SOFTWARE SECURITY

Minimize Cybersecurity Risk and Relieve Overstretched Security Teams with Trend Micro Support and Service Bundles

Trend Micro Incorporated | September 07, 2021

Trend Micro Incorporated a global cybersecurity leader, today announced the launch of Trend Micro Service One, consolidating its managed services to optimize enterprise threat management. The new services bundles, which can include premium support, an early warning service, Managed XDR and incident response, help customers prevent, detect and respond to cyber threats faster by supplementing internal resources.

The prevalence of cybersecurity threats and the dynamic threat landscape leave businesses vulnerable and put security experts in high demand to triage and investigate incidents.

According to Aaron Sherrill, Senior Research Analyst at 451 Research, part of S&P Global Market Intelligence[1], "Security teams are struggling to understand the right approach or strategy to employ to detect and respond to advanced threats. While most organizations have a plethora of security tools at their disposal, they are creating enormous amounts of data that must be explored and inspected. It is becoming increasingly difficult to distinguish between the noise and indicators of serious threats – especially complex, distributed threats that operate low and slow to avoid detection."

Over half of Security Operations Center (SOC) teams feel overwhelmed by alerts and aren't confident in their abilities to prioritize or respond to these alerts, according to a recent Trend Micro survey. Outsourcing security management significantly lightens the workloads and saves businesses from catastrophic breaches. 

"The weight of the world was felt by our security team as we work tirelessly to enable organization success in the digital transformation journey," said Andre Castleberry, cybersecurity manager of Hall County, Georgia. "Trend Micro's managed services have empowered our small team to manage risk and compliance at scale. Having threat experts support day-to-day detection and response for our security platform allows our employees to focus resources on serving our constituents."

Trend Micro's expert threat analysis and monitoring via its different services helps fortify business risk management plans. Managed threat detection and response across a complete security platform takes the burden of threat data triage off of stretched security teams, allowing internal resources to focus on business enablement.

"Security teams are stretched to the max while the business risk of cybersecurity continues to increase," said Wendy Moore, vice-president of product marketing for Trend Micro. "We want to help make our customers' lives easier while also minimizing their risk of attack. Providing better insight across the entire security platform, from product enablement, to risk monitoring and mitigation, to attack detection and response is one way we're doing that. Our proactive services that cross the threat lifecycle enables more advanced visibility and protection, helping businesses manage threats most effectively."

Enterprise security requires streamlined operations with a broader perspective, including better context to hunt, detect and contain threats to best manage the business risk introduced by cyber threats. Trend Micro's powerful cybersecurity platform detects malicious activities, with threat intelligence from various sources, helping catch threats faster and improve investigations, analysis, and response times, while eliminating pressure from the SOC team so they can focus on high value activities.

Leveraging Trend Micro's services adds business value by combining premium customer support with such options as:

Early Warning Service scans for early indicators of compromise and then alert customers of potential threats before they cause system harm.
Incident Response provides expert resources in case of a critical, active attack.
Managed Detection and Response monitors alerts and logs across the entire environment, identifying and investigating events and providing ongoing threat expertise.
Trend Micro is committed to supporting customers through their digital transformation journey, supporting internal resources, so customers get the most out of their security platform.

About Trend Micro
Trend Micro, a global cybersecurity leader, helps make the world safe for exchanging digital information. Fueled by decades of security expertise, global threat research, and continuous innovation, Trend Micro's cybersecurity platform protects thousands of organizations and millions of individuals across clouds, networks, devices, and endpoints. As a leader in cloud and enterprise cybersecurity, the platform delivers a powerful range of advanced threat defense techniques optimized for environments like AWS, Microsoft, and Google, and central visibility for better, faster detection and response. With 7,000 employees across 65 countries, Trend Micro enables organizations to simplify and secure their connected world.

Spotlight

The Higher Education Information Security Council (HEISC), along with EDUCAUSE and Internet2, held its annual Information Security Awareness Video & Poster Contest, an event that allows college students to win prizes, gain experience, and earn recognition by creating a PSA about information security.


Other News
SOFTWARE SECURITY

JFrog Integrates with ServiceNow to Improve Software Security Vulnerability Response Times with “ServiceOps”

JFrog | May 27, 2022

JFrog Ltd. , the Liquid Software company and creators of the JFrog DevOps Platform, today unveiled new integrations for JFrog Xray with ServiceNow’s Lightstep Incident Response and Spoke products for IT Service Management. Available immediately, the JFrog Xray integrations with ServiceNow (NYSE: NOW) provide IT leaders with real-time insights on security vulnerabilities and compliance issues to quickly engage necessary team members from across the organization for more immediate response and remediation. “Successfully securing the software supply chain at the speed of business is a team sport, requiring efficient, cross-team collaboration for timely security incident remediation. Our integration with ServiceNow aims to change the relationship between developers and the rest of the business, so they can maintain the speed and frequency of releases, while avoiding downtime and loss of trust from end customers." Shlomi Ben Haim, Co-Founder and CEO, JFrog The new integration enables IT teams to proactively address security issues before they become major concerns. The combination of JFrog Xray and ServiceNow delivers a robust software composition analysis (SCA) tool that can quickly scan binaries for vulnerabilities and license compliance issues, then share those insights with the appropriate parties across the organization. The JFrog Xray-ServiceNow solution is unique in that it helps DevOps engineers, site reliability engineers (SREs), IT system administrators, and others, more securely build, deploy, run, and monitor applications effortlessly, in a single view. It also enables real-time security alerts and insights with assigned actions across all the tools, people, and processes needed for timely resolution. JFrog Xray & ServiceNow: Delivering Incident Response & Enterprise-wide Workflow Design for Security Incidents Identifying and effectively responding to malicious attacks must transcend business units and operational functions. By improving real-time insight, collaboration, and communication amongst and between enterprise security and IT teams, the JFrog Xray-ServiceNow integrations ensure swift responses to emerging security threats. The JFrog Xray integration with Lightstep Incident Response enables developers, SREs, and Security Administrators to: Monitor, collect and respond to license compliance and security vulnerabilities impacting the software supply chain across all stages of the software development and release lifecycle. Streamline vulnerability response by pulling-in the right team members across the organization for faster remediation. The JFrog Xray Spoke for ServiceNow allows IT operations staff to: Generate violation reports, create ‘ignore rules’, re-scan builds, add custom item properties, and more. Automate workflows that meet audit demands and avoid penalties for improper use of code segments obtained from the open-source community. Identify problems earlier in the application development pipeline and incorporate change management solutions. For more information on the new JFrog Xray integrations for ServiceNow Lightstep Incident Response, read this blog or solution sheet. Further details on the JFrog Xray integration with Spoke can be found in this blog. You can also connect with JFrog and ServiceNow solution experts during swampUP 2022 taking place in San Diego, May 25 - 26, 2022. For more information and to register, visit https://swampup.jfrog.com/. About JFrog JFrog Ltd. , is on a mission to power all the world’s software updates, driven by a “Liquid Software” vision to allow the seamless, secure flow of binaries from developers to the edge. The JFrog Platform enables software creators to power their entire software supply chain throughout the full binary lifecycle, so they can build, secure, distribute, and connect any source with any production environment. JFrog’s hybrid, universal, multi-cloud DevOps platform is available as both self-managed and SaaS services across major cloud service providers. Millions of users and thousands of customers worldwide, including a majority of the Fortune 100, depend on JFrog solutions to securely manage their mission-critical software supply chain. Once you leap forward, you won’t go back.

Read More

SOFTWARE SECURITY

Sysdig Open Source Is Extended to Secure Cloud Services

Sysdig | May 16, 2022

Sysdig, the unified container and cloud security leader, announced that Sysdig open source, the incident response standard for containers, has been extended to the cloud. Using system calls, Sysdig open source (Sysdig OSS) traditionally offers deep observability into running applications, as well as file system access and network activity, which speeds incident response and troubleshooting. Teams can quickly filter information from Sysdig OSS and take action. With the announcement of this new integration, these capabilities have been extended beyond containers to any cloud environment. Today, Sysdig announced Edd Wilder-James has joined Sysdig from Google to lead the company’s open source ecosystem team. The complexity of cloud-native applications – with countless components and variables – makes it extremely difficult for security analysts and system administrators to quickly triage alerts and debug problems. Sysdig OSS captures process, file system, and network activity in real time and with a high degree of granularity. The tool, which has nearly two million downloads and 6,850 GitHub stars, surfaces everything from executed commands and file system activity to network activity. Sysdig OSS then offers advanced filtering and troubleshooting capabilities, supporting root cause analysis for security and performance issues.Using a new plugin framework – originally developed by the open source community for the CNCF project Falco – Sysdig extends the number of sources Sysdig OSS can be connected with to anything that generates logs or events, including Azure, Google, and AWS CloudTrail logs. Going forward, every plugin developed for Falco can also be leveraged by Sysdig OSS. Using one tool, like Sysdig OSS, to observe events from the entire cloud-native environment streamlines investigations. Using a different tool for each environment adds complexity, which makes it massively harder to troubleshoot. Sysdig’s Commitment to Open Source Sysdig was founded as an open source company and Sysdig Secure and Sysdig Monitor were both built on an open source foundation to address the security challenges of modern cloud applications. Both projects were created by Sysdig to leverage deep visibility as a foundation for security, and they have become standards for container and cloud threat detection and incident response. Falco, which was contributed to the CNCF in 2018, is now an incubation-level hosted project with more than 45 million downloads. Sysdig OSS and Falco can be used together as a powerful open source solution to reduce risk at runtime. Sysdig OSS acts as a flight recorder, capturing a detailed record for inspection. Falco acts as a security camera, continuously detecting unexpected behavior, configuration changes, intrusions, and data theft in real time. Teams can use Sysdig OSS and Falco together to detect and respond to threats. “If you want to see what is going on inside an application, Sysdig OSS gives you that record. “Sysdig open source was the inspiration for Falco. While Falco will monitor and alert based on your policies, Sysdig open source will tell you what happened at a particular time, before and after the event. Having the ability to use both open source tools in the cloud is extremely powerful.” Loris Degioanni, Founder and CTO of Sysdig About Sysdig Sysdig is driving the standard for cloud and container security. The company pioneered cloud-native runtime threat detection and response by creating Falco and Sysdig as open source standards and key building blocks of the Sysdig platform. With the platform, teams can find and prioritize software vulnerabilities, detect and respond to threats, and manage cloud configurations, permissions and compliance. From containers and Kubernetes to cloud services, teams get a single view of risk from source to run, with no blind spots, no guesswork, no black boxes. The largest and most innovative companies around the world rely on Sysdig.

Read More

SOFTWARE SECURITY

Palo Alto Networks Bolsters Its Cloud Native Security Offerings With Out-of-Band WAAS

Palo Alto Networks | June 24, 2022

Over the last two years, organizations have expanded their use of cloud environments by more than 25%. Many are now struggling to manage the technical complexity of cloud migration, including the ability to secure their applications across the entire application development lifecycle. Palo Alto Networks (NASDAQ: PANW), a leader in The Forrester Wave™: Cloud Workload Security, Q1 2022, today announced the addition of Out-of-Band Web Application and API Security (Out-of-Band WAAS) to Prisma® Cloud to help organizations secure web applications with maximum flexibility. Until now, a primary industry approach to securing web applications has been to deploy inline web application firewalls (WAFs). Some organizations are reluctant to introduce WAFs or API security solutions inline, however, due to performance and scalability concerns. With today's announcement, Prisma Cloud can provide organizations with deep web and API security both inline and out of band, allowing them to choose how to protect their applications in the cloud. "Companies no longer have to decide between application security and performance. By adding Out-of-Band WAAS to Prisma Cloud, we are empowering customers with flexible security options that fit their evolving application needs," said Ankur Shah, senior vice president, Prisma Cloud, Palo Alto Networks. "As more organizations move workloads to the cloud, the capabilities that make up Prisma Cloud help provide the most complete protection, reducing complexity and increasing visibility across infrastructure, workloads, identities and applications." "As organizations increasingly build and deploy their applications in the cloud, protecting their business-critical applications without impacting performance has been a challenge. "Adding the option of Out-of-Band WAAS helps both developer and security teams secure their applications with the same level of security as traditional in-line WAFs and API security without impacting performance." Melinda Marks, senior analyst, ESG In addition to Out-of-Band WAAS, Prisma Cloud is getting new threat detection, alert prioritization and permissions management capabilities to help provide organizations with deeper, unified visibility across their entire cloud application portfolio: Multicloud Graph View for Cloud Infrastructure Entitlement Management (CIEM): Discover over-privileged accounts and understand access risk across multicloud environments. Prisma Cloud now provides a graph view of the net effective permissions across AWS, Microsoft Azure and Google Cloud. Multicloud Agentless Cloud Workload Protection: Extend visibility into cloud workloads and application risks across Azure and Google Cloud, in addition to AWS, to complement existing agent-based protection. DNS-Based Threat Detection: Surface malicious activity and anomalous behavior in cloud environments. Prisma Cloud Threat Detection now leverages machine learning (ML) and advanced threat intelligence to identify bad actors hiding in DNS traffic. MITRE ATT&CK® Alert Prioritization: Enable security teams to prioritize risks and incidents based on the industry's most widely adopted framework. About Palo Alto Networks Palo Alto Networks is the world's cybersecurity leader. We innovate to outpace cyberthreats, so organizations can embrace technology with confidence. We provide next-gen cybersecurity to thousands of customers globally, across all sectors. Our best-in-class cybersecurity platforms and services are backed by industry-leading threat intelligence and strengthened by state-of-the-art automation. Whether deploying our products to enable the Zero Trust Enterprise, responding to a security incident, or partnering to deliver better security outcomes through a world-class partner ecosystem, we're committed to helping ensure each day is safer than the one before. It's what makes us the cybersecurity partner of choice.

Read More

PLATFORM SECURITY

Evo Security Announces the Launch of Evo Partner Identity Cloud for MSPs

Evo Security | June 21, 2022

Evo Security today announced the launch of Evo Partner Identity Cloud or EPIC. Evo Partner Identity Cloud is the first all-in-one identity and access management (IAM) solution designed exclusively with the needs of managed service providers (MSPs) and their business customers in mind. The enterprise-grade cloud platform is a comprehensive identity and access management solution that gives MSPs an easy and highly secure way to protect small and medium-sized businesses and enterprises from the most common types of cybersecurity attacks that frequently exploit login and access vulnerabilities to penetrate network and cloud assets. Evo Partner Identity Cloud includes multi-factor authentication (MFA), single sign-on (SSO), privileged access management (PAM), technician elevated access, secrets management, and unified directory services, among other critical security capabilities. Evo Partner Identity Cloud is the easiest and most complete way for MSPs to simultaneously protect login credentials and apply least-privilege access across applications, networks, and infrastructure for themselves and their customers in a single scalable, multi-tenant solution. "Traditional enterprise identity and access management solutions are built for 1:1 administration, which means they cannot adequately support the MSP and the MSP's customers simultaneously. Point solutions have helped bridge the gap, but don't provide the enterprise-grade security and platform approach required by MSPs seeking to build a sound security practice" said Evo Security's CEO and Founder, Mike Roth. "We built Evo Partner Identity Cloud with a multi-tenant architecture to provide MSPs an enterprise-grade level of security that they can use to protect themselves and all of their SMB and SME customers at scale with purpose-built platform that means business." said Evo's CEO and Founder, Michael Roth. "What's great about Evo Security's Partner Identity Cloud is that it works with our existing MSP managed technology stack to provide comprehensive identity and access management capabilities for us and our customers. It helps keep our internal systems secure, while providing cloudIT with new ways to generate revenue and enforce best security hygiene practices in our customers' networks." Vince Kent, CEO of managed service provider cloudIT The Evo Partner Identity Platform supports MSPs by providing the ability to: Turn identity and access management (IAM) into a highly profitable revenue center that can immediately produce new revenue with industry-leading margins; Replace multiple point solutions, including password vaults, password rotation tools, multi-factor authentication (MFA) tools, and privileged access management (PAM) tools, with a comprehensive identity and access management platform that reduces overhead expenses, provides enterprise-grade protection, and simplifies application and security administration for the MSP and its customers; Deploy login security at scale across customers for web applications, workstations, Macs, servers, VPNs, firewalls, switches, and other network devices; Establish least-privilege and exceed-compliance controls in managed and co-managed scenarios using granular permissions and security groups; Completely eliminate sharing of customer passwords and MFA codes, while simultaneously streamlining technician access across all customer endpoints and apps; Migrate from Microsoft to Evo as the sole Identity Provider (IdP) or build a hybrid IdP scenario based on customer configuration needs; Connect to common MSP tools, such as ConnectWise, Datto, and Microsoft, and improve internal management efficiencies; Gain visibility and real-time security intelligence across customer infrastructure to improve value of services delivery and stop attacks before they start. Evo Security CEO Michael Roth said "Evo Partner Identity Cloud isn't just an all-in-one MSP identity and access management platform. It's an all-in-one MSP business solution." About Evo Security Based in Austin, Texas, Evo Security is an identity and access management cybersecurity company that builds enterprise-grade security products with the MSP in mind. Evo Security's solutions are designed to protect MSPs and their SMB and enterprise customers with comprehensive, multi-tenant security solutions. They are easy to implement and help manage security across managed service providers' internal and external users, while providing MSPs new ways to generate new and highly profitable revenue streams.

Read More

Spotlight

The Higher Education Information Security Council (HEISC), along with EDUCAUSE and Internet2, held its annual Information Security Awareness Video & Poster Contest, an event that allows college students to win prizes, gain experience, and earn recognition by creating a PSA about information security.

Resources