Cloud Security

Acalvio to Deliver Industry's First Distributed Deception Solution on Microsoft Azure Cloud Platform

Grazed from Acalvio

Acalvio Technologies, an innovator in Advanced Threat Defense, today announced the industry's first Distributed Deception solution to be delivered from Microsoft's Azure platform. Acalvio will collaborate with Microsoft to create standardized models for deployment and response; and enable Managed Service Providers (MSPs) to deliver customized solutions for their respective markets.

"Business leaders are moving quickly to leverage the cloud to drive digital transformation while reducing security risks," said Andrew Conway, General Manager of Product Marketing for Microsoft Enterprise Mobility & Security. "We are pleased to work with Acalvio as they build their innovative cloud-based Advanced Threat Defense on the Microsoft Azure cloud platform to deliver security capabilities that give companies greater confidence in their security posture."

 

CyberArk Announces Support for Amazon Inspector for Enhanced Cloud Security

Grazed from CyberArk

CyberArk, the company that protects organizations from cyber attacks that have made their way inside the network perimeter, today announced expanded privileged account security solutions for Amazon Web Services (AWS) to help customers better protect against, detect and respond to advanced threats.

Many organizations already run at least part of their operations in the cloud, while others are seeking to accelerate their migration strategies - with industry research predicting that up to 80 percent of workloads will run on a cloud architecture by 2024. Migrating from the data center to the cloud introduces different cyber security considerations, particularly associated with securing privileged user and application credentials used to manage consoles, enable applications to connect with sensitive assets, and dynamically scale elastic production environments.

For enterprises migrating to the cloud, CyberArk helps customers seamlessly extend and consistently enforce the security policies they have in place today on their on-premises infrastructure into their emerging cloud and DevOps environments.

Prioritize Risk Reduction in AWS Environments

Qualys Expands Global Cloud Platform with Three New Secure Operations Centers (SOCs)

Grazed from Qualys

Qualys, Inc., a pioneer and leading provider of cloud-based security and compliance solutions, today announced the opening of three new Secure Operations Centers (SOCs) in the European Union (EU), India and North America. The addition of these new locations in Amsterdam, Pune, India and San Jose, Calif. marks a new milestone for Qualys' expanding global operations, which now includes six locations on three continents.

Organizations migrating services to the cloud must comply with new and changing global and regional regulations that impact where data resides. Qualys' expansion will provide its global base of customers worldwide with greater access to a broad suite of cloud-based security and compliance solutions, and enable customers to choose which region best suits their data governance needs. Each of these new SOCs adds the capacity to scan millions of IP addresses at once, significantly increasing Qualys' capabilities to support the largest organizations.

"This expansion of the Qualys Cloud Platform helps us better serve organizations across the globe and particularly within the EU and across Asia to compete in the new era of business, and increases our capacity to serve our North American customers," said Philippe Courtot, chairman and CEO, Qualys, Inc.

ServiceNow Resolves Real Security Threats Fast

Grazed from ServiceNow

ServiceNow, the enterprise cloud company, today announced integrations from leading cybersecurity companies into ServiceNow Security Operations solution. With ServiceNow customers can prioritize threats and use a structured response engine to resolve real security threats fast. Now security analysts can easily enrich threat information, map those threats to the underlying business service at risk, and easily collaborate with IT to automatically resolve them. This replaces the manual, slow and ineffective back-and-forth resolution process of the past.

While enterprises have invested heavily in protection and detection tools, security response is often left unaddressed. Determining whether an alert constitutes an actual threat can take hours. Security analysts use email, phone calls and spreadsheets to coordinate remediation with IT teams. These manual processes are error-prone and unwieldy, leading to lengthy breach containment times of 70 days on average, according to the Ponemon Institute.

ServiceNow Security Operations replaces the manual work patterns of the past with intelligent workflows of the future and just added several new automation integrations from leading security vendors. In as little as 20 seconds, Security Operations automatically enriches each security incident with threat intelligence, including information from potentially affected endpoints. This allows security analysts to spend less time on researching problems and to get to resolution faster. In addition, ServiceNow Security Operations eliminates the need for manual data collection by automatically generating a post-incident report for later analysis, reporting or audit.

Threat Stack Launches New Packaging Model to Scale with Customers' Cloud Security Maturity

Grazed from Threat Stack

Threat Stack, the leader in cloud-native security and compliance management, today announced the launch of its new packaging model for the Threat Stack Cloud Security Platform (CSP), strengthening the company's commitment to customers of all sizes throughout their cloud maturity. Each package is custom built to align with three Cloud Security Maturity phases: Auditing the environment; Continuously monitoring and alerting; Investigating events and remediation. This new model enables the security of a customer's journey from just getting started in the cloud to an approach focused on analysis, investigation and remediation.

"Traditionally companies amass several tools as security maturity evolves over time, becoming costly and resource intensive," said Brian M. Ahern, Chairman and CEO, Threat Stack. "The new Threat Stack Cloud Security Platform® packaging is designed to enhance security visibility, reduce operating costs and maximize company resources through flexible package selection aligning with company security maturity and infrastructure security requirements."

Threat Stack CSP is now available in three package options:

Cloud Security is Top Priority for IT in 2017 Says CompuCom Survey

Grazed from CompuCom Systems, Inc.

According to a new survey from CompuCom Systems, Inc. ("CompuCom"), a leading technology infrastructure services company, nearly half of IT professionals surveyed (47 percent) believe that cloud security is the most important technology for their organization this year, over Internet of Things (IoT), data analytics, third-party software support and robotics process automation (RPA). The online poll collected responses from 662 IT professionals across multiple industries from November 9, 2016 - January 12, 2017.

The cloud computing market is susceptible to threats including data breaches, data loss and insecure application programming interfaces (APIs). The world cloud security market is expected to reach $8.9 billion by 2020, according to a report by Allied Market Research, with a CAGR Of 23.5 percent from 2015 to 2020.

Bluelock Helps Clients Secure Cloud-Based Environments and Reduce Auditing Stress With Its Latest Portal Enhancements

Grazed from BlueLock

Bluelock, provider of Disaster Recovery-as-a-Service (DRaaS) for complex environments and sensitive data, is expanding its IT security footprint with a new series of features to enhance clients' overall security posture. The first of these initiatives is the launch of a comprehensive dashboard that increases visibility and auditability across clients' security services.

As cybersecurity threats continue to grow in the digital age, Bluelock Portfolio provides clients visibility into the depth of security with which their applications and services are guarded, with the ability to easily add additional protection services. Clients can access a comprehensive, searchable log of those who have accessed and modified systems, as well as quickly request documents for response to auditors.

Armor Named to 'Watch List' in Momentum Partners' 'Cybersecurity Market Review'

Grazed from Armor

Armor, a leading provider of managed cloud security, has been named by Momentum Partners, an advisor and dealmaker in cybersecurity, to Momentum's Watch List: Q4 2016. Each quarter Momentum identifies ten companies after carefully weighing feedback from their industry network and considering a variety of growth and innovation factors.

"Last year was significant in terms of expanding our product set to encompass an offering that would help our customers fulfill their shared security obligation on public cloud platforms," said Jared Day, president, Armor. "In addition to our secure hosting offering, we now provide a comprehensive approach to protecting a variety of cloud and virtualized environments. Being included in this list reinforces Armor's strategic direction and we look forward to sustaining and accelerating this momentum even further as we enter 2017."

 

Zscaler Attains EU-U.S. Privacy Shield Certification

Grazed from Zscaler, Inc.

Zscaler, Inc., the leading cloud security company, announced today that effective November 23, 2016, it has become certified under the EU-U.S. Privacy Shield Certification Framework (the "Privacy Shield"). Zscaler customers can be assured that any personal data transferred from the EU to the United States will be protected by the safeguards set by the Privacy Shield and fully compliant under EU law.

Following the invalidation of the Safe Harbor Framework, the Privacy Shield was jointly designed and approved by the U.S. Department of Commerce and the European Commission in July 2016 to provide companies with a mechanism to comply with EU data protection requirements when transferring personal data from the EU to the United States in support of transatlantic commerce.

CloudPassage Announces Slack Integration for Halo

Grazed from CloudPassage

CloudPassage today announced the release of a Slack integration toolkit for Halo, the company’s award-winning automated security platform. The open source community-supported tool, called Don-Bot, lets people use Slack to communicate with Halo using natural language queries and get replies as if Halo were another Slack user. Thousands of teams large and small including many DevOps and IT security personnel have made Slack their communication medium of choice. Implementing Don-Bot helps them streamline workflows and work more efficiently.

“Slack’s speed and convenience help DevOps teams communicate; now Don-Bot will help them work more efficiently,” said Sami Laine, principal technologist, CloudPassage. “The Slack integration provides users easy access to the most essential functions of Halo.”