NIST CSF 2.0 Governance: SeeMetrics Launches Cybersecurity Governance Boards
New Patented Traffic-Shaping Technology From Cobalt Iron Dynamically Adjusts Network Throughput Based on Events
SeeMetrics Launches Cybersecurity Governance Boards
Black Box to Showcase Cutting-Edge Connectivity Solutions at BICSI Winter Conference & Exhibition, Jan. 28-Feb. 1
Black Box at ISE 2024: Industry-Leading KVM-Over-IP Solutions for Control Room Connectivity and Collaboration
CIOReview Adds Cobalt Iron to Its List of Top 10 Most Promising Data Security Solution Providers 2023
Trend Micro Achieves AWS Built-In Competency to Simplify and Accelerate Cloud Success
Trend Micro First to Integrate Cloud Risk Management and XDR Across Customers’ Entire Attack Surface
Cobalt Iron Secures Patent on Applying Machine Learning to Cyber Inspection
How to avoid being a victim of professional social network scams
-
Trend Micro Named a Leader in Endpoint Security
Trend Micro (TYO: 4704; TSE: 4704) today announced its recognition by Forrester as a Leader in endpoint security. The independent market analysis states that "Trend Micro is the veteran that leads with a full-featured endpoint security offering...Trend Micro has continually worked to ensure features function in both environments. This has helped it maintain high customer loyalty for enterprises of all levels on a global basis." To read "The Forrester Wave™: Endpoint Security, Q4 2023" in full, please visit: https://www.trendmicro.com/explore/forrester-wave-xdr Kevin Simzer, COO at Trend: "Do you have a handle on your organization's enterprise attack surface, including endpoints and every asset beyond that? In order to reduce risk, you have to be able to see it. Our platform provides the broadest visibility in the industry, and endpoint is a critical element of that strength." Trend Micro received a maximum possible score of 5.0 in 12 of Forrester's evaluation criteria: exploit prevention, malware prevention, identity protection, network threat detection, application control, mobile device security, endpoint performance impact, innovation, roadmap, adoption, revenue and number of customers. Forrester's report notes that "Trend Micro has benefitted from consistent protection of endpoints," and that Trend "maintains a high level of investment in innovation," and has a roadmap that continues to "ensure endpoint protection is foundational to all its enterprise security offerings." Other notes from the report include: "Attack prevention engines have been a staple of customers who want an endpoint security solution 'that just works'" "Trend Micro is a good fit for customers who want a consistently strong endpoint protection platform that can support evolving to XDR" Trend Vision One™ – Endpoint Security offers threat protection, detection and response across endpoints, servers and cloud workloads—for on-premises, hybrid and multi-cloud environments. A comprehensive range of threat detection capabilities includes high-fidelity machine learning at pre-execution and runtime, behavioral analysis, app control, ransomware rollback and much more. Integrated EDR delivers prioritized, actionable alerting for accelerated incident response alongside threat hunting. Virtual patching leverages Zero Day Initiative intelligence to protect endpoints from unknown threats, and cloud-native security protects and monitors for suspicious activity across containers and workloads.
-
Trend Micro Container Security Evolution Saves SOC Teams Up to Two Weeks of Time Per Incident
Trend Micro (TYO: 4704; TSE: 4704), a global cybersecurity leader, today announced the next evolution of its cloud container security capabilities for its flagship platform. The latest addition to the platform delivers end-to-end protection, detection, and response to drive secure digital transformation. The new capabilities simplify investigations by enabling analysts to prioritize incidents faster and with greater accuracy—reducing the time spent on each container security incident by up to two weeks.* "Nothing is more important than reducing business risks, which we do through increasing the efficiency of our cyber threat detection capabilities" said Fernando Gadelha, head of cybersecurity at ZUP. "Honestly, containers are only a percentage of our efforts, but it is critical to be able to streamline any operations and manage them alongside our broader security efforts – Trend Micro makes that easiest. Big picture, that translates to less time spent on training and moving between screens, and more time and resources driving business transformation." Kevin Simzer, chief operating officer at Trend: "We see modern enterprises increasingly turning to containers to accelerate and scale development alongside evolving market demands—but these advances can lead to missing cloud visibility and new security vulnerabilities. Our platform empowers teams to protect and respond to threats in cloud container environments, using the exact same console and user interface they rely on for managing risks across the rest of the attack surface." The Trend Vision OneTM platform is designed to deliver comprehensive, cross-layer capabilities that eliminate the cost, security gaps, and administrative overhead associated with point solutions. Trend's latest innovation in container security brings unparalleled visibility to the security operations center (SOC) to accelerate threat detection, response, and containment. Specialized cloud security teams will benefit from a tailored approach that protects containerized applications and enables organizations to leverage the full potential of cloud environments securely. According to independent analyst firm Gartner, "Integrating previously isolated security capabilities simplifies security workflows and reduces the complexity associated with managing multiple tools, thus providing better visibility into the security landscape. A centralized platform allows for better coordination and communication between security and development teams, fostering collaboration and enabling incidents to be handled more efficiently."** Trend Vision One™ – Container Security benefits include: Consolidated security: Centralizing container security within a unified platform streamlines security management while delivering unprecedented visibility through deep, correlated telemetry across more native security layers—including endpoint, server, workload, identity, email, and network. This consolidated approach enables security teams to identify threats earlier in the attack lifecycle leading to rapid and effective containment. A platform approach ensures security policies are consistently monitored and applied across the organization. Optimized operational efficiency: Drastically reduces the time spent by SOC teams on container security operations, saving up to two weeks per incident. This efficiency improvement can free up resources for other critical tasks, enabling organizations to operate in the cloud with less risk. Consistency across all cloud environments: Ensures seamless security management is in place across both Kubernetes clusters (multi-cloud and on-premises) and Amazon ECS by simplifying the management of security policies and minimizing the risk of potential security vulnerabilities. Enhanced security: Proactively mitigates risk by searching for bugs in Amazon ECS and Kubernetes. Supports end-to-end protection that secures containers from build to termination, ensuring seamless security across the container lifecycle. To find out more about Trend Vision One – Container Security, please visit: https://www.trendmicro.com/en_hk/business/products/one-platform.html *Projection based upon beta testing and time quantifications. **Gartner, 5 Ways CNAPP Will Improve Your Cloud Security, Fred Sotolongo, 21 September 2023 Gartner is a registered trademark and service mark, Peer Insights and Magic Quadrant are registered trademarks, of Gartner, Inc. and/or its affiliates in the U.S. and internationally and are used herein with permission. All rights reserved. Gartner Peer Insights content consists of the opinions of individual end users based on their own experiences with the vendors listed on the platform, should not be construed as statements of fact, nor do they represent the views of Gartner or its affiliates. Gartner does not endorse any vendor, product or service depicted in this content nor makes any warranties, expressed or implied, with respect to this content, about its accuracy or completeness, including any warranties of merchantability or fitness for a particular purpose. Gartner does not endorse any vendor, product or service depicted in its research publications and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.
-
OPSWAT Unveils CIP Lab at GovWare in Singapore, Showcasing Cutting-Edge IT/OT Cybersecurity Solutions
OPSWAT, a global leader in critical infrastructure protection (CIP) cybersecurity solutions, is pleased to announce the debut of its highly-anticipated Critical Infrastructure Protection (CIP) lab at the prestigious GovWare event in Singapore. The event will take place at the Sands Expo and Convention Centre from 17th to 19th October. As a pioneering cybersecurity firm, OPSWAT is committed to safeguarding the world's critical infrastructure against emerging cyber threats. GovWare serves as the perfect platform for OPSWAT to showcase its comprehensive IT/OT cybersecurity solutions that are designed to fortify critical infrastructure against potential vulnerabilities and attacks. "We are excited to participate in GovWare and unveil our state-of-the-art CIP lab to the cybersecurity community." said Malcolm Rowe, VP APAC at OPSWAT. "This marks a significant milestone in our mission to protect the world's critical infrastructure, and GovWare provides an exceptional opportunity for us to demonstrate the effectiveness of our cutting-edge solutions." At GovWare, OPSWAT's booth (P28) will be strategically located to welcome visitors seeking to gain insights into the latest advancements in cybersecurity technologies. Industry professionals and government representatives are invited to visit the OPSWAT booth to experience hands-on demonstrations of the CIP lab. This interactive experience will showcase OPSWAT's ability to secure and defend critical infrastructures from potential cyber threats and ensure operational continuity. The OPSWAT CIP lab is the embodiment of OPSWAT's dedication to innovation and excellence in cybersecurity. It enables users to experience firsthand how its solutions integrate seamlessly into both IT and OT environments, providing comprehensive protection without compromising operational efficiency. In partnership with ABPSecurite, a CIP lab will also be located at its HQ in Singapore. This serves as a strategic location for OPSWAT's partners and customers in Southeast Asia for in depth demonstrations of our latest solutions and technology, as well as further solidifying the partnership with ABPSecurite as our regional distributor for the Southeast Asia region. "The new physical CIP lab demonstration environment at ABPSecurite's office will provide an excellent platform to showcase our latest solutions and technologies, as well as further strengthen our commitment to invest in the region to support both our partners and customers." stated Jeremy Giam, Regional Manager at OPSWAT. Join OPSWAT at GovWare in Singapore and witness the future of critical infrastructure protection through immersive demonstrations of our groundbreaking IT/OT cybersecurity solutions. Be at the forefront of securing the world's most vital assets and learn how OPSWAT can be your trusted partner in the battle against cyber threats. For more information about OPSWAT and how to schedule a demo at the CIP lab at GovWare or ABPSecurite, visit our website at www.opswat.com or stop by our booth at GovWare (P28).
-
SolarWinds Commemorates Cybersecurity Awareness Month by Highlighting Software Industry’s Secure by Design Progress
SolarWinds (NYSE:SWI), a leading provider of simple, powerful, secure observability and IT management software, commemorates Cybersecurity Awareness Month by highlighting the software industry's progress toward becoming more Secure By Design. Informed by years of experience from industry-leading cybersecurity experts, the SolarWinds Secure by Design initiative is a gold-plated cybersecurity approach to software build systems and processes that set a new standard in software supply chain security. SolarWinds developed Secure By Design to address the evolving threat of highly sophisticated and unforeseeable cyberattacks, including those by advanced nation-state threat actors. As a guiding principle for software security and cyber resiliency, Secure By Design provides an effective and novel defense for thwarting advanced supply chain cyber threats. With a focus on creating more secure environments, the SolarWinds Secure By Design guiding principles were designed to make both the company and the software industry at large safer. "Security is an ongoing journey with no finish line but, as we reflect on the past year, it's clear we've made great progress on the journey towards a Secure by Design industry," said Sudhakar Ramakrishna, CEO and President of SolarWinds. "The increasing frequency and sophistication of cyber threats demand a collective response from the cybersecurity community. It is our shared responsibility to come together, collaborate, and innovate to build a more secure future for all." The past year has seen significant advancement of the adoption and implementation of a more Secure By Design approach, including new community approaches to support cyber resiliency, more secure software build systems, improved information sharing about threats across the industry, and a stronger cyber workforce. Building Out a Community Approach to Support Cyber Resiliency This year marks the 20th annual Cybersecurity Awareness Month, in which the President of the United States and Congress dedicate time to work together with the public and private sectors to raise awareness about the importance of cybersecurity. SolarWinds has continually called for transparent and open information sharing across the industry and more robust public-private partnerships to combat increasingly sophisticated nation-state cyberattacks. SolarWinds recently hosted a panel discussion in Washington, D.C., highlighting several key ways to help the industry stay secure. Ramakrishna was joined by Congressman Darrell Issa (R-CA), Congressman Raja Krishnamoorthi (D-IL), and CISA Executive Assistant Director for Cybersecurity Eric Goldstein for a conversation on why stronger public-private partnerships are needed to enhance the security of the nation's cyberinfrastructure. Additionally, SolarWinds will be in attendance at GovWare 2023, joined by more than ten thousand other policymakers, tech innovators, and end-users. This year's theme, "Fostering Trust Through Collaboration in the New Digital Reality," aims to address the significant link between digital trust and achieving success in today's cyberspace. Developing A Resilient Build Environment with The Next-Generation Build System The SolarWinds Next-Generation Build System, a key component of the company's Secure By Design approach, leverages a unique parallel build process where software is developed in multiple secure, duplicate, and ephemeral environments. First unveiled by SolarWinds last year, the Next-Generation Build System was developed to make supply chain attacks more difficult to execute by prioritizing cybersecurity throughout the entire lifecycle management process. As SolarWinds recently announced, the Next-Generation Build System meets or exceeds the Secure Software Development Framework (SSDF) updated last year by The National Institute of Standards and Technology (NIST®). The build system's alignment with SSDF and CISA's Enduring Security Framework has been a continued driver encouraging more organizations to become Secure By Design. The SolarWinds Next-Generation Build System has received multiple industry recognitions this year, including the CSO50 Award for IT Infrastructure Monitoring and Management, the BIG Innovation Fortress Cyber Security Award and recognition from the Cloud Security Awards. Additionally, SolarWinds Chief Information Security Officer and VP of Security Tim Brown, who has spearheaded the ongoing development of the Next-Generation Build System, was named CISO of the Year by the Globee® Cybersecurity Awards. Improving Security Through a Stronger Cyber Workforce This year, the industry has prioritized growing the cybersecurity workforce, a critical mission as more than 3.4 million positions in the field remain unfilled. The White House recently unveiled a first-of-its-kind National Cyber Workforce and Education Strategy to address both immediate and long-term cyber workforce needs. Alongside this announcement, the U.S. National Science Foundation CyberCorps® Scholarship for Service program will provide more than $24 million over the next four years to support the development of a stronger cybersecurity workforce. SolarWinds has long advocated additional resources for skill and vocational training. The company has taken on a leadership role in this regard, encouraging software companies to allocate the equivalent of one trained, full-time employee to support CISA and foster information-sharing between companies and government agencies. This collaboration across sectors is necessary to create unified best practices and develop shared threat intelligence. For more information on the SolarWinds Secure By Design initiative, please visit: https://www.solarwinds.com/trust-center
-
Trend Micro Recognized as a 2023 Gartner® Peer Insights™ Customers’ Choice for Endpoint Protection
Trend Micro (TYO: 4704; TSE: 4704), a global cybersecurity leader, today announced that it has been recognized as Customers' Choice in the 2023 Gartner Voice of the Customer for Endpoint Protection Platforms by customers on Gartner Peer Insights™. To read more about the Gartner® report, Voice of the Customer for Endpoint Protection Platforms, please visit: https://www.trendmicro.com/explore/gartner-voc-endpoint "The Trend Vision One platform takes modern endpoint protection to a new level by enabling customers to manage policies and bridge the gap between threat protection and cyber risk management across endpoints, servers and cloud workloads all from a single location," said Shannon Murphy, Global Security and Risk Strategist at Trend. "We're delighted this approach is resonating with the market. There's no more important validation for us than from the cybersecurity community through the voices of our customers." The Gartner® Peer Insights™ report for Endpoint Protection Platforms (EPPs) is based on 4,210 published reviews over an 18-month period ending 30 June 2023. To be recognized as a Customers' Choice, vendors must meet or exceed both the average Overall Experience and the average User Interest and Adoption. Of 275 customer reviews for Trend Micro, the vast majority (62%) were five-star, with over a third more (35%) four-star reviews. Trend received an overall rating of 4.6 from its customers and a 93% willingness to recommend for its EPP offering as of June 2023. Trend Vision One™ – Endpoint Security goes beyond typical EPP by offering protection, detection and response across hybrid environments: physical servers, virtual machines, cloud and containers. It integrates EDR/XDR across endpoints, datacenters and cloud workloads to drive enhanced detection and response. And it features comprehensive multi-layered capabilities including anti-malware and ransomware protection, device control, host-based intrusion prevention, application control, file integrity monitoring, log inspection, machine learning/AI and more. In addition to this recognition, Trend Micro has been named a Leader in the Gartner Magic Quadrant™ for Endpoint Protection Platform (EPP) report 17 times since the report was published for the first time in 2002. Trend has also been ranked #1 for Cloud Workload Security Market Share (IDC) for five years in a row. Gartner, Magic Quadrant for Endpoint Protection Platforms, Peter Firstbrook, Chris Silva, 31 December 2022 The report Magic Quadrant for Endpoint Protection Platforms was published as Magic Quadrant for Enterprise Antivirus in 2005-06, as Magic Quadrant for Enterprise Antivirus, 1H03 in 2003 and as Enterprise Antivirus 2Q02 MQ: Room for Improvement in 2002. Gartner is a registered trademark and service mark, Peer Insights and Magic Quadrant are registered trademarks, of Gartner, Inc. and/or its affiliates in the U.S. and internationally and are used herein with permission. All rights reserved. Gartner Peer Insights content consists of the opinions of individual end users based on their own experiences with the vendors listed on the platform, should not be construed as statements of fact, nor do they represent the views of Gartner or its affiliates. Gartner does not endorse any vendor, product or service depicted in this content nor makes any warranties, expressed or implied, with respect to this content, about its accuracy or completeness, including any warranties of merchantability or fitness for a particular purpose. Gartner does not endorse any vendor, product or service depicted in its research publications and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose
-
New Report Highlights Key Elements of Cloud Workload Security Landscape
Trend Micro (TYO: 4704; TSE: 4704), a global cybersecurity leader, today revealed its citation by analyst Forrester in a new report which will help IT buyers better understand the landscape of cloud workload security offerings. To access a full copy of the Forrester report, please visit: https://www.forrester.com/report/the-cloud-workload-security-landscape-q3-2023/RES179850 Forrester's report, The Cloud Workload Security Landscape, Q3 2023, lists Trend Micro as one of six vendors that generate $250m or more in annual revenue from their cloud workload security (CWS) portfolio. The report also covers extended use cases that include three areas of focus for Trend: agent-based cloud workload protection; container protection; and cloud security posture management (CSPM). Trend has decades of experience innovating in all three product areas, and will be showcasing further advancements at AWS re:Invent in November. Container and cloud workload protection will be enhanced, unified and integrated with XDR to deliver centralized detection and response for the cloud (CDR). Trend will also look to integrate its CSPM and container runtime vulnerability capabilities into a major new offering to help customers better manage risk across their cloud attack surface. These enhancements are part of the Trend Vision One™ strategy designed to deliver visibility, control and risk management across the entire IT and OT environment from a single platform. "Trend Micro pioneered cloud security as we know it," said Kevin Simzer, COO at Trend. "We remain focused on innovating for our customers, whatever stage of the cloud journey they're at. Our upcoming announcements at AWS re:Invent will deliver even more value as we accelerate our platform-based security strategy to help global organizations improve attack surface risk management."
-
Cobalt Iron Advances Cyber Recovery With Isolated Vault Services
Cobalt Iron Inc., a leading provider of SaaS-based enterprise data protection, today announced Isolated Vault Services™, a new enhancement available in the Cobalt Iron Compass® enterprise SaaS backup platform. In a simple and unique way, Isolated Vault Services makes it possible to transition normal backup operations into isolated vault recovery services. It is intended for companies needing to recover data in an isolated vault or clean-room environment, typically as part of a declared disaster or cyber recovery operation. The simplicity of switching normal backup operations to isolated vault recovery services is something not experienced with other backup products. With the ubiquity of cyber attacks, companies must continually improve their data resiliency and recovery posture. A critical part of that task is ensuring data is recoverable and then validating the integrity of recovered data after a disaster or cyber event. Data administrators need clean copies of data that they know have been and are isolated from access by bad actors. To that end, they often establish an isolated clean room for purposes of recovering systems, applications, and data. Transitioning normal backup operations into isolated recovery services is challenging because backup infrastructures and operations are based on accessibility and connectivity that are not allowed in a vaulted recovery zone. In addition, typical backup environments have many vulnerabilities and are the target of cyber attacks themselves, so there must be some level of confidence that backup data and operations are sanitized before introducing them into a clean-room recovery environment. As a result, organizations struggle with establishing safe, isolated recovery zones, where production operations can be restored from current backups that are accessible and validated. Cobalt Iron Compass is unique in that all backup data ingested into the platform is vaulted and immutable by design, with no access available to the backup environment. Compass Isolated Vault Services extends these Zero Access™ architectural advantages by allowing administrators to toggle Compass Accelerators — the physical, on-premises devices that deliver the Compass SaaS platform — from normal backup operations into an isolated recovery services mode. At that point, customers can use the Compass Accelerators to restore business data and services inside of an isolated vault zone, completely disconnected from the internet. This vault service functionality is available through the local Compass Accelerator menu services or through the Compass REST API for orchestrated recovery. Isolated Vault Services: (1) Facilitates clean room system, application, and data recoveries. (2) Allows any Compass Accelerator to operate in a completely network-isolated vault mode for safe recovery from cyber events and disasters. (3) Enables automated recovery orchestration via Compass Isolated Vault Services REST API. >Stop, start, restore, and query data protection server instances. >Control, select, and connect Accelerator-protected data storage. >Perform Accelerator-protected client data operations, such as list clients, unlock clients, and change client passwords. Isolated Vault Services frees data administrators from cumbersome isolated recovery processes, such as establishing a recovery infrastructure in the isolated vault zone, manually reconfiguring backup and storage, manually recovering backup data and operations into an isolated vault environment, and validating backup data to ensure it was not infected prior to being made available in the isolated vault zone. Isolated Vault Services is available today at no additional cost to Compass users. "Disasters and cyber attacks can wreak havoc on even the most prepared businesses. We see organizations struggle with restoring data and services in safe, isolated recovery environments," said Richard Spurlock, Cobalt Iron founder and CEO. "Compass Isolated Vault Services transforms the complexity of vaulted recovery zone services into simple and dependable recovery activities for systems, applications, and enterprise data following disaster or cyber events."
-
Arlo Unveils New Essential Cameras and Doorbell To Provide Affordable Smart Home Security that Protects Your Everything
Arlo Technologies, Inc. (NYSE: ARLO), a leading smart home security brand, recently announced its second generation Essential cameras and doorbell that deliver smart home protection at incredible value in the USA. Today, they are available in Australia and New Zealand. The lineup includes a new standard Essential Outdoor Camera, as well as a new Essential Indoor Camera with an automated privacy shield. A new Video Doorbell with head-to-toe 180-degree field of view is also available. "Arlo prides itself in building trusted, lifelong customer relationships with innovative, award-winning security solutions that deliver an exceptional user experience," said Brad Little, Vice President & Managing Director – Arlo APAC. "Our new second generation Essential cameras and doorbell provide the best combination of technology and value Arlo has ever offered, adding to Arlo's wide range of high-quality products and industry-leading AI software to ensure you can protect your everything." The all-new second generation Essential Cameras and Doorbell offer several new advancements, providing customers with powerful smart home security solutions at affordable price points. Additionally, each device features USB-C connections for easy re-charging, and a new quick set-up process offering a faster, more streamlined experience via Bluetooth. Each of Arlo's second-generation Essential Cameras and Doorbell are available in 2K resolution that delivers two times more clarity than HD, allowing consumers great clarity at an affordable price. The new Arlo Essential Cameras and Doorbell include: Essential Outdoor Camera (2nd Generation) Check-in and take action quickly when motion is detected around your home with the Essential Outdoor Camera, featuring a 130-degree viewing angle, colour night vision, noise-cancelling audio and an integrated spotlight to rid any unwanted guests. 130-Degree Viewing Angle: Keep an eye on what matters most with a wide field of view Integrated Spotlight: Shine a light on your yard to ward off unwelcome visitors See More at Night: See videos in colour rather than traditional black and white for better identification Noise-Cancelling Audio: Hear and speak to visitors with clear, two-way audio Integrated Siren: Trigger your siren automatically, or manually from the Arlo app Weather Resistant: Designed to withstand heat, cold, rain, or sun Easy Setup and Install: Easy DIY installation with wire-free setup and mount MSRP of US$99.99 for a single camera kit. Essential Indoor Camera (2nd Generation) Stay connected to what's happening inside your home and keep your private moments yours with Arlo's Essential Indoor Camera featuring an automated privacy shield. Check-in on your home, family or pets anytime with two-way talk and night vision. Automated Privacy Shield: Keep moments private at any time by closing the shield directly through the Arlo Secure App 130-Degree Viewing Angle: Keep an eye on what matters most with a wide field of view Noise-Cancelling Audio with Two-Way Talk: Hear and speak to visitors with clear, two-way audio See at Night: View critical details even without a light with night vision Integrated Siren: Trigger your siren automatically, or manually from the Arlo app Easy Setup and Install: Plug in and connect directly to Wi-Fi and install anywhere MSRP of US$79.99 for a single camera kit. Video Doorbell (2nd Generation) See more at your front door and greet guests from anywhere right from your phone with the Arlo Video Doorbell, featuring two-way audio, night vision, and an integrated siren. Video Call: Answer the doorbell directly from your phone so you never miss a visitor Visitor Messaging: Have your guests leave a voice message if you're unable to answer the door, while listening remotely at your convenience Get the Full Picture: See a person from head to toe and packages on the ground with 180-degree field of view See at Night: View critical details even without a light with night vision Integrated Siren: Trigger your siren automatically, or manually from the Arlo app Weather Resistant: Certified to withstand heat, cold, rain, or sun MSRP of US$129.99. The second-generation Essential cameras and doorbell are fully compatible with Arlo Secure, Arlo's mobile app that allows users to connect and protect what matters most. An easy-to-use interface manages all connected Arlo products, letting users monitor their entire home and take immediate action right from their phone lock screen for ultimate peace of mind. With a paid Arlo Secure plan, users can take their security to the next level with advanced features including 30 days of rolling video history, customisable Smart Activity Zones for alerts that matter most, as well as time-saving automations that can be programmed to trigger events such as geofencing, mode changes, schedules, alarms and more. Accessories for the Arlo second generation Essential Cameras and Doorbell, including a Solar Panel, Outdoor Charging Cable, and Protective Camera Covers, will also become available. The Arlo second generation Essential Cameras and Doorbells are available now on Arlo.com and leading retailers nationwide. For more information on Arlo's full range of smart home security products and services, visit www.Arlo.com
-
Black Box to Showcase AI-Enhanced Solutions for Unified Customer Experience at GITEX GLOBAL
At GITEX GLOBAL, Oct. 16-20 at the Dubai World Trade Center (DWTC), Black Box® (booth H8-30) will showcase customer experience (CX) solutions and consulting services that leverage Conversational AI, Generative AI, and other cutting-edge tools to help businesses dramatically improve customer experiences, reduce costs and ensure optimal ROI from their CX technology investments. With a focus on how AI can improve efficiency and improve employee and customer satisfaction, Black Box will feature world-class services and solutions that help organizations deliver exceptional experiences with consistency across the customer journey. Black Box will partner onsite with Cognigy, which is revolutionizing the customer service industry by providing the most cutting-edge AI workforce on the market, providing solutions for the ultimate customer experience, whether it's an existing or new platform. "The quality of the customer experience can be a key differentiator for businesses today, and when deployed strategically within a larger CX solution, tools such as Conversational AI can deliver a valuable competitive edge," said N Jayantha Prabhu, business head - India, SAARC and MEA at Black Box. "We look forward to showcasing our best-in-class CX solutions and services at GITEX GLOBAL, where we'll offer insights into the value of AI tools and provide guidance with regard to overall CX transformation: choosing the right platforms, applications and business partner to deliver those integrations." Exhibiting within the AI Everything show at GITEX GLOBAL, Black Box will highlight CX transformation solutions and services that empower businesses to improve the experiences they provide to customers while reducing the costs of those services. Black Box experts will be on hand at GITEX GLOBAL to discuss in detail how AI-based tools can be implemented within larger CX solutions and services to help enable exceptional customer experiences. The company will also show how tools and technologies such as chatbots and voicebots, empowered by Conversational AI and Generative AI, can facilitate these goals — accelerating response times, enhancing personalization, reducing wait times, prioritizing issues, answering common questions, routing calls automatically, verifying or confirming customer-specific information, etc. — to help businesses optimize both internal processes and CX. More information about GITEX GLOBAL is available at www.gitex.com Further information about Black Box and the company's products and services is available at www.blackbox.com
-
SeeMetrics Launches *Customizable* Cybersecurity Performance Boards
SeeMetrics, the pioneering Cybersecurity Performance Management (CPM) platform reshaping the landscape of how security leaders measure, track, and improve security performance, is thrilled to launch its latest innovation: Customizable Cybersecurity Performance Boards. This product launch marks a significant milestone as it allows security leaders to communicate their desired narrative to different stakeholders and in the context that matters most to them. This customization comes in two essential dimensions: Security leaders can now instantaneously create their own Cybersecurity Performance Boards, selecting from a library of ready-to-use metrics that align with their specific needs and goals. Secondly, the customization extends to the metrics level as well, allowing leaders to set thresholds, filter business units, timeframes, asset types, geographic considerations and more in a dynamic way. These stack-derived metrics automatically analyze the relevant data and reflect performance in real-time. The genesis of this customization feature can be traced back to the introduction of SeeMetrics' Cybersecurity Performance Boards, spanning Vulnerability Management, Endpoint Protection, Identity Management, Mail Security, Security Awareness, and Incident Response. The new customizable boards were created to help meet the diverse demands of CISOs, each armed with unique objectives and interests, in order to assist them in managing their operations and sharing different narratives with various stakeholders. CISOs and security leaders are increasingly tasked with promptly addressing queries regarding performance, progress, and budget allocation. They require a centralized platform that consolidates, analyzes, and visualizes data from a multitude of operational security tools to communicate the state of operations to a range of different audiences - from security engineering, to management and executive teams. They need to identify trending patterns, identify the critical gaps, and understand how these factors impact overall performance. While SeeMetrics has been delivering out-of-the-box metrics thus far, the maturation of the cybersecurity industry and the increasing interest in metrics necessitate a move towards full customization capabilities, enabling CISOs to measure precisely what aligns with their unique needs. "When it comes to metrics, one size doesn't fit all: each company has their own challenges, priorities and risk appetite, requiring them to filter and focus on their specific business context,” says Shay Haluba, CTO and Co-Founder of SeeMetrics. “SeeMetrics now enables security leaders to easily customize their own metrics, empowering them to craft their own multidimensional security story by leveraging a foundation of out-of-the-box metrics and offering the option to mix and match, and coherently communicate the organization’s up-to-date security-stack performance on a regular basis.” "From my personal experience as a CISO, we all need a direct means to efficiently manage cybersecurity operations and customize them to suit our specific requirements, enhancing our comprehension of our effectiveness. This will lead to more dynamic conversations and better prepared CISOs,” says Julie Tsai, former Roblox CISO and advisor to SeeMetrics. “Metrics undoubtedly facilitate this process, but the ability to customize metrics relevant to my team's needs is a true game-changer."
-
VDM selects NAGRA to deliver the highest level of security through mediaspot, its next gen distribution platform
NAGRA, a Kudelski Group (SIX:KUD.S) company and the world's leading independent provider of content protection and multiscreen television solutions, today announced that France-based Video Digital Multimedia (VDM), a Groupe Transatlantic Company and leading provider of digital media solutions for the audiovisual industry, has integrated NAGRA NexGuard forensic watermarking to enhance content protection across its distribution workflows. “NAGRA provides the most efficient, flexible, and powerful solution that seamlessly integrates into mediaspot®, our Digital Media Platform. This ensures that our customers’ valuable assets remain secure from production to distribution, with no impact on quality or lead time.” said Sébastien Arlaud, Director of Business and Innovation at VDM. “Available as a subscription-based option of mediaspot®, forensic watermarking capabilities are configurable and can be activated for one title, for the full catalog, for content that meets a particular criteria or just automatically applied - customers are free to decide.” NAGRA NexGuard forensic watermarking is integrated into VDM’s mediaspot® file distribution service to uniquely watermark all content delivered and published to third parties. The solution allows for quick and efficient identification of any source of content leaks, providing content owners with key intelligence for anti-piracy actions, while acting as a strong deterrent against illegal copying or distribution. “We pride ourselves on being the trusted partner for innovative companies, like VDM, who recognize that security can no longer be considered optional—but rather a core component to protect valuable assets essential to business success,” said Olivier Met, SVP EMEA region at NAGRA. “NAGRA NexGuard continues to be the proven solution that delivers results for production and post-production houses, enabling them to keep control over the valuable content they produce as it progresses along increasingly distributed workflows.”
-
NAGRA Receives Industry Recognition for Content Protection Innovation at IBC 2023
NAGRA, a Kudelski Group (SIX:KUD.S) company and the world's leading independent provider of content protection and media and entertainment solutions, today announced that its Active Streaming Production CDN Gatekeeper won the CSI Award for Best Content Protection at the 2023 IBC Show. CDN Gatekeeper together with security monitoring and analytics are the latest extensions of the NAGRA Active Streaming Protection framework that address the growing threat piracy and fraud at the CDN edge. “This CSI Award win is further testament to NAGRA’s industry expertise, commitment to preserving content value and innovation in bringing the best solutions to take on the ever-evolving pirate service landscape,” said Nancy Goldberg, Executive Vice President and CMO at NAGRA. “Not only are we helping to secure investments in content, but our work demonstrates the value that can be derived from a holistic streaming security solution. With the right tools in place, our customers can transform their content protection strategies from a cost center to a profit center.” NAGRA Active Streaming Protection CDN Gatekeeper works alongside other Active Streaming Protection services to enable rapid identification and disruption of illicit stream consumption and service fraud at the CDN edge. Rather than terminating the feed, NAGRA makes it possible to degrade the quality of service, significantly impacting the viewing experience. The result is increased churn and damage to the reputation and ongoing viability of the pirate service. Leveraging edge-computing services such as AWS CloudFront Functions, Akamai EdgeWorkers or Google Media CDN Service Extensions, the NAGRA Active Streaming Protection CDN Gatekeeper service manages restriction lists and schedules targeted smart disruption to pirate services. At the same time, CDN tokens can be generated with extended rules to be enforced at a CDN level that align and are consistent with DRM sessions. Established in 2003, the CSI awards are among the industry's most prestigious and competitive technology awards, designed to recognize and reward innovation and excellence in the cable, satellite, broadcast, IPTV, telco, broadband/OTT video, mobile TV and associated sectors. NAGRA Active Streaming Protection is a holistic approach that delivers end-to-end content protection to address the security gaps often left open to pirates. For more information, visit https://dtv.nagra.com/active-streaming-protection
-
Swissbit introduces iShield Archive memory card that protects sensitive information
With ‘iShield Archive’, the storage and security expert Swissbit introduces a new microSD card designed for encryption and access protection of video and image records, expanding the Swissbit iShield product line for plug-and-play security solutions. The card is intended particularly for manufacturers and users for whom sensitive data confidentiality and data protection in line with GDPR legislation are top priorities. It can be used host-independently with all common camera types. The plug-and-play system offers insurance firms, governments, or security organizations an effective solution to guarantee that recordings are never viewed, copied, or erased by unauthorized people under any circumstances. The data is AES-256-bit hardware encrypted by iShield Archive and can also be used in WORM (Write Once, Read Many) scenarios. The microSD comes in storage sizes ranging from 16 to 64 GB and is UHS-I U3 and V30 rated for 4K video recordings. Securely storing sensitive video and image data is, in many cases, essential to ensure data protection, confidentiality, or the integrity of crucial evidence. After all, data breaches can have significant repercussions, particularly for public safety but also for the insurance or healthcare industries. This is where Swissbit's iShield Archive offers a reliable solution. Manufacturers, system integrators, businesses or authorities can easily equip drones, body cams and many other types of cameras with an extra layer of security using the microSD card. Functionality and operation The PC-based "iShield Archive Tool" (iAT) software is used to set up the card. Both the security parameters and user PIN are configured here. Following the initial configuration, iShield Archive securely stores data in the end device and uses hardware AES-256-bit encryption to protect it. Any previously recorded data is no longer viewable on iShield Archive once the camera is turned off or the microSD card is removed, and can only be accessed and downloaded using iAT together with a correct password. Up until the card's capacity is reached, this procedure can be repeated. To release storage capacity, data must first be deleted from iShield Archive, which is only possible through authentication with the correct password. Optionally, deletion can be further safeguarded by an admin PIN, which allows iShield Archive to be used for role-based access control. Here, only a defined group of individuals have the required rights to permanently delete recordings or data. In the so-called WORM mode, regular users have read-only access with a user PIN, but are not authorized to edit or delete data. WORM mode is commonly used for data that needs to be stored in a safe and unalterable manner for legal reasons. Technical specification and availability The 16, 32, and 64 GB storage capacity options for iShield Archive feature Speed Class UHS-I U3 and Video Speed Class V30 for capturing 4K video. The microSD cards are based on 3D-pSLC NAND and designed for use in the industrial temperature range of -40 to +85 °C. The iAT software is available for Windows, macOS, and Linux operating systems and can be downloaded for free from www.swissbit.com. The following sales channels sell iShield Archive: Allnet, Digikey, Distrelec, Farnell, Mouser, and Rutronik 24. Individual inquiries can also be directed at any time to sales@swissbit.com
-
pCloud Celebrates a Decade of Innovation and Security in Online Storage: A Decade of Data Management Excellence
pCloud, the leading platform in online storage and data management, proudly commemorates a decade of reshaping the digital landscape. Since its inception in 2013, pCloud, a European cloud storage service provider created in Switzerland and compliant with Swiss privacy laws and GDPR, has redefined how individuals and businesses manage their data, offering secure, reliable, and user-centric solutions that have garnered the trust of over 19 million users worldwide. A Symphony of Achievements: 1. Global User Reach: With its worldwide presence, pCloud has fostered a global community of 19 million users who rely on its exceptional services for their data storage needs. 2. Innovation and Security: Throughout the past decade, pCloud's innovation has set new industry standards, all while maintaining an unblemished record of data security. pCloud utilizes advanced encryption techniques to safeguard user data. The company also boldly launched the "Hacking Challenge", inviting the world's best hackers to test its security measures, with none succeeding. 3. Championing Data Privacy: Over the years, pCloud's commitment to privacy has stood unwavering, resulting in zero data breaches. Users can trust that their data is safe and remains their own. 4. Launch of pCloud Pass: In 2022, pCloud extended its commitment to security by launching pCloud Pass, a truly secure European password manager. pCloud Pass provides users with a safe and convenient way to manage their passwords, enhancing their online security. 5. More Security Tools: pCloud introduced innovative security tools like a Data Breach Checker, Password Strength Checker, and Strong Password Generator, empowering users to safeguard their digital presence. 6. Unique Offerings: pCloud has been at the forefront of innovation by becoming the first cloud storage to offer Lifetime plans with a unique payment model. Additionally, pCloud introduced a pioneering 10TB storage plan, meeting the evolving needs of its user base. 7. Referral Campaign: To thank its loyal users for a decade of support, pCloud is launching a referral campaign that rewards users with free storage. For each successful referral, users and their friends both receive additional storage space, strengthening the pCloud community. An Exciting Future Ahead: As pCloud embarks on its next decade, the company remains steadfast in its commitment to pushing the boundaries of data management technology. "Tunio Zafer, CEO of pCloud, expressed, "Our journey of the last 10 years has been characterized by innovation, security, and unwavering user trust. We're excited to carry this legacy forward as we continue to redefine data management."
-
ViewQwest strengthens commitment to Information Security Management standards with ISO 27001:2013 certification
ViewQwest – an award-winning Telecommunications and Managed Security Services Provider, has achieved ISO 27001:2013 certification – a globally recognised security compliance standard outlining best practices for organisations to manage information security risks through the creation of an information security management system (ISMS). Following a rigorous audit and certification process, which is repeated annually, the certification was issued by TÜV AUSTRIA CERT GMBH from Akkreditierung Austria, the Austrian National Accreditation Body – a leading provider of testing, certification, auditing and advisory services. "We are proud to be ISO 27001:2013 certified. By achieving this certification, ViewQwest has demonstrated our ability to identify and manage risks related to data and information security. It underscores our commitment to security best practices and, most importantly, to protect our clients' company and customer data," said Vignesa Moorthy, ViewQwest Group CEO. The certification affirms that ViewQwest has established and implemented, and maintains and continually improves their information security policies, procedures and systems to safeguard non-public (confidential and internal) data such as customer data, financial data and internal communications from external breaches or being leaked to the public, in compliance with ISO 27001 standards. ISO 27001 is the best-known and most globally recognised standard for information security management systems, data protection, cyber resilience, and their requirements. Through the implementation of ISO 27001 standards, organisations take a systematic approach for managing the security of vital assets and sensitive information in a way that minimises risks and ensures confidentiality and integrity. For more information on ViewQwest, please visit https://corporate.viewqwest.com/
-
Microsoft Cyber Signals: Sporting Events and Venues Draw Cyberthreats at Increasing Rates
Today Microsoft released the fifth edition of Cyber Signals, spotlighting threats to large venues, sporting and entertainment events, based on learnings and telemetry from delivering cybersecurity support to critical infrastructure facilities during the State of Qatar's hosting of the FIFA World Cup 2022™. Cybersecurity threats to large events and venues are diverse and complex. They require constant vigilance and collaboration among stakeholders to prevent and mitigate escalation. With the global sports market valued at more than 600 billion USD, sports teams as well as major league and global sporting associations, and attendees house a trove of valuable information desirable to cybercriminals. Unfortunately, this information is made increasingly vulnerable by the growing number of connected venues and the number of devices and interconnected networks in these environments, sports teams as well as major league and global sporting associations and attendees, house a trove of valuable information desirable to cybercriminals. Venue IT systems and arenas contain hundreds of known and unknown vulnerabilities that allow threats actors to target critical business services such as point of sale, IT infrastructures, and visitor devices. Teams, coaches, and athletes themselves are also vulnerable to data loss on athletic performance, competitive advantage, and personal information. Attendee personal identifiable information can also be targeted through vulnerable event digital amenities, like companion mobile apps, Wi-Fi hotspots, and QR codes with malicious URLs. Microsoft Defender Experts for Hunting (DEX) developed comprehensive cybersecurity defenses for Qatari facilities and organizations supporting the soccer tournament. DEX conducted an initial risk assessment, factoring in threat actor profiles, adversary tactics, techniques, and procedures, and other global intelligence from Microsoft's telemetry. It ultimately analyzed over 634.4 million events while providing cybersecurity defenses for Qatari facilities and organizations throughout November and December of 2022. With sporting and entertainment events at large, there is a level of cyber risk and vulnerability that does not exist in other environments. Because some of these events come together quickly, often with new partners and vendors acquiring access to enterprise networks that are perceived as temporary, they are often not designed for evaluation and ongoing refinement of the security posture. In addition to the pre-planning required to support this unique security apparatus, venues consider the privacy risk associated with temporary, ad-hoc, and permanent cyber infrastructure. That means understanding and acknowledging if configurations needed to support the event potentially add additional risk or vulnerability. To safeguard against cybersecurity threats, sports, associations, teams, and venues must adopt robust protective measures. First and foremost, they should prioritize the implementation of a comprehensive and multi-layered security framework. This includes deploying firewalls, intrusion detection and prevention systems, and strong encryption protocols to fortify the network against unauthorized access and data breaches. Regular security audits and vulnerability assessments should be conducted to identify and address any weaknesses within the network infrastructure. Furthermore, user awareness and training programs are crucial to educate employees and stakeholders about cybersecurity best practices, such as recognizing phishing emails, using multifactor authentication or passwordless protection, and avoiding suspicious links or downloads. Additionally, it is essential to partner with reputable cybersecurity firms to continuously monitor network traffic, detect potential threats in real-time, and respond swiftly to any security incidents. By adopting these proactive measures, sports associations, teams, and venues can significantly enhance their resilience against cyberattacks and protect both their own infrastructure and the sensitive information of their patrons. Learn more in this fifth edition of Cyber Signals. To learn more about Microsoft Security solutions, visit the website. Bookmark the Security blog to keep up with Microsoft's expert coverage on security matters. Also, follow Microsoft on LinkedIn (Microsoft Security) and Twitter (@MSFTSecurity) for the latest news and updates on cybersecurity.
-
Kaspersky unveils latest APT trends for Q2
In Kaspersky's latest report on Advanced Persistent Threats (APTs) trends for the second quarter of 2023, researchers analyze the development of new and existing campaigns. The report highlights APT activity during this period including the updating of toolsets, the creation of new malware variants, and the adoption of fresh techniques by threat actors. A significant new revelation was the exposure of the long-running "Operation Triangulation" campaign involving the use of a previously unknown iOS malware platform. Experts also observed other interesting developments that they believe everyone should be aware of. Here are key highlights from the report: Asia-Pacific witnesses a new threat actor – Mysterious Elephant Kaspersky uncovered a new threat actor belonging to the Elephants family, operating in the Asia-Pacific region, dubbed "Mysterious Elephant". In their latest campaign, the threat actor employed new backdoor families, capable of executing files and commands on the victim's computer, and receive files or commands from a malicious server for execution on the infected system. While Kaspersky researchers have observed overlaps with Confucius and SideWinder, Mysterious Elephant possesses a distinctive and unique set of TTPs, setting them apart from these other groups. Toolsets upgraded: Lazarus' develops new malware variant, BlueNoroff attacks macOS, and more Threat actors are constantly improving their techniques, with Lazarus upgrading its MATA framework and introducing a new variant of the sophisticated MATA malware family, MATAv5. BlueNoroff, a financial attack-focused subgroup of Lazarus, now employs new delivery methods and programming languages, including the use of Trojanized PDF readers in recent campaigns, the implementation of macOS malware, and the Rust programming language. Additionally, ScarCruft APT group has developed new infection methods, evading Mark-of-the-Web (MOTW) security mechanism. The ever-evolving tactics of these threat actors present new challenges for cybersecurity professionals. Geopolitical influences remain primary drivers of APT activity APT campaigns remain geographically dispersed, with actors concentrating their attacks on regions such as Europe, Latin America, the Middle East and various parts of Asia. Cyber-espionage, with a solid geopolitical backdrop, continues to be a dominant agenda for these endeavors. Adrian Hia, Managing Director for APAC at Kaspersky said "Kaspersky has been monitoring all the active APT actors in the region that infect mobile devices and are slowly targeting businesses and infrastructure. Our researchers focuses on APT activities to uncover the most sophisticated cyber-attacks. By publishing our findings from our investigation, we hope to be able to help organisations be aware of the latest activities and remain secure in our bid to build a safer world." "While some threat actors stick to familiar tactics like social engineering, others have evolved, refreshing their toolsets and expanding their activities. Moreover, new advanced actors, such those conducting the 'Operation Triangulation' campaign, constantly emerge. This actor uses a previously unknown iOS malware platform distributed through zero-click iMessage exploits. Staying vigilant with threat intelligence and the right defense tools is crucial for global companies, so they can protect themselves against both existing and emerging threats. Our quarterly reviews are designed to highlight the most significant developments among APT groups to help defenders combat and mitigate related risks," comments David Emm, principal security researcher at Kaspersky's Global Research and Analysis Team (GReAT). To read the full APT Q2 2023 trends report, please visit Securelist. In order to avoid falling victim to a targeted attack by a known or unknown threat actor, Kaspersky researchers recommend implementing the following measures: Ensuring the security of your system, it is crucial to promptly update your operating system and other third-party software to their latest versions. Maintaining a regular update schedule is essential in order to stay protected from potential vulnerabilities and security risks Upskill your cybersecurity team to tackle the latest targeted threats with Kaspersky online training developed by GReAT experts. Use the latest Threat Intelligence information to stay up-to-date with the actual TTPs used by threat actors. For endpoint level detection, investigation, and timely remediation of incidents, implement EDR solutions such as Kaspersky Endpoint Detection and Response. Dedicated services can help combat high-profile attacks. The Kaspersky Managed Detection and Response service can help identify and stop intrusions in their early stages, before the perpetrators achieve their goals. If you encounter an incident, Kaspersky Incident Response service will help you respond and minimize the consequences, in particular - identify compromised nodes and protect the infrastructure from similar attacks in the future.