DATA SECURITY, PLATFORM SECURITY, WEB SECURITY TOOLS

ReasonLabs Launches Free Online Security Tool to Power Secure Web Experience For Millions of Global Users

ReasonLabs | August 24, 2022 | Read time : 02:55 min

ReasonLabs
ReasonLabs, a leading cybersecurity company providing enterprise-grade protection to users worldwide, has launched its newest product, Online Browser Security. The product provides real-time, 24/7 protection against malicious URLs, phishing, harmful extensions, suspicious downloads, intrusive cookies and trackers, unauthorized notifications, and pop-ups. It is currently available worldwide as a free download.

Online Browser Security is seamlessly integrated with RAV Endpoint Protection, ReasonLabs' leading antivirus software built on a multilayered machine-learning engine, to keep personal data safe from security threats. Bringing all the elements of a next-generation antivirus solution to the web browser, the solution allows consumers to use the internet with confidence and peace of mind. Powered by an autonomous protection engine, users can choose their own protection settings and let the endpoint protection do the work for them. It comes complete with a dashboard to stay informed regarding any identified and blocked online threats. Scheduled and user-initiated scans are also available at the touch of a button.

"Our mission at ReasonLabs is to provide every home user with the same degree of cybersecurity protection that large companies receive. "In our connected world, everyone deserves the highest level of protection, and today, we have added another solution that will safeguard users in real-time, 24/7. As an additional layer to our security platform, RAV Online Security offers next-generation protection for all next-generation cyber threats."

Kobi Kalif, ReasonLabs CEO

Key features of RAV Browser Security include a malicious URL blocker, the ability to disable harmful extensions, and the blocking of suspicious cookies and ad trackers. The product also monitors all file downloads and comes equipped with an advanced threat scanner, and has notification control. These features can be easily managed through the easy-to-use RAV Online Security dashboard. Optimizing users' online experience, Online Security is a key component of ReasonLabs' advanced breach prevention product suite, which also includes RAV EDR, RAV VPN, RAV Safer Web, and FamilyKeeper, its parental control solution.

About ReasonLabs
ReasonLabs is a global pioneer in cybersecurity detection and prevention. Powered by machine learning, ReasonLabs' cutting-edge technology is revolutionizing consumer-focused cybersecurity, bringing enterprise-grade protection into the homes of tens of millions of users worldwide. Its innovative engine scans over 2 billion files in 180 countries a day, delivering fast, comprehensive data while providing 24/7 real-time threat detection. Founded in 2016, ReasonLabs is based in New York and Tel Aviv.

Spotlight

In this series reviews the components of traditional Information Security Programs (ISPs), and discusses how elements of the ISP should be refocused in the current cybersecurity threat environment. The video includes coverage of threat intelligence, third-party management, cyber resilience, and incident response programs. The video also provides a brief overview of the Cybersecurity Assessment Tool, and includes resources to consult for additional information on cybersecurity risks and risk management processes.


Other News
DATA SECURITY,PLATFORM SECURITY,SOFTWARE SECURITY

Absolute Software Unveils New Product Innovations for Resilient Zero Trust

Absolute | December 01, 2022

Absolute Software™ , the only provider of self-healing, intelligent security solutions, today announced new product innovations, empowering customers with deeper visibility and intelligence, expanded software integrations, and a refreshed user experience through its latest updates to Absolute Secure Endpoint and Absolute Secure Access. These product releases continue the company’s investment in bringing together the combined power of Absolute Secure Endpoint and Absolute Secure Access with our unique, firmware-embedded self-healing capability, enabling customers to achieve truly resilient Zero Trust environments and deliver an optimal user experience. This announcement builds on the launch of Absolute ZTNA – the industry’s first self-healing Zero Trust Network Access (ZTNA) solution – and Absolute Insights™ for Endpoints and Network, providing unparalleled intelligence into device, application, and network performance. Embedded in more than 600 million devices, Absolute is the only intelligent security solutions provider capable of delivering visibility, control, and resiliency across endpoints, applications, and network connections. The Absolute Platform enables IT and security teams to ensure their endpoints remain compliant and mission-critical applications remain operational, and empowers them to transition from traditional VPNs to a resilient Zero Trust approach without hindering security or user productivity. A recent 451 Research report validates Absolute’s differentiated platform approach and capabilities, saying: Too often, organizations don’t fully consider the resilience of the deployed zero-trust environment, and network access and device security are handled independently. It’s a situation that complicates security operations and one that can impact employee productivity. “Our common platform addresses a wide range of market needs, as we have the unique ability to apply self-healing capabilities to devices, applications, and network access. “Organizations are acknowledging that they need resilience-focused Zero Trust approaches, capable of integrating endpoint and access assessments at every step. By providing the critical components needed to achieve that resiliency - deep visibility, intelligence, and firmware-embedded Persistence - we are enabling them to not only protect devices, data, and users but also ensure critical controls are operating at maximum efficacy.” John Herrema, EVP of Products and Strategy at Absolute New capabilities available to Absolute Secure Endpoint customers in the latest product release include: Public API Expansion: The latest Absolute Secure Endpoint release adds new Public APIs to our existing library, allowing customers and partners to integrate our device actions into their existing workflows - significantly improving the efficiency of their existing workflows and enhancing automation capabilities. Absolute Connector for ServiceNow™: The Absolute Connector for ServiceNow enables joint customers to access Absolute’s comprehensive asset intelligence and single source of truth within their ServiceNow platform environment – enabling them to efficiently respond to service requests, supplement their ServiceNow workflows, and rapidly demonstrate compliance. Expanded Application Resilience™ Catalog: The Absolute Application Resilience catalog now includes support for more than 60 critical security applications that IT and security administrators can self-heal across their endpoints. Recent additions include WinMagic® MagicEndpoint™, Dell™ Trusted Device, Deep Instinct™, Norton 360™, OPSWAT™, UNOWHY™, Aranda Software™, and Pixart® MDM. The company also announced upcoming server and client enhancements to Absolute Secure Access, including: New Look and Feel: The names, status icons, fonts, and colors have been updated to reflect new product names and refreshed corporate brand; the core functionality and upgrade experience remain smooth and easy. SaaS Enhancements: The SaaS offering adds native NAT capabilities and enhanced alerting. Enhanced 5G Telemetry and Detection: Insights for Network dashboards that display cellular coverage, signal quality, and usage now include the 5G mid-band spectrum, and reflect improved 5G sensitivity. Deeper Visibility: The Secure Access/webService API has been enhanced, offering programmatic access to key pool performance metrics, including status information for our Active/Active server infrastructure. Faster NAC Checks: NAC capabilities are optimized, significantly reducing the time it takes for the VPN to connect and begin tunneling traffic. Android Client Enhancements: Collecting network telemetry on Android devices can now be done with the screen off to improve battery life, ensuring that administrators have actionable device and network information even if a device is in sleep mode. The Android cryptographic libraries providing FIPS 140-2 cryptography are also updated. The features included in the latest Absolute Secure Endpoint release are available now. For additional details, including which are available to Control, Visibility, or Resilience tier customers, visit here. The company expects to make Absolute Secure Access updates available to customers in January 2023. About Absolute Software Absolute Software is the only provider of self-healing, intelligent security solutions. Embedded in more than 600 million devices, Absolute is the only platform offering a permanent digital connection that intelligently and dynamically applies visibility, control and self-healing capabilities to endpoints, applications, and network connections - helping customers to strengthen cyber resilience against the escalating threat of ransomware and malicious attacks. Trusted by 18,000 customers, G2 recognized Absolute as a leader for the eleventh consecutive quarter in the Fall 2022 Grid® Report for Endpoint Management and as a high performer in the Grid Report for Zero Trust Networking.

Read More

DATA SECURITY, NETWORK THREAT DETECTION, PLATFORM SECURITY

OpenText Teams with NetScaler to Deliver Advanced Web Application Protection

OpenText | October 13, 2022

OpenText™ , today announced the integration of its BrightCloud Threat Intelligence with NetScaler Application Delivery Controller (ADC). The move will provide NetScaler customers with contextual insights and automatically protect against malicious IP addresses to improve their resilience in managing the latest security threats. NetScaler ADC and WAF protect customers from known and zero-day application attacks with a comprehensive security solution for web applications and Application Programming Interfaces (APIs) both on-premises and in the cloud. With the BrightCloud IP Reputation Service as its threat intelligence source, NetScaler can efficiently inspect client requests for attack traffic by filtering against known malicious IP addresses. NetScaler's research shows that BrightCloud IP Reputation Service offers the most comprehensive database of known problematic IP addresses. In fact, BrightCloud Threat Intelligence is used within nearly 85 percent of security solutions purchased by enterprises. "While filtering requests with malicious IP addresses is an effective method to protect applications from attacks, it can be a huge lift and increase inspection overhead. NetScaler came to us for a solution to this challenge that would save their customers time and be easy to operate and reliable. "Our BrightCloud IP Reputation Service easily integrates with any NetScaler ADC function, so that customers always have the most up-to-date threat intelligence at their fingertips. We are thrilled to partner with NetScaler to help improve the security posture of its customer base." Ted Harrison, EVP, Worldwide Enterprise Sales, OpenText Security Solutions With attack sources changing constantly, near real-time updates provided by BrightCloud are critical to safeguard NetScaler customers. Using BrightCloud IP Reputation Service, NetScaler can block application access to from IP addresses that are known, based on BrightCloud data, to be infected. In addition, BrightCloud's contextual mapping across different vectors such as file, domain, and malware data, continuously updates the IP reputation score and highlights typically less obvious connections to potential threat actors. IP reputation scores are updated every five minutes ensuring NetScaler customers have the most up-to-date protection. Citrix is a pioneer and leader in securing applications and delivering information to users wherever they are. Jason Poole, Director of Product Marketing, Application Security, said of the partnership, "In teaming with BrightCloud, we can provide our customers with an added layer of real-time protection and granular controls that protect against the new threats opened by flexible work models and ensure their devices, data, employees and customers remain safe." About OpenText Security Solutions As attack surfaces expand, OpenText Security Solutions help organizations of every size achieve cyber resilience with Webroot Security, Carbonite Data Management, BrightCloud® Threat Intelligence, and EnCase Digital Forensics and Threat Response. With a united front of best practices paired with layered solutions, we prevent, detect, and restore small, mid-sized and enterprise business operations in the event of a cybersecurity attack. About OpenText OpenText, The Information Company™, enables organizations to gain insight through market leading information management solutions, powered by OpenText Cloud Editions.

Read More

DATA SECURITY, NETWORK THREAT DETECTION, PLATFORM SECURITY

IronYun® Announces Integration with Genetec™ Security Center Designed For Comprehensive Visual Intelligence

IronYun | November 01, 2022

IronYun Inc., a leader in AI vision for security, safety and operational applications, today announced the integration of the award winning Vaidio AI Vision Platform with Genetec™ Security Center. Genetec customers can now add advanced, accurate, and field-proven AI video analytics to their existing infrastructure, to improve security, safety, and operational efficiency. "Integrating Vaidio with Security Center makes it easy to add advanced artificial intelligence to existing infrastructure to increase functionality and make security operations even more effective and efficient." Paul Sun, IronYun CEO With the ability to analyze video from Security Center and to seamlessly feed alerts and notifications into the Security Center interface, the Vaidio AI Vision Platform continues to build on an award-winning foundation. Vaidio won the 2020 New Product Showcase for Commercial Monitoring and received two New Product Showcase Awards in 2021 for Mobile Applications and Video Analytics. Also in 2021, IronYun partnered with DP World and Verizon to study Vaidio AI Vision in port and warehouse safety and operational applications. In addition, IronYun was recognized as a Major Player in IDC's Worldwide Video Analytics MarketScape as "a good decision for enterprises that have extensive video surveillance capabilities and want to upgrade to advanced analytics that incorporate the latest technology." The Vaidio AI Vision Platform is an open software platform that can be deployed on-prem on servers, on edge devices, and/or in the cloud. Vaidio orchestrates multiple next-generation AI video analytics engines to provide such functions as video search, intrusion detection, license plate recognition, face search and recognition, people and vehicle counting, vehicle make and model recognition, social health analytics, and many others. Vaidio works with any IP camera and integrates out of the box with Genetec Security Center. Vaidio AI monitors real-time video streams with superhuman accuracy, and accelerates forensic video search of stored video. The platform offers the flexibility to purchase only needed analytics, with the option to run multiple analytics on a single camera, and to add more analytic functionality over time. Vaidio's optimized, next-generation AI vision algorithms maximize hardware resource efficiency, to effectively lower overall solution costs relative to competitive alternatives. The latest Vaidio releases add new AI-enabled safety detection, privacy blurring and associated data and user management features, a fully featured parking management application, (the first 3rd party application developed on the Vaidio platform), Vaidio Data, a robust business intelligence engine, and Vaidio Command Center, for centralized management of complex, distributed, large scale environments. About Vaidio The Vaidio AI Vision Platform offers 30 AI -enabled next-generation video analytics functions for security, safety, access control and operational applications. Vaidio is an open platform that works with any IP camera, scales from 1 to 1,000s of cameras, and integrates with market leading VMSs for real-time, forensic and holistic situational awareness. The Vaidio Platform is differentiated by higher accuracy and greater resource efficiency across a vast array of advanced AI-enabled video analytics. Relative to competitive alternatives, Vaidio can reduce hardware requirements up to 80%, and false alerts up to 99.995% -- reducing both up front and long-term operating costs. About IronYun IronYun has evolved the artificial intelligence at the core of the Vaidio Platform to create a resource-efficient, open platform that is field-proven to maximize accuracy and performance across the industry's broadest array of analytics functions. We are NDAA approved, headquartered in Stamford, CT, and our Vaidio Platform is deployed across tens of thousands of cameras for government, healthcare, education, retail, transit and enterprise customers worldwide.

Read More

DATA SECURITY, PLATFORM SECURITY, SOFTWARE SECURITY

Datadog Launches Cloud Security Management to Provide Cloud Native Application Protection

Datadog | October 20, 2022

Datadog, Inc., the monitoring and security platform for cloud applications, today announced the general availability of Cloud Security Management. This product brings together capabilities from Cloud Security Posture Management (CSPM), Cloud Workload Security (CWS), alerting, incident management and reporting in a single platform to enable DevOps and Security teams to identify misconfigurations, detect threats and secure cloud-native applications. As organizations' cloud architectures become more complex, assessing security risks and collaborating across teams to mitigate them has become increasingly difficult. While security engineers are responsible for identifying threats and misconfigurations, DevOps teams are responsible for remediating them. DevOps and security teams often use multiple point solutions and tools to report on and resolve issues, but these tools provide an incomplete view of security risks and create silos between teams. Datadog's Cloud Security Management brings together observability and security insights across an organization's entire cloud environment—without the need to deploy additional agents. This shared context provides security engineers with deeper insights to collaborate with DevOps teams and more quickly remediate security issues. "Tight collaboration between security and DevOps teams is required to mitigate security risks in today's environments. This change has been brought on by the move to the cloud. Security teams today cannot take countermeasures alone without potentially impacting the performance and reliability of production systems. "Datadog Cloud Security Management helps these teams work together to remediate issues quickly by providing a single platform—as opposed to multiple point solutions—that delivers a complete view of an organization's infrastructure and risk exposure." Prashant Prahlad, VP of Product at Datadog "Using Cloud Security Management was like having a member of the InfoSec team embedded within our DevOps team," said Chad Upton, Vice President of Infrastructure at FirstUp. "All the security metrics were front and center so they could easily see the number of misconfigured resources in a single view and they didn't have to wait for someone from InfoSec to reach out and let them know there was an issue." "Because Datadog Cloud Security Management shows observability and security data together, alongside the resource relationship graph, we were able to remove cloud resources that were no longer in use and easily understand the impact of misconfigured cloud resources by visualizing all dependencies," said Ben Collen, Senior Director of Engineering and CISO at Vertex. Cloud Security Management expands on the foundational capabilities of cloud security posture management and cloud workload security of a CNAPP solution through: Resource Relationship Graph: By providing a visual risk assessment of misconfigured resources and vulnerabilities across an organization's cloud infrastructure, DevOps teams can take remedial actions based on the impact of the risk. Custom Detection Rules: Teams can now create fine-grained threat detection rules across all cloud resources—including their associated logs and security incident events. Resource Catalog (Beta): Engineers can access a comprehensive visual representation of all security risks associated with each cloud resource in a customer's environment and identify the owners of every cloud infrastructure resource to remediate vulnerabilities and misconfigurations. About Datadog Datadog is the monitoring and security platform for cloud applications. Our SaaS platform integrates and automates infrastructure monitoring, application performance monitoring and log management to provide unified, real-time observability of our customers' entire technology stack. Datadog is used by organizations of all sizes and across a wide range of industries to enable digital transformation and cloud migration, drive collaboration among development, operations, security and business teams, accelerate time to market for applications, reduce time to problem resolution, secure applications and infrastructure, understand user behavior and track key business metrics.

Read More

Spotlight

In this series reviews the components of traditional Information Security Programs (ISPs), and discusses how elements of the ISP should be refocused in the current cybersecurity threat environment. The video includes coverage of threat intelligence, third-party management, cyber resilience, and incident response programs. The video also provides a brief overview of the Cybersecurity Assessment Tool, and includes resources to consult for additional information on cybersecurity risks and risk management processes.

Resources