DATA SECURITY

WafCharm Provides Breakthrough Automation of AWS WAF, Enhancing Cybersecurity for Businesses Amidst Ongoing Global Attacks

Cyber Security Cloud Inc. | June 01, 2021

Cyber Security Cloud Inc. (CSC), the world’s leading innovator in cyber threat intelligence and AI-driven web security, announced today that its WafCharm service fully manages AWS WAF operations and automatically optimizes rules for AWS WAF to assist in addressing web-related cyber attacks against business and critical government infrastructure, which are increasing globally. WafCharm is the only service on the market that builds, tests, and tunes AWS WAF rules automatically and continuously defends against zero-day threats.

While WafCharm protects against the OWASP 10 — the most critical web application security risks — it also automatically implements new rules in reaction to zero-day vulnerabilities found by CSC’s top threat intelligence team, Cyhorus.

CSC CEO Toshihiro Koike said, “As the need for web security grows globally, managing WAF with high accuracy has become a critical problem for many enterprises and web service providers.” WafCharm, our product, is an innovative solution that allows anybody to effortlessly and safely protect their web services. Companies should focus on innovation and value creation without having to worry about WAF rule management. We are happy to reach out to those who want to minimize expenses and effort while maintaining security accuracy to protect their environments better.”

About Cyber Security Cloud Inc.

The mission of the Cyber Security Cloud is to provide safe cyberspace for people all around the world to use. CSC provides web application security services in over 70 countries, using the most effective cyber threat intelligence and AI-driven security technology available. As one of the world’s few Amazon Web Services (AWS) WAF Managed Rules Sellers certified by AWS — the cloud giant that controls almost half of the global cloud market — CSC optimizes and automates rules best suited to each customer’s AWS deployments as new cyber threats arise. CSC also offers a scalable WAF solution for Microsoft Azure and other clouds. CSC, a global leader in cybersecurity, continues to develop and refine award-winning technologies and security solutions that contribute to the information revolution.

Spotlight

A cybersecurity framework is a plan for keeping your data and systems safe. It often addresses an organization’s overall security objectives rather than focusing exclusively on just IT elements. Everyone within your organization should make cybersecurity a priority, not just the so-called nerds in the wiring closet. A cybersecurity framework should thoroughly address personnel, networking systems, business computers, portable equipment, operating systems, software, services, business processes, work tasks, communications, data transit, and storage. Most cybersecurity frameworks are intended to improve the existing security infrastructure already in place.

Spotlight

A cybersecurity framework is a plan for keeping your data and systems safe. It often addresses an organization’s overall security objectives rather than focusing exclusively on just IT elements. Everyone within your organization should make cybersecurity a priority, not just the so-called nerds in the wiring closet. A cybersecurity framework should thoroughly address personnel, networking systems, business computers, portable equipment, operating systems, software, services, business processes, work tasks, communications, data transit, and storage. Most cybersecurity frameworks are intended to improve the existing security infrastructure already in place.

Related News

PLATFORM SECURITY

Axonius Adds Key Integrations with AWS

Axonius | July 25, 2022

Axonius, a cybersecurity asset management provider, today announced integrations with Amazon Macie, Amazon GuardDuty, and AWS SecurityHub while extending its Amazon Inspector functionality. These new integrations will help customers to better understand and manage vulnerabilities across their Amazon Web Services (AWS) infrastructure. By connecting to both AWS first-party and ISV-third party security solutions, Axonius provides comprehensive visibility and management of assets across AWS cloud, multi-cloud, and on-premises. The latest integrations provide the following capabilities: Identify Exposed Amazon S3 Buckets: Axonius fetches findings from Amazon Macie to help customers identify exposed Amazon S3 buckets to maintain data integrity and compliance. Detecting Malicious Activity & Compromised Security Controls: By integrating with Amazon GuardDuty, Axonius helps customers detect malicious activity to protect AWS accounts, workloads, and data and help them understand which assets have compensating security controls. Helping Meet Security Best Practices: With insights from AWS SecurityHub, customers can compare against correlated data to verify whether assets that don't meet best practice standards have a compensating security control. Comprehensive View of Cloud Security Posture: Axonius delivers a complete inventory of assets from more than 450 correlated data sources giving customers a comprehensive view of their cloud security, including vulnerability data from Amazon Inspector. "As companies continue to shift workloads to the cloud, they're also increasingly leveraging cloud provider-native security service offerings. "Yet customers are still exhausted by the highly-manual, slow, and error-prone processes that negatively impact their risk mitigation, threat management, and compliance. With Axonius and AWS, customers finally have a unified view of their assets while dramatically strengthening their security posture." Mark Daggett, Vice President of Worldwide Channels and Alliances at Axonius About Axonius Axonius is the cybersecurity asset management platform that gives organizations a comprehensive asset inventory, uncovers gaps, and automatically validates and enforces policies. Deployed in minutes, the Axonius cyber asset attack surface management (CAASM) solution integrates with hundreds of data sources to give customers the confidence to control complexity by mitigating threats, navigating risk, decreasing incidents, automating response actions, and informing business-level strategy. Cited as one of the fastest growing cybersecurity startups, with accolades from CNBC, Forbes, and Fortune, Axonius covers millions of devices for customers around the world.

Read More

DATA SECURITY,PLATFORM SECURITY,SOFTWARE SECURITY

Hillstone Networks Targets Cyberattacks at Network Edge with High-End Next Generation Firewall Offerings

Hillstone Networks | August 25, 2022

Hillstone Networks, an innovative and accessible cybersecurity solutions provider, today unveiled new models in the Hillstone Networks A-Series Next Generation Firewalls (NGFW), the A7600 and A6800, to help enterprises secure their expanding network edge, deliver powerful network security capabilities, and drive sustainability with solutions in a compact 1RU form factor. According to IBM’s Cost of a Breach 2022 report, 83% of organizations studied have had more than one breach. Cyberattacks are not abating, and the cost, damages and recovery from a single breach continue to rise. Against an aggressive cyberattack backdrop, the volume and complexity of traffic in today’s IT environments continue to exponentially increase due to the expansion of different services such as videos, apps, and cloud-based-everything. With increased connectivity to services comes an increased complexity of vulnerabilities to secure against. Secure An Expanded Network Edge with Hillstone A-Series Next Generation Firewalls Enterprises need high-performing next-generation firewalls to meet today’s bandwidth requirements, service levels, and defend against more advanced threats. As the network edge expands from the traditional on-premises network perimeter, IT teams now must secure unforeseen levels of depth, as all layers of the IT stack must be secured at the edge. Minimize the Speed versus Security Trade-off with Proprietary Hardware Acceleration Engine IT teams regularly compromise one need over another, based on budget or resources. Hillstone’s proprietary Hardware (HW) Acceleration Engine offloads network traffic from the processor, allowing more resources to be dedicated for comprehensive security services, bringing streamlined threat detection and prevention capabilities to high-traffic applications and scenarios. The HW Acceleration Engine delivers ultra-low latency in network packet forwarding, allowing the NGFW to sift through and secure even the most latency-sensitive applications, including multimedia streaming, broker services, and other high-volume transactions. Native Cyberresilience Combined with High Throughput/Low Latency Deliver on App and Customer Experience Raw processing speed, with throughputs of 200 Gbps and 280 Gbps, allow for packet forwarding within a few microseconds, delivering quality of service across networks. Enterprise-grade security features come native with these offerings, including comprehensive and advanced threat protection for known and unknown malware with multiple security services, including Intrusion Prevention, IP Reputation, URL Filtering, Anti-Spam, Anti-Virus, Cloud Sandbox, Botnet C2, among others. “Because today’s network traffic across all applications and services is increasing both in complexity, and in volume across hybrid and multi-cloud deployments, a high performing NGFW is no longer optional – it is now mandatory. “Today’s data centers, edge locations, service providers are looking for a powerful solution that delivers on multiple fronts – security, performance, and customer experience. The new NGFW offerings deliver the on the needs of our customers today with the flexibility of multiple deployment models.” Tim Liu, co-founder & CTO, Hillstone Networks The A-Series NGFW is a solid platform for enterprise customers to enable an SD-WAN solution to bridge connectivity and security needs. The integration consolidates network VPN and security in one device or client, allowing for a faster, lower-cost and more secure local internet connection at remote locations. In addition, customers can also unlock a Zero Trust Network Access (ZTNA) solution, to meet remote access security requirements, including identity-based, least-privileged secure access, as well as context-aware, adaptive access control, enhancing both security and effectiveness for the remote connections. About Hillstone Networks Hillstone Networks’ innovative and accessible cybersecurity solutions reshape enterprise and service provider security, enabling cyber resilience while lowering TCO. Providing comprehensive visibility, superior intelligence, and rapid protection to see, understand, and act against cyberthreats from edge to cloud, Hillstone is favorably rated by leading analysts and trusted by global companies.

Read More

DATA SECURITY,SOFTWARE SECURITY,WEB SECURITY TOOLS

Phosphorus Announces New Partnership with Dewpoint to Expand Its xIoT Security Solutions and Platform in US Market

Phosphorus | September 26, 2022

Phosphorus, the leading provider of advanced and full-scope security for the extended Internet of Things (xIoT), today announced a partnership with Dewpoint. The IT and security solutions provider will act as a value-added reseller (VAR) for Phosphorus in the US market. The new partnership will see the two companies jointly delivering a new generation of xIoT security solutions in the US to meet growing enterprise demand for xIoT attack surface management and remediation capabilities. “xIoT security is a critical need for today’s enterprises, and these risks are left unaddressed by traditional IT security solutions. We look forward to working with Dewpoint to help expand our US sales channels and bring the world’s most advanced xIoT security platform to more organizations.” Kal Gajera, Director of North America Channels at Phosphorus Phosphorus’s Extended Enterprise xIoT Security Platform is the world’s first and only automated security platform capable of delivering xIoT Attack Surface Management, xIoT Hardening, and Remediation, and xIoT Detection and Response across the full range of IoT, OT, and Network-connected devices—spanning both new and legacy devices. This enables large organizations to scale xIoT technologies (which can amount to millions of devices per organization) without having to add any additional employees to find, fix, and monitor them. ABOUT PHOSPHORUS Phosphorus Cybersecurity® is the leading xTended Security of Things™ platform designed to secure the rapidly growing and often unmonitored Things across the enterprise xIoT landscape. Our Extended Enterprise xIoT Security Platform delivers Attack Surface Management, Hardening & Remediation, and Detection & Response to bring enterprise xIoT security to every cyber-physical Thing in your enterprise environment. With unrivaled xIoT discovery and posture assessment, Phosphorus automates the remediation of the biggest IoT, OT, and Network device vulnerabilities—including unknown and inaccurate asset inventory, out-of-date firmware, default credentials, risky configurations, and out-of-date certificates. ABOUT DEWPOINT Dewpoint has been bringing business and technology together since 1996. We make sure technology is solving all your business problems, providing transparency of spend for executives, and enhancing collaboration and flexibility. As the IT industry and businesses continue to change, Dewpoint provides the thought leadership and industry expertise to offer a new level of services in project management, digital innovation, infrastructure, security, cloud, and a range of tailored professional and managed service solutions for all our clients.

Read More