DATA SECURITY

NHC Collaborates with Check Point to Launch a Security Offering

NHC | April 08, 2021

New Horizon Communications Corp. (NHC), THE Communications STACK Provider™ supporting SMB and Enterprise organizations in North America with their VoIP, UCaaS, Contact Center, Collaboration, SD-WAN, Security, Network conglomeration and Managed Services needs, has joined forces with Check Point Software Technologies® (CHKP), settled in Tel Aviv Israel, to dispatch NHC's cloud-first Security Suite.

In 2020, Gartner® named Check Point Software Technologies a pioneer in their Network Firewalls Magic Quadrant. Also, Check Point's capacity to incorporate sufficiently with NHC's SD-WAN assistance, given upstream by VMware, guided NHC to pick Check Point as their new Network Security accomplice. Designated spot's profound item seat will permit NHC to grow security capacities at the client edge while building up an entrance to the arising Secure Access Service Edge (SASE).

"The market scene has been changing so quickly, particularly with a year ago's lockdown and rotate to a dispersed labor force model. We perceived rapidly that our clients require a strong yet adaptable arrangement as it identifies with getting their organization both at the branch level and at their all-inclusive branches, á la their worker homes", said Stephen Gibbs, President and Chief Operation Officer, NHC. "The association we're declaring today permits NHC to jump recklessly into extending our client security balance with a cloud-first arrangement which viably grows our client's edge organization and gets it from dangers both known and obscure. Combined with our Managed Service, STACKGuard, which gives clients perceivability and organization occasion goal, NHC is once more at the front of conglomerating innovation with an emphasis on the client experience."

NHC's underlying business sector offering will be centered around getting the client's organization edge through the arrival of the accompanying two items:

NHC EdgeSecure™ - A little impression virtual security door with cutting edge danger counteraction that can be midway conveyed and overseen in practically no time, making it an ideal security answer for branch workplaces. EdgeSecure works as a Virtual Network Function (VNF) on our Software-characterized WAN (SD-WAN) branch office machines to give extensive danger avoidance security, zero-day assurance, coordinated conveyance, the board and robotization. Clients have full control of safety strategy and information, fulfilling security and guideline prerequisites. EdgeSecure furnishes associations of all sizes with coordinated, progressed danger counteraction, decreasing intricacy and bringing down the complete expense of possession. Dissimilar to different arrangements that just identify dangers, EdgeSecure forestalls dangers with Check Point's SandBlast Zero-Day Protection. Sandblast Zero-Day is a cloud-facilitated sandboxing innovation where records are immediately isolated and investigated, running in a virtual sandbox to find vindictive conduct before it enters your organization. Malware is identified during the adventure stage, even before programmers can apply avoidance procedures endeavoring to sidestep the sandbox. This inventive arrangement joins cloud-facilitated Edge Gateway-level investigation and OS-level sandboxing to keep contamination from the most hazardous adventures and zero-day and focused on assaults. The arrangement likewise incorporates Application Control and URL Filtering to uphold safe web use. IPS, Anti-Bot and Antivirus security from known dangers, and HTTPS assessment shields from dangers attempting to stow away inside encoded HTTPS channels. Advantages include:

• Lightweight VM intended for the WAN edge

• 1GB of memory, 1GB of plate, 1 CPU center

• Mechanized destinations on-boarding

• Cloud the board

• Inbound and outbound traffic assessment

• Keep up protection and consistence

NHC CloudSecure™ - Network security as an assistance, CloudSecure, is a cloud-facilitated network danger counteraction administration offering an upkeep free, thorough, moderate security answer for distant locales and branch workplaces. CloudSecure flawlessly conveys the most recent and most far reaching network safety accessible, shielding branch workplaces from the most recent age of focused and progressed digital dangers. CloudSecure doesn't trouble IT staff with sending or keeping up devoted equipment and supports adding progressed danger avoidance capacities on top of existing switches or SD-WAN organizations. With a straightforward and simple arrangement measure, network traffic from existing SD-WAN edge gadgets are burrowed to an essential cloud-based organization security administration at a close by area. A subsequent association gives repetition. This guarantees branch workplaces stay associated. As an Outbound organization firewall, highlights incorporate Application Control, URL Filtering (SWG), Content Awareness (DLP), IPS, Anti-Bot, Antivirus, SandBlast Threat Emulation (sandboxing) Protocols Inspected All ports, all conventions including SSL/TLS Applications and Websites 110+ classes and granular control of 8,000+ applications Data Types 40+ pre-characterized information types including PCI, PII, HIPAA, source code and that's just the beginning. Advantages include:

• Most recent and consistently forward-thinking security

• Flexible and versatile

• Under 50 milliseconds idleness

• Guarantees 99.999% uptime

• APIs computerize on-boarding new locales

• GRE or IPsec burrows guarantee security


ABOUT NHC

Established in 2002 as an enlisted public utility, NHC conveys a solitary way to all heritage and complex innovations on a solitary receipt, overseen through a solitary agony of glass, and with smoothed out 100% stateside support groups. There's no compelling reason to go elsewhere for any correspondence arrangement. NHC administration contributions include:

• VoIP

• Bound together Communications as a Service (UCaaS)

• Contact Center as a Service (CCaaS)

• Cooperation administrations

• Programming Defined Wide Area Network (SD-WAN)

• Security as-a-Service (SECaaS)

• Programming as-a-Service (SaaS)

• Regular Telephone Service (POTS)

• Fiber | Broadband

• LtE/5G Connectivity

• Equipment as-a-Service (HaaS)

• Overseen Services

NHC tailors every answer for our end client needs through a record the board model spearheaded by our authors. A genome, which remembers for profundity investigation and comprehension of an association's present basic necessities while staying aware of their future development needs. NHC Key Differentiators of NHC include:

• Underlay Network conveyance anyplace in North America

• Cloud-first Overlay administrations conveyed over any organization

• Task Management to scale from administration conveyance to Day-2 help

• Straightforward online gateway for a solitary sheet of glass see

• Administration investigation and point by point revealing of innovation use

• Organization occasion perceivability and control

• NHC is THE Communications STACK Provider™ for current SMB and Enterprise organizations, just as provincial Government Agencies.

Spotlight

As part of our Digital Kids Initiative here at CPYU, we are always looking for good resources that inform and equip parents to lead their kids into a life-time of safe and God-glorifying interaction with technology. Today, we ran across this helpful infographic that you can pass on to parents.


Other News
DATA SECURITY

Dataprise Expands its DRaaS and Data Protection Offerings with Acquisition of Industry Leader Global Data Vault

Dataprise | January 18, 2022

Dataprise, a leading strategic IT managed service provider, today announced the acquisition of Global Data Vault, a leader in Disaster-Recovery-as-a-Service (DRaaS), Backup-as-a-Service (BaaS) and modern data protection solutions. The addition of Global Data Vault creates one of the industry's broadest portfolios of integrated data protection and cybersecurity offerings to solve client's toughest business resilience, risk mitigation and compliance challenges. "Clients turn to Dataprise to be their one strategic IT partner, which requires we bring the broadest portfolio of services powered by the best technology and deepest expertise. Today, the mandate for a holistic cybersecurity and data protection strategy is a top priority for our clients, Global Data Vault is a powerful addition as they bring industry leading cloud-based data protection solutions that bolster our premier cybersecurity portfolio, top-notch employees, a strong Veeam partnership, and relentless focus on client success." Steve Lewis, CEO of Dataprise Founded in 2004, Global Data Vault is a recognized leader in the BaaS and DRaaS industry and holds the distinction of being a Platinum Veeam Cloud & Service Provider. Global Data Vault's mission is to protect organizations' critical data with modern data protection strategies to ensure business continuity and eliminate downtime. Headquartered in Dallas, TX, Global Data Vault protects hundreds of clients across the United States, Canada, and the United Kingdom. "Our clients are facing new challenges driven by dramatic changes in the cybersecurity threat landscape and evolution of IT strategies including cloud adoption," said Anthony Galley, Chairman of Global Data Vault. "Dataprise has an enviable portfolio of cybersecurity, managed IT services, and cloud services that enhance the value of our modern data protection and DRaaS offerings. Together with Dataprise we are perfectly positioned to provide our clients even greater value." "We're excited for the opportunity that joining Dataprise presents for our clients, employees and partners. We now have a much broader set of services, capabilities and resources all aimed at protecting client data and ensuring business continuity," said Will Baccich, CEO of Global Data Vault. This marks Dataprise's second acquisition as the company executes on its strategy to build the broadest managed services portfolio and give clients one strategic IT partner to solve it all. The recent acquisition of Wireless Watchdogs added a comprehensive Mobility Managed Services (MMS) and Mobile Device Management (MDM) portfolio aimed at solving mobile device, Internet of Things (IoT) and endpoint management challenges. About Dataprise Founded in 1995, Dataprise believes that technology should enable our clients to be the absolute best at what they do. This commitment to client success is why Dataprise is recognized as the premier strategic managed service and security partner to strategic CIOs and IT leaders across the United States. Dataprise delivers best-in-class managed cybersecurity, disaster recovery as a service (DRaaS), managed infrastructure and managed end-user services that transform business, enhance user experiences, and eliminate risks.

Read More

DATA SECURITY

HITRUST i1 Assessment control selection leverages security best practices, threat intelligence

HITRUST | December 18, 2021

HITRUST today announced it is addressing the need for a continuously-relevant cybersecurity assessment that aligns and incorporates best practices and leverages the latest threat intelligence to maintain applicability with information security risks and emerging cyber threats, such as ransomware. The design and selection of the controls for the HITRUST Implemented 1-year (i1) Assessment puts it in a new class of information security assessment that is threat-adaptive – designed to maintain relevance over time as threats evolve and new risks emerge, while retiring controls no longer deemed material. Most existing assessment approaches are not designed to keep pace with current and emerging threats; those that do, rely heavily on broad control requirements that raise questions about suitability of control and consistency of review that ultimately impact reliability of results. In contrast, HITRUST identifies information security controls relevant to mitigating known risks and leverages cyber threat intelligence data to influence the selection – and where necessary, updating – of technically-focused HITRUST CSF requirements included in the HITRUST i1 Assessment. As a result, the HITRUST i1 Assessment includes controls selected to address emerging cyber threats active today. “The HITRUST i1 Assessment is unique in both selection of controls and the design of its assurance program. Effort towards completion is comparable to other moderate assurance vehicles while delivering a higher level of reliability,” Jeremy Huval, HITRUST Chief Innovation Officer The HITRUST i1 Assessment is the first information security assessment of its kind with attributes not available through other assurance programs: Designed to maintain relevant control requirements to mitigate existing and emerging threats and provide updates as new threats are identified (It is threat-adaptive, prescriptive, and focused on controls relevant to risk) Designed to sunset controls that have lost relevance and have limited assurance value based on effort required to comply or assess Its unique controls selection and assurance program design deliver a higher level of reliability than other moderate assurance options The level of time and effort to complete is comparable to other moderate assurance options in the market Offers a forward-looking, 1-year certification As the HITRUST i1 was designed around relevant information security risks and emerging cyber threats, it is not surprising it provides coverage for numerous standards, such as NIST 800-171, GLBA Safeguards Rule, HIPAA Security Rule, and Health Industry Cybersecurity Practices (HICP). HITRUST will evaluate security controls and review threat intelligence data no less than quarterly, and for each subsequent major and minor release of the HITRUST CSF, to ensure the HITRUST i1 Assessment requirement selection remains relevant over time. Guidance documents will also drive enhancements to the HITRUST CSF and HITRUST i1 Assessment control sets as needed. While the HITRUST i1 Assessment is intended to adapt and evolve to maintain relevance, it’s important to note that HITRUST i1 Assessment certified organizations will not be impacted by changes to the HITRUST i1 Assessment control requirements until their next HITRUST assessment cycle. HITRUST is hosting a webinar at 11 a.m. CT on Thursday, February 3, 2022, to discuss the HITRUST Implemented 1-year (i1) Assessment in more detail. To register, and for more information, click here: Next Generation HITRUST Information Security Assessment Focuses on Continuous Cyber Relevance About HITRUST Since it was founded in 2007, HITRUST has championed programs that safeguard sensitive information and manage information risk for organizations across all industries and throughout the third-party supply chain. In collaboration with privacy, information security, and risk management leaders from the public and private sectors, HITRUST develops, maintains, and provides broad access to its widely adopted common risk and compliance management frameworks as well as related assessment and assurance methodologies.

Read More

ENTERPRISE SECURITY

M.C. Dean launches Enterprise Security SaaS

M.C. Dean | March 25, 2022

M.C. Dean, a leader in cyber-physical solutions and systems integrator for enterprise-class security systems, today announced the launch of its Enterprise Security software as a service (SaaS) on AWS commercial and GovCloud. "Our Enterprise Security SaaS offering provides integrated access control, intrusion detection, and video surveillance managed services with the ease, flexibility, and resiliency of the cloud." Eric Dean, M.C. Dean chief technology officer M.C. Dean's fully managed Enterprise Security SaaS runs on high availability AWS Cloud with leading commercial-off-the-shelf security systems combined with 24x7x365 service monitoring and customer support. The service supports web-based and client software access with enterprise-level system integrations such as single sign-on and standard or custom options. Flexible & Resilient: Benefit from cloud-enabled system self-restoration and managed database capabilities. Automated deployments can build and rebuild systems within seconds. Active directory integrations provide secure, seamless access. Take advantage of centralized support for low-cost, high-performance nationwide installation and maintenance. Highly Secure: Enterprise Security SaaS is designed to meet FedRAMP, FICAM, and other industry requirements. Keep application data separate and secure while accelerating cybersecurity authorizations for commercial and government clients. Time & Cost Effective: Replace costly CapEx with utility-based pricing and immediate availability. Streamline setup costs and timelines, while reducing the price per site and device. About M.C. Dean M.C. Dean is Building Intelligence®. We design, build, operate, and maintain cyber-physical solutions for the nation's most recognizable mission-critical facilities, secure environments, complex infrastructure, and global enterprises. The company's capabilities include electrical, electronic security, telecommunications, life safety, automation and controls, audio visual, and IT systems. M.C. Dean is headquartered in Tysons, Virginia and employs more than 5,100 professionals who engineer and deploy automated, secure, and resilient power and technology systems; and deliver the management platforms essential for long-term system sustainability.

Read More

DATA SECURITY

Atakama and BigID Announce Strategic Alliance for Discovering and Protecting Sensitive Data

Atakama | February 16, 2022

Atakama, the leading encryption company, has partnered with BigID, the leading data intelligence platform, to provide organizations with an integrated, automated approach to discovering and protecting sensitive and critical data. The integration of Atakama's file encryption solution with BigID's data discovery and classification ensures that organizations can automate well-defined policies to discover, classify, and protect their data. Together, BigID and Atakama make it easy for customers to accelerate governance, reduce risk, protect their sensitive data with advanced encryption, and achieve continuous data compliance. BigID enables customers to automatically discover, catalog, and classify all types of data and metadata, structured and unstructured. This includes PII, PHI, NPI, IP, and other sensitive, critical, and regulated data. Once the data has been identified, BigID can label and tag data in accordance with the organization's policies. Atakama can read the labels and immediately encrypt files in whichever location the files are stored. The integration of BigID and Atakama provides a powerful and scalable approach to sensitive data discovery and protection across the entire enterprise. "BigID together with Atakama provides our customers with a seamless, but multi-faceted approach to data security,This partnership takes data protection to another level and will immediately strengthen an organization's security posture through unmatched visibility and control. We're thrilled to have Atakama be an integral technology partner via the BigID App Marketplace as we continue helping organizations meet their data management and security objectives." Marc DeGaetano, CRO at BigID "Partnering with BigID is a natural fit given their industry-leading capabilities across discovery and classification," said Scott Glazer, CRO at Atakama. "The ability to discover and protect sensitive data is the cornerstone of a successful cybersecurity program. We're thrilled to be able to work with BigID to deliver the combined solution to our customers via the BigID App Marketplace, who can trust that their data has been properly identified and securely protected." About BigID BigID's data intelligence platform enables organizations to know their enterprise data and take action for privacy, protection, and perspective. Customers deploy BigID to proactively discover, manage, protect, and get more value from their regulated, sensitive, and personal data across their data landscape. BigID has been recognized for its data intelligence innovation as a 2019 World Economic Forum Technology Pioneer, named to the 2021 Forbes Cloud 100, the 2021 Inc 5000 as the #19th fastest growing company and #1 in Security, a Business Insider 2020 AI Startup to Watch, and an RSA Innovation Sandbox winner. Find out more at https://bigid.com. About Atakama Atakama is a distributed key management solution that enables granular, file-level encryption without the need for passwords, identity and access controls, centralized servers, or HSMs. Attackers are prevented from accessing any data encrypted by Atakama even when the network or systems are breached. Atakama's distributed architecture has no single point of attack or failure, a security breakthrough that vastly exceeds the status quo for information security. By using Atakama, organizations can prevent file exfiltration, enhance regulatory compliance, secure sensitive information, and enable the cornerstone of a full-fledged zero trust infrastructure.

Read More

Spotlight

As part of our Digital Kids Initiative here at CPYU, we are always looking for good resources that inform and equip parents to lead their kids into a life-time of safe and God-glorifying interaction with technology. Today, we ran across this helpful infographic that you can pass on to parents.

Resources