Cloud Security

CloudPassage Releases Compliance Update to Halo Security Platform

Grazed from CloudPassage

CloudPassage announced today a new release of CloudPassage Halo, the company's award-winning automated cloud workload security platform. The update includes the addition of Server Account Monitoring (SAM) for Windows, which helps security teams achieve compliance and improved security posture by enabling them to monitor local server accounts on Windows servers.

"Maintaining compliance is essential to security analysts in regulated industries," said Amit Gupta, head of product management, CloudPassage. "With this new release, Halo now provides Windows users the most effective framework for monitoring server accounts in highly dynamic environments such as AWS, Azure, and private clouds."
 

Neustar Unlocks Cloud Security Channel for Select Partners

Grazed from Neustar, Inc.

Neustar, Inc., a trusted, neutral provider of real-time information services, today announced its Cloud Security Partner Program, a channel partnership program for a select group of strategic business partners and cloud service providers. The Neustar Cloud Security Partner Program enables its channel partners to capitalize on the growing adoption of cloud security solutions by delivering Neustar Security Solutions to its customers. Neustar Security Solutions offer flexible deployment methods for a variety of industry-leading cloud services, including DNS and DDoS mitigation.

According to IDC FutureScape: Worldwide IT Industry 2017 Predictions, "Many enterprises have shifted to a ‘cloud first' strategy over the past several years. Over the next several years - as two-thirds or more of IT spending shifts to the cloud - many organizations (and IT suppliers) will get steadily closer to ‘cloud only.'"

Why it’s still important to educate your employees around cloud security, VPNs, and Wi-Fi

Grazed from CloudTech. Author: James Bourne.

For those at the coalface of the security industry, the feeling of metaphorically banging one’s head against a brick wall, of continually educating, re-educating and correcting misinformation, mischievous or otherwise, will feel all too familiar. Take the comments from Home Secretary Amber Rudd around WhatsApp following the terror attack in Westminster.

Following the disclosure that the messaging service was used moments before the attacker struck, Rudd’s remarks – “there should be no place for terrorists to hide” – were met with a certain level of dismay in the industry. Graham Cluley, a long-standing independent security analyst, put it this way. “There is a danger that politicians will take ghastly incidents of terror as a platform to push forward their agenda of weakening encryption,” he wrote...

CloudPassage, Crowd Research Partners Report Reveals Need for Cloud Security Tools, Talent

Grazed from CloudPassage

CloudPassage, Crowd Research Partners and other cloud security vendors have released the 2017 Cloud Security Report, revealing the concerns of cyber security practitioners around cloud adoption and related security roadblocks. The report is based on the results of an online survey of over 350,000 cyber security professionals conducted by the Information Security Community on LinkedIn.

"This is feedback straight from the trenches -- illuminating the most pressing concerns of cloud adoption, management, and security," said David Appelbaum, chief marketing officer of CloudPassage. "Understanding where security practitioners see gaps in their legacy processes, practices, and tools helps us help them as they begin migrating more of their critical infrastructure to the cloud."

Key findings from the report include:

Imperva FlexProtect Simplifies Security for Hybrid Cloud Application Deployments

Grazed from Imperva, Inc.

Imperva, Inc., committed to protecting business-critical data and applications in the cloud and on-premises, today announced Imperva FlexProtect to give customers access to both Imperva SecureSphere and Imperva Incapsula within a single subscription agreement. By providing the flexibility to deploy Imperva web application firewall (WAF) solutions based on need, the subscription helps organizations simplify the protection of enterprise applications as they migrate their portfolios from on-premises data centers to the cloud.

The cloud market will accelerate in 2017 as enterprises seek to gain efficiencies as they scale compute resources to better serve customers, noted a Forrester Research blog.* As companies migrate applications from on-premises to the cloud, application security itself must become hybrid to support the combination of both on-premises and cloud appliances along with cloud services. However, within the enterprise application portfolio, there is usually uncertainty surrounding which applications will move and when, how they will be rearchitectured, and what happens if an app needs to be migrated back on-premises or moved to a different cloud. By giving customers the flexibility to use Incapsula and SecureSphere, regardless of where an application is initially deployed or migrated, Imperva FlexProtect directly supports dynamic hybrid cloud deployments and provides needed investment protection to manage this transition.

SecureWorks Cloud Guardian Solutions Simplify and Automate Cloud Security

Grazed from SecureWorks Corp.

SecureWorks Corp., a leading provider of intelligence-driven information security solutions, is bolstering its Cloud Guardian portfolio with a new service that automates the application of strong cloud security policies for organizations embracing digital transformation.

With the Security Configuration Management solution, clients can add another layer of cyber protection for their workloads on Amazon Web Services (AWS) by programmatically implementing and enforcing best practices for security. The service leverages not only the Center for Internet Security (CIS) benchmarks for AWS as a best practices library, but also a series of policies based on SecureWorks' AWS usage and incident response experience. Users can repair their cloud configurations with a single click, simplifying security and enabling organizations to focus on rapidly developing new applications and tools for their customers.

The addition of Security Configuration Management to the Cloud Guardian portfolio continues SecureWorks' efforts to address the challenges many enterprises and small businesses face as they continue their march towards hybrid IT. With the Cloud Guardian solutions, organizations can receive:

GigaTrust Launches Anyone-to-Anyone Content Security Cloud Services

Grazed from GigaTrust

GigaTrust, a leading provider of endpoint security and document in-use protection, today announced the availability of GigaCloud, a fully-managed Software as a Service (SaaS) offering for secure endpoint document protection. GigaCloud delivers secure email and document collaboration services anytime, anywhere, on virtually any device and any platform with real-time data analytics, reporting and administrative tools.

In today's mobile society, email and documents are the lifeblood of communication among employees, partners and customers. But, with the rapid increase in data breaches, the need for document security is paramount. According to the Ponemon Institute, the average worldwide cost of a breach is $158 per record - a 29 percent increase since 2013. Balancing the need for collaboration with enterprise security and control to protect information against breaches, non-compliance, hacks and intellectual property theft from any mobile or desktop device represents the most significant challenge for organizations of all sizes in all industries.

Organizations often struggle with piecing together disparate security solutions to protect their universe of documents, but there is a better way. GigaCloud is the first and only secure email and document protection, consumption and collaboration service backed by cloud infrastructure and a complete security ecosystem. The GigaCloud service delivers the encrypted email and document protection that organizations and government entities need; in the configuration that works best for them.

Key benefits of the GigaCloud service include:

eSentire Adds Cloud Visibility to Deliver Integrated Managed Detection and Response

Grazed from eSentire

eSentire, Inc.
, the largest pure-play Managed Detection and Response (MDR) provider, today announced the integration of cloud sources to its award-winning eSentire Managed Detection and Response service. With visibility across network, endpoint, and cloud, eSentire can now hunt for threats both on and off company premises, keeping organizations safe from constantly evolving cyber-attacks that technology alone cannot prevent.

Cyber-threats traditionally targeting on-premises resources - such as ransomware, identity theft, and data exfiltration - are a growing concern for cloud services. As organizations' adoption of the cloud continues to accelerate, effectively addressing these additional security challenges is a top concern. Mid-market companies are especially challenged. Cloud adoption is more prevalent in the mid-market due to its ease of deployment and low upfront costs. However, mid-market firms typically lack the expertise and resources required to effectively secure their cloud deployments.

Zscaler Arrives at RSA Conference 2017 with an Exciting Lineup and a Smashing Display

Grazed from Zscaler, Inc.

Zscaler, Inc., the leading cloud security company, today announced its presence at the upcoming RSA Conference 2017 in San Francisco at the Moscone Center, South Hall booth #1207. Through a series of in-booth displays, product demonstrations, and partner presentations, ZscalerTM will showcase its industry-recognized solutions architected from the ground up as part of a multi-tenant, distributed cloud security platform for the new, cloud-centric world of IT.

Also featured at the exhibit will be the Zscaler "smash booth," in which visitors are invited to take out their frustrations with the expensive, complex security appliances of the past. Many of the traditional appliance-based approaches to enterprise security have changed little over the years, even as users have become mobile and applications have moved to the cloud. With their outdated architectures, designed to protect a security perimeter that no longer exists, such appliances have become relics. For InfoSec professionals who -- in the face of software issues, firewall rules, CVEs, and more -- have ever wished for a sledgehammer, Zscaler is happy to offer them one, along with a pair of safety goggles.

All Zscaler activities at RSA, including its smash booth, continue to center on the company's "break free" message, encouraging visitors to break free from architectures of the past that are preventing them from fully embracing the agility, productivity, and efficiencies of cloud enablement.

New Intel Security Cloud Report Reveals IT Departments Find It Hard to Keep the Cloud Safe

Grazed from Intel Security

Intel Security today announced its second annual cloud security report, "Building Trust in a Cloudy Sky." The report outlines the current state of cloud adoption, the primary concerns with private and public cloud services, security implications, and the evolving impact of Shadow IT of the more than 2,000 IT professionals surveyed.

"The ‘Cloud First' strategy is now well and truly ensconced into the architecture of many organizations across the world," said Raj Samani, EMEA chief technology officer, Intel Security. "The desire to move quickly toward cloud computing appears to be on the agenda for most organizations. This year, the average time before respondents thought their IT budgets would be 80 percent cloud-based was 15 months, indicating that Cloud First for many companies is progressing and remains the objective."

Trust in the Cloud on the Rise