilities. By attacking servers, fraudsters may access financials, IP, and more, opening the door to system-wide data theft, ransomware, and worse. Delinea's guide on server access security explains how stacking security measures directly on servers can check that privileged credentials have the proper rights at every access point. Implementing a Zero Trust cybersecurity approach based on the Principle of Least Privilege reinforces this by giving access to server resources only to confirmed identities with the necessary entitlements, when they need them, and for only the time required to perform the job. Then remove those rights so they cannot be exploited. "The concepts of Zero Trust and least privilege are not new, but many IT and security professionals are unclear about how to apply them in rapidly-changing, more complex hybrid environments. This new resource can help anyone get a better understanding of how to secure access to on-premises and cloud servers and take actionable steps to avoid becoming the next victim of cybercrime targeting modern infrastructure." Joseph Carson, Chief Security Scientist and Advisory CISO at Delinea The eBook's best practices assist cybersecurity professionals in implementing a server access security plan to: Find and remove standing privileges that allow users to connect to servers from anywhere and at any time. At each access control point, verify identities and permissions. Make certain that only authorized users may access or modify resources on each server. Allow users just-enough, just-in-time access and only provide elevated access when necessary. At the server-side, log and record behavior.

Read More