Cloud Security

RedLock Announces Support for New Security Command Center for Google Cloud Platform

Grazed from RedLock

RedLock, the Cloud Threat Defense company, today announced technology integration with Cloud Security Command Center for Google Cloud Platform, a security and data risk platform that helps enterprises gather data, identify threats and act on them before they lead to damage or loss. The RedLock integration with Cloud Security Command Center provides customers with centralized visibility into security and compliance risks, and greater context for alerting and actionable remediation in Google Cloud environments. As part of the integration, RedLock continuously monitors environments and sends results pertaining to resource misconfigurations, compliance violations, network security risks and anomalous user activities to Cloud Security Command Center.

The RedLock Cloud 360 platform connects to an organization's Google Cloud environment within minutes via APIs, and works in the background to ensure that DevOps can keep their focus where it belongs-on developing and deploying apps their customers need. Key features of the platform include:

Rackspace Extends Managed Security to Google Cloud Platform

Grazed from Rackspace

Rackspace announced today that Managed Security and Compliance Assistance for Google Cloud Platform (GCP) is now available for preview to new and existing customers that use Rackspace Managed Services for GCP. Companies using GCP can now benefit from the additional security capabilities provided by Rackspace Managed Security (RMS) to deliver enhanced breach detection and remediation, helping minimize the time cyber criminals spend in an environment and limit overall impact to the business.

With Rackspace Managed Security and Compliance Assistance for GCP, Rackspace is now a leading managed security services provider that offers services on all of the major public cloud platforms. In IDC's 2017 CloudView Survey of over 6,000 enterprise respondents, nearly 50 percent indicated concerns about security in the cloud, and about 40 percent cited superior security capabilities available from service providers as a major incentive to move to the cloud. With RMS, Rackspace security experts help customers with strategic planning for best practice multi-cloud security, tactical day-to-day security monitoring and threat analysis to deter, detect and respond to potential threats around the clock.

Limelight Networks Helps Companies Defend against Cyber Threats with New Bot Management Solution

Grazed from Limelight Networks

With cyberattacks increasing in scope, sophistication and frequency, Limelight Networks, Inc., a global leader in digital content delivery, today announced a new Advanced Bot Manager option for its Limelight Web Application Firewall (WAF) solution for protecting digital content.

Global internet traffic generated from bots is higher than human-generated traffic, according to Mary Meeker's annual internet trends report. And more than half of bots are malevolent and engaging in destructive activities such as seeking vulnerabilities on websites and committing fraud, stealing corporate and personal data, and launching DDoS attacks. At the same time, the internet depends on beneficial bots that power search engines and digital assistants.

CyberArk Acquires Vaultive to Advance Privileged Account Security for the Cloud

Grazed from CyberArk

CyberArk today announced the acquisition of certain assets of privately-held Vaultive, Inc., a cloud security provider. The deal closed today.

The CyberArk Privileged Account Security Solution is the industry's most comprehensive solution for protecting against privileged account exploitation anywhere - on-premises, in hybrid cloud environments and across DevOps workflows. Building upon the Vaultive technology, CyberArk will deliver greater visibility and control over privileged business users, and Software-as-a-Service (SaaS), Infrastructure-as-a-Service (IaaS) and Platform-as-a-Service (PaaS) administrators. By delivering a cloud-native and mobile experience, Vaultive will extend the CyberArk solution to these highly privileged users, which are frequent targets for cyber attacks.

"The Vaultive team brings innovative technology and advanced cloud industry experience to CyberArk. We look forward to incorporating the technology to add additional depth and proactive protection for enterprises facing an expanding attack surface in the cloud," said Udi Mokady, chairman and CEO, CyberArk. "Vaultive provides a strong building block to accelerate CyberArk's cloud security strategy, making CyberArk the only vendor able to extend privileged account security to administrators and privileged business users in cloud environments with this level of granularity and control."

Netwrix Survey: Tech and IT Companies Are the Driving Force of Cloud Security Investments

Grazed from Netwrix

Netwrix Corporation, provider of a visibility platform for user behavior analysis and risk mitigation in hybrid environments, today released the 2018 Netwrix Cloud Security: In-Depth Report.

The report supplements the 2018 Netwrix Cloud Security Report, unveiling survey findings specific to various industries and regions. Overall, 853 organizations shared their feedback for the survey, conducted in November 2017. All organizations are public or hybrid cloud users.

The key findings include:

Entrust Datacard Joins Cloud Security Alliance to Promote Security in Cloud Computing

Grazed from Entrust Datacard

Entrust Datacard, a leading provider of trusted identity and secure transaction technology solutions, today announced that it has joined the Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining and raising awareness of best practices to help ensure a secure cloud computing environment.

Entrust Datacard brings a deep expertise in trusted identities and transactions, with offerings in IoT, authentication, access, issuance, PKI and SSL. In the last year, the company has launched two cloud-based solutions. The IntelliTrust™ Authentication Service delivers high levels of authentication security in the cloud, and the ioTrust™ Security Solution establishes a secure by design connected ecosystem from device manufacturing through the entire IoT lifecycle.

Three Major Developments That Will Change Cloud Security In 2018

Written by Tim Mullahy

The cloud is constantly changing - both for better and for worse - as is its security landscape. Here are just a few of the big trends we'll see this year.

While some fear-mongers in the media might have you believe otherwise, the cloud is actually quite secure - in some cases, even moreso than traditional infrastructure. That isn't to say there aren't still challenges, mind you. The cloud's cybersecurity profile and threat landscape are constantly (and rapidly) changing.

New threats are constantly on the rise, with security experts constantly puzzling over new problems and challenges. Today, we're going to talk about just a few of the developments we can expect to see in 2018, for better and for worse.

Check Point Software Announces CloudGuard: Complete Gen V Cyber Protection for the Cloud

Grazed from Check Point Software

Check Point Software Technologies Ltd., a leading provider of cyber-security solutions globally, has today announced the CloudGuard product family to protect enterprises from Gen V cyber attacks on cloud applications and infrastructure.  Check Point is also introducing CloudGuard SaaS protecting enterprises against cyber attacks on SaaS applications. CloudGuard is a part of the Check Point Infinity architecture, built on industry proven and award winning technologies to provide comprehensive Gen V cyber protection for the cloud.

Enterprise cloud adoption is accelerating, enabling greater business agility and efficiencies through both deployment of hybrid cloud infrastructures like Amazon Web Services, Microsft Azure and  VMWare NSX; and migration to cloud-based applications such as Microsoft Office365, Google G-Suite, Salesforce, Servicenow, Slack, Box, Dropbox, Egnyte and more.  There is also an increase in multi vector attacks on cloud workloads and cloud applications including malware, as well as increasing incidences of account hijacking.  According to Check Point research, half of all breaches of enterprise SaaS applications are the result of account hijacks.

Cloud Security Alliance Quantum-Safe Security Awareness Survey Report

Grazed from Cloud Security Alliance

The Cloud Security Alliance (CSA), the world's leading organization dedicated to defining and raising awareness of best practices to help ensure a secure cloud computing environment, today released the Quantum-Safe Security Awareness Survey Report. Conducted by CSA's Quantum Safe Security Working Group (QSS WG) the survey looks to assess the overall awareness and understanding of quantum security risk and is part of the group's larger effort to develop a future framework for addressing quantum computing threats.

"Within the next 10 to 15 years we can expect to see a cryptographically useful quantum computer," said Bruno Huttner, CSA QSS WG co-chair and product manager for the Quantum-Safe division of ID Quantique. "With this considerable breakthrough will come a significant threat to the security of public key cryptography and the associated challenges of securing the global digital communications infrastructure. This report is an important step in identifying potential areas of concern and so we can begin to lay the groundwork for security solutions."


CloudPassage Halo Now Available on Amazon AWS Marketplace

Grazed from CloudPassage

CloudPassage, the leader in cloud and container workload security, today announced availability of their award-winning security automation platform Halo and the Server Secure cloud workload security solution on AWS Marketplace. Customers subscribing to Halo Server Secure on AWS Marketplace can now purchase it as part of the new AWS Enterprise Contract program. The Enterprise Contract program standardizes the contract between CloudPassage and the customer, helping them simplify their security budgeting and streamlining payment - CloudPassage Halo will simply appear as a line item on their AWS bill.

"Now AWS Marketplace customers can buy and deploy Halo Server Secure for high-performance cloud workload security in a highly predictable and cost effective way - via a single integrated AWS bill," said John Janetos, director, business development, CloudPassage. "As global enterprises rapidly embrace the cloud for mission-critical workloads and DevOps for application development, automated security that can operate at speed and scale is becoming a critical path. The AWS Marketplace helps eliminate protracted negotiations to make it easy for our customers to securely embrace the cloud."