DATA SECURITY

XM Cyber Partners with Italy-based Value-Added Distributor ICOS

XM Cyber | May 06, 2021

XM Cyber, the multi-award-winning leader in cyberattack path management, today announced that it has signed an agreement with Italy-based value-added distributor (VAD) ICOS. This agreement will enable ICOS to offer XM Cyber solutions in the Italian market to help organizations protect their most critical assets.

"XM brings a new approach that uses the attacker perspective to find and remediate critical attack paths toward organizations' crown jewels across on-premises and multi-cloud networks," explained Erez Jacobson, Channels Sales Director, EMEA & APAC, XM Cyber. "We are a fast-growing business and need to scale through our partners ecosystem. The agreement with ICOS is an exciting development to consolidate our footprint in the Italian market."

ICOS is a partner of some of the leading technology vendors in the sector, offering resellers the infrastructure and cybersecurity solutions that are most in line with the new paradigms of enterprise IT.

About XM Cyber
XM Cyber is the global leader in cyberattack path management. The XM Cyber platform enables companies to rapidly respond to cyber risks affecting their business-sensitive systems by continuously finding new exposures, including exploitable vulnerabilities and credentials, misconfigurations, and user activities. XM Cyber constantly simulates and prioritizes the attack paths putting mission-critical systems at risk, providing context-sensitive remediation options. XM Cyber helps to eliminate 99% of the risk by focusing allowing IT and Security Operations to focus on the 1% of the exposures before they get exploited to breach the organization's "crown jewels" – its critical assets. XM Cyber was founded by top executives from the Israeli cyber intelligence community and has offices in North America, Europe, and Israel.

Spotlight

Dashlane Business supports login with single sign-on (SSO), using any SAML 2.0 enabled IdP. In a single-sign-on setup, the user doesn’t have to input UserMP . Instead, a random key is generated at account creation. This key (the data encryption key) is delivered to the Dashlane app after the user successfully logs in to the IdP, and it is used as a symmetric encryption key to encrypt and decrypt the user data.

Spotlight

Dashlane Business supports login with single sign-on (SSO), using any SAML 2.0 enabled IdP. In a single-sign-on setup, the user doesn’t have to input UserMP . Instead, a random key is generated at account creation. This key (the data encryption key) is delivered to the Dashlane app after the user successfully logs in to the IdP, and it is used as a symmetric encryption key to encrypt and decrypt the user data.

Related News

PLATFORM SECURITY, SOFTWARE SECURITY, CLOUD SECURITY

SOC Prime Launches Integration with Amazon Security Lake to Supercharge Security Operations

Businesswire | May 31, 2023

SOC Prime, provider of the world’s largest and most advanced platform for collective cyber defense, today announced its integration with Amazon Security Lake, the AWS security service that enables organizations to automatically centralize security data from the cloud, on-premises, and custom data sources into a purpose-driven data lake stored in their account. SOC Prime drives a transformational change in cybersecurity relying on zero-trust & multi-cloud approach to empower smart data orchestration, dynamic attack surface visibility, and cost-efficient threat hunting. Backed by its advanced cybersecurity solutions, Uncoder AI, Attack Detective, and The Prime Hunt, SOC Prime enables organizations to boost their cyber defense capabilities at scale, unleashing the power of Amazon Security Lake. Leveraging SOC Prime’s Uncoder AI, an Augmented Intelligence framework, security teams can save development time and migration costs with re-usable threat hunting queries automatically convertible to Amazon Athena and OpenSearch in the standard Open Cybersecurity Schema Framework (OSCF) format. SOC Prime’s Attack Detective tool intelligently and automatically queries security logs in the customer's Amazon Security Lake account via Amazon Athena and Amazon OpenSearch to identify data sources and then scan them in real time with a curated set of threat hunting queries. By leveraging Attack Detective, security engineers can channel their efforts directly into incident investigation rather than analyzing overwhelming volumes of alerts and accelerate threat research by validating over 10,000 adversary behaviors against the stored log sources in a matter of hours. Attack Detective follows core Zero-Trust Architecture (ZTA) principles segregating the data plane and control plane to ensure that no SIEM or EDR access credentials are shared or inherited within the Company profile. The tool provides complete threat visibility based on the organization-specific logs by linking and correlating with SIEM and EDR on-premises data in its native location without the need to migrate it to the cloud, which contributes to significant cost savings and ensures compliance with zero-trust basic tenets. Adding to investment optimization capabilities, The Prime Hunt open-source browser extension enables security professionals to extract valuable data from large datasets at a lower cost. Users can seamlessly run threat hunting queries on security logs within the Amazon Security Lake account via a web browser in both Athena and OpenSearch and automatically identify accounts and assets affected by the suspected activity. About SOC Prime Headquartered in Boston, SOC Prime operates the world’s largest and most advanced platform for collective cyber defense that cultivates collaboration from a global cybersecurity community and curates the most up-to-date Sigma rules compatible with over 27 SIEM, EDR, and XDR platforms. SOC Prime’s innovation, backed by the vendor-agnostic and zero-trust cybersecurity approach, and cutting-edge technology leveraging Sigma language and MITRE ATT&CK® as core pillars are recognized by the independent research companies, credited by the leading SIEM, XDR & MDR vendors, and trusted by 8,000+ organizations, including 42% of Fortune 100 and 21% of Forbes Global 2000. Flexible subscriptions ensure that both organizations and individual operators can benefit from SOC Prime’s curated detection content and enhanced cyber defense capabilities. SOC Prime is backed by DNX Ventures, Streamlined Ventures, and Rembrandt Venture Partners, having received $11.5M in funding in October 2021. For more information, visit https://socprime.com or follow us on LinkedIn & Twitter.

Read More

PLATFORM SECURITY, SOFTWARE SECURITY, CLOUD SECURITY

Orca Security is First CNAPP to Integrate with Microsoft Azure OpenAI GPT-4

Businesswire | May 05, 2023

Orca Security, the pioneer of agentless cloud security, today announced its full integration with Microsoft Azure OpenAI GPT-4. The integration builds on the ChatGPT implementation in the Orca Cloud Security platform announced in January and makes it the first cloud-native application protection platform (CNAPP) to support GPT-4 through the Azure OpenAI Service. In addition to the integration, Orca announced several new features for its ChatGPT integration. The Microsoft Azure OpenAI Service provides REST API access to OpenAI's ChatGPT technology. With this new Microsoft integration, Orca Security customers can benefit not only from the greatly improved functionality in GPT-4, but also from the security and enterprise support that Microsoft provides. This includes the benefits of privacy of customer data submitted to the service, compliance with key regulations such as HIPAA and SOC2, an uptime SLA of 99.9%, and regional availability for lower latency and increased reliability. Since introducing GPT-3 support in the Orca Platform in January, customers have used it to dramatically reduce their mean-time-to-remediation (MTTR). Security practitioners can instantly generate high-quality remediation instructions for each alert straight from the Orca Platform. These instructions can simply be copied and pasted into platforms such as Terraform, Pulumi, AWS CloudFormation, AWS Cloud Development Kit, Azure Resource Manager, Google Cloud Deployment Manager, and Open Policy Agent. If more information is needed, users can ask ChatGPT follow-up questions directly from the Orca Platform. With the transition to GPT-4, customers will benefit from the model’s improved accuracy as well as its ability to generate code snippets. “The customer response to our integration with GPT has been incredibly positive,” said Gil Geron, CEO at Orca Security. “It’s been amazing to see customers embrace it in so many ways to gain dramatic efficiency improvements. With our integration with GPT-4 through the Azure OpenAI Service, we continue to improve accuracy and ensure privacy to protect our customers’ data while maximizing its benefit.” In addition to transitioning from GPT-3 to Azure OpenAI GPT-4, Orca made several other enhancements to its integration, including prompt improvements to ensure further optimization of remediation responses; a new Open Policy Agent (OPA) remediation method; and the ability to include remediation steps in Jira tickets when assigning cloud security issues. The Azure OpenAI GPT-4 integration is available immediately. To learn more, please read the blog post published today. About Orca Security Orca Security is the pioneer of agentless cloud security that is trusted by hundreds of enterprises globally. Orca makes cloud security possible for enterprises moving to and scaling in the cloud with its patented SideScanning™ technology and Unified Data Model. The Orca Cloud Security Platform delivers the world’s most comprehensive coverage and visibility of all risks across the cloud. With continuous first-to-market innovations and expertise, the Orca Platform ensures security teams quickly identify and remediate risks to keep their businesses secure. Connect your first account in minutes: https://orca.security or take the free cloud risk assessment.

Read More

DATA SECURITY, PLATFORM SECURITY, SOFTWARE SECURITY

Illumio Launches Zero Trust Segmentation ROI Calculator to Help Organizations Maximize Cyber Investments

Globenewswire | April 18, 2023

Illumio, Inc., the Zero Trust Segmentation company, today launched the Illumio Zero Trust Segmentation ROI Calculator, a self-service tool that quantifies what an organization’s return on investment (ROI) on Illumio’s Zero Trust Segmentation (ZTS) platform would be, bringing more clarity into their decision-making process. In a difficult economy, organizations need to understand and be able to show the impact of every dollar they spend, and they need solutions that deliver a reliable return on investment. By answering a few simple questions related to their specific business environment, respondents will receive a written assessment of the quantitative impact Illumio ZTS would have on their organization, which will arm decision makers with data to support further investment in cybersecurity initiatives that reduce risk and increase resilience to breaches. Illumio recently commissioned a Total Economic ImpactTM of Illumio Zero Trust Segmentation (ZTS) study from Forrester Consulting, who interviewed Forrester analysts, Illumio stakeholders, and Illumio customers from organizations of varying sizes and industries to inform their findings. The study found that Illumio delivered a total benefit of $10.2 million over three years and paid for itself in six months for a composite organization. Additionally, over three years Illumio ZTS: Reduced a cyberattack’s blast radius by 66 percent by restricting lateral movement, which saved $1.8 million via decreased overall risk exposure. Drove $3 million in savings via tool consolidation and reduced firewall costs. Saved $3.8 million by limiting unplanned downtime. Increased InfoSec’s operational efficiency by $1.6 million by reducing the time and effort needed to implement security policy. Delivered 111 percent return on investment. “The security industry is moving from the prevention and detection eras to the breach containment era to minimize the impact of breaches on the broader organization,” said PJ Kirner, CTO and co-founder at Illumio. “With a challenging economy, CFOs and boards are asking security teams to quantify the return on their investments. With this ROI calculator, leaders can validate the impact ZTS would have on their specific organization, accelerating the implementation of core security strategies that augment prevention and detection technologies to reduce risk and increase resilience to breaches more quickly.” To measure the impact Illumio ZTS could have on your organization, use the Illumio Zero Trust Segmentation ROI Calculator. Learn more about The Forrester Total Economic ImpactTM of Illumio Zero Trust Segmentation here. About Illumio Illumio, the Zero Trust Segmentation Company, stops breaches and ransomware from spreading across the hybrid attack surface. The Illumio ZTS Platform visualizes all traffic flows between workloads, devices, and the internet, automatically sets granular segmentation policies to control communications, and isolates high-value assets and compromised systems proactively or in response to active attacks. Illumio protects organizations of all sizes, from Fortune 100 to small business, by stopping breaches and ransomware in minutes, saving millions of dollars in application downtime, and accelerating cloud and digital transformation projects.

Read More