DATA SECURITY

Feitian Technologies and Secret Double Octopus Collaborate to Expand the Passwordless Workforce's Reach

FEITIAN Technologies | May 07, 2021

Secret Double Octopus, the market leader in enterprise passwordless authentication, announced today a partnership with Feitian Technologies, a renowned producer of hardware authentication tokens and security keys.

FEITIAN Technologies is a well-known global supplier of safe and innovative multi-factor authentication (MFA) hardware as well as identity and access management (IAM) solutions. FEITIAN designs and manufactures enterprise-grade biometric hardware, FIDO2-certified security keys, fingerprint scanners, smart cards, and other security and authentication systems for the workforce and consumer markets.

Secret Double Octopus' Octopus Passwordless EnterpriseTM technology, designed and developed for the special requirements of complex business infrastructures, is revolutionizing workforce authentication. To date, the Octopus platform is the only enterprise-grade solution capable of addressing any authentication use-case, from workstations and on-premises applications to cloud services. Its new integration with the Feitian line of security keys provides a simple touch-and-go authentication solution for the entire workforce, as well as a clear path to become a fully passwordless company.

About FEITIAN Technologies

FEITIAN Technologies, founded in 1998, is a leading global supplier of cybersecurity products and solutions. Their clients are spread across more than 100 countries and regions. They serve their clients all over the world because they have 5 overseas branches in Asia, Europe, and North America, as well as a talented international team. FEITIAN employs over 1,000 people, with R&D engineers accounting for more than half of the staff. Over the last 20 years, FEITIAN has established a diverse range of innovative products with international patent rights and certifications due to continuous strong investment in R&D and a broad understanding of customer needs.

About Secret Double Octopus

Secret Double Octopus is an enterprise passwordless authentication solution. They liberate end-users and security teams from the pressure of passwords with the ease and security of strong passwordless authentication. The Octopus Passwordless EnterpriseTM technology offers a seamless user interface and a single way to access workstations, remote services, cloud applications, and on-premises systems, while also offering better cyber-attack security. After being called a Gartner "Cool Vendor," our 4th generation product is now serving customers ranging from mid-sized to Fortune 50 all over the world.

Spotlight

By making servers or services unavailable, DDoS attacks can be crippling to both an organization's finances and its brand reputation. Once all the costs of an attack were factored in - reactive spending on software or infrastructure, brand management repair, increased insurance premiums, security consultant fees - a recent survey showed that DDoS attacks on large enterprises cost an average of $440,000 per incident.


Other News
DATA SECURITY,PLATFORM SECURITY,SOFTWARE SECURITY

Upstream Deepens Investment in Michigan, US with a New Vehicle Security Operation Center

Upstream | September 08, 2022

Upstream, the creator of industry-leading cloud-based cybersecurity and data management platform for connected vehicles and smart mobility, is opening its first U.S.-based vehicle security operation center (vSOC) in Ann Arbor, Michigan, to closely surveil and mitigate emerging cyber threats and risks for its U.S.-based automotive clients. Data and connectivity are the foundation of the automotive industry's transformation, unlocking new revenue streams and business opportunities for automotive stakeholders and users. But, connectivity and mobility applications bring a wide range of cyber risks. "Upstream enables OEMs to build trust into the connected vehicles ecosystem. "Our platform monitors over 12 million vehicles worldwide. We see new attack surfaces and threats on a regular basis, fueled by a wide variety of vulnerabilities, including EV charging networks, expanded use of smartphone apps that control basic car functions and infotainment systems. This is the right timing to open our U.S.-based vSOC, and Michigan is a natural choice." Yoav Levy, CEO and co-founder of Upstream "Companies continue to invest in Michigan because of our world-class talent, quality of life, low cost of doing business and culture of innovation," said Trevor Pawl, Michigan's Chief Mobility Officer. "Michigan remains committed to being the global epicenter of the next revolution of the automotive industry and we applaud Upstream's continued success and investment in Michigan's autonomous and electrified future." "Vehicles are benefiting from a wave of technology innovation, producing transportation that is safer and smarter thanks to connectivity," said Faye Francy, executive director of Auto-ISAC, a global information sharing community established by automakers to address cybersecurity risks. "The very technology that provides us with these new efficiencies also introduces potential cyber risk to the vehicle, and vSOC operations is an application for the automotive industry to proactively address the risk." In fact, Upstream found more than 50 percent of all reported automotive-related cybersecurity incidents took place during the past two years alone. "Customer experience applications, by OEMs and smart mobility providers, are one of the fastest growing attack surfaces and account for 6 percent of total attacks in 2022 so far compared to 2 percent in 2021, explains Yaniv Maimon, Upstream's director of vSOC. "Charging stations and infrastructure have also become a significant concern, especially given range anxiety concerns and the constant pressure to accelerate EV adoption." At the Michigan vSOC, Upstream is hiring and training experienced local cyber and automotive experts to operate the vSOC, offer cross-functional response and mitigate attacks in real time. "Southeast Michigan's emergence as a high-tech mobility hub and its proximity to our automotive customers, their Tier-1 suppliers and cybersecurity talent makes it a perfect setting for our new vSOC," Levy said, adding that traditional security operation centers focus on compliance and IT assets and lack the holistic and contextual view required to mitigate cybersecurity threats against vehicles, services and entire fleets. The Michigan-based vSOC is expected to be fully operational by the end of the year. It adds to Upstream's growing network of automotive-specific security centers already active in Israel, and coming soon in Japan. Additional vSOC investments are expected in Europe in the near future. About Upstream: Upstream provides a cloud-based data management platform purpose-built for connected vehicles, delivering unparalleled automotive cybersecurity detection and response (V-XDR) and data-driven applications. The Upstream Platform unlocks the value of vehicle data, empowering customers to build connected vehicle applications by transforming highly distributed vehicle data into centralized, structured, contextualized data lakes. Coupled with AutoThreat® Intelligence, the first automotive cybersecurity threat intelligence solution, Upstream provides industry-leading cyber threat protection and actionable insights, seamlessly integrated into the customer's environment and Vehicle Security Operation Centers (vSOC).

Read More

DATA SECURITY,PLATFORM SECURITY,SOFTWARE SECURITY

Concentric AI Included in Newly Created Data Security Posture Management Category in Recent Gartner® Hype Cycle™ Report

Concentric AI | August 29, 2022

Concentric AI, a leading vendor of intelligent AI-based solutions for autonomous data security posture management, today announced it has been listed as a Sample Vendor in the newly created Data Security Posture Management category in the recently published Gartner Hype Cycle for Data Security, 2022 report.1 Concentric AI also appears in the Data Access Governance and Data Discovery and Management categories in the Gartner Hype Cycle for Data Security, 2022 report.1 According to the Hype Cycle for Data Security, 2022: “Data security posture management (DSPM) provides visibility as to where sensitive data is, who has access to that data, how it has been used and what the security posture of the data store or application is.”1 Organizations use DSPM as the basis for data risk assessment and to optimize data security governance implementations. The new Data Security Posture Management category has a Benefit Rating of Transformational, which Gartner defines as, “Enables new ways of doing business across industries that will result in major shifts in industry dynamics.”1 According to Gartner: “Organizations face challenges mitigating data security and privacy risks as data rapidly proliferates across multi-cloud and hybrid IT architectures. Identifying meaningful data risk is impossible to solve without combining metrics from data sensitivity, data lineage, infrastructure configurations that create data risks and access risk into a common view. This is an urgent problem that is encouraging rapid growth in the availability and maturation of this technology.”1 “We believe being recognized by Gartner as a Sample Vendor in Data Security Posture Management validates that organizations need visibility of into their sensitive data across datasets and locations, as well as a consolidated view into the risk associated with inconsistent access privileges, permissions, activity, and location to protect their data from loss. “Organizations using Concentric AI benefit from the company’s AI-assisted deep learning autonomous data security solution to reduce their data risk by discovering, evaluating, and remediating security issues.” Karthik Krishnan, Founder and CEO, Concentric AI Concentric AI secures data-centric work using AI to protect business-critical information hidden in the millions of files and databases used by today’s distributed workforce. The company’s unique deep learning solution autonomously and accurately finds sensitive content, assesses risk, and remediates security issues, allowing organizations across industries to meet their data security needs for the first time. Concentric AI’s Semantic Intelligence™ automates unstructured and structured data security using deep learning to categorize data, uncover business criticality and reduce risk. Its Risk Distance™ analysis technology uses the baseline security practices observed for each data category to spot security anomalies in individual files. It compares documents of the same type to identify risk from oversharing, third-party access, wrong location, or misclassification. Organizations benefit from the expertise of content owners without intrusive classification mandates, with no rules, regex, or policy maintenance needed. Gartner Disclaimer Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose. GARTNER and HYPE CYCLE are registered trademarks and service marks of Gartner, Inc. and/or its affiliates in the U.S. and internationally and are used herein with permission. All rights reserved. About Concentric AI With Concentric AI, organizations can finally address their unmet data security needs by discovering and protecting business-critical content. Concentric AI protects intellectual property, financial documents, PII/PCI content, customer data, business confidential data and more, across on-premises and cloud-based data stores, as well as messaging and communication applications. The Concentric AI Semantic Intelligence™ Data Security Posture Management solution uses deep learning and Risk Distance™ analysis to accurately categorize data, assess risk, and remediate security issues – without relying on upfront rules or complex configuration. Concentric AI is venture-backed by leading Silicon Valley VCs and is headquartered in San Jose, Calif.

Read More

DATA SECURITY,PLATFORM SECURITY,SOFTWARE SECURITY

Barracuda recognized for industry-leading email security and data protection solutions

Barracuda | August 23, 2022

Barracuda, a trusted partner and leading provider of cloud-first security solutions, announced today that it is recognized as an innovator with two prestigious awards for email protection in the 2022 SC Awards and for data protection in the 2022 CRN Annual Report Card (ARC) Awards. 2022 SC Awards Barracuda Email Protection has been recognized as the winner of the Email Protection category in the 2022 SC Awards. Now in its 25th year, the SC Awards are cybersecurity's most prestigious and competitive program. Winners are recognized for outstanding solutions, organizations, and people driving innovation and success in information security. Barracuda Email Protection is a comprehensive, easy-to-use solution that delivers API-based inbox defense, phishing protection, incident response, gateway defense, data protection, and compliance capabilities. "We're thrilled that our solutions were named the best in the Email Protection category this year. "This win recognizes the value of our solutions, including our advanced ML capabilities, which enable our customers to fully automate detection and remediation. At Barracuda, it's our mission to deliver innovative security products that are easy to by, deploy, and use, and we see this award as a sign we are delivering on that." Don MacLennan, SVP of Engineering and Product Management, Email Protection, at Barracuda The 2022 SC Awards received a record 800 entries across 38 categories — a 21% increase over 2021. Entries for the SC Awards were judged by a panel of industry leaders, from sectors including healthcare, financial services, manufacturing, consulting, and education, among others. 2022 CRN Annual Report Card Barracuda was named the overall winner in the Data Protection Software category of CRN's 2022 Annual Report Card award. This award honors the industry's top technology vendors for success in providing high levels of satisfaction for channel partners through innovative products, services, and partner programs. Barracuda not only earned the highest score overall in the category, but also swept the four subcategories: Product Innovation, Support, Partnership, Managed & Cloud Services. With 37 years of history, CRN's ARC Awards recognize best-in-class vendors that are devoted to boosting IT channel growth through innovation in technology and partner strategy. Through the ARC Awards — known as one of the most prestigious honors in the IT industry — solution providers offer key feedback that commends technology manufacturers for designing channel-friendly product offerings, developing strong partner programs, and building long-term successful relationships with solution providers. This win recognizes both Barracuda Cloud-to-Cloud Backup and Barracuda Backup. Barracuda Cloud-to-Cloud Backup provides easy-to-use, cloud-native backup for Microsoft 365 data. Barracuda Backup combines storage, software, and inline deduplication, to ensure data is protected against loss no matter what happens. "We're honored by this recognition, and it is especially meaningful because it is based on input from channel partners," said Bill Fitzgerald, VP, Channel Sales, Americas. "I'd like to express my sincere thanks to all channel partners that participated in the CRN survey." The ARC Awards are based on an invitation-only research survey conducted by The Channel Company. Responses from 3,000 solution providers across North America were evaluated in this year's survey, rating 82 vendor partners across four criteria: product innovation, support, partnership, and managed cloud services. Scores were awarded in 25 major product categories in technology areas that are critical to channel partner success. About Barracuda At Barracuda we strive to make the world a safer place. We believe every business deserves access to cloud-first, enterprise-grade security solutions that are easy to buy, deploy, and use. We protect email, networks, data, and applications with innovative solutions that grow and adapt with our customers' journey. More than 200,000 organizations worldwide trust Barracuda to protect them — in ways they may not even know they are at risk — so they can focus on taking their business to the next level.

Read More

PLATFORM SECURITY

Resecurity® Brings Cyber Threat Intelligence to Microsoft Azure

Resecurity | July 01, 2022

Resecurity, a cybersecurity and intelligence company, today announced its award-winning cybersecurity threat intelligence and risk monitoring platform is now available on Microsoft's Azure Marketplace. Microsoft's Azure Marketplace is the most comprehensive marketplace on the planet, offering thousands of certified cloud applications and software to over four million active users and subscribers. With cyber-risk ranking as a top concern for CEOs and business owners1, enterprises are looking for additional support to secure and manage the evolving cyber threatscape. More importantly, they're looking for trusted vendors who provide scalable, secure solutions that can work inside existing operating systems. Today, nearly 70 percent of organizations worldwide use Microsoft Azure for their cloud services.2 By joining the Microsoft Azure marketplace, Resecurity's software solutions will be easily accessible to the millions of Microsoft Azure customers needing comprehensive cybersecurity management and monitoring. "Enterprises continue to battle increasing cyber threats emerging from the Dark Web and ransomware groups targeting cloud services. Trusted partners like Microsoft Azure have enabled organizations to confidently bring in the cybersecurity expertise and solutions they need to protect their ecosystems. "Resecurity is dedicated to helping organizations worldwide mitigate these risks with our reliable, scalable and accessible cybersecurity and threat intelligence software." Gene Yoo, CEO of Resecurity Resecurity's AI-powered solutions provide proactive alerts and comprehensive visibility of digital risks targeting the enterprise ecosystem. The innovative platform allows administrators to reduce potential blind spots and security gaps by quickly seeing in-depth analysis and specific artifacts obtained through the dark web, botnets activity, network intelligence and high-quality threat intelligence data. Microsoft Azure users who integrate Resecurity into their cybersecurity strategy will benefit from: Around-the-clock security monitoring of your cloud workloads and enterprise ecosystem, In-depth risk evaluation of the entire enterprise ecosystem (Dark Web, Compromised Accounts, Data Leaks, Network Hygiene, Cloud Security, etc.), A scalable software solution that can monitor a digital footprint of any size (Domains, Network Ranges, Cloud-based Nodes), AI-powered threat intelligence that leverages Rescurity's Dark Web intelligence repositories with over 3.4 billion records and cyber intelligence analysts deployed across all continents, Contextualized risk alerts and data-backed suggested actions to enable a proactive security strategy.Just recently Resecurity has been named a gold winner by the 2022 Cybersecurity Excellence Awards in North America. Resecurity's products and services received Gold recognition across 3 categories in highly competitive nominations such as cyber threat intelligence (CTI), threat hunting, and third-party risk management (TPRM). Just recently Resecurity has been named a gold winner by the 2022 Cybersecurity Excellence Awards in North America. Resecurity's products and services received Gold recognition across 3 categories in highly competitive nominations such as cyber threat intelligence (CTI), threat hunting, and third-party risk management (TPRM). About Resecurity Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence. Known for providing best-of-breed data-driven intelligence solutions, Resecurity's services and platforms focus on early-warning identification of data breaches and comprehensive protection against cybersecurity risks. Founded in 2016, it has been globally recognized as one of the world's most innovative cybersecurity companies with the sole mission of enabling organizations to combat cyber threats regardless of how sophisticated they are. Most recently, Resecurity was named as one of the Top 10 fastest-growing private cybersecurity companies in Los Angeles, California by Inc. Magazine. An Official Member of Infragard, AFCEA, NDIA, SIA and FS-ISAC.

Read More

Spotlight

By making servers or services unavailable, DDoS attacks can be crippling to both an organization's finances and its brand reputation. Once all the costs of an attack were factored in - reactive spending on software or infrastructure, brand management repair, increased insurance premiums, security consultant fees - a recent survey showed that DDoS attacks on large enterprises cost an average of $440,000 per incident.

Resources