DATA SECURITY, ENTERPRISE IDENTITY, ENTERPRISE SECURITY

SyncDog Announces Partnership with 3Eye Technologies to Expand Access to Mobile Endpoint Security Technology

SyncDog Inc. | October 28, 2022 | Read time : 03:00 min

SyncDog Inc.
SyncDog, Inc., the leading Independent Software Vendor (ISV) for next generation mobile security and data loss prevention, today announced a partnership with 3Eye Technologies to develop a smarter, more advanced offering for its mobility and cloud strategy to accelerate sales initiatives. SyncDog's Secure.Systems™ Workspace offers companies and government organizations a more secure and scalable solution for addressing all the challenges that go along with enabling employees on mobile devices—with immediate opportunities around helping to bring organizations into compliance with the federal government's CMMC 2.0 framework and other security & privacy regulatory standards.

The rising popularity and rapid adoption of hybrid work models means that employees are empowered to conduct their work from wherever they are and on whatever device they have on hand–even personally owned (BYOD) devices. However, hybrid and remote work policies emphasize the importance of having robust data protection and endpoint security solutions. Now, more than ever, the ability for both private and public sector institutions to achieve compliance and adopt the cybersecurity and data protection standards outlined in industry frameworks is more critical than ever, as evidenced by the federal government's push to implement CMMC 2.0. In accordance with CMMC and other federally regulated requirements, SyncDog's unified Trusted Mobile Workspace provides a holistic, zero-trust approach that helps bring organizations into compliance with the federal government's CMMC framework along with other broadly recognized regulatory standards.

"We are excited to partner with 3Eye to offer even more organizations a smarter and more efficient approach to a secure mobility architecture. A particularly compelling opportunity will be in enabling government employees and federal contractors to collaborate in real-time outside the office in a secure way – even while using BYOD/Personal devices – and still complying with CMMC 2.0 regulations. "This partnership will help broaden the range of organizations securely transferring data between the device and organization's secure network and provide reassurance that devices and processes they are following and implementing adhere to necessary regulations."

Brian Egenrieder, Chief Revenue Officer at SyncDog

"The prevalence of hybrid and remote work has IT and security teams grappling with ever evolving and complex cybersecurity challenges. This widespread workforce shift has made the need for enterprise mobility more important than ever, but these challenges are only exacerbated by the lack of robust mobile security strategies," said Conor MacFarlane, President and CEO of 3Eye Technologies. "SyncDog technology protects sensitive data no matter what device it is on, making it easier for people to conduct business securely. It's a terrific addition to our portfolio of highly advanced mobility and security technologies."

3Eye Technologies is a mobile-first distributor, who partners with best of breed vendors to provide the highest quality mobility, security, and identity solutions to deliver cutting-edge technologies through its reseller database. SyncDog will leverage 3Eye Technologies' distribution capabilities to build upon their growing market presence and connect SyncDog with more customers across new commercial markets and regions.

About SyncDog Inc.
SyncDog is the leading ISV for building mobile frameworks that extend app functionality to devices while securing corporate and government networks from mobile-endpoint threats. SyncDog's flagship solution, Secure.Systems, delivers a rich and unimpeded mobile experience for employees working remotely, and supports a multitude of enterprise productivity apps within a NIST-certified (FIPS 140-2 cert. #2687) workspace. Secure.Systems is ideal for organizations that want to deliver a rich mobile app experience across BYOD, CYOD (choose your own device), or other endpoint device policy. Secure.Systems is a natural complement to security and compliance auditing initiatives to satisfy the mandates of CMMC, HIPAA, GDPR, PCI DSS, GLBA, FISMA, and other laws/standards for data security.

About 3Eye Technologies
3Eye Technologies is a value-added distributor of mobility, security, and identity solutions, committed to helping our partners identify, configure, and deliver solutions that enable seamless and secure work, wherever work gets done.

Spotlight

The year of 2022 presented both new and evolving trends. We primarily recognized significant activity in five main areas – Russia’s war in Ukraine and its underground implications, the continued popularity and evolution of ransomware, the rise and endurance of initial access brokers (IABs), developments in the malware threat lan


Other News
DATA SECURITY,PLATFORM SECURITY,SOFTWARE SECURITY

Balbix Announces Cybersecurity Posture Automation Support for Google Cloud Platform

Balbix | November 17, 2022

Balbix, provider of the world's leading platform for cybersecurity posture automation, announced today the general availability of support for Google Cloud Platform (GCP). Security teams can now use Balbix to easily quantify, prioritize and mitigate risks in their Google Cloud environments. With this announcement, Balbix has also extended its Cyber Asset Attack Surface Management (CAASM) solution to support multi-cloud environments that span both GCP and Amazon Web Services. The rapid move to the cloud has made IT environments more complex to manage and secure. As a result, security teams struggle to get a consolidated view of risk. Yet, 63 percent of organizations say they look at security posture in the cloud separately from on-premises, according to Cybersecurity Insiders' 2002 State of Security Posture Report. "Our customers' environments can include over 1 million assets, spread across multiple clouds and their own facilities. Managing an attack surface this large is no longer a human-scale problem. "With Balbix's new support for GCP, our customers can use automation to manage cybersecurity posture across more of their environment." Gaurav Banga, Founder and CEO of Balbix Cyber Security Posture Automation for Google Cloud Platform Balbix now provides support for popular Google Cloud services, including Compute Engine, Cloud Storage, Cloud SQL, Google Kubernetes Engine (GKE) Cluster & Deployments, Cloud Functions, Cloud Key Management Service (KMS), Pub/Sub and Secret Manager. As a result, Balbix customers with Google Cloud environments can use automation and advanced analytics to: Get comprehensive, near real-time visibility of their Google Cloud assets. Combine data from Google Cloud with their other IT and security tools to gain security and business context for their assets. Discover misconfigurations – the most exploited attack vector for the cloud – as well as unpatched software vulnerabilities, weak credentials and trust issues. Measure risk in terms of breach likelihood and business impact in order to prioritize remediation. Calculate and report on cyber risk quantified in dollars (or other currencies) instead of risk scores Cyber Asset Attack Surface Management for Multi-Cloud Environments The addition of support for GCP extends Balbix's CAASM solution to multi-cloud environments. Security practitioners no longer need to use multiple tools or combine data manually from these tools in a custom spreadsheet to understand their security posture. They can see the relationships between assets, applications and users no matter where the assets are in the cloud or on-premises. They can also identify any gaps in coverage for security controls. Balbix provides more than just visibility. Unlike other vendors, Balbix combines CAASM with Risk-Based Vulnerability Management (RBVM) and Cyber Risk Qualification (CRQ) solutions so security teams are able to immediately take action to reduce their cyber risk. They can continuously identify, prioritize and mitigate security issues as they emerge, while quantifying and tracking residual cyber risk in dollars. Daily cybersecurity decisions – operational as well as executive – can be made using a unified and up-to-date view of cyber risk. "By adding support for Google Cloud, Balbix has broadened its risk model to be inclusive of multiple public cloud platforms and allowed organizations to better measure their overall cyber risk," said Ed Amoroso, Founder and CEO of research and advisory firm TAG Cyber. "Customers can leverage this unified risk model to quantify cyber risk by business unit, geography, site, asset type or business owner – and quickly remediate those risks." The API-based Balbix Connector for Google Cloud Platform collects asset inventory and misconfiguration data and is available now. Visibility into other types of vulnerabilities is provided by optional Balbix sensors. These sensors also catalog the software bill of materials (SBOM) of applications running in GCP. Data collected by Balbix connectors and sensors is automatically deduplicated, correlated and inferenced to provide security teams with an accurate and unified view of risk. About Balbix Balbix enables businesses to reduce cyber risk by identifying and mitigating their riskiest cybersecurity issues faster. Our SaaS platform, the Balbix Security Cloud™, ingests data from businesses' security and IT tools so they can understand every aspect of their cybersecurity posture, build a unified cyber risk model and obtain actionable insights for risk reduction. With Balbix, businesses can automate inventory of their cloud and on-premise assets, conduct continuous risk-based vulnerability management and quantify cyber risk in dollars. Executives and operational teams can make cybersecurity decisions based on data not opinions.

Read More

DATA SECURITY,PLATFORM SECURITY,SOFTWARE SECURITY

Blackpoint Cyber Launches Three Product Features

Blackpoint Cyber | November 11, 2022

Blackpoint Cyber, a leading technology-focused cybersecurity company, has released three product features this fall, as they look ahead to 2023. “I am consistently blown away by the Blackpoint Cyber team. Our desire to improve the security posture for our partners is an ongoing journey as we continue to expand an ecosystem of products which address the needs of MSPs and customers in todays’ dynamic threat landscape. As someone with previous experience in the MSP space, it is refreshing to see how much our team really loves the channel and strives to regularly provide additional value by helping MSPs to secure themselves as well as their customers,” said Justin Weller, Director of Business Development at Blackpoint Cyber. Blackpoint partners can stay ahead of cyberthreats with the following products: Security Configuration Benchmarks for M365 – Vulnerability Mapping to CIS Benchmarks for Cloud Environments CIS foundation benchmark for M365 and Azure provide prescriptive guidance for establishing a secure baseline configuration. Blackpoint has reviewed every control on your behalf and made recommendations on several to harden your customer environments. Now you can compare your security measures to Center of Internet Security Benchmarks directly in the Blackpoint portal. Assess your standing against these internationally recognized security standards and implement the recommended changes to reduce the attack surface in cloud tenants. MDE Vulnerability Report—Security Visibility Unlocked The capabilities of Blackpoint’s product bundle, Blackpoint Response, have grown. With Managed Defender for Endpoint, we've introduced internal vulnerability reporting to help you better assess your customers’ security posture, directly within the portal. The reports include recommendations for remediation and simplify the process to action them. Improvements based on the reports may pertain to expiring certificates, device exposure, or vulnerable software. macOS Agent—The Power of MDR Within Your Mac After many requests from their partner community, due to a lack of true Mac MDR, Blackpoint’s flagship MDR product, SNAP-Defense, is now available to monitor and respond to threats on Apple devices running macOS. As the macOS market share in business settings continues to grow, Blackpoint partners now have the capability to provide protection to those assets. About Blackpoint Cyber Blackpoint Cyber offers the only world-class, nation-state-grade cybersecurity ecosystem serving the MSP community. Using its own software and SOC, Blackpoint’s true 24/7 MDR service not only detects breaches earlier than any other solution on the market, but also provides an actual response rather than just an alert to keep your and your clients’ networks safe from widespread damage.

Read More

PLATFORM SECURITY,SOFTWARE SECURITY

Stellar Cyber Integrates with Netskope to Deliver World-Class User Context, Speeding Investigations and Improving Security Outcomes

Stellar Cyber | December 20, 2022

Stellar Cyber, the innovator of Open XDR, today announced a new integration with Netskope, a global leader in secure access service edge (SASE). This powerful integration makes it easy for enterprise and MSSP users of the Stellar Cyber Open XDR platform to improve visibility of risks and threats by incorporating the rich user-centric data generated by Netskope in every investigation conducted by their security analysts. Under this integration, Netskope maintains visibility and control across five lanes of user traffic, including web, managed SaaS, unmanaged SaaS, cloud service providers, and public-facing custom apps in one single-pass cloud architecture. At the same time, Stellar Cyber ingests, normalizes, and analyzes Netskope data and all other collected data to identify potential threats creating prioritized, investigation-ready incidents. As security analysts complete incident investigations, Stellar Cyber automatically initiates response actions to third-party products integrated into the solution, including Netskope. “Making it easy for our customers that use Stellar Cyber to incorporate Netskope’s valuable user insights into their investigations is another way for us to bring them new levels of security visibility. “Making security analysts more productive means attacker dwell time decreases, reducing the risk of breach across our customer's environment.” Andy Horwitz, VP of Business Development at Netskope “Automatically incorporating Netskope’s rich user data into every investigation in the Stellar Cyber platform adds critical context that previously required significant manual effort, which should be especially important to customers with lean security teams focused on reducing the workload on their SOC analysts,” said Andrew Homer, VP, Technology Alliances at Stellar Cyber. “With this integration, we continue to deliver what our customers, and the market, expect.” About Stellar Cyber Stellar Cyber’s Open XDR platform delivers comprehensive, unified security without complexity, empowering lean security teams of any skill to secure their environments successfully. With Stellar Cyber, organizations reduce risk with early and precise identification and remediation of threats while slashing costs, retaining investments in existing tools, and improving analyst productivity, delivering an 8X improvement in MTTD and a 20X improvement in MTTR. The company is based in Silicon Valley.

Read More

SOFTWARE SECURITY

Keeper Security Releases iOS Updates for One-Time Share and Siri Shortcuts

Keeper Security | December 15, 2022

Keeper Security, the leading provider of zero-trust and zero-knowledge cybersecurity software protecting passwords, secrets and connections, today announced their latest iOS updates which include integration of the One-Time Share feature, which enables secure record sharing on a time-limited basis, using Keeper's zero-knowledge encryption and zero-trust security model. Keeper also now integrates with Siri Shortcuts, providing users with a quicker way to control their Keeper Password Manager. Keeper One-Time Share is the easiest and most secure way to send confidential information to a friend, family member or co-worker without exposing sensitive information over email, text or other forms of messaging. One-Time Share links are restricted to the recipient's device and automatically expire at a time of the Keeper user's choosing. One-Time Share records can only be used on one device. Even if the user forgets to unshare the record, it will expire automatically, and the recipient's access will be revoked. With Siri Shortcut integration, users will be able to quickly get things done on Keeper's Password Manager by asking Siri. "Keeper is thrilled to provide iOS users with this rich feature set that maximizes the security capabilities of their iOS devices, With One-Time Share, iOS users can securely share critical information, whether that's a family sharing their WiFi password with a friend or a security system code with a houseguest. Additionally, Siri integration allows users to control Keeper more easily with voice commands." Craig Lurey, CTO and Co-founder of Keeper Security. About Keeper Security: Keeper Security is transforming the way people and organizations around the world secure their passwords, secrets and confidential information. Keeper's easy-to-use cybersecurity platform is built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance. Trusted by millions of individuals and thousands of organizations globally, Keeper is the leader for best-in-class password management, secrets management, privileged access, secure remote access and encrypted messaging.

Read More

Spotlight

The year of 2022 presented both new and evolving trends. We primarily recognized significant activity in five main areas – Russia’s war in Ukraine and its underground implications, the continued popularity and evolution of ransomware, the rise and endurance of initial access brokers (IABs), developments in the malware threat lan

Resources