INFOSEC PROJECT MANAGEMENT

Carahsoft Secures Exclusive Cybersecurity Aggregator Agreement

Carahsoft | March 08, 2022

Carahsoft
The Trusted IT Solutions Provider®, Carahsoft Technology Corp., today announced that it has signed a new agreement with Broadcom Inc. to become the exclusive Public Sector Cybersecurity Aggregator partner for the Symantec security portfolio, which is aspect of Broadcom Software, in the U.S.

Carahsoft has become the official U.S. distributor for all Broadcom Software products to channel partners in the Public Sector covering Federal, State and Local Government, and Education sectors, thanks to this new Cybersecurity Aggregator arrangement. Carahsoft intends to offer a number of initiatives that will allow the Broadcom Software Public Sector channel partner community to develop and be financially rewarded for providing exceptional client experiences, better customer retention, and growth.

Broadcom Software is dedicated to creating strategic investments that will enable Carahsoft to provide Broadcom Software Public Sector clients of all sizes with industry-leading customer service and technical support. The cybersecurity channel partner community will be better positioned as a result of this new arrangement to provide exceptional client experiences, boost customer retention, and optimize growth and profits. Carahsoft wants to offer considerable incentives and deal registration programs in collaboration with Broadcom Software to assist accelerate development in these crucial areas.

“This agreement will create a compelling opportunity for our cybersecurity Public Sector channel partners. Through this agreement, Broadcom Software and Carahsoft will focus efforts and investments on the resources to boost resellers’ sales of Symantec solutions and provide new programs and focus for the small and medium business customer segment. We’re committed to offering improved partner support, incentives, and pricing to help promote quality engagements and optimized customer experiences.”

Brian Snell, Carahsoft’s Sales Director for the Broadcom Software business

Cynthia Loyd, Vice President of Global Enterprise, Partner and Commercial Sales for Broadcom Software Said “Through this collaboration, we will be able to deliver innovative security solutions to all of our customers seamlessly in Public Sector, and do so faster, more efficiently, and more reliably. Partners are critical to the success of the Public Sector customer space for Broadcom Software. We are offering extensive resources to build trust and confidence in our collaboration and invite our Symantec resellers to join with Carahsoft to capitalize on these opportunities.”

Broadcom Software private sector partners in North America continue to rely on Carahsoft as a reliable distributor for Mainframe, Cybersecurity, and Agile Operations Software solutions.

Spotlight

We believe this architecture, designed to support key initiatives such as IT consumerization and cloud computing, represents a novel approach to enterprise security. It provides more flexible, dynamic, and granular security controls than traditional enterprise security models. For example, the architecture is designed to dynamically adjust a user’s access privileges as the level of risk changes, depending on factors such as location and the type of device used—such as a trusted mobile business PC or an untrusted personal smartphone. The architecture also focuses heavily on survivability, based on the assumption that compromise is inevitable.


Other News
DATA SECURITY

Flow Security Launches Next-Gen Data Security Platform Following $10 Million Seed Round

Flow Security | August 05, 2022

Flow Security today announced $10M in seed funding and launched the first data security platform that discovers and protects both data at rest and in motion. The funding was led by Amiti, with participation from GFC, Amdocs Ventures, and industry leaders such as CyberArk CEO Udi Mokady and Demisto CEO and co-founder Slavik Markovich. Enterprises of all sizes continue to make heavy investments in technology stacks as they transition to modern cloud application architectures. This new era promises many benefits, but has also led to significant data sprawl and major difficulties in securing data. With the widespread adoption of modern architectures, securing sensitive data such as PII, PHI, financial information, and intellectual property has become a near-impossible task. Flow Security helps organizations overcome these challenges by continuously mapping and detecting all data-related risks for an improved data security posture. Flow is the only data security platform that supports use cases including discovering and classifying data flows to external services, policy enforcement, automatic data-related threat modeling, and reducing data access permissions to the minimum. Flow has a growing customer base in highly-regulated markets such as e-commerce, fintech, healthcare, insurtech, and more. "Discovery, mapping and protecting data is usually a manual process, which is not effective in large organizations," says Nir Chervoni, Head of Data Security of Booking.com, "Automatic data mapping should consist of analyzing the actual payload, and not only its metadata. So far, Flow is the only company I've seen that provides that capability for multiple scenarios." "Security and data protection teams are struggling to keep up with the rapid pace of today, and Flow is making their lives exponentially easier," said Ben Rabinowitz, Managing Partner and Founder at Amiti Ventures. "We're thrilled to be a partner on this journey, and eager to help capitalize on this opportunity to give security teams the technology they need to become business enablers." "We've reviewed dozens of different data security tools lately, and we weren't satisfied with any of them. "But Flow's data-in-motion approach is a game changer. It took the platform a few days to map data-related threats that usually take months of manual work to detect." Ralph Pyne, VP of Security at NextRoll "Data security is not a new problem, but the challenges are changing and growing," said Jonathan Roizin, co-founder and CEO of Flow Security. "Organizations are moving at a record pace and quickly transitioning to the cloud and cloud-first applications. These transformations often make life easier, but they also make the jobs of security professionals even more difficult. With Flow, security teams are no longer forced to chase down information. It simplifies security and regulatory processes and bridges the gap between security and development teams." About Flow Security Flow Security revolutionizes data security with the first platform that discovers and protects data not only at rest, but also in motion. Founded in 2021 by Jonathan Roizin and Rom Ashkenazi, the Israel-based company is backed by Amiti, GFC, Amdocs Ventures, and market-leading angel investors.

Read More

DATA SECURITY

Cyble Launches Dedicated Managed Security Service Provider (MSSP) Program to Empower Industry-leading MSSPs

Cyble | June 16, 2022

Cyble, the Y Combinator-backed leader in AI-powered global cyber threat intelligence, is proud to announce its latest threat intelligence platform for the Managed Security Service Providers (MSSPs). Through the new program, Cyber MSSP partners can benefit from a comprehensive dashboard comprising advanced threat intelligence and cybercrime monitoring and mitigation. It will be instrumental in enabling both customers and partners to work in tandem towards achieving their cybersecurity goals. The platform is designed to empower Cyble’s MSSP partners with an enhanced control to provide, configure, and monitor all services provided by Cyble Vision as a software suite to its end customers. This new update brings in features such as a multi-admin management console, seamless access to the user hierarchy dashboard for the easy understating of customer distribution and ownerships, centralized dashboards and consoles for access, and the ability to manage and maintain end-user dashboards from their own accounts. Additionally, it also enables tracking of all customer alerts, thereby fostering early intervention and safeguarding customer assets & interests. Manish Chachada, COO and Co-founder of Cyble, said, “The launch of our MSSP program is a key development in Cyble’s journey. It will enable our partners to extend Cyble’s Threat Intelligence, Digital Risk Protection Services, and Darkweb and Cybercrime Monitoring capabilities to customers worldwide, ensuring seamless integration with their environment. We are completely committed to the needs of our clients and partners, and the ability of our MSSP program to provide users with a single intuitive dashboard for AI-enabled threat management, advanced threat hunting, and mitigation response has been a key differentiating factor against competitors.” “Strategic partnership is a critical necessity for organizations due to the unprecedented need to quickly and efficiently address takedowns, incident response, 3rd party risk scoring, and monitoring emerging risks etc. The MSSP program will pave way for cost savings with ROI and access to increased visibility, operational efficiencies, control, and actionable intelligence for our partners' clients.” Mandar Patil, Vice President International Market and Customer Success at Cyble The MSSP platform comes with upgraded threat detection abilities backed by AI-based innovation, unlimited scalability, open platform with the capability to integrate effectively, and is governed by the GDPR privacy mandates. The news closely follows Cyble’s recent announcement on being the winner in 8 categories of the prestigious 10th Annual Global InfoSec Awards by the elite Cyber Defense Magazine (CDM), the industry’s leading electronic information security magazine. “We are incredibly excited to release this core module to a broader partner base and can’t wait to help a larger enterprise community. This is an outcome of having worked tirelessly to design a solution that enhances the threat detection and proactive mitigation capabilities of our clients. MSSP partners look for nothing more than comprehensive, easy-to-navigate, secure solutions that provide the best-in-class threat intelligence and digital risk protection. Our solution does just that! Our excitement knows no bounds as we look forward to strengthening our existing strategic MSSP partnerships besides onboarding new partners worldwide,” said Beenu Arora, CEO, and Co-founder of Cyble. About Cyble Cyble is a global threat intelligence SaaS provider that helps enterprises protect themselves from cybercrimes and exposure on the Surface web, Deepweb, and Darkweb. Its prime focus is to provide organizations with real-time visibility into their digital risk footprint. Backed by Blackbird Ventures, Xoogler, and Y Combinator as part of the 2021 winter cohort, Cyble has also been recognized by Forbes as one of the top 20 Best Cybersecurity Start-ups, along with several other industry recognitions. Headquartered in Georgia, United States, and with offices in Dubai, Australia, Singapore, and India, Cyble has a global presence.

Read More

SOFTWARE SECURITY

Involta Partners With Tech Startup HacWare to Expand Enterprise Cybersecurity Awareness Services

Involta | August 08, 2022

Involta, an award-winning data center, hybrid IT, and cloud-forward consulting firm, announces today a partnership with HacWare, an AI-driven cybersecurity awareness and training SaaS (Software-as-a-Service) product that combines threat intelligence with user behavior to help lean IT teams combat today's most advanced phishing attacks. "Today, email phishing attacks remain the number one source of security breaches, causing over 90% of data breaches," states Tiffany Ricks, Founder and CEO of HacWare, Inc. "The average employee is vulnerable because they spend 1,500 hours a year using email, and many are unaware of email security best practices. Partnering with Involta gives us the opportunity to help businesses improve their email security awareness and build up their first line of defense against cyberattacks." HacWare's internal risk assessment provides real-time threat intelligence to show internal vulnerabilities. HacWare learns from the intelligence to provide personalized phishing simulations and training. The phishing technology leverages behavioral psychology best practices to improve cyber posture, saving businesses up to 40% in labor costs. "At Involta, we know the two most important things our customers can do to protect themselves from a phishing attack is awareness and education," comments Mark Cooley, Involta VP of Security and Compliance. "Making sure that your company's employees understand the prevalence and sophistication of these attacks is crucial. HacWare's security awareness technology combines open-source data and data science to show employees how to avoid scams while significantly saving on traditional security training and awareness labor costs. The automated, easy-to-use platform is the perfect addition to our robust security solution suite." Ricks' motivation comes from an entrepreneurial spirit and the desire to help people. She has led HacWare, Inc. to be widely recognized by leading publications such as The Wall Street Journal, Dark Reading, TechCrunch, Forbes and Women's Business Council. "We are thrilled to partner with Tiffany and her team at HacWare to bring her expertise and innovative solutions to our customers and prospects. "Not only is her product both superior and necessary in today's security landscape, but she is also a true role model for our industry's next generation of female leaders. As more women continue to enter into the world of security and digital infrastructure, it's critical to align with them and help bolster their positions while working alongside them to close the gender gap." Jim Buie, Involta President and CEO Involta's commitment to supporting women in tech and empowering girls to explore STEM fields includes a partnership with Girls, Inc. of Pinellas County, Florida, where they recently introduced digital infrastructure as a potential career path. About Involta Involta is an award-winning hybrid IT and cloud-forward consulting firm orchestrating digital transformation for the nation's leading enterprises. Involta's ongoing mission is rooted in partnership. Its personalized approach identifies customers' requirements while earning their trust to ultimately deliver Superior Infrastructure and Services, Operational Excellence and People Who Deliver, keeping with the Involta brand promise.

Read More

ENTERPRISE IDENTITY,PLATFORM SECURITY,SOFTWARE SECURITY

Safe Security Introduces Free Assessments to Provide Trusted Financial Risk Calculations for Cyber Attacks and Cyber Insurance Discussions

Safe Security | August 17, 2022

Safe Security, a global leader in cybersecurity risk quantification and management, today announced two industry-first assessment tools to empower organizations to make holistic financial decisions based on their actual cyber risk. At no cost, organizations can access Safe Security’s Interactive Cost Calculator, as well as the Cyberinsurance Assessment, which are designed to enable data-driven discussions about risk and coverage requirements. “Executive leadership from the CEO and board members, to CISOs, risk teams, and CFOs are asking questions like, ‘how much will a cyber attack cost us?’ Or, ‘how much should our cyber insurance cost?’ Today, those leaders either do not have a financial figure at all or possess a financial figure from a ‘black-box’ approach that they can’t explain or trust,” said Saket Modi, co-founder and CEO of Safe Security. “Based on our research, Safe Security is offering organizations the opportunity to understand the financial impact of a cyber attack with full visibility into how the assessment is calculated so you can trust and explain the numbers. Knowledge is power, and our mission is to arm you with an unbiased assessment that can be used for risk discussions and insurance negotiations.” Interactive Cost Calculator for Cyber Attacks Safe Security’s Interactive Cost Calculator for cyber attacks is a free, tunable calculator that enables organizations to understand their potential financial risk due to a cyber attack, such as ransomware. The easy-to-use assessment gathers specific inputs about the company, and provides a cost estimate based on Safe Security’s cost model that takes into account cost drivers associated with security incidents. The output can be customized to the parameters of an organization to further refine the estimate. Inside-Out Cyberinsurance Assessment Safe Security’s Inside-Out Cyberinsurance Assessment helps companies better understand their cyber health and reduce premiums. Cyber insurance premiums keep rising despite increasing cybersecurity investments. Companies can gain specific guidance on how their cybersecurity risk posture compares to others in the same industry, how much coverage they need, and the top actions they should take to ensure a successful cyber insurance renewal. The SAFE platform runs a cyber risk assessment based on the following data points: API feeds from the organization’s internal technology environment Maturity of the organization’s cybersecurity policies and products About Safe Security Safe Security is a leader in cybersecurity and digital business risk quantification management, with a mission to build a safer digital future. Safe’s cyber risk quantification and management (CRQM) platform enables organizations to manage cyber risks in real-time. Its platform automatically collects signals from inside and outside a company’s environment to give the company-specific cyber risk rating, or SAFE Score, the financial impact of a potential breach, and an action plan. This enables organizations to have a common language across teams - from the board all the way down to an analyst - to align with a consistent risk metric. Other benefits include justifying investments in cybersecurity and purchase of cyber insurance for the organization.

Read More

Spotlight

We believe this architecture, designed to support key initiatives such as IT consumerization and cloud computing, represents a novel approach to enterprise security. It provides more flexible, dynamic, and granular security controls than traditional enterprise security models. For example, the architecture is designed to dynamically adjust a user’s access privileges as the level of risk changes, depending on factors such as location and the type of device used—such as a trusted mobile business PC or an untrusted personal smartphone. The architecture also focuses heavily on survivability, based on the assumption that compromise is inevitable.

Resources