Q&A with Maliha Aqeel, Director of Global Communications at Fix Network World

MEDIA 7 | January 16, 2020

marketing metrics
Maliha Aqeel, Director of Global Communications at Fix Network World is an award-winning, communication and marketing professional who helps companies harness the power of their brand to drive engagement and achieve measurable business results. 

She has developed and led content and marcomm programs for B2B companies in the financial and professional services sectors in her over 15 years of industry experience.

MEDIA 7: When did you start working and what was it?
MALIHA AQEEL:
I started my career in 1996 right after high school, freelancing as a journalist and features writer for a magazine in Dubai, UAE. Over time, I expanded my services to include scriptwriting for corporate videos and TV productions, writing and designing client newsletters and promotional collateral.

M7: What made you want to pursue a career in branding and marketing communications? What aspect about your role brings you the most joy?
MA: I didn’t consciously decide to pursue a career in marketing and communication as my plan was to become a filmmaker. However, I had great curiosity about what makes people prefer one brand over the other when a feature-by-feature comparison didn’t show a huge difference between similar products or services. I had taken a few advertising courses during university and it broadened my understanding of how powerful brand experiences and storytelling can drive business objectives. That balance of strategy and creativity is what I enjoy most about what I do and why I’ve continued to find purpose in my career.


"Marketing professionals have to act as conveners, and connect the dots so that there is alignment between stakeholders like sales and operation teams and executive leadership on what products and services will drive growth in any given quarter."

M7: How has branding changed over the years to become what it is today? What marketing metrics do you value most for brand management?
MA:
Branding used to be focused on the tactical: aesthetics of an ad, wordsmithing copy and “selling” a vision that was less about what the customer needed and more about what the brand wanted you to purchase. Much of this was driven by the rise of a consumerist society in the 1980s and part of the 1990s. But the new millennium witnessed boom-bust economic cycles, changing demographics and technological advances at a relentless pace than ever before. Gradually, the brand’s point of view started to become less relevant and empowered consumers took back control of their brand experience and their buyer journey.

Now brands have to look outward, focusing on the needs, behaviors and motivations of their end customers. They’re also recognizing that purpose and having an impact on society in a positive way is what will drive their enterprise value instead of share price alone. The institutional investors are also taking notice and aligning their investment criteria and evaluation accordingly. This was one of the outcomes of the Embankment Project for Inclusive Capitalism, a multi-year initiative that looked into making capitalism more dynamic, sustainable, inclusive and trusted. As a result, the brand metrics that I value most are outcome-focused like contribution to reputation value, net promoter score, brand perception (a combination of brand recall and service delivery) and employee engagement/advocacy scores.


"One of the most common mistakes companies make is implementing a brand strategy that isn’t aligned to the organization’s overall business goal."

M7: What are the common mistakes that companies make when implementing their brand strategies?
MA:
One of the most common mistakes is implementing a strategy that isn’t aligned to the organization’s overall business goal. This can be challenging in large corporations where there are multiple competing priorities, but marketing professionals have to act as conveners, and connect the dots so that there is alignment between stakeholders like sales and operation teams and executive leadership on what products and services will drive growth in any given quarter. And then create and implement holistic marketing campaigns that drive specific results that support the key performance indicators (KPIs) that the executives are measured on.

A second mistake is running campaigns that are not aligned from a macro or micro environmental perspective. For example, an oil company runs a social media campaign on their corporate citizenship initiatives at a time when the industry (not necessarily the company) is under regulatory scrutiny for bad environmental practices. The timing, not necessarily the content, of the campaign can appear tone deaf and unsympathetic to sentiment in society. Another instance is if a company runs an employer branding campaign about its great culture at a time when it might be going through litigation for a workplace harassment issue. To counter this, marketing and communication professionals need to create business partnerships across all layers and functions of the company so that they’re planning and executing brand strategies that are contextually appropriate and reputationally sound.


"Marketing and communication professionals need to create business partnerships across all layers and functions of the company so that they’re planning and executing brand strategies that are contextually appropriate and reputationally sound."

M7: Which strategies do you count on to help leaders understand the value of communications?
MA:
I’m a huge advocate of data-driven decision making and offering informed insights and recommendations. C-suite executives see data analytics as a distinct competitive advantage for their business, and it can be the main strategy we use to help them understand our value. Gut instinct has a role to play in planning and execution, but to convince others and demonstrate our importance, we need to have a common understanding of business goals and use language that senior leaders will understand. Examples of this include showing how strategic communications resulted in cost efficiencies, margin improvement and contribution to revenue or increase in sales. These are tangible financial results that any executive function will recognize and appreciate. In addition to the above, I also use benchmarking data (internal and external) and forecasting as part of my communication and resource planning so that I have a framework for reporting to leadership on communication-driven outcomes.

M7: With over 15 years of progressive experience in strategic communication, what advice do you have for leaders who are trying to improve their performance?
MA:
My advice is to bring the brand promise and purpose into your decision-making process. Often, not always, performance is directly impacted by the culture of an organization. And your culture is a reflection of your purpose. It conveys why what the organization does matters; make evangelists out of your customers and convince employees to be part of the journey not just show up for a pay cheque. Research by Gallup found that highly engaged teams are 21% more productive, but low employee engagement results in 65% lower share price over time.

Communication professionals are enablers of the brand. As strategic advisors, we have to help make the connection between culture and business performance—between the intangible and the tangible. The cost of getting it wrong can have a negative impact on reputation capital, share price and even the balance sheet. Research from the Engagement Institute showed that disengaged employees cost US businesses up to $550 billion a year, which is a little over half the nominal GDP of The Netherlands in 2019 ($900 billion). That’s not a comparison that you want someone making at your annual general meeting of shareholders.

ABOUT FIX NETWORK WORLD

The Fix Network global family of brands includes collision repair franchise networks Fix Auto and Pro Color, glass repair and replacement brand NOVUS Glass and mechanical shops Speedy Auto Service, as well as the full suite of SRP glass products. With more than 2,100 points of service in over 40 countries worldwide, Fix Network is the global aftermarket services leader. The Network continues to grow internationally, thanks to a solid foundation based on entrepreneurship and innovation. For more information, visit Fixnetwork.

More THOUGHT LEADERS

‘Marketing can be the oxygen to a company’s growth,’ says Shashi Kiran

Media 7 | April 19, 2023

Shashi Kiran has a growth mind-set and enjoy driving results that make an effect, add value, and give people a good time. Integrity, authenticity, and staying away from politics are important parts of my identity. He has worked in marketing, sales, business development, and product management at both big global companies with global teams and multi-billion dollar sales and multi-stage startups. Read more to know his thoughts on role of marketing in IT industry....

Read More

'We measure our success based on customer satisfaction, loyalty and retention,' says Strobes CEO Venu Rao

Media 7 | April 12, 2023

Venu Rao is a successful entrepreneur and cybersecurity professional who excels in developing client relationships by addressing their challenges and providing affordable and convenient validated solutions. With more than 15 years of experience in technology, product development, marketing and sales, he deeply understands the IT industry. As the Co-founder & CEO of Strobes Security, he is helping clients improve their cybersecurity posture by solving significant problems in the vulnerability management space with innovative solutions. Read his interview to know his thoughts about the cybersecurity landscape and the importance of having customer-centric solutions....

Read More

'We should not have data without a story, and not have a story without data,' believes Varun Kohli

Media 7 | April 11, 2023

Advisor, Investor and Category Creating CMO Varun Kohli is a highly accomplished market strategist, who has held leadership positions at large companies as well as startups. He has experience in developing, managing, and promoting solutions for various areas including API Security, financial risk and crime management, governance and compliance, fraud prevention, analytics, cybersecurity, file sharing, mobile threat defence, security information and event management, email, log management, instant messaging management, encryption and anti-spam. He led a team of over 50 marketers at Symantec, responsible for Global Demand, Project Management Office, and Strategic Marketing for their USD 2.4 billion Enterprise Business. He currently serves on the advisory boards of several startups. Read this exclusive interview to learn about his thoughts on the state of cybersecurity....

Read More

‘Marketing can be the oxygen to a company’s growth,’ says Shashi Kiran

Media 7 | April 19, 2023

Shashi Kiran has a growth mind-set and enjoy driving results that make an effect, add value, and give people a good time. Integrity, authenticity, and staying away from politics are important parts of my identity. He has worked in marketing, sales, business development, and product management at both big global companies with global teams and multi-billion dollar sales and multi-stage startups. Read more to know his thoughts on role of marketing in IT industry....

Read More

'We measure our success based on customer satisfaction, loyalty and retention,' says Strobes CEO Venu Rao

Media 7 | April 12, 2023

Venu Rao is a successful entrepreneur and cybersecurity professional who excels in developing client relationships by addressing their challenges and providing affordable and convenient validated solutions. With more than 15 years of experience in technology, product development, marketing and sales, he deeply understands the IT industry. As the Co-founder & CEO of Strobes Security, he is helping clients improve their cybersecurity posture by solving significant problems in the vulnerability management space with innovative solutions. Read his interview to know his thoughts about the cybersecurity landscape and the importance of having customer-centric solutions....

Read More

'We should not have data without a story, and not have a story without data,' believes Varun Kohli

Media 7 | April 11, 2023

Advisor, Investor and Category Creating CMO Varun Kohli is a highly accomplished market strategist, who has held leadership positions at large companies as well as startups. He has experience in developing, managing, and promoting solutions for various areas including API Security, financial risk and crime management, governance and compliance, fraud prevention, analytics, cybersecurity, file sharing, mobile threat defence, security information and event management, email, log management, instant messaging management, encryption and anti-spam. He led a team of over 50 marketers at Symantec, responsible for Global Demand, Project Management Office, and Strategic Marketing for their USD 2.4 billion Enterprise Business. He currently serves on the advisory boards of several startups. Read this exclusive interview to learn about his thoughts on the state of cybersecurity....

Read More

Related News

DATA SECURITY, PLATFORM SECURITY, SOFTWARE SECURITY

CyberArk Introduces First Identity Security-Based Enterprise Browser

iTWire | May 30, 2023

CyberArk (NASDAQ: CYBR), the Identity Security company, today introduced CyberArk Secure Browser. This first-of-its-kind Identity Security web browser enables organisations to better protect against attacks with a flexible, identity-based approach to securing employee and third-party access to enterprise resources. By 2030, enterprise browsers will be the core platform for delivering workforce productivity and security software on managed and unmanaged devices for a seamless hybrid work experience.1 Browsers provide a vital connection between identities, applications and data, making them a prominent attack vector and a target for cybercriminals – especially in distributed, work-from-anywhere environments. A rise in post-MFA authentication attacks targeting session cookies reinforces the need for defense-in-depth strategies. Now, CyberArk is applying its deep cybersecurity experience, history of Identity Security innovation and intelligent privilege controls to web browsing. Part of the CyberArk Identity Security Platform, the Chromium-based CyberArk Secure Browser supports enterprise Zero Trust initiatives with integrated security, centralised policy management and productivity tools while delivering a familiar user experience. The CyberArk Identity Security Platform delivers the most robust, layered approach to address the number one area of cybersecurity risk: credential access.2 CyberArk Secure Browser is designed to eliminate existing security gaps between consumer-focused browsers and SaaS applications, endpoint-based controls and identity providers. By extending the CyberArk Identity Security Platform to the browser itself, CyberArk makes it easy for IT teams to tailor security, privacy and productivity controls on managed and unmanaged devices. Key features include: Cookieless Browsing: Cookieless browsing is a key differentiating feature that allows users to access and use web-based resources without exposing cookie files to attackers. The cookies will be stored remotely on CyberArk servers enabling secure and seamless web browsing without saving cookie files on the endpoints. This approach makes it difficult for attackers or third parties to steal, forge, alter or manipulate cookies to gain unauthorised access to sensitive resources and helps ensure that users’ web sessions, data and accounts remain confidential and secure. Data Exfiltration Protections: Companies can control the browsing experience with fine-grained policies designed to prevent data exfiltration attempts that can compromise corporate data. Password Replacement: CyberArk Secure Browser features patent-pending password replacement functionality. Instead of showing stored credentials for privileged resources or websites, the browser displays a one-time alphanumeric string. This string works only once, only in CyberArk Secure Browser and only for intended targets – eliminating the possibility that end users will see these privileged credentials in plain text. Extensibility: Third-party identity providers and out-of-the-box integrations are supported with the CyberArk Identity Security Platform solutions, including CyberArk Workforce Password Management and CyberArk Secure Web Sessions. This allows companies to customise session protections, access controls and credential management to each user based on their roles. It also works in conjunction with CyberArk Endpoint Privilege Manager to mitigate potentially risky web access and vulnerable endpoints. Quick Access Bar: The built-in quick access sidebar helps ensure end users can utilise their Single Sign-On (SSO) credentials to securely access frequently used apps, third-party tools and CyberArk privileged access management resources directly from CyberArk Secure Browser with the click of a button. “CyberArk is constantly innovating – working to protect our customers against current cybersecurity risk and emerging threats. Based on trends impacting hybrid work environments and research generated by our CyberArk Labs and Red Team, developing an enterprise browser – with an identity-first, security-first approach – was a natural progression for our business,” said Gil Rapaport, general manager, Access at CyberArk. “CyberArk Secure Browser represents a new era of web browsing, where security, privacy and productivity are the top priorities.” Dynamically mirroring controls and access policies existing on Chrome and Edge browsers that are already deployed on the end user’s device, CyberArk Secure Browser reduces IT overhead and accelerates the deployment timeline for employees, contractors and vendors. Planned availability for CyberArk Secure Browser on Windows endpoints is by the end of 2023. To learn more about CyberArk Secure Browser, please visit https://lp.cyberark.com/secure-browser-early-access.html. About CyberArk CyberArk is the global leader in Identity Security. Centered on privileged access management, CyberArk provides the most comprehensive security offering for any identity – human or machine – across business applications, distributed workforces, hybrid cloud workloads and throughout the DevOps lifecycle. The world’s leading organizations trust CyberArk to help secure their most critical assets.

Read More

ENTERPRISE IDENTITY, SOFTWARE SECURITY, CLOUD SECURITY

Lookout Announces the Successful Divestiture of Its Consumer Mobile Security Business Segment

Businesswire | June 05, 2023

Lookout, Inc., the endpoint-to-cloud security company, today announced it has closed the previously announced sale of its consumer mobile security business to F-Secure, a global provider of consumer security products and services. With this strategic divestiture Lookout will focus on expanding its core enterprise business, built around the Lookout Cloud Security Platform. The sale of Lookout’s consumer mobile security business represents a deliberate and strategic decision to optimize its enterprise product portfolio and concentrate its product innovation and go-to-market on the expansion of these core competencies. The divestiture sets Lookout up for long-term growth and further positions the Company to address the security transformation impacting organizations today, including the increase in remote work, the shift to cloud-based delivery models and the transition to zero trust architectures. “We are pleased to announce the successful divestiture of our mobile consumer security business, which represents a significant milestone in our strategic transformation to become a pure-play enterprise cybersecurity company,” Jim Dolce, CEO at Lookout. “With this refined focus, we will continue to drive innovation, invest in the development of cutting-edge solutions and drive greater value for our customers.” Lookout’s core enterprise business includes Lookout Mobile Endpoint Security and its security services edge (SSE) cloud-native solution, the Lookout Cloud Security Platform. The Company entered the cloud security market through its acquisition of CipherCloud in March 2021. Its Cloud Security Platform was recently scored among the highest three vendors in the 2023 Gartner Critical Capabilities for Security Service Edge (SSE)1 report in each of the four use cases. The Gartner Critical Capabilities for SSE – an essential companion to the Gartner Magic Quadrant™ for SSE2 in which Lookout was named a Visionary for the second year in a row – is a comparative analysis that scores products or services against a set of critical differentiators that every business needs, as identified by Gartner. These four use cases include Secure Web and Cloud Usage, Detect and Mitigate Threats, Connect and Secure Remote Workers and Identify and Protect Sensitive Information. As part of the sale agreement, F-Secure acquires all of the Lookout consumer mobile security products and technology and assumes all responsibility for ongoing operations and customer relationships. Additionally, the Company’s consumer employees will become part of F-Secure. About Lookout Lookout, Inc. is the endpoint-to-cloud cybersecurity company that delivers zero trust security by reducing risk and protecting data wherever it goes, without boundaries or limits. Our unified, cloud-native platform safeguards digital information across devices, apps, networks and clouds and is as fluid and flexible as the modern digital world. Lookout is trusted by enterprises and government agencies of all sizes to protect the sensitive data they care about most, enabling them to work and connect freely and safely. To learn more about the Lookout Cloud Security Platform, visit www.lookout.com and follow Lookout on our blog, LinkedIn and Twitter. © 2023 Lookout, Inc. LOOKOUT®, the Lookout Shield Design®, LOOKOUT with Shield Design®, and SIGNAL FLARE® are registered trademarks of Lookout, Inc. in the United States and other countries. DAY OF SHECURITY®, LOOKOUT MOBILE SECURITY®, and POWERED BY LOOKOUT® are registered trademarks of Lookout, Inc. in the United States. Lookout, Inc. maintains common law trademark rights in EVERYTHING IS OK, PROTECTED BY LOOKOUT, CIPHERCLOUD, SCREAM, the 4 Bar Shield Design, and the Lookout multi-color/multi-shaded Wingspan design.

Read More

PLATFORM SECURITY, SOFTWARE SECURITY, CLOUD SECURITY

SOC Prime Launches Integration with Amazon Security Lake to Supercharge Security Operations

Businesswire | May 31, 2023

SOC Prime, provider of the world’s largest and most advanced platform for collective cyber defense, today announced its integration with Amazon Security Lake, the AWS security service that enables organizations to automatically centralize security data from the cloud, on-premises, and custom data sources into a purpose-driven data lake stored in their account. SOC Prime drives a transformational change in cybersecurity relying on zero-trust & multi-cloud approach to empower smart data orchestration, dynamic attack surface visibility, and cost-efficient threat hunting. Backed by its advanced cybersecurity solutions, Uncoder AI, Attack Detective, and The Prime Hunt, SOC Prime enables organizations to boost their cyber defense capabilities at scale, unleashing the power of Amazon Security Lake. Leveraging SOC Prime’s Uncoder AI, an Augmented Intelligence framework, security teams can save development time and migration costs with re-usable threat hunting queries automatically convertible to Amazon Athena and OpenSearch in the standard Open Cybersecurity Schema Framework (OSCF) format. SOC Prime’s Attack Detective tool intelligently and automatically queries security logs in the customer's Amazon Security Lake account via Amazon Athena and Amazon OpenSearch to identify data sources and then scan them in real time with a curated set of threat hunting queries. By leveraging Attack Detective, security engineers can channel their efforts directly into incident investigation rather than analyzing overwhelming volumes of alerts and accelerate threat research by validating over 10,000 adversary behaviors against the stored log sources in a matter of hours. Attack Detective follows core Zero-Trust Architecture (ZTA) principles segregating the data plane and control plane to ensure that no SIEM or EDR access credentials are shared or inherited within the Company profile. The tool provides complete threat visibility based on the organization-specific logs by linking and correlating with SIEM and EDR on-premises data in its native location without the need to migrate it to the cloud, which contributes to significant cost savings and ensures compliance with zero-trust basic tenets. Adding to investment optimization capabilities, The Prime Hunt open-source browser extension enables security professionals to extract valuable data from large datasets at a lower cost. Users can seamlessly run threat hunting queries on security logs within the Amazon Security Lake account via a web browser in both Athena and OpenSearch and automatically identify accounts and assets affected by the suspected activity. About SOC Prime Headquartered in Boston, SOC Prime operates the world’s largest and most advanced platform for collective cyber defense that cultivates collaboration from a global cybersecurity community and curates the most up-to-date Sigma rules compatible with over 27 SIEM, EDR, and XDR platforms. SOC Prime’s innovation, backed by the vendor-agnostic and zero-trust cybersecurity approach, and cutting-edge technology leveraging Sigma language and MITRE ATT&CK® as core pillars are recognized by the independent research companies, credited by the leading SIEM, XDR & MDR vendors, and trusted by 8,000+ organizations, including 42% of Fortune 100 and 21% of Forbes Global 2000. Flexible subscriptions ensure that both organizations and individual operators can benefit from SOC Prime’s curated detection content and enhanced cyber defense capabilities. SOC Prime is backed by DNX Ventures, Streamlined Ventures, and Rembrandt Venture Partners, having received $11.5M in funding in October 2021. For more information, visit https://socprime.com or follow us on LinkedIn & Twitter.

Read More

DATA SECURITY, PLATFORM SECURITY, SOFTWARE SECURITY

CyberArk Introduces First Identity Security-Based Enterprise Browser

iTWire | May 30, 2023

CyberArk (NASDAQ: CYBR), the Identity Security company, today introduced CyberArk Secure Browser. This first-of-its-kind Identity Security web browser enables organisations to better protect against attacks with a flexible, identity-based approach to securing employee and third-party access to enterprise resources. By 2030, enterprise browsers will be the core platform for delivering workforce productivity and security software on managed and unmanaged devices for a seamless hybrid work experience.1 Browsers provide a vital connection between identities, applications and data, making them a prominent attack vector and a target for cybercriminals – especially in distributed, work-from-anywhere environments. A rise in post-MFA authentication attacks targeting session cookies reinforces the need for defense-in-depth strategies. Now, CyberArk is applying its deep cybersecurity experience, history of Identity Security innovation and intelligent privilege controls to web browsing. Part of the CyberArk Identity Security Platform, the Chromium-based CyberArk Secure Browser supports enterprise Zero Trust initiatives with integrated security, centralised policy management and productivity tools while delivering a familiar user experience. The CyberArk Identity Security Platform delivers the most robust, layered approach to address the number one area of cybersecurity risk: credential access.2 CyberArk Secure Browser is designed to eliminate existing security gaps between consumer-focused browsers and SaaS applications, endpoint-based controls and identity providers. By extending the CyberArk Identity Security Platform to the browser itself, CyberArk makes it easy for IT teams to tailor security, privacy and productivity controls on managed and unmanaged devices. Key features include: Cookieless Browsing: Cookieless browsing is a key differentiating feature that allows users to access and use web-based resources without exposing cookie files to attackers. The cookies will be stored remotely on CyberArk servers enabling secure and seamless web browsing without saving cookie files on the endpoints. This approach makes it difficult for attackers or third parties to steal, forge, alter or manipulate cookies to gain unauthorised access to sensitive resources and helps ensure that users’ web sessions, data and accounts remain confidential and secure. Data Exfiltration Protections: Companies can control the browsing experience with fine-grained policies designed to prevent data exfiltration attempts that can compromise corporate data. Password Replacement: CyberArk Secure Browser features patent-pending password replacement functionality. Instead of showing stored credentials for privileged resources or websites, the browser displays a one-time alphanumeric string. This string works only once, only in CyberArk Secure Browser and only for intended targets – eliminating the possibility that end users will see these privileged credentials in plain text. Extensibility: Third-party identity providers and out-of-the-box integrations are supported with the CyberArk Identity Security Platform solutions, including CyberArk Workforce Password Management and CyberArk Secure Web Sessions. This allows companies to customise session protections, access controls and credential management to each user based on their roles. It also works in conjunction with CyberArk Endpoint Privilege Manager to mitigate potentially risky web access and vulnerable endpoints. Quick Access Bar: The built-in quick access sidebar helps ensure end users can utilise their Single Sign-On (SSO) credentials to securely access frequently used apps, third-party tools and CyberArk privileged access management resources directly from CyberArk Secure Browser with the click of a button. “CyberArk is constantly innovating – working to protect our customers against current cybersecurity risk and emerging threats. Based on trends impacting hybrid work environments and research generated by our CyberArk Labs and Red Team, developing an enterprise browser – with an identity-first, security-first approach – was a natural progression for our business,” said Gil Rapaport, general manager, Access at CyberArk. “CyberArk Secure Browser represents a new era of web browsing, where security, privacy and productivity are the top priorities.” Dynamically mirroring controls and access policies existing on Chrome and Edge browsers that are already deployed on the end user’s device, CyberArk Secure Browser reduces IT overhead and accelerates the deployment timeline for employees, contractors and vendors. Planned availability for CyberArk Secure Browser on Windows endpoints is by the end of 2023. To learn more about CyberArk Secure Browser, please visit https://lp.cyberark.com/secure-browser-early-access.html. About CyberArk CyberArk is the global leader in Identity Security. Centered on privileged access management, CyberArk provides the most comprehensive security offering for any identity – human or machine – across business applications, distributed workforces, hybrid cloud workloads and throughout the DevOps lifecycle. The world’s leading organizations trust CyberArk to help secure their most critical assets.

Read More

ENTERPRISE IDENTITY, SOFTWARE SECURITY, CLOUD SECURITY

Lookout Announces the Successful Divestiture of Its Consumer Mobile Security Business Segment

Businesswire | June 05, 2023

Lookout, Inc., the endpoint-to-cloud security company, today announced it has closed the previously announced sale of its consumer mobile security business to F-Secure, a global provider of consumer security products and services. With this strategic divestiture Lookout will focus on expanding its core enterprise business, built around the Lookout Cloud Security Platform. The sale of Lookout’s consumer mobile security business represents a deliberate and strategic decision to optimize its enterprise product portfolio and concentrate its product innovation and go-to-market on the expansion of these core competencies. The divestiture sets Lookout up for long-term growth and further positions the Company to address the security transformation impacting organizations today, including the increase in remote work, the shift to cloud-based delivery models and the transition to zero trust architectures. “We are pleased to announce the successful divestiture of our mobile consumer security business, which represents a significant milestone in our strategic transformation to become a pure-play enterprise cybersecurity company,” Jim Dolce, CEO at Lookout. “With this refined focus, we will continue to drive innovation, invest in the development of cutting-edge solutions and drive greater value for our customers.” Lookout’s core enterprise business includes Lookout Mobile Endpoint Security and its security services edge (SSE) cloud-native solution, the Lookout Cloud Security Platform. The Company entered the cloud security market through its acquisition of CipherCloud in March 2021. Its Cloud Security Platform was recently scored among the highest three vendors in the 2023 Gartner Critical Capabilities for Security Service Edge (SSE)1 report in each of the four use cases. The Gartner Critical Capabilities for SSE – an essential companion to the Gartner Magic Quadrant™ for SSE2 in which Lookout was named a Visionary for the second year in a row – is a comparative analysis that scores products or services against a set of critical differentiators that every business needs, as identified by Gartner. These four use cases include Secure Web and Cloud Usage, Detect and Mitigate Threats, Connect and Secure Remote Workers and Identify and Protect Sensitive Information. As part of the sale agreement, F-Secure acquires all of the Lookout consumer mobile security products and technology and assumes all responsibility for ongoing operations and customer relationships. Additionally, the Company’s consumer employees will become part of F-Secure. About Lookout Lookout, Inc. is the endpoint-to-cloud cybersecurity company that delivers zero trust security by reducing risk and protecting data wherever it goes, without boundaries or limits. Our unified, cloud-native platform safeguards digital information across devices, apps, networks and clouds and is as fluid and flexible as the modern digital world. Lookout is trusted by enterprises and government agencies of all sizes to protect the sensitive data they care about most, enabling them to work and connect freely and safely. To learn more about the Lookout Cloud Security Platform, visit www.lookout.com and follow Lookout on our blog, LinkedIn and Twitter. © 2023 Lookout, Inc. LOOKOUT®, the Lookout Shield Design®, LOOKOUT with Shield Design®, and SIGNAL FLARE® are registered trademarks of Lookout, Inc. in the United States and other countries. DAY OF SHECURITY®, LOOKOUT MOBILE SECURITY®, and POWERED BY LOOKOUT® are registered trademarks of Lookout, Inc. in the United States. Lookout, Inc. maintains common law trademark rights in EVERYTHING IS OK, PROTECTED BY LOOKOUT, CIPHERCLOUD, SCREAM, the 4 Bar Shield Design, and the Lookout multi-color/multi-shaded Wingspan design.

Read More

PLATFORM SECURITY, SOFTWARE SECURITY, CLOUD SECURITY

SOC Prime Launches Integration with Amazon Security Lake to Supercharge Security Operations

Businesswire | May 31, 2023

SOC Prime, provider of the world’s largest and most advanced platform for collective cyber defense, today announced its integration with Amazon Security Lake, the AWS security service that enables organizations to automatically centralize security data from the cloud, on-premises, and custom data sources into a purpose-driven data lake stored in their account. SOC Prime drives a transformational change in cybersecurity relying on zero-trust & multi-cloud approach to empower smart data orchestration, dynamic attack surface visibility, and cost-efficient threat hunting. Backed by its advanced cybersecurity solutions, Uncoder AI, Attack Detective, and The Prime Hunt, SOC Prime enables organizations to boost their cyber defense capabilities at scale, unleashing the power of Amazon Security Lake. Leveraging SOC Prime’s Uncoder AI, an Augmented Intelligence framework, security teams can save development time and migration costs with re-usable threat hunting queries automatically convertible to Amazon Athena and OpenSearch in the standard Open Cybersecurity Schema Framework (OSCF) format. SOC Prime’s Attack Detective tool intelligently and automatically queries security logs in the customer's Amazon Security Lake account via Amazon Athena and Amazon OpenSearch to identify data sources and then scan them in real time with a curated set of threat hunting queries. By leveraging Attack Detective, security engineers can channel their efforts directly into incident investigation rather than analyzing overwhelming volumes of alerts and accelerate threat research by validating over 10,000 adversary behaviors against the stored log sources in a matter of hours. Attack Detective follows core Zero-Trust Architecture (ZTA) principles segregating the data plane and control plane to ensure that no SIEM or EDR access credentials are shared or inherited within the Company profile. The tool provides complete threat visibility based on the organization-specific logs by linking and correlating with SIEM and EDR on-premises data in its native location without the need to migrate it to the cloud, which contributes to significant cost savings and ensures compliance with zero-trust basic tenets. Adding to investment optimization capabilities, The Prime Hunt open-source browser extension enables security professionals to extract valuable data from large datasets at a lower cost. Users can seamlessly run threat hunting queries on security logs within the Amazon Security Lake account via a web browser in both Athena and OpenSearch and automatically identify accounts and assets affected by the suspected activity. About SOC Prime Headquartered in Boston, SOC Prime operates the world’s largest and most advanced platform for collective cyber defense that cultivates collaboration from a global cybersecurity community and curates the most up-to-date Sigma rules compatible with over 27 SIEM, EDR, and XDR platforms. SOC Prime’s innovation, backed by the vendor-agnostic and zero-trust cybersecurity approach, and cutting-edge technology leveraging Sigma language and MITRE ATT&CK® as core pillars are recognized by the independent research companies, credited by the leading SIEM, XDR & MDR vendors, and trusted by 8,000+ organizations, including 42% of Fortune 100 and 21% of Forbes Global 2000. Flexible subscriptions ensure that both organizations and individual operators can benefit from SOC Prime’s curated detection content and enhanced cyber defense capabilities. SOC Prime is backed by DNX Ventures, Streamlined Ventures, and Rembrandt Venture Partners, having received $11.5M in funding in October 2021. For more information, visit https://socprime.com or follow us on LinkedIn & Twitter.

Read More