Cloud Security

eSentire Adds Cloud Visibility to Deliver Integrated Managed Detection and Response

Grazed from eSentire

eSentire, Inc.
, the largest pure-play Managed Detection and Response (MDR) provider, today announced the integration of cloud sources to its award-winning eSentire Managed Detection and Response service. With visibility across network, endpoint, and cloud, eSentire can now hunt for threats both on and off company premises, keeping organizations safe from constantly evolving cyber-attacks that technology alone cannot prevent.

Cyber-threats traditionally targeting on-premises resources - such as ransomware, identity theft, and data exfiltration - are a growing concern for cloud services. As organizations' adoption of the cloud continues to accelerate, effectively addressing these additional security challenges is a top concern. Mid-market companies are especially challenged. Cloud adoption is more prevalent in the mid-market due to its ease of deployment and low upfront costs. However, mid-market firms typically lack the expertise and resources required to effectively secure their cloud deployments.

Zscaler Arrives at RSA Conference 2017 with an Exciting Lineup and a Smashing Display

Grazed from Zscaler, Inc.

Zscaler, Inc., the leading cloud security company, today announced its presence at the upcoming RSA Conference 2017 in San Francisco at the Moscone Center, South Hall booth #1207. Through a series of in-booth displays, product demonstrations, and partner presentations, ZscalerTM will showcase its industry-recognized solutions architected from the ground up as part of a multi-tenant, distributed cloud security platform for the new, cloud-centric world of IT.

Also featured at the exhibit will be the Zscaler "smash booth," in which visitors are invited to take out their frustrations with the expensive, complex security appliances of the past. Many of the traditional appliance-based approaches to enterprise security have changed little over the years, even as users have become mobile and applications have moved to the cloud. With their outdated architectures, designed to protect a security perimeter that no longer exists, such appliances have become relics. For InfoSec professionals who -- in the face of software issues, firewall rules, CVEs, and more -- have ever wished for a sledgehammer, Zscaler is happy to offer them one, along with a pair of safety goggles.

All Zscaler activities at RSA, including its smash booth, continue to center on the company's "break free" message, encouraging visitors to break free from architectures of the past that are preventing them from fully embracing the agility, productivity, and efficiencies of cloud enablement.

New Intel Security Cloud Report Reveals IT Departments Find It Hard to Keep the Cloud Safe

Grazed from Intel Security

Intel Security today announced its second annual cloud security report, "Building Trust in a Cloudy Sky." The report outlines the current state of cloud adoption, the primary concerns with private and public cloud services, security implications, and the evolving impact of Shadow IT of the more than 2,000 IT professionals surveyed.

"The ‘Cloud First' strategy is now well and truly ensconced into the architecture of many organizations across the world," said Raj Samani, EMEA chief technology officer, Intel Security. "The desire to move quickly toward cloud computing appears to be on the agenda for most organizations. This year, the average time before respondents thought their IT budgets would be 80 percent cloud-based was 15 months, indicating that Cloud First for many companies is progressing and remains the objective."

Trust in the Cloud on the Rise

Acalvio to Deliver Industry's First Distributed Deception Solution on Microsoft Azure Cloud Platform

Grazed from Acalvio

Acalvio Technologies, an innovator in Advanced Threat Defense, today announced the industry's first Distributed Deception solution to be delivered from Microsoft's Azure platform. Acalvio will collaborate with Microsoft to create standardized models for deployment and response; and enable Managed Service Providers (MSPs) to deliver customized solutions for their respective markets.

"Business leaders are moving quickly to leverage the cloud to drive digital transformation while reducing security risks," said Andrew Conway, General Manager of Product Marketing for Microsoft Enterprise Mobility & Security. "We are pleased to work with Acalvio as they build their innovative cloud-based Advanced Threat Defense on the Microsoft Azure cloud platform to deliver security capabilities that give companies greater confidence in their security posture."

 

CyberArk Announces Support for Amazon Inspector for Enhanced Cloud Security

Grazed from CyberArk

CyberArk, the company that protects organizations from cyber attacks that have made their way inside the network perimeter, today announced expanded privileged account security solutions for Amazon Web Services (AWS) to help customers better protect against, detect and respond to advanced threats.

Many organizations already run at least part of their operations in the cloud, while others are seeking to accelerate their migration strategies - with industry research predicting that up to 80 percent of workloads will run on a cloud architecture by 2024. Migrating from the data center to the cloud introduces different cyber security considerations, particularly associated with securing privileged user and application credentials used to manage consoles, enable applications to connect with sensitive assets, and dynamically scale elastic production environments.

For enterprises migrating to the cloud, CyberArk helps customers seamlessly extend and consistently enforce the security policies they have in place today on their on-premises infrastructure into their emerging cloud and DevOps environments.

Prioritize Risk Reduction in AWS Environments

Qualys Expands Global Cloud Platform with Three New Secure Operations Centers (SOCs)

Grazed from Qualys

Qualys, Inc., a pioneer and leading provider of cloud-based security and compliance solutions, today announced the opening of three new Secure Operations Centers (SOCs) in the European Union (EU), India and North America. The addition of these new locations in Amsterdam, Pune, India and San Jose, Calif. marks a new milestone for Qualys' expanding global operations, which now includes six locations on three continents.

Organizations migrating services to the cloud must comply with new and changing global and regional regulations that impact where data resides. Qualys' expansion will provide its global base of customers worldwide with greater access to a broad suite of cloud-based security and compliance solutions, and enable customers to choose which region best suits their data governance needs. Each of these new SOCs adds the capacity to scan millions of IP addresses at once, significantly increasing Qualys' capabilities to support the largest organizations.

"This expansion of the Qualys Cloud Platform helps us better serve organizations across the globe and particularly within the EU and across Asia to compete in the new era of business, and increases our capacity to serve our North American customers," said Philippe Courtot, chairman and CEO, Qualys, Inc.

ServiceNow Resolves Real Security Threats Fast

Grazed from ServiceNow

ServiceNow, the enterprise cloud company, today announced integrations from leading cybersecurity companies into ServiceNow Security Operations solution. With ServiceNow customers can prioritize threats and use a structured response engine to resolve real security threats fast. Now security analysts can easily enrich threat information, map those threats to the underlying business service at risk, and easily collaborate with IT to automatically resolve them. This replaces the manual, slow and ineffective back-and-forth resolution process of the past.

While enterprises have invested heavily in protection and detection tools, security response is often left unaddressed. Determining whether an alert constitutes an actual threat can take hours. Security analysts use email, phone calls and spreadsheets to coordinate remediation with IT teams. These manual processes are error-prone and unwieldy, leading to lengthy breach containment times of 70 days on average, according to the Ponemon Institute.

ServiceNow Security Operations replaces the manual work patterns of the past with intelligent workflows of the future and just added several new automation integrations from leading security vendors. In as little as 20 seconds, Security Operations automatically enriches each security incident with threat intelligence, including information from potentially affected endpoints. This allows security analysts to spend less time on researching problems and to get to resolution faster. In addition, ServiceNow Security Operations eliminates the need for manual data collection by automatically generating a post-incident report for later analysis, reporting or audit.

Threat Stack Launches New Packaging Model to Scale with Customers' Cloud Security Maturity

Grazed from Threat Stack

Threat Stack, the leader in cloud-native security and compliance management, today announced the launch of its new packaging model for the Threat Stack Cloud Security Platform (CSP), strengthening the company's commitment to customers of all sizes throughout their cloud maturity. Each package is custom built to align with three Cloud Security Maturity phases: Auditing the environment; Continuously monitoring and alerting; Investigating events and remediation. This new model enables the security of a customer's journey from just getting started in the cloud to an approach focused on analysis, investigation and remediation.

"Traditionally companies amass several tools as security maturity evolves over time, becoming costly and resource intensive," said Brian M. Ahern, Chairman and CEO, Threat Stack. "The new Threat Stack Cloud Security Platform® packaging is designed to enhance security visibility, reduce operating costs and maximize company resources through flexible package selection aligning with company security maturity and infrastructure security requirements."

Threat Stack CSP is now available in three package options:

Cloud Security is Top Priority for IT in 2017 Says CompuCom Survey

Grazed from CompuCom Systems, Inc.

According to a new survey from CompuCom Systems, Inc. ("CompuCom"), a leading technology infrastructure services company, nearly half of IT professionals surveyed (47 percent) believe that cloud security is the most important technology for their organization this year, over Internet of Things (IoT), data analytics, third-party software support and robotics process automation (RPA). The online poll collected responses from 662 IT professionals across multiple industries from November 9, 2016 - January 12, 2017.

The cloud computing market is susceptible to threats including data breaches, data loss and insecure application programming interfaces (APIs). The world cloud security market is expected to reach $8.9 billion by 2020, according to a report by Allied Market Research, with a CAGR Of 23.5 percent from 2015 to 2020.

Bluelock Helps Clients Secure Cloud-Based Environments and Reduce Auditing Stress With Its Latest Portal Enhancements

Grazed from BlueLock

Bluelock, provider of Disaster Recovery-as-a-Service (DRaaS) for complex environments and sensitive data, is expanding its IT security footprint with a new series of features to enhance clients' overall security posture. The first of these initiatives is the launch of a comprehensive dashboard that increases visibility and auditability across clients' security services.

As cybersecurity threats continue to grow in the digital age, Bluelock Portfolio provides clients visibility into the depth of security with which their applications and services are guarded, with the ability to easily add additional protection services. Clients can access a comprehensive, searchable log of those who have accessed and modified systems, as well as quickly request documents for response to auditors.