DATA SECURITY

XM Cyber Partners with Italy-based Value-Added Distributor ICOS

XM Cyber | May 06, 2021

XM Cyber, the multi-award-winning leader in cyberattack path management, today announced that it has signed an agreement with Italy-based value-added distributor (VAD) ICOS. This agreement will enable ICOS to offer XM Cyber solutions in the Italian market to help organizations protect their most critical assets.

"XM brings a new approach that uses the attacker perspective to find and remediate critical attack paths toward organizations' crown jewels across on-premises and multi-cloud networks," explained Erez Jacobson, Channels Sales Director, EMEA & APAC, XM Cyber. "We are a fast-growing business and need to scale through our partners ecosystem. The agreement with ICOS is an exciting development to consolidate our footprint in the Italian market."

ICOS is a partner of some of the leading technology vendors in the sector, offering resellers the infrastructure and cybersecurity solutions that are most in line with the new paradigms of enterprise IT.

About XM Cyber
XM Cyber is the global leader in cyberattack path management. The XM Cyber platform enables companies to rapidly respond to cyber risks affecting their business-sensitive systems by continuously finding new exposures, including exploitable vulnerabilities and credentials, misconfigurations, and user activities. XM Cyber constantly simulates and prioritizes the attack paths putting mission-critical systems at risk, providing context-sensitive remediation options. XM Cyber helps to eliminate 99% of the risk by focusing allowing IT and Security Operations to focus on the 1% of the exposures before they get exploited to breach the organization's "crown jewels" – its critical assets. XM Cyber was founded by top executives from the Israeli cyber intelligence community and has offices in North America, Europe, and Israel.

Spotlight

What if a homeowner took a month to notice that a burglar was living in the extra bedroom? That seems unlikely, and yet, essentially that is often what happens when an advanced persistent threat (APT) infiltrates an enterprise. A 2018 Ponemon Institute study revealed that U.S. companies took an average of 197 days to detect an APT intrusion.1.

Spotlight

What if a homeowner took a month to notice that a burglar was living in the extra bedroom? That seems unlikely, and yet, essentially that is often what happens when an advanced persistent threat (APT) infiltrates an enterprise. A 2018 Ponemon Institute study revealed that U.S. companies took an average of 197 days to detect an APT intrusion.1.

Related News

DATA SECURITY

Area 1 Security and SolCyber Partner to Deliver the Only Managed Preemptive Cloud Email Security to the Midmarket

Area 1 Security | October 22, 2021

Area 1 Security has been selected as the primary cloud email security provider for all customers of SolCyber, the first modern MSSP for the midmarket. Area 1's industry-first preemptive cloud email security stops phishing campaigns 24 days (on average) before they launch — keeping inboxes clean of threats that cause 95% of cybersecurity incidents. The SolCyber and Area 1 partnership brings best-in-class email protection to midsize organizations, which are increasingly targeted by phishing attacks. According to a recent survey by RSM US LLP in partnership with the U.S. Chamber of Commerce, 45% of mid-market executives said that social engineering attacks were successful last year — despite 90% of their organizations providing security awareness training. Additionally, 33% of mid-market executives disclosed that they experienced a ransomware attack or demand in 2020. The implications for mid-market organizations — which typically have fewer in-house resources and specialty expertise compared to larger organizations —are significant and costly. In fact, of the mid-market businesses that have experienced a cyberattack, 63% are unable to resume normal business operations for over a month. In one 12-month period, Area 1 Security prevented more than half a billion dollars in direct losses for its customers, including some of the world's largest healthcare, financial services, retail and consumer goods brands. Its cloud-scale solution is one of the core components in SolCyber's Foundational offering, a simple-to-implement curated technology stack, which also includes endpoint with EDR capabilities, lateral movement detection, and active directory and admin exploitation prevention. We're very excited about our partnership with Area 1 Security. They have an amazing web crawling infrastructure that gives early warning protection that really matters to our customers. It's not often you can find a preemptive security technology that really works, and provides immediate value,Our customers want to stop ransomware and other cyber threats to their businesses. Period. But they typically don't have the time or resources to build a mature security posture on their own. Area 1 fits seamlessly into our Foundational Coverage, it deploys in minutes and is highly scalable, accelerating our customers' time to realize true value. SolCyber CEO Scott McCrady "We are thrilled to partner with a modern MSSP with an extremely user-friendly model. Like Area 1, SolCyber is committed to making it easy for organizations of all sizes to deploy best-in-class cloud-based security," said Steve Pataky, chief revenue officer of Area 1 Security. "We look forward to getting all of SolCyber's customers to INBOX.CLEAN™ — an inbox free of ever-evolving threats that defraud companies of data, dollars and brand confidence." About SolCyber SolCyber, a ForgePoint company, is the first modern MSSP to deliver a curated stack of enterprise strength security tools and services that are streamlined, accessible and affordable for any organization. SolCyber is disrupting the status quo, by providing a new standard of managed security services that work to reduce cyber risk, wastage and complexity. We believe in a secure environment for all. For more information about SolCyber, visit solcyber.com or follow us at @SolCyberMss or on LinkedIn. About Area 1 Security Area 1 Security is the only company that preemptively stops Business Email Compromise, malware, ransomware and targeted phishing attacks. By focusing on the earliest stages of an attack, Area 1 stops phish — the root cause of 95 percent of breaches — 24 days (on average) before they launch. Area 1 also offers the cybersecurity industry's first and only performance-based pricing model, Pay-per-Phish. Area 1 is trusted by government agencies and Fortune 500 enterprises across financial services, healthcare, critical infrastructure and other industries, to preempt targeted phishing attacks, improve their cybersecurity posture, and change outcomes.

Read More

DATA SECURITY

Pondurance Partnered with GuidePoint Security, a Cybersecurity Solutions Leader

Pondurance | February 15, 2022

Pondurance, a provider of Managed Detection and Response (MDR) services, has announced its partnership with GuidePoint Security, a provider of cybersecurity solutions that helps businesses make better decisions and reduce risk. In the Pondurance Channel Partner Program, GuidePoint Security joins a prestigious group of solution providers, managed service providers, and systems integrators. Thousands of businesses around the country trust GuidePoint Security as a top cybersecurity expert and solution provider. The firm offers organizations proven experience, customized solutions, and services to assist them in making smarter cybersecurity decisions that reduce risk. In addition, GuidePoint Security will be able to offer Pondurance's award-winning Managed Detection and Response solution as a result of this relationship, increasing Pondurance's reach into the multi-billion dollar cybersecurity consulting and managed services sector. “Our partners are central to our mission to give every organization the ability to detect and respond to cyber threats, regardless of size, industry, or current in-house capabilities,GuidePoint shares our vision, and we are excited to partner with them to make our proactive MDR service available to the thousands of organizations that count on them for their renowned security expertise.” Lyndon Brown, Chief Strategy Officer at Pondurance GuidePoint Security can provide its customers with the world-class security operations center (SOC) they deserve by adding Pondurance's best-in-class MDR services to its offering. Pondurance's innovative cloud-native technology, backed by a 24/7 staff of analysts, threat hunters, and incident responders, provides clients with continuous cyber risk reduction. In addition, Pondurance, unlike other MDR providers, provides 360-degree detection across cloud, network, endpoint, and logs, containing threats before they propagate and providing the personalized experience that every enterprise needs. Members of the Pondurance Channel Partner Program, such as GuidePoint Security, can use a holistic approach to MDR services to grow their company's capabilities and generate annual recurring income streams. When you join the Channel Partner Program, you get access to training and certification, sales and marketing collaboration, dedicated partner managers, and much more.

Read More

SOFTWARE SECURITY

CyberProof Announces Partnership with Radiflow, a Leading Provider of Cyber Security Solutions for OT Systems & Industrial Networks

CyberProof | September 01, 2021

CyberProof Inc., a UST company, announced today that it will be adding Radiflow, a leading provider of cyber security solutions for industrial networks, to its partner network. The new partnership strengthens CyberProof's ability to provide comprehensive Managed Detection & Response (MDR) services for converged IT/OT systems and support the cyber security needs of Distributed Control Systems (DCS)/ICS and SCADA networks. CyberProof, ranked as a "Leader" in the Forrester Wave™ for Midsized Managed Security Services Providers (MSSPs) – uses its proprietary CyberProof Defense Center (CDC) platform to provide a single platform, through which security teams can detect and mitigate threats across both the IT and OT environments. As seen in several recent, high-profile breaches on Critical National Infrastructure (CNI), attackers often can compromise OT networks without being detected because organizations lack an updated inventory of OT assets, processes, and connections. Working with Radiflow allows CyberProof to discover previously unmapped assets in OT environments, maintain a centralized dynamic inventory, and help customers monitor and detect all traffic and communication within the OT network. CyberProof's CDC Platform is pre-integrated with Radiflow's iSID industrial threat detection system, enabling real-time visibility into changes to assets, ports, and protocols. This integration supports proactive, real-time monitoring across IT and OT environments with full transparency. It enables CyberProof to search for new and known vulnerabilities leveraging the broadest protocol coverage, providing visibility into all industrial network risk variables for OT, IoT & IIoT. "By working together with Radiflow, we provide a single view and control point for both IT and OT environments – including an integrated Security Operations Center (SOC)," said Tony Velleca, CEO at CyberProof. "We are able to combine Radiflow's unique technology together with CyberProof's Use Case Factory, a unique agile framework for continuously improving detection and response against relevant attack scenarios," Velleca added. "The partnership with CyberProof extends security monitoring and managed response into the OT space," said Ilan Barda, CEO at Radiflow. "By integrating Radiflow's solutions, CyberProof is now able to proactively detect and respond to threats in ICS/SCADA networks and lay out a risk mitigation plan for optimal OT security that meets each customer's needs and budget," Barda continued. About Radiflow Radiflow's solutions offer full visibility of what and who is threatening your network and where it stands in terms of risk and its potential impact. Radiflow's first OT BAS (breach-attack-simulation) solution uses a data-driven approach to combine the vulnerabilities in your network with the tactics of your adversaries. Radiflow's BAS engine automatically simulates hundreds of WHAT-IF scenarios facilitating ROI-based optimization of your cyber-security roadmap with multiple prioritization keys to fit the various needs of each enterprise. Once a plan is defined, clients receive clear tracking and reporting of the progress. Radiflow's solutions are recognized as strong IEC-62443 enablers. About CyberProof CyberProof is a security services company that helps organizations intelligently manage their incident detection and response. Our advanced cyber defense platform enables operational efficiency with complete transparency to dramatically reduce the time needed to respond to security threats and minimize business impact. SeeMo, our virtual analyst, automates and accelerates cyber operations by learning and adapting from endless sources of data and responds to requests by providing context and actionable information. This allows our nation-state cyber experts and your team to prioritize the most urgent incidents and proactively identify and respond to potential threats. We collaborate with our global clients, academia, and the technology ecosystem to continuously advance the art of cyber defense. CyberProof is part of the UST family. Some of the world's largest enterprises trust us to create and maintain secure digital ecosystems using our comprehensive cyber security platform and mitigation services.

Read More