Data Security

BitSight and Marsh McLennan Collaborate to Bolster Organizations' Cybersecurity Performance

Exclusive Networks, a global trusted cybersecurity specialist for digital infrastructure, today announced its worldwide distribution agreement with Infinipoint, a provider of a pioneering Device-Identity-as-a-Service (DIaaS) security solution that uniquely enables the critical device pillar of the zero-trust cybersecurity approach. Focusing on mid-market aligned partners – initially in Europe covering France, Germany, and the UK with a view to extending across global territories from early 2022 – Exclusive will be supporting Infinipoint growth targets both through net new opportunities and by capitalising on technology integrations (i.e., SASE, MFA, ZTNA, etc.) and alliances from within its vendor portfolio.

Commenting on the announcement, Andy Travers, EVP Worldwide sales & Marketing at Exclusive Networks said, "Of the seven pillars propping up the concept of zero-trust architecture (ZTA), partners have struggled most to position a strong story around zero-trust for device access because specialist solutions simply haven't existed. That's all changed with Infinipoint and DIaaS. Enterprises know that implementing the zero-trust for devices piece right is essential – and with Infinipoint we're breaking down that barrier. It's a great solution and fits perfectly into our cyber ecosystem. DIaaS also naturally supports a multitude of consumption models which makes it readymade for scaling out globally via our X-OD on-demand platform."

Launched in July this year, DIaaS has been gaining significant market traction. Exclusive will build on this demand to accelerate and scale globally through its specialist go-to-market services and ecosystem of over 18,000 channel partners.

Ariel Kriger, Global VP, Sales & Business Development at Infinipoint said, "Infinipoint is pioneering the Device-Identity-as-a-Service security category and is the first and only solution to provide Single Sign-On (SSO) authorisation integrated with risk-based policies and self-service one-click remediation for non-compliant and vulnerable devices.

"Exclusive Networks was the natural choice to support our market acceleration, possessing

the necessary specialist cyber expertise and global scale to enthuse, educate and serve pent-up partner demand for this gap in the zero-trust market. Extending a zero-trust security posture to devices remains an essential and urgent requirement for every work-from-anywhere workforce. And to do it properly you have to do it by design, with adaptive access controls acting on device context, continuously checking device posture not just at the point of access – all the while not burdening the IT department or negatively impacting end user productivity. None of this is easy to do, but we've done it and now partners, and their customers can reap the benefit."

About Exclusive Networks
Exclusive Networks is a global trusted cybersecurity specialist for digital infrastructure helping to drive the transition to a totally trusted digital future for all people and organisations. Our distinctive approach to distribution gives partners more opportunity and more customer relevance. Our specialism is their strength – equipping them to capitalise on rapidly evolving technologies and transformative business models.

The Exclusive Networks story is a global one with a services-first ideology at its core, harnessing innovation and disruption to deliver partner value. With offices in 40 countries and the ability to service customers in over 150 countries across five continents, Exclusive Networks has a unique 'local sale, global scale' model, combining the extreme focus and value of local independents with the scale and service delivery of a single worldwide distribution powerhouse.

About Infinipoint
Infinipoint is a pioneer in the Device-Identity-as-as-Service security category to extend a true zero-trust security posture to devices. Infinipoint is the only solution that provides Single Sign-On (SSO) authorization integrated with risk-based policies and one-click remediation for non-compliant and vulnerable devices. This reduces risk by protecting access to an organization's data and services while transforming devices to support a world-class security posture. Infinipoint is able to do all this in a productive way that maintains business continuity with no disruption to the workforce.

Spotlight

Other News
Data Security

GuidePoint Security Announces Portfolio of Data Security Governance Services

GuidePoint Security | January 30, 2024

GuidePoint Security, a cybersecurity solutions leader enabling organizations to make smarter decisions and minimize risk, today announced the availability of its Data Security Governance services, which are designed to help customers address the challenges of unstructured data and data sprawl through a proven process and program to meet their unique needs. GuidePoint’s Data Security Governance services consist of policies, standards, and processes leveraging the newest technologies to meet organizations’ data governance goals in both on-prem and cloud environments. Once the right strategy is determined with the customer, GuidePoint Security consultants will review program requirements, assess current policies and controls, perform gap analysis, design and develop/enhance the program, recommend and implement supporting technologies, and create operational processes and metrics. “Whether an organization is just beginning to build their data security governance program or needs help assessing and improving an existing program, our team and service capabilities are built to meet them at their current maturity level,” said Scott Griswold, Practice Director - Security Governance Services, GuidePoint Security. “We work side by side with the customer to conduct the necessary data discovery in their environment and provide tailored recommendations for solutions and processes to ultimately build/improve upon the data security governance program.” GuidePoint’s Data Security Governance Services include: Sensitive Data Cataloging: For organizations just getting started in the process of protecting their sensitive data, GuidePoint offers Data Identification workshops to identify sensitive data types in the environment, including trade secrets, intellectual property, and sensitive business communications. Data Security Governance Program Assessment: For organizations with existing Data Security Governance or Data Protection programs, GuidePoint Security experts will assess the program to identify policy non-compliance, gaps in data protection requirements—whether legal, regulatory, contractual, or business—and program maturity levels. Data Security Governance Program Strategy Development: The GuidePoint team will work with an organization's key stakeholders to design a program strategy aligned with relevant requirements. The outputs of this effort include delivering ongoing sensitive data discovery, automated classification and labeling, the application of required sensitive data protections, restrictions on where sensitive data can be stored and sent, and data retention policy enforcement. Merger and Acquisition Data Identification: This offering provides the ability to identify sensitive data within an M&A target or recent acquisition (including locations, amounts, and access rights) and then perform penetration testing on the storage repositories where that sensitive data exists to determine the risk of data compromise. About GuidePoint Security GuidePoint Security provides trusted cybersecurity expertise, solutions and services that help organizations make better decisions that minimize risk. Our experts act as your trusted advisor to understand your business and challenges, helping you through an evaluation of your cybersecurity posture and ecosystem to expose risks, optimize resources and implement best-fit solutions. GuidePoint’s unmatched expertise has enabled a third of Fortune 500 companies and more than half of the U.S. government cabinet-level agencies to improve their security posture and reduce risk. Learn more at www.guidepointsecurity.com.

Read More