DATA SECURITY

Owl Cyber Defense improves advanced network security capabilities with Trident Assured Collaboration Systems Acquisition

prnewswire | January 05, 2021

Owl Cyber Defense Solutions, LLC ("Owl"), a worldwide market pioneer in online protection arrangements and administrations for safeguarding network limits and empowering secure information sharing across areas, reported today the obtaining of the Trident Assured Collaboration Systems ("ACS") product offering. ACS has the solitary U.S. government-affirmed Voice over IP ("VoIP") and Video Teleconference ("VTC") Cross Domain Solution ("CDS") just as the business' most exceptional Full Motion Video ("FMV") sifting ability – usefulness basic to CDS activities in a time of robots and cameras. The obtaining gives Owl a more extensive scope of guaranteed network border guard arrangements than any rival on the lookout.

Owl, upheld by private speculation firm DC Capital Partners, has been a main supplier of CDS to the U.S. Branch of Defense ("DoD") and Intelligence Community for over 20 years. Owl is likewise the worldwide pioneer in network safety assurance for basic framework, offering the solitary U.S. government tried and certify CDS accessible for organization inside and outside the U.S to both government and business customers.

Owl's Cross Domain Solutions offer the most elevated level of organization edge security, far surpassing the capacities of firewalls and other ordinary organization protections. Owl's items are the decision for ensuring the country's most delicate organizations and frameworks against assault. Ongoing episodes have exhibited the failure of inheritance firewalls to forestall cyberattacks against basic business and working frameworks and cloud-based applications. The blend of Owl and ACS's innovation offers a full continuum of CDS items that give equipment upheld space partition and layers of information separating confirmation instead of a solitary organization line checkpoint with insignificant substance sifting.

Arrangements like firewalls that worked 25 years back as an organization insurance approach are not, at this point compelling against country state quality assaults. As country state assaults increment, the methodologies utilized by state entertainers start to saturate the criminal side of cyberattacks. Powerful network safety presently requires a coordinated, multi-layered framework with information diode equipment parts in gatekeepers which perform escalated information assessment and confirmation. The up and coming age of insurance, coming out now and based on a mix of Owl and ACS innovation, installs CDS usefulness in incredibly low-inactivity, unmodifiable equipment.

Thomas J. Campbell, Chairman of Owl and Founder and Managing Partner of DC Capital, said, "This is another step in executing our strategic vision.  The acquisition of ACS not only places Owl ahead of other Cross Domain Solution providers, but it also plays a pivotal role in our larger strategy to offer true cybersecurity protection. The future requires solutions that are cost effective and easy to implement, use, and maintain." 

"The explosion of the Internet of Things ("IoT") demands cyber-secure devices, from those that control our critical infrastructure, to our homes and cars," said Campbell. "The technology Owl pioneered 20 years ago is now available in form factors small enough to be embedded inside devices.  Owl has always been an early mover, the first to develop hardware-enforced network protection and now the first to offer a hardware-enforced CDS that can be embedded."

"Owl has been rapidly moving towards this number one position for the last couple of years," commented Robert Stalick, President and CEO of Owl. "With the addition of ACS, the last piece has fallen into place. Owl is now the clear leader in accredited Cross Domain Solution offerings, with the widest range of capabilities and products – solving problems from tactical to enterprise in data, voice, and video; for government, critical infrastructure and commercial enterprises."

Jerry B. Chernock, Partner at DC Capital, added, "Clearly we need to address the deficiency of firewalls. There is a motivation behind why our customers demand Cross Domain Solutions and not exclusively on firewalls. Late assaults, including a security break at an unmistakable U.S. based network protection firm and a few U.S. Government organizations, have accentuated the requirement for knowledge, military, basic framework and corporate customers to rapidly develop how they secure their organizations."

"The sophistication of these technologies cannot be overstated," said Ken Walker, Chief Technology Officer at Owl. "The U.S. Government continues to set the standards for the most rigorous operational requirements and testing regimes globally, setting expectations that very few companies can meet. Owl is one of a handful of elite companies that satisfies the government-established 'Raise the Bar' requirements."

About Owl Cyber Defense Solutions

Owl has been serving the cybersecurity needs of the U.S. government since inception – providing hardware-enforced cybersecurity controls, industry leading expertise in operating system hardening, extensive device and network-based assessment services and thought-leadership in filtering/data processing disciplines. Owl Cross Domain Solutions are operating broadly in missions across both the DoD and the U.S. intelligence agencies. Globally Owl is the leader in perimeter protection for nuclear power plants, oil and gas operations, renewables and power generation and transmission, with aggressive growth occurring in the data center and cloud provider sectors. Owl continues to innovate and is bringing to market the world's first embeddable cybersecurity to serve the Internet of Things ("IoT").

Spotlight

Now that many organizations are on board with the basics of business mobility, users are hungry for more. Companies everywhere are turning to mobile business apps to empower employees on the go and kickstart productivity. But as these organizations move beyond Mobile Device Management (MDM), IT must ensure that the chosen apps can secure corporate data while enabling efficiency. Here are 10 things to consider as you move forward with mobile business apps.


Other News
ENTERPRISE SECURITY

iTecs Enters Into A Partnership With Check Point

iTecs | December 20, 2021

iTecs, a Dallas based IT MSP, Cybersecurity, and Cloud Hosting Provider (https://itecsonline.com) enters into a partnership with Check Point, a leader in enterprise and SMB cybersecurity products and solutions, to provide iTecs clients with efficacious cybersecurity protection. The collaboration between the two parties enables iTecs to deliver the various services and products to clients as a managed service. "The traditional 'perimeter-based' security model is not aging well in this new landscape, and binary access tools are proving to be cumbersome and unscalable. Fixed perimeters no longer govern working environments. Instead, users work on their own devices and sensitive company data stored in third-party cloud services. As a result, companies can no longer rely on binary security models that focus on letting good guys in and keeping bad guys out. The challenge for modern enterprises is how to give users the required access while reducing set-up and maintenance costs without compromising security. Check Point's Zero Trust Network Access model provides the tools to safeguard companies in today's ever-growing work-from-home demand. Especially with the growing popularity and development of 'METAVERSE' work environments, it's essential to adopt new and intelligent ways of protecting your users," says Brian Desmot, CEO & Founder of iTecs. Currently in partnerships with Sophos, SentinelOne, Cisco, CoSoSys, and now Check Point, iTecs' Managed Security Services (MSS) division provides SMB and Enterprises with an array of sophisticated and synergistic threat-preventing solutions. "Our propensity of testing cybersecurity solutions has led us to the conclusion that Check Point is the right partner to provide our clients with maximum ROI. As a result, we are redesigning our website and will include new pages devoted to the broad menu of services our alliance with Check Point is providing," Brian Desmot iTecs is going through a rebranding campaign with the launch of a new logo and website which will be completed by early 2022. About iTecs IT Outsourcing and Support Brian Desmot founded iTecs in 2002, a white-glove IT support, consulting, managed IT services provider. The firm delivers an umbrella of IT services from break-fix, consulting, cybersecurity, to procurement for businesses of all sizes. If you need a professional, customer-centric offsite IT department, iTecs is the best choice.

Read More

SOFTWARE SECURITY

ZeroEyes Announces Partnership with Veteran-Owned Cybersecurity Firm Layer 8 Security

Layer 8 Security | February 02, 2022

ZeroEyes, Inc., creators of the only AI-based video analytics platform focused solely on gun detection, is proud to announce its partnership with Philadelphia-based company, Layer 8 Security. Layer 8 Security is a cybersecurity consulting and technical services firm that arms organizations with practical security, compliance, and privacy strategies. Starting in 2022, Layer 8 Security will assist ZeroEyes with the company's information security certifications. Both companies are veteran-founded, owned, and operated, and are part of the Veterans Business Referral Network with over 200 members in the Greater Philadelphia area. In addition to the local connections, both companies are well-known on the national stage for being leaders in their respective disciplines. "I've known members of the ZeroEyes team for years,ZeroEyes' focus on gun detection and physical security complements our focus on being the 'sheepdogs,' protecting people in any way we can. In our case our focus is on data privacy and protecting businesses from hackers. I'm excited to leverage our shared goals as veterans helping veterans." Kevin Hyde, President and Co-Founder at Layer 8 Security "Layer 8 Security and ZeroEyes are both focused on security and building veteran-owned businesses," adds ZeroEyes' Chief of Staff, Kieran Carroll. "We're excited to support Layer 8 Security in their mission and appreciate their services in securing our own business." About ZeroEyes ZeroEyes is the industry's leading AI-based weapons detection solution. Our software integrates into existing security camera systems and sends out a series of alerts when a verified gun is detected via our best-in-class weapons detection algorithms. Founded by a team of Navy SEALs and military veterans with over 50 years of military experience with deep special operations and intelligence community expertise, ZeroEyes is the trusted weapons detection provider of numerous clients, including the US Department of Defense, leading public K-12 school districts, commercial property groups, Fortune 1000 corporate campuses, shopping malls, and big-box retail. About Layer 8 Security Layer 8 Security is a cybersecurity consulting, advisory, and technical services firm that arms organizations with practical security, compliance, and privacy strategies. Today's business environment requires seamless integration with third-party vendors, clients, and partners. Layer 8 Security ensures your information ecosystem is secure, compliant, and resilient to the severity and frequency of a disruption resulting from a cyber attack.

Read More

SOFTWARE SECURITY

Thrive Integrates SOAR Technology into their Security Operations to Enhance Real-Time Cyber Threat Detection

Thrive | May 20, 2022

Thrive, one of the leading Managed Security Services Providers (MSSPs) in the world, has made a significant investment to upgrade their 24x7x365 eyes-on-glass Security Operation Center (SOC) by integrating a Security Orchestration, Automation, and Response (SOAR) engine. The SOAR capabilities will enable the Thrive global security team to better navigate today's complex, risk-laden environment for clients via tool aggregation and coordinated response, unified operations, reduced alert fatigue, and Artificial Intelligence (AI). This will result in a significant reduction of incident response times for client threats and provide higher quality information for the Thrive SOC to combat intricate cyber risks in real time. By 2025, the amount lost to cyber theft is expected to reach $10.5 trillion annually, which is the single greatest transfer of wealth in history, according to a report from AT&T. These glaring statistics indicate why cybersecurity has become imperative in the world of commerce. "Cybersecurity threats and vulnerabilities are constantly multiplying, due to not only more sophisticated social engineering but also a rise in micro-ransomware incidents, That means vigilance against attacks of all kinds must also evolve. Incorporating a SOAR into our robust global security operations unit will allow Thrive clients to have a stronger defense system in place against cybersecurity attacks and enable our team to respond more expeditiously to any issues should they arise." Mike Gray, CTO of Thrive Thrive's integrated managed cybersecurity solutions provide a proactive and expert approach to security management for identifying and remediating security issues. Powered by next-gen technology, proven frameworks and service-driven experts, Thrive's unified cybersecurity platform enables Thrive's 24x7x365 SOC to automatically address critical security issues without client intervention. By creating a stress-free experience that solves for the technical complexity and talent shortage mid-market enterprises face, Thrive's cybersecurity solutions fortify the digital transformation initiatives that propel business growth. About Thrive Thrive is a leading provider of NextGen managed services designed to drive business outcomes through application enablement and optimization. The company's Thrive5 Methodology utilizes a unique combination of its Application Performance Platform and strategic services to ensure each business application achieves peak performance, scale, uptime, and the highest level of security.

Read More

SOFTWARE SECURITY

ReliaQuest Expands GreyMatter Platform with support for Risk Scenarios and MITRE ATT&CK v10

ReliaQuest | February 18, 2022

ReliaQuest, the leader in Open XDR-as-a-Service, today announced the expansion of its GreyMatter platform with support for MITRE ATT&CK v10 and Risk Scenarios that visually maps and measures a security program’s detection coverage in terms of threats and cyber risks. This new feature enables security leaders to close the communications gap with business leaders while demonstrating how well their security program mitigates cyber risks of most concern to the enterprise. Many leaders are challenged with measuring the progress of their security program and the impact of their security investments. According to a recent Ponemon Institute Research report, 64% of security leaders say a lack of standardized security metrics to measure progress is the primary obstacle to implementing an IT security risk management program. What’s more, 58% say that the lack of a well-defined security and risk management program is what makes their organization most vulnerable to cyberattacks. With the ability to map coverage against Risk Scenarios, GreyMatter enables security leaders to have a real-time view into how they are performing against individual threats or cyber risks they are most concerned about. They can pinpoint any gaps in coverage and make informed decisions on how best to proceed with investments and actions to close these gaps. Breakdowns by cyber risk categories and subcategories within them help security leaders focus on areas of concern at a granular level. “Too often, leaders rely on technical metrics that lack a holistic view of how security tools are operating together, leaving them at a loss when it comes to communicating cyber risks to the business, What’s more, translating the effectiveness of security tools in a language that leadership understands poses even more of a challenge. Now, with Risk Scenarios, security leaders have a more comprehensive view into how much coverage they have across cyber risk areas that concern them the most. This will help them make informed decisions on how best to approach these issues and communicate them effectively to leadership.” Brian Foster, Chief Product Officer at ReliaQuest Additionally, ReliaQuest announced an upgrade of its support for the latest MITRE ATT&CK framework version 10. By upgrading to support v10 of the framework, GreyMatter users are better able to visualize and measure detection coverage aligned to the latest techniques. In line with keeping with improving efficiencies for security operators, GreyMatter delivers enhancements to reduce tool hopping by automating collection of various contextual information, aiding in faster investigations and further streamlining the security operations workflow. About ReliaQuest ReliaQuest, the leader in Open XDR-as-a-Service, is the force multiplier for security operations teams. ReliaQuest GreyMatter is a cloud-native Open XDR platform that brings together telemetry from any security and business solution, whether on-premises, or in one or multiple clouds, to unify detection, investigation, response and resilience. ReliaQuest combines the power of technology and 24/7/365 security expertise to give organizations the visibility and coverage they require to make cybersecurity programs more effective.

Read More

Spotlight

Now that many organizations are on board with the basics of business mobility, users are hungry for more. Companies everywhere are turning to mobile business apps to empower employees on the go and kickstart productivity. But as these organizations move beyond Mobile Device Management (MDM), IT must ensure that the chosen apps can secure corporate data while enabling efficiency. Here are 10 things to consider as you move forward with mobile business apps.

Resources