DATA SECURITY

NETSCOUT Omnis Cyber Intelligence Integrates with AWS Security Hub

NETSCOUT | November 11, 2021

NETSCOUT SYSTEMS, INC. a leading provider of cybersecurity, service assurance, and business analytics solutions, today announced that Amazon Web Services, Inc. (AWS) customers will now have added visibility and security when migrating workloads to AWS using NETSCOUT's Omnis® Cyber Intelligence (OCI) integration with AWS Security Hub.

NETSCOUT OCI is the industry's fastest and most scalable network security software solution, built on the foundation of the industry's most prominent network monitoring and packet recording and analysis technology. It uniquely detects and investigates suspicious activities in real-time and retrospectively, identifies threats early in the attack life cycle to prevent infections from spreading, stops future attacks, and identifies compromised assets.

As a cloud security posture management service, AWS Security Hub performs automated, continuous security best practice checks against AWS resources, aggregates alerts, and enables automated remediation.

The integration between NETSCOUT OCI and AWS Security Hub enhances the corporate security posture by extending the breadth and depth of cyberthreat visibility and intelligence. The integration is seamless since NETSCOUT OCI automatically formats violations in the Amazon Security Findings Format (ASFF) with built-in intelligence to suppress duplicate alerts and group them as needed. NETSCOUT OCI, through its integration with AWS Security Hub, helps detect, investigate, and respond to potentially malicious activity exposing risks that exist in hybrid cloud interdependencies.

"As organizations migrate workloads to the cloud, their infrastructure becomes increasingly complex, making end-through-end visibility a necessity to uncover increased attack surfaces and combat threat exposure,As an AWS Validated Technology and Public Sector Partner with Network and Migration competencies, we've been in lock-step development with AWS. We're excited that customers can realize the benefits of NETSCOUT OCI, which is now fully integrated onto AWS Security Hub."

Russ Currie, vice president, enterprise strategy, NETSCOUT

About NETSCOUT
NETSCOUT SYSTEMS, INC. helps assure digital business services against security, availability, and performance disruptions. Our market and technology leadership stems from combining our patented smart data technology with smart analytics. We provide real-time, pervasive visibility and insights customers need to accelerate and secure their digital transformation. Omnis Cyber Intelligence delivers the fastest and most scalable network security solution available on the market. NETSCOUT nGenius service assurance solutions provide real-time, contextual analysis of service, network, and application performance. And Arbor® Smart DDoS Protection by NETSCOUT products help protect against attacks that threaten availability and advanced threats that infiltrate networks to steal critical business assets. To learn more about improving service, network, and application performance in physical or virtual data centers or in the cloud, and how NETSCOUT's security and performance solutions can help you move forward with confidence.

Spotlight

It is the Chief Information Security Officer’s (CISO) responsibility to identify the gaps between the most significant security threats and vulnerabilities, compared with the organization's current state. The CISO should develop an information security strategy that aligns with the strategic goals of the organization and sells the gap mitigation strategy to executive management and the board of directors. Before embarking on this new adventure, clearly articulate what success looks like to your organization. What is the result you are driving to accomplish? Then develop a strategy to get you there. Take a play directly from the Sales organization’s playbook – Know yourself; know your customer; and know the benefits from your customer’s perspective. Following this simple strategy will help the CISO close the deal of selling your Information Security Strategy.


Other News
DATA SECURITY

Noetic Cyber Partners with SentinelOne to address growing cybersecurity asset management challenges

Noetic Cyber | February 03, 2022

Noetic Cyber, a cloud-based continuous cyber asset management and controls platform, today announced a partnership with autonomous cybersecurity platform company SentinelOne (NYSE:S). This partnership delivers an end-to-end cybersecurity asset management solution that leverages SentinelOne's endpoint and cloud workload telemetry, combined and correlated with information from other information sources, to generate a high-fidelity, continuously updated, multidimensional map of all assets and their cyber relationships. The current fragmentation of IT management, DevOps and security tools makes it difficult for security teams to see all the assets in the business and to understand the relationships between them. In fact, 71% of global IT leaders admit to finding new endpoints in their environment on a weekly basis. Endpoint and cloud workload telemetry is a vital part of this information, providing high-fidelity, relevant insights into threats and cyber assets. The integration of SentinelOne Singularity XDR and the Noetic platform enables teams to extend the visibility, detection and endpoint insights of SentinelOne into a wider asset inventory and management architecture, maximizing their value. "We are very excited to be partnering with Noetic Cyber on this integrated solution," said Chuck Fontana, SVP of Business Development, SentinelOne. "There is a significant security challenge in not understanding the cyber risk of all assets in your environment. Together with Noetic, we're able to close that gap and ensure a hygienic cybersecurity environment for organizations across industries." The SentinelOne Connector for Noetic is an API-based integration. Joint customers install the SentinelOne Connector into the Noetic platform and provide it with API credentials to establish a bi-directional integration between the two platforms. The Noetic platform periodically polls SentinelOne, looking for information indicating new, updated or removed endpoints. This information is ingested, aggregated and correlated with information from other data sources, presented to security teams via innovative graph database technology. Pre-packaged queries and dashboards help analysts to uncover coverage and compliance gaps and hidden risks. The Noetic platform also includes a comprehensive automation workflow engine, which allows security teams to pre-determine corrective action, such as deploying the SentinelOne agent to unprotected machines, triggering a scan or disconnecting a machine from the network. "Through this innovative partnership with SentinelOne, we are able to jointly address security coverage gaps and automatically correct misconfigured endpoints that could otherwise leave organizations vulnerable,Leveraging the high-fidelity data provided by SentinelOne, Noetic provides unparalleled insights into your cyber assets, identifies security risks and uses automation to continuously close them." Paul Ayers, CEO of Noetic About SentinelOne SentinelOne's cybersecurity solution encompasses AI-powered prevention, detection, response and hunting across endpoints, containers, cloud workloads, and IoT devices in a single autonomous platform. About Noetic Cyber Noetic Cyber enables security teams to make faster, more accurate decisions to detect coverage gaps and reduce cyber risk. The Noetic solution is a cloud-based Continuous Cyber Asset Management & Controls Platform that provides teams with unified visibility of all assets across their cloud and on-premises systems, and delivers continuous, automated remediation to close coverage gaps and enforce security policy. Noetic improves security tools and control efficacy by breaking down existing siloes and improving the entire security ecosystem. Founded in 2019, Noetic is based in Boston and London.

Read More

SOFTWARE SECURITY

Sysdig Open Source Is Extended to Secure Cloud Services

Sysdig | May 16, 2022

Sysdig, the unified container and cloud security leader, announced that Sysdig open source, the incident response standard for containers, has been extended to the cloud. Using system calls, Sysdig open source (Sysdig OSS) traditionally offers deep observability into running applications, as well as file system access and network activity, which speeds incident response and troubleshooting. Teams can quickly filter information from Sysdig OSS and take action. With the announcement of this new integration, these capabilities have been extended beyond containers to any cloud environment. Today, Sysdig announced Edd Wilder-James has joined Sysdig from Google to lead the company’s open source ecosystem team. The complexity of cloud-native applications – with countless components and variables – makes it extremely difficult for security analysts and system administrators to quickly triage alerts and debug problems. Sysdig OSS captures process, file system, and network activity in real time and with a high degree of granularity. The tool, which has nearly two million downloads and 6,850 GitHub stars, surfaces everything from executed commands and file system activity to network activity. Sysdig OSS then offers advanced filtering and troubleshooting capabilities, supporting root cause analysis for security and performance issues.Using a new plugin framework – originally developed by the open source community for the CNCF project Falco – Sysdig extends the number of sources Sysdig OSS can be connected with to anything that generates logs or events, including Azure, Google, and AWS CloudTrail logs. Going forward, every plugin developed for Falco can also be leveraged by Sysdig OSS. Using one tool, like Sysdig OSS, to observe events from the entire cloud-native environment streamlines investigations. Using a different tool for each environment adds complexity, which makes it massively harder to troubleshoot. Sysdig’s Commitment to Open Source Sysdig was founded as an open source company and Sysdig Secure and Sysdig Monitor were both built on an open source foundation to address the security challenges of modern cloud applications. Both projects were created by Sysdig to leverage deep visibility as a foundation for security, and they have become standards for container and cloud threat detection and incident response. Falco, which was contributed to the CNCF in 2018, is now an incubation-level hosted project with more than 45 million downloads. Sysdig OSS and Falco can be used together as a powerful open source solution to reduce risk at runtime. Sysdig OSS acts as a flight recorder, capturing a detailed record for inspection. Falco acts as a security camera, continuously detecting unexpected behavior, configuration changes, intrusions, and data theft in real time. Teams can use Sysdig OSS and Falco together to detect and respond to threats. “If you want to see what is going on inside an application, Sysdig OSS gives you that record. “Sysdig open source was the inspiration for Falco. While Falco will monitor and alert based on your policies, Sysdig open source will tell you what happened at a particular time, before and after the event. Having the ability to use both open source tools in the cloud is extremely powerful.” Loris Degioanni, Founder and CTO of Sysdig About Sysdig Sysdig is driving the standard for cloud and container security. The company pioneered cloud-native runtime threat detection and response by creating Falco and Sysdig as open source standards and key building blocks of the Sysdig platform. With the platform, teams can find and prioritize software vulnerabilities, detect and respond to threats, and manage cloud configurations, permissions and compliance. From containers and Kubernetes to cloud services, teams get a single view of risk from source to run, with no blind spots, no guesswork, no black boxes. The largest and most innovative companies around the world rely on Sysdig.

Read More

PLATFORM SECURITY

Palo Alto Networks Achieves FedRAMP Authorization for IoT Security Solution

Palo Alto Networks | April 22, 2022

Palo Alto Networks , the global cybersecurity leader, today announced that its IoT Security solution has achieved Federal Risk and Authorization Management Program (FedRAMP) Moderate Authorization. The company's sponsoring agency is the United States Department of Veterans Affairs (VA). U.S. federal agencies are increasingly focused on adopting a Zero Trust architecture to ensure their IoT devices meet federal security compliance requirements. With this authorization, Palo Alto Networks IoT Security can help federal agencies protect their unmanaged IoT devices with ML-powered visibility, threat prevention and Zero Trust enforcement with a single platform. "As cyberattacks become more frequent and sophisticated, the IoT Security solution helps automate Zero Trust security with quick, accurate discovery and best-in-class protection. We are committed to protecting the U.S. government and its federal agencies from all security threats with reliable solutions." Dana Barnes, senior vice president of Public Sector, Palo Alto Networks Digital transformation across all industries is driving massive growth in the use of IoT devices. Palo Alto Networks Unit 42 IoT Threat Report found that 30% of all devices on enterprise networks fall in the IoT category. Unfortunately, IoT devices and their inherent vulnerabilities are often overlooked, which can lead to enterprise-wide exposure to unseen cyber risk. Federal officials have adopted several provisions in recent years to increase overall protection and awareness of IoT device security vulnerabilities, including the Internet of Things Cybersecurity Improvement Act and the National Institute of Standards and Technology's (NIST) IoT Device Cybersecurity Guidance for the Federal Government. The IoT Security solution's Moderate Authorization extends the offerings Palo Alto Networks provides its U.S. government customers. This authorization adds to the portfolio of other authorized products already being deployed today. The IoT Security solution helps U.S. agencies leverage their current Palo Alto Networks Next-Generation Firewalls (NGFWs) to secure all unmanaged IoT devices at scale. Some of the key benefits for government agencies include: Quick and accurate discovery and insights into all devices, even those never seen before Best-in-class protection with behavior analysis to detect risk, compliance, and anomalous activity, and prevention of known and unknown threats Automated Zero Trust security with automated discovery, least-privileged access policies, and 1-click enforcement Workflow automation across existing IT and security solutions and simplified agentless and sensorless deployment About Palo Alto Networks Palo Alto Networks, the global cybersecurity leader, is shaping the cloud-centric future with technology that is transforming the way people and organizations operate. Our mission is to be the cybersecurity partner of choice, protecting our digital way of life. We help address the world's greatest security challenges with continuous innovation that seizes the latest breakthroughs in artificial intelligence, analytics, automation, and orchestration. By delivering an integrated platform and empowering a growing ecosystem of partners, we are at the forefront of protecting tens of thousands of organizations across clouds, networks, and mobile devices. Our vision is a world where each day is safer and more secure than the one before.

Read More

DATA SECURITY

Years of Growth Lead to Covail Acquisition by Cybersecurity Firm GoSecure

Covail | December 23, 2021

Covail, a Columbus-based cybersecurity and digital optimization firm founded by Central Ohio’s largest companies, is being acquired by a leading Managed Detection and Response firm. Covail announced today that it has agreed to be acquired by cybersecurity and managed detection and response (MDR) services provider GoSecure. The transaction is estimated to close in December 2021. Terms of the acquisition were not disclosed. “Since our founding six years ago as the Columbus Collaboratory, our goal has been to find ways to leverage collaboration to deliver successful AI, cybersecurity and cloud-based software solutions to our Fortune 500 clients,With this acquisition by GoSecure, our clients will now have access to an even broader set of capabilities and expertise thanks to our ability to leverage GoSecure’s class-leading capabilities and solutions. This will also help to further accelerate market penetration for our leading-edge security products and AI capabilities.” Covail CEO Matt Wald Covail, as Columbus Collaboratory, was born out of the aspiration of seven of the largest companies in central Ohio – American Electric Power (AEP), Battelle, Cardinal Health, Huntington Bank, L Brands (now Bath & Body Works), Nationwide, and OhioHealth – in partnership with One Columbus. The goal of the endeavor was to solve common automation, AI, and cybersecurity challenges across multiple industries. “The diversity and maturity of these founding companies made Covail the innovative, value-driven, solutions partner that it is today”, said Michael Krouse, SVP of Strategy and Transformation at Ohio Health and Chairman of the Covail Board. “Covail accelerated the cybersecurity and AI capabilities of the founding companies, upskilled critical tech talent for the region, and built a high-growth company that contributed to our region’s economic growth engine. It’s exciting to be able to leverage this strategic relationship to secure Columbus as the Midwest’s premier cybersecurity hub.” Through its ecosystem of collaborators and commercial partners, Covail’s technology teams executed over 1,000 engagements and collaboration sessions that solved complex business challenges using machine learning and the latest cyber defense practices. The firm’s work attracted top technology talent to the region, Wald said, and led to the development of software products that enabled advanced cyber threat detection and continuous risk management. GoSecure is a recognized cybersecurity leader and innovator. The company is the first and only to integrate endpoint, network and email threat detection into a single Managed Detection and Response (MDR) service. GoSecure plans to leverage Covail’s talent, proprietary technology, and client relationships to build a regional presence in Central Ohio that will help accelerate its momentum in the US market. GoSecure’s access to technology talent and partnerships made Columbus an attractive, economically viable location for a cybersecurity hub, Wald said. Wald said partnership with the original companies in the Covail firm will continue, along with an expansion to additional businesses with the goal of making Central Ohio a major U.S. cybersecurity operations center. About Covail Covail™ is a trusted solutions partner, enabling organizations to optimize through Intelligent Operations solutions that lower total risk and cost for key business functions, equipping them to transform from a position of strength. Since 2015, Covail’s experts in Cybersecurity, Artificial Intelligence (AI), and Automation have been delivering business results for leading Fortune 500 companies across industries. Trustworthy, Intelligent Operations. Accelerated. Learn more at covail.com. About GoSecure GoSecure is a recognized cybersecurity leader and innovator, pioneering the integration of endpoint, network, and email threat detection into a single Managed Detection and Response service. The GoSecure TitanTM platform delivers predictive multi-vector detection, prevention, and response to counter modern cyber threats. Titan MDR offers a detection to mitigation speed of less than 15 minutes, delivering rapid response and active mitigation services that directly touch the customers’ network and endpoints. For over 10 years, GoSecure has been helping customers better understand their security gaps and improve their organizational risk and security maturity through MDR and Advisory Services solutions delivered by one of the most trusted, skilled and experienced teams in the industry.

Read More

Spotlight

It is the Chief Information Security Officer’s (CISO) responsibility to identify the gaps between the most significant security threats and vulnerabilities, compared with the organization's current state. The CISO should develop an information security strategy that aligns with the strategic goals of the organization and sells the gap mitigation strategy to executive management and the board of directors. Before embarking on this new adventure, clearly articulate what success looks like to your organization. What is the result you are driving to accomplish? Then develop a strategy to get you there. Take a play directly from the Sales organization’s playbook – Know yourself; know your customer; and know the benefits from your customer’s perspective. Following this simple strategy will help the CISO close the deal of selling your Information Security Strategy.

Resources