Cloud Security

Imperva FlexProtect Simplifies Security for Hybrid Cloud Application Deployments

Grazed from Imperva, Inc.

Imperva, Inc., committed to protecting business-critical data and applications in the cloud and on-premises, today announced Imperva FlexProtect to give customers access to both Imperva SecureSphere and Imperva Incapsula within a single subscription agreement. By providing the flexibility to deploy Imperva web application firewall (WAF) solutions based on need, the subscription helps organizations simplify the protection of enterprise applications as they migrate their portfolios from on-premises data centers to the cloud.

The cloud market will accelerate in 2017 as enterprises seek to gain efficiencies as they scale compute resources to better serve customers, noted a Forrester Research blog.* As companies migrate applications from on-premises to the cloud, application security itself must become hybrid to support the combination of both on-premises and cloud appliances along with cloud services. However, within the enterprise application portfolio, there is usually uncertainty surrounding which applications will move and when, how they will be rearchitectured, and what happens if an app needs to be migrated back on-premises or moved to a different cloud. By giving customers the flexibility to use Incapsula and SecureSphere, regardless of where an application is initially deployed or migrated, Imperva FlexProtect directly supports dynamic hybrid cloud deployments and provides needed investment protection to manage this transition.

SecureWorks Cloud Guardian Solutions Simplify and Automate Cloud Security

Grazed from SecureWorks Corp.

SecureWorks Corp., a leading provider of intelligence-driven information security solutions, is bolstering its Cloud Guardian portfolio with a new service that automates the application of strong cloud security policies for organizations embracing digital transformation.

With the Security Configuration Management solution, clients can add another layer of cyber protection for their workloads on Amazon Web Services (AWS) by programmatically implementing and enforcing best practices for security. The service leverages not only the Center for Internet Security (CIS) benchmarks for AWS as a best practices library, but also a series of policies based on SecureWorks' AWS usage and incident response experience. Users can repair their cloud configurations with a single click, simplifying security and enabling organizations to focus on rapidly developing new applications and tools for their customers.

The addition of Security Configuration Management to the Cloud Guardian portfolio continues SecureWorks' efforts to address the challenges many enterprises and small businesses face as they continue their march towards hybrid IT. With the Cloud Guardian solutions, organizations can receive:

GigaTrust Launches Anyone-to-Anyone Content Security Cloud Services

Grazed from GigaTrust

GigaTrust, a leading provider of endpoint security and document in-use protection, today announced the availability of GigaCloud, a fully-managed Software as a Service (SaaS) offering for secure endpoint document protection. GigaCloud delivers secure email and document collaboration services anytime, anywhere, on virtually any device and any platform with real-time data analytics, reporting and administrative tools.

In today's mobile society, email and documents are the lifeblood of communication among employees, partners and customers. But, with the rapid increase in data breaches, the need for document security is paramount. According to the Ponemon Institute, the average worldwide cost of a breach is $158 per record - a 29 percent increase since 2013. Balancing the need for collaboration with enterprise security and control to protect information against breaches, non-compliance, hacks and intellectual property theft from any mobile or desktop device represents the most significant challenge for organizations of all sizes in all industries.

Organizations often struggle with piecing together disparate security solutions to protect their universe of documents, but there is a better way. GigaCloud is the first and only secure email and document protection, consumption and collaboration service backed by cloud infrastructure and a complete security ecosystem. The GigaCloud service delivers the encrypted email and document protection that organizations and government entities need; in the configuration that works best for them.

Key benefits of the GigaCloud service include:

eSentire Adds Cloud Visibility to Deliver Integrated Managed Detection and Response

Grazed from eSentire

eSentire, Inc.
, the largest pure-play Managed Detection and Response (MDR) provider, today announced the integration of cloud sources to its award-winning eSentire Managed Detection and Response service. With visibility across network, endpoint, and cloud, eSentire can now hunt for threats both on and off company premises, keeping organizations safe from constantly evolving cyber-attacks that technology alone cannot prevent.

Cyber-threats traditionally targeting on-premises resources - such as ransomware, identity theft, and data exfiltration - are a growing concern for cloud services. As organizations' adoption of the cloud continues to accelerate, effectively addressing these additional security challenges is a top concern. Mid-market companies are especially challenged. Cloud adoption is more prevalent in the mid-market due to its ease of deployment and low upfront costs. However, mid-market firms typically lack the expertise and resources required to effectively secure their cloud deployments.

Zscaler Arrives at RSA Conference 2017 with an Exciting Lineup and a Smashing Display

Grazed from Zscaler, Inc.

Zscaler, Inc., the leading cloud security company, today announced its presence at the upcoming RSA Conference 2017 in San Francisco at the Moscone Center, South Hall booth #1207. Through a series of in-booth displays, product demonstrations, and partner presentations, ZscalerTM will showcase its industry-recognized solutions architected from the ground up as part of a multi-tenant, distributed cloud security platform for the new, cloud-centric world of IT.

Also featured at the exhibit will be the Zscaler "smash booth," in which visitors are invited to take out their frustrations with the expensive, complex security appliances of the past. Many of the traditional appliance-based approaches to enterprise security have changed little over the years, even as users have become mobile and applications have moved to the cloud. With their outdated architectures, designed to protect a security perimeter that no longer exists, such appliances have become relics. For InfoSec professionals who -- in the face of software issues, firewall rules, CVEs, and more -- have ever wished for a sledgehammer, Zscaler is happy to offer them one, along with a pair of safety goggles.

All Zscaler activities at RSA, including its smash booth, continue to center on the company's "break free" message, encouraging visitors to break free from architectures of the past that are preventing them from fully embracing the agility, productivity, and efficiencies of cloud enablement.

New Intel Security Cloud Report Reveals IT Departments Find It Hard to Keep the Cloud Safe

Grazed from Intel Security

Intel Security today announced its second annual cloud security report, "Building Trust in a Cloudy Sky." The report outlines the current state of cloud adoption, the primary concerns with private and public cloud services, security implications, and the evolving impact of Shadow IT of the more than 2,000 IT professionals surveyed.

"The ‘Cloud First' strategy is now well and truly ensconced into the architecture of many organizations across the world," said Raj Samani, EMEA chief technology officer, Intel Security. "The desire to move quickly toward cloud computing appears to be on the agenda for most organizations. This year, the average time before respondents thought their IT budgets would be 80 percent cloud-based was 15 months, indicating that Cloud First for many companies is progressing and remains the objective."

Trust in the Cloud on the Rise

Acalvio to Deliver Industry's First Distributed Deception Solution on Microsoft Azure Cloud Platform

Grazed from Acalvio

Acalvio Technologies, an innovator in Advanced Threat Defense, today announced the industry's first Distributed Deception solution to be delivered from Microsoft's Azure platform. Acalvio will collaborate with Microsoft to create standardized models for deployment and response; and enable Managed Service Providers (MSPs) to deliver customized solutions for their respective markets.

"Business leaders are moving quickly to leverage the cloud to drive digital transformation while reducing security risks," said Andrew Conway, General Manager of Product Marketing for Microsoft Enterprise Mobility & Security. "We are pleased to work with Acalvio as they build their innovative cloud-based Advanced Threat Defense on the Microsoft Azure cloud platform to deliver security capabilities that give companies greater confidence in their security posture."

 

CyberArk Announces Support for Amazon Inspector for Enhanced Cloud Security

Grazed from CyberArk

CyberArk, the company that protects organizations from cyber attacks that have made their way inside the network perimeter, today announced expanded privileged account security solutions for Amazon Web Services (AWS) to help customers better protect against, detect and respond to advanced threats.

Many organizations already run at least part of their operations in the cloud, while others are seeking to accelerate their migration strategies - with industry research predicting that up to 80 percent of workloads will run on a cloud architecture by 2024. Migrating from the data center to the cloud introduces different cyber security considerations, particularly associated with securing privileged user and application credentials used to manage consoles, enable applications to connect with sensitive assets, and dynamically scale elastic production environments.

For enterprises migrating to the cloud, CyberArk helps customers seamlessly extend and consistently enforce the security policies they have in place today on their on-premises infrastructure into their emerging cloud and DevOps environments.

Prioritize Risk Reduction in AWS Environments

Qualys Expands Global Cloud Platform with Three New Secure Operations Centers (SOCs)

Grazed from Qualys

Qualys, Inc., a pioneer and leading provider of cloud-based security and compliance solutions, today announced the opening of three new Secure Operations Centers (SOCs) in the European Union (EU), India and North America. The addition of these new locations in Amsterdam, Pune, India and San Jose, Calif. marks a new milestone for Qualys' expanding global operations, which now includes six locations on three continents.

Organizations migrating services to the cloud must comply with new and changing global and regional regulations that impact where data resides. Qualys' expansion will provide its global base of customers worldwide with greater access to a broad suite of cloud-based security and compliance solutions, and enable customers to choose which region best suits their data governance needs. Each of these new SOCs adds the capacity to scan millions of IP addresses at once, significantly increasing Qualys' capabilities to support the largest organizations.

"This expansion of the Qualys Cloud Platform helps us better serve organizations across the globe and particularly within the EU and across Asia to compete in the new era of business, and increases our capacity to serve our North American customers," said Philippe Courtot, chairman and CEO, Qualys, Inc.

ServiceNow Resolves Real Security Threats Fast

Grazed from ServiceNow

ServiceNow, the enterprise cloud company, today announced integrations from leading cybersecurity companies into ServiceNow Security Operations solution. With ServiceNow customers can prioritize threats and use a structured response engine to resolve real security threats fast. Now security analysts can easily enrich threat information, map those threats to the underlying business service at risk, and easily collaborate with IT to automatically resolve them. This replaces the manual, slow and ineffective back-and-forth resolution process of the past.

While enterprises have invested heavily in protection and detection tools, security response is often left unaddressed. Determining whether an alert constitutes an actual threat can take hours. Security analysts use email, phone calls and spreadsheets to coordinate remediation with IT teams. These manual processes are error-prone and unwieldy, leading to lengthy breach containment times of 70 days on average, according to the Ponemon Institute.

ServiceNow Security Operations replaces the manual work patterns of the past with intelligent workflows of the future and just added several new automation integrations from leading security vendors. In as little as 20 seconds, Security Operations automatically enriches each security incident with threat intelligence, including information from potentially affected endpoints. This allows security analysts to spend less time on researching problems and to get to resolution faster. In addition, ServiceNow Security Operations eliminates the need for manual data collection by automatically generating a post-incident report for later analysis, reporting or audit.