SOFTWARE SECURITY

Perimeter 81 has expanded its Security Services Edge (SSE) Solution

Perimeter 81 | February 28, 2022

Perimeter 81
Perimeter 81, the Zero Trust Network Access market leader, has expanded its Security Services Edge (SSE) solution to include a Secure Web Gateway component. The Secure Web Gateway (SWG) extends the organization's remarkable simplicity of use to Web filtering, ensuring that company personnel is protected from fraudulent websites and unsafe information regardless of where they work.

The Secure Web Gateway from Perimeter 81 will restrict access to specific URLs or categories of websites based on the user, their role, and other factors such as the day of the week. These categories are continuously updated daily to ensure that no site goes unnoticed. In addition, employee access to "restricted" or "warned" websites is tracked and reported for auditing purposes to ensure that business policies and auditing requirements are met. For applications that do not require SSL inspection and protect employee privacy, such as when browsing financial or healthcare websites, bypass rules can be created.

“The new Secure Web Gateway functionality is a big step forward for our Cybersecurity Experience (CSX) Platform, and delivering an enterprise-grade secured corporate network over the public internet, With this release, we are extending the reach of our radically simple cybersecurity beyond the corporate hybrid cloud, to the infinite number of touchpoints an employee may encounter on the web. The Secure Web Gateway will be transparent to users and very easy to administer, like all the other components of our Security Services Edge solution.”

Amit Bareket, CEO at Perimeter 81

Chief Growth Officer at Perimeter 81, Sagi Gidali, adds: “Our recent State of the Cybersecurity Report revealed that 71% VPs and CIOs find it more difficult to prevent cyberattacks due to the complexity of the cybersecurity solutions they use. By providing an exceptional cybersecurity experience for both users and the IT team that implements and manages cybersecurity, we can assist companies in protecting both their hybrid networks and their hybrid employees more effectively. With this release, we have expanded that protection with our Secure Web Gateway, managed from the same easy-to-use dashboard.”

Spotlight

Targeted intrusions for gaining long-term access and collecting data about industrial control systems (ICS) are becoming much more frequent. Many of these attacks are about understanding the network and preparing for future activities without causing any immediate impact. The most recent Dragos Year in Review6 report shows that the ransomware groups Lockbit 2.0 and Conti were responsible for more than half of the observed ransomware attacks in industrial environments in 2021, and that these instances resulted in actions on objectives. These attacks have been observed in almost every industrial vertical, primarily targeting small to medium-sized organizations in manufacturing.


Other News
PLATFORM SECURITY,SOFTWARE SECURITY

Stellar Cyber Integrates with Netskope to Deliver World-Class User Context, Speeding Investigations and Improving Security Outcomes

Stellar Cyber | December 20, 2022

Stellar Cyber, the innovator of Open XDR, today announced a new integration with Netskope, a global leader in secure access service edge (SASE). This powerful integration makes it easy for enterprise and MSSP users of the Stellar Cyber Open XDR platform to improve visibility of risks and threats by incorporating the rich user-centric data generated by Netskope in every investigation conducted by their security analysts. Under this integration, Netskope maintains visibility and control across five lanes of user traffic, including web, managed SaaS, unmanaged SaaS, cloud service providers, and public-facing custom apps in one single-pass cloud architecture. At the same time, Stellar Cyber ingests, normalizes, and analyzes Netskope data and all other collected data to identify potential threats creating prioritized, investigation-ready incidents. As security analysts complete incident investigations, Stellar Cyber automatically initiates response actions to third-party products integrated into the solution, including Netskope. “Making it easy for our customers that use Stellar Cyber to incorporate Netskope’s valuable user insights into their investigations is another way for us to bring them new levels of security visibility. “Making security analysts more productive means attacker dwell time decreases, reducing the risk of breach across our customer's environment.” Andy Horwitz, VP of Business Development at Netskope “Automatically incorporating Netskope’s rich user data into every investigation in the Stellar Cyber platform adds critical context that previously required significant manual effort, which should be especially important to customers with lean security teams focused on reducing the workload on their SOC analysts,” said Andrew Homer, VP, Technology Alliances at Stellar Cyber. “With this integration, we continue to deliver what our customers, and the market, expect.” About Stellar Cyber Stellar Cyber’s Open XDR platform delivers comprehensive, unified security without complexity, empowering lean security teams of any skill to secure their environments successfully. With Stellar Cyber, organizations reduce risk with early and precise identification and remediation of threats while slashing costs, retaining investments in existing tools, and improving analyst productivity, delivering an 8X improvement in MTTD and a 20X improvement in MTTR. The company is based in Silicon Valley.

Read More

Spotlight

Targeted intrusions for gaining long-term access and collecting data about industrial control systems (ICS) are becoming much more frequent. Many of these attacks are about understanding the network and preparing for future activities without causing any immediate impact. The most recent Dragos Year in Review6 report shows that the ransomware groups Lockbit 2.0 and Conti were responsible for more than half of the observed ransomware attacks in industrial environments in 2021, and that these instances resulted in actions on objectives. These attacks have been observed in almost every industrial vertical, primarily targeting small to medium-sized organizations in manufacturing.

Resources