Digital identity protection: Swissbit introduces iShield Key Pro with USB-C interface
Integrated solution provides ultra-low latency, tamper-proof, and just-in-time distribution of live video
European Patent Office Grants Cobalt Iron a Patent on Its Cyber Event Responsiveness
Swissbit makes its debut at the RSA Conference 2024 showcasing leading-edge FIDO2 solutions
Swissbit at GPEC 2024: Secure data retention for police agencies and government authorities
WiTTRA Secures ISO 27001 Certification: A Milestone Achievement in Information Security
Cobalt Iron Announces New Cloud Backup-as-a-Service Offering for IBM Power Virtual Server
NIST CSF 2.0 Governance: SeeMetrics Launches Cybersecurity Governance Boards
New Patented Traffic-Shaping Technology From Cobalt Iron Dynamically Adjusts Network Throughput Based on Events
SeeMetrics Launches Cybersecurity Governance Boards
-
Black Box to Showcase Cutting-Edge Connectivity Solutions at BICSI Winter Conference & Exhibition, Jan. 28-Feb. 1
Black Box®, a renowned innovator in delivering communication and technology solutions, will showcase seamless connectivity solutions in Booth 920 at the BICSI Winter Conference & Exhibition, Jan. 28-Feb. 1, at the Rosen Shingle Creek Hotel in Orlando, Florida. The company will spotlight its comprehensive solution offering including wireless technology, Wi-Fi, private 5G/LTE, DAS, AV and intelligent building systems. The BICSI conference will focus on forward-thinking, solution-generating, progressive information and communications technology (ICT) topics. On the second day of the event, David Richards, a longtime BICSI Certified Trainer and Master Instructor who serves as quality and training manager for global solutions integration at Black Box, will be inducted as BICSI President. Richards oversees BICSI and Black Box training and development (T&D) programs in a state-of-the-art Black Box Authorized Training Facility in the Phoenix metro area. "I'm honored and excited to be serving the ICT industry as the next BICSI President," said Richards. "With my experience, I look forward to helping my team advance, mentor and train ICT professionals." Matt Barnes, director of quality for the global deployment services at Black Box, will be a speaker for the "What's New, What's It Do?" session later that evening. "The BICSI Winter Conference & Exhibition draws experts from across the ICT industry to share knowledge, exchange ideas and showcase the latest technologies and solutions," said Barnes, who has a wealth of industry experience including field ICT work. "We look forward to highlighting the robust portfolio of connectivity solutions and services offered by Black Box, as well as the world-class quality program we've implemented to ensure consistent delivery of great results for our customers." Conference attendees who stop by the Black Box Booth 920 can speak with experts about how to plan, select and implement connectivity solutions that best support and enhance their business. They can also register to win a YETI cooler. More information is available here. https://www.blackbox.com/campaigns/bicsi-winter-conference-exhibition
-
Black Box at ISE 2024: Industry-Leading KVM-Over-IP Solutions for Control Room Connectivity and Collaboration
At ISE 2024 on Booth 5E330, Black Box® will feature IP-based KVM and video wall solutions that enhance control room workflows and empower operators by enabling incomparable system connectivity, exceptionally intuitive user experiences and fluid team collaboration. Black Box will demonstrate how the company's award-winning Emerald® KVM-over-IP solutions ensure flexible, scalable and secure workflows with industry-leading low-IP-bandwidth usage. The Black Box booth at ISE 2024 will showcase the KVM-over-IP-based Emerald® Ecosystem, which provides infinitely scalable universal access to physical computers, cloud appliances, virtual machines, and H.264/265 video streams. The company will unveil Emerald®AV WALL, a new addition to the Emerald Ecosystem that unites KVM and AV video wall processing under a single management system, along with Emerald® DESKVUE, an award-winning solution for creating individually tailored workspaces. The company will also feature its AlertWerks AW3000 wireless IoT Gateway integrated within the Emerald Ecosystem and demonstrate how it allows operators to link to physical sensors, configure virtual sensors, watch values on browser-based dashboards, set notifications and alarms and configure automatic actions. Product managers and global solution experts will be available on the booth to answer questions about how these Black Box solutions address a wide variety of control room challenges. Emerald® Ecosystem The Black Box Emerald® Ecosystem stands for advanced security features, user comfort, and custom-designed redundancy to ensure resilient 24/7 operation. Its exceptionally low bandwidth usage makes it easy to incorporate remote and hybrid users and administrators working from any location, enabling them to access, monitor and control systems over a LAN, WAN, or the internet, including dark fiber connections. The programmable ControlBridge® touch panel from Black Box allows even complex control room configurations to be executed instantly with a single touch. The Emerald Ecosystem unifies KVM-over-IP with AV video wall processing and IoT predictive maintenance under a single management system, Boxilla® Manager, to reduce system complexity and total cost of ownership. ISE 2024 DEBUT PREVIEW: EmeraldAV WALL In the new Black Box Emerald®AV WALL, making its official debut at ISE 2024, KVM unites with AV. Designed to meet user requirements for more effective collaboration, this solution enables seamless interoperability with Emerald KVM-over-IP systems while also supporting non-KVM environments. EmeraldAV WALL complements Emerald® DESKVUE, making it easy to display a single source from an Emerald system on a video wall for viewing by a larger group. The solution directly supports a 2x2 video wall while allowing for the expansion in the number of supported monitors through additional units. AWARD WINNER: Emerald DESKVUE At ISE 2024, Black Box will demonstrate the award-winning Emerald® DESKVUE KVM-over-IP receiver, a small-form-factor device that offers a completely new concept in creating individually tailored workspaces. Emerald DESKVUE allows a user to access up to 16 selected sources simultaneously, replacing multiple receivers and thus reducing system complexity and costs. Operators can implement a setup with up to four 4K monitors, but the preferred option is a large ultra-wide curved 5K monitor in the center with two smaller 4K monitors to the right and the left. Adding Emerald®AV WALL licenses on the Emerald DESKVUE receiver expands the capabilities for visualization with a 2x2 video wall. Users can arrange windows on the displays in any size and arrangement. Switching between systems happens automatically in the background as users perform their tasks, removing any need for manual switching commands, or even awareness of system changes. ControlBridge® Multisystem One Touch Control Increase operator comfort and reduce human errors. The programmable ControlBridge® touch panel allows users to change workflows with complex setups with one click. It connects and combines AV-, KVM-, room automation-, external control- and IoT-systems into one easy-to-use control panel. Numerous scenarios like day or night shifts, crisis recovery plans, backup types, and many more can be preconfigured and indicated on the touch panel with clear names. Users can focus easier on their tasks and act faster and error-free thanks to tested presets.
-
CIOReview Adds Cobalt Iron to Its List of Top 10 Most Promising Data Security Solution Providers 2023
Cobalt Iron Inc., a leading provider of SaaS-based enterprise data protection, today announced that for the third year in a row, it has been named one of CIOReview's Top 10 Most Promising Data Security Solution Providers. This distinction is thanks to the Cobalt Iron Compass® enterprise SaaS backup platform, which delivers intelligent data backup at massive scale while making the backup infrastructure impervious to cyber attacks. Compass' unique Zero Access® architecture replaces common enterprise access points with a robust, automated security infrastructure. Unlike zero trust, which aims to prevent unauthorized access, Zero Access eliminates common logins and access points to the backup environment, including to the operating system, backup server software, backup storage repository, and ancillary tools and databases. In doing so, Compass effectively blocks out potential threats. Compass Zero Access is a key part of Cobalt Iron's multidimensional approach to data protection and security. In addition, Compass employs advanced, multilayer encryption; vigilant monitoring and cyber event detection; robust security protocols; and security analytics to secure copies of company data. The Compass Cyber Shield® security features built into Compass help keep data under the enterprise's control to minimize risk from potential audit requirements, compliance, and governance violations. Cyber Shield accounts for most governmental data security mandates around the world, such as the European Union's General Data Protection Regulation (GDPR) and longtime data privacy measures such as HIPAA, SOX, and ISO 27001. All management is handled by policy and channeled through the Compass Commander™ user interface. This approach eliminates nearly all cybersecurity vulnerabilities in the backup estate. Backup containment and isolation by design renders backup data inert and secures it against unauthorized access or exfiltration during its life cycle. A simple-to-deploy and easy-to-manage solution, Compass supports many different cloud providers — including Alibaba, Amazon, Azure, Google, and IBM Cloud — for many different cloud use cases and scales to petabytes of data in data centers or across thousands of remote locations. "It's an honor to be recognized by CIOReview for the work we've done with Compass," said Richard Spurlock, Cobalt Iron CEO and founder. "Our customers appreciate the ultrasecure, enterprise-grade data protection that provides a formidable guardian against cyber threats."
-
Trend Micro Achieves AWS Built-In Competency to Simplify and Accelerate Cloud Success
Trend Micro Incorporated (TYO: 4704; TSE: 4704) a global cybersecurity leader, a global cybersecurity leader, today announced it has achieved the Amazon Web Services (AWS) Built-in Competency in the Security and Cloud Operations category. This designation recognizes Trend as an AWS Partner that provides customers with an AWS built-in co-build solution that is designed to automatically install, configure, and integrate with key foundational AWS services using a well-architected modular code repository (MCR) in an automated deployment package validated by AWS experts, increasing the customer's time to value. To find out more about AWS built-in solutions, please visit: http://trendmicro.com/aws Achieving the AWS Built-in Competency differentiates Trend as an AWS Partner Network (APN) member that built their software solution to include foundational AWS services to help customers achieve their business goals for scale, simplicity, and operational cost control in cloud. By streamlining the integration process with foundational AWS services like Amazon GuardDuty, AWS CloudTrail, AWS Security Hub, and AWS Organizations, customers can decrease risk, reduce operational overhead, and provide consistent observability in cloud environments. Mike Milner, VP of cloud technology for Trend Micro: "We love creating with AWS and the key to this launch was not figuring out what was possible, but rather uncovering what the world needs most to protect digital assets and mitigate the advanced risks we see today. Cloud development is not only more accessible now but far more can be done with less expertise—which is invaluable to all. Innovations are only as powerful as they are secure, which is the role Trend Micro fills in all AWS competencies." AWS is enabling scalable, flexible, and cost-effective solutions from startups to global enterprises. To support the seamless integration and deployment of these solutions, the AWS Competency Program helps customers identify AWS Partners with deep industry experience and expertise. Specifically, Trend/AWS feature integration allows for: Accelerated response against vulnerability exploits via automated intrusion detection system and intrusion prevention policy (IDS/IPS) rules for workloads running on AWS Enhanced customer risk insight to accelerate SecOps, by leveraging the power of the Trend Vision One™ platform. Receive alerts on any AWS CloudTrail events that trigger a detection model in the Workbench app in Trend Vision One Full visibility into and protection of workloads across multiple AWS accounts, to enhance threat protection. Trend Micro™ Workload Security agents are seamlessly deployed every time a new instance is created on AWS accounts, via AWS Systems Manager (Distributor) A centralized location for aggregating, organizing prioritizing and automating remediation of security alerts. Trend Micro™ Container Security sends security findings from runtime protection for Amazon Elastic Kubernetes Service (Amazon EKS)/Kubernetes clusters direct to the AWS Security Hub, for a comprehensive view of security posture across AWS accounts Accelerated compliance via automatically secured cloud workloads "We looked at the options out there, and Trend Micro was the only one who could provide an entire suite in a virtual package" said chief technology officer of Sandstone Technology "Their cybersecurity platform is a single dashboard solution that offers protection for our cloud database and delivers compliance reports at any time and during the 30-day reporting cycle. That made them the easy decision."
-
Trend Micro First to Integrate Cloud Risk Management and XDR Across Customers’ Entire Attack Surface
Global cloud security leader Trend Micro Incorporated (TYO: 4704; TSE: 4704) has announced the addition of cloud risk management to its flagship cybersecurity platform. The new service drives business value by enabling organizations to consolidate their cybersecurity efforts and achieve a complete view of cloud security risks across hybrid IT environments. This release introduces advanced features including: Agentless and cloud-native vulnerability scanning Cloud security posture management (CSPM) Cloud infrastructure entitlement management (CIEM) Comprehensive risk visibility across hybrid clouds Container security risk visibility for clusters and images "Our offering is fully available, including in the AWS Marketplace, and noted as the first platform to natively connect customer threat surfaces, drive cyber risk reduction, fortify security posture, optimize compliance processes, and minimize cost and complexity," said Kevin Simzer, COO at Trend. "Our customers have the most accurate roadmap to optimize their resources allocation to best fortify their defenses." A resilient security posture calls for an understanding of risk across the system and applications that comprise their attack surface—yet only 9% of businesses actively monitor for this. The corporate attack surface has significantly expanded as a byproduct of organizations investing in digital transformation and cloud migration initiatives. As a result, businesses and governments have adopted siloed security technologies across on-premises and multi-cloud environments, which could include AWS, Azure, GCP, Kubernetes and other cloud service providers. Trend identifies unknown risks through the expansion of external attack surface management (EASM) to identify an organization's public assets across cloud providers, resulting in improved cloud security and governance. Trend Vision One™ now delivers this functionality via a unified approach to risk management, threat detection and incident response—drawing on data from diverse sources, including cloud metadata, containers, workloads, endpoints, identities, networks, and emails. This includes capabilities to manage cloud asset inventory and cloud security posture, prioritize risk, scan for threats and vulnerabilities and assess risk profiles and attack paths. These enhancements extend the platform beyond cloud native application protection platform (CNAPP) components, aiding organizations in consolidating their cybersecurity efforts and achieving a holistic view of their cloud security risks. Specifically, Trend Vision One™ – Attack Surface Risk Management (ASRM) offers: Attack surface discovery: enhances business security by actively mapping the cloud attack surface in real-time, providing a comprehensive inventory of internal and external cloud assets to safeguard against potential threats. Risk assessment and prioritization: continuously evaluates assets to prioritize and execute remediation actions, proactively reducing risks and preventing security breaches. This includes prioritizing vulnerabilities in running containers and bolstering organizations' resilience. Attack path analysis: assesses risk profiles and uncovers potential attack paths to guide the implementation of compensating controls, fortifying organizations' resilience against cyber threats. Risk measurement and reporting: reveals overall security performance to inform investment decisions, effectively communicate the state of cyber risk to the C-suite and provide a clear understanding of the security posture and its impact on business performance. Compliance optimization: streamlines compliance processes by identifying and addressing violations and misconfigurations, aligning security operations with industry standards and frameworks to maintain trust and regulatory adherence. To find out more about Trend Vision One – Attack Surface Risk Management (ASRM), please visit: https://www.trendmicro.com/en_hk/business/products/one-platform.html
-
Cobalt Iron Secures Patent on Applying Machine Learning to Cyber Inspection
Cobalt Iron Inc., a leading provider of SaaS-based enterprise data protection, today announced that it has received another new patent, this time for machine learning-driven cyber inspection. Issued on Sept. 19, U.S. Patent 11765187 introduces new capabilities for Cobalt Iron Compass®, an enterprise SaaS backup platform. When fully implemented, the new techniques will apply machine learning analysis to determine which cyber inspection tools are most appropriate and effective for given data or cyber threats. They will also allow businesses to adjust proactively and automatically to which, how, and when cyber inspection tools are used to validate corporate data. This optimizes cyber inspection operations, thus improving cyber event detection and data validation processes. Cyber attacks are increasing in frequency and sophistication. While businesses continue to harden various resources and parts of the IT environment, nefarious characters continue to change their attack approaches and targets. Cyber protections that worked yesterday or are working today may be insufficient in the near future. Companies also need more insights into how well their cyber resiliency schemes are working. In particular, analytics around cyber protection, detection, and inspection operations are woefully lacking in the industry. This invention addresses those concerns. It qualified for a patent because of several unique characteristics: Historical analysis of the usage of multiple cyber inspection tools and their effectiveness in detecting different types of cyber events in particular types of data. The application of machine learning techniques to cyber inspection operations. Automatic adjustment of a time range to perform cyber inspection operations based on cyber attack indications. Automatic adjustment of policy-driven cyber inspection using multiple cyber inspection tools and multiple cyber inspection levels: at different times or events in the life cycle of a data object. or for different types of cyber events. This patient introduces machine learning technology advancements that will refine and optimize how Compass applies multiple cyber inspection tools depending on the conditions. Specifically, the techniques disclosed in this patent: Store and analyze machine learning training data associated with a plurality of cyber attacks (including ransomware attacks), inspection class policies, data protection operations, cyber inspection operations, and operational forensics data. Establish inspection-class policies to specify, for each plurality of security conditions or events, a class of inspection tools and a specific level of inspection to perform within a defined security zone. A specific type of data to be inspected. A certain point in a data life cycle (e.g., on creation, modification, backup, recovery, etc.) for the specific type of data to be inspected. Monitor for a variety of security conditions and events. When a new security condition or event occurs, upon analysis of the machine learning training data and inspection class policies, determine an inspection tool and a specific level of inspection to perform on specific data at a certain point in the data life cycle. Perform the determined cyber inspection operations. Dynamically adjust the class of inspection tool and the specific level of cyber inspection to perform on the data to lower the risk and impact of future cyber attacks. Dynamically adjust a time range to perform cyber inspection operations based on cyber attack indications. Perform cyber attack forensics and historical analysis to determine particular data objects attacked, attack patterns, attack timings, attack sources, and other proactive insights into cyber attack activities and consequences. Restrict access control to data objects similar to particular data objects attacked. For example, Compass might use these techniques to analyze cyber attack patterns and targets, recognize specific types of data or applications being targeted, and automatically restrict access control to similar types of data or applications in the enterprise. In another instance, the technology might enable Compass to analyze machine learning training data from previous cyber attacks and previous cyber inspection operations to determine whether a different cyber inspection tool or a different level of inspection would be more effective at detecting particular types of cyber attack patterns. And if so, it may dynamically adjust the cyber inspection tool or level of inspection it performs against particular types of data in future cyber inspection operations. The business outcome: lower risk of undetected cyber security events and continually improved data validation operations. "Organizations are in dire need of more proactive assistance in protecting their data and other IT resources and in detecting suspicious cyber activities," said Rob Marett, chief technology officer at Cobalt Iron. "These new techniques apply machine learning analysis to figure out in advance which cyber inspection tools will be best for different scenarios. This allows businesses to continually optimize cyber inspection operations, thus improving their ability to detect cyber events and validate data."
-
How to avoid being a victim of professional social network scams
The boom that social networks have experienced in recent years has led to an increase in attempts to defraud specific employment platforms. Cyber attackers see in these job search platforms a niche of potential victims among whom their malicious activity is increasing by the minute. In strictly professional communities it seems logical to consider that an unknown individual might send a message on behalf of a supposedly legitimate organization to a particular user. As a general rule, the contacted user will be inclined to trust his interlocutor. It is precisely in this trust that the cybercriminal's success lies. Raquel Puebla and Itxaso Reboleiro, cyberintelligence analysts at Innotec Security part of Accenture, provide below some keys with which we could avoid becoming victims of this type of fraudulent activities. Take note! Warning signs ● Users are advised to pay special attention to alleged job offers directly requesting personal and/or financial information, to messages encouraging the user to click on links to suspicious domains or to download documents of unknown origin, and to click on offers from potentially suspicious online profiles. In the face of these indications, distrust is the best prevention. ● "It should also be verified that the company from which the offer allegedly comes from is legitimate, has an official website and digital presence and has a certain reputation." Therefore, an unknown company or one with a very small number of employees on an employment social network could be a warning sign. ● Similarly, the profile of the supposed employer may also contain warning signs such as, for example, not having an image, having been created very recently, not having validations and interactions from other employees, not having disclosed publications for the benefit of the organization to which they belong, etc. "Usually, if a company has vacancies, it usually publishes about it and even provides corporate email addresses to apply to the offer". ● It is also advisable to analyze the job position being offered and be wary of those cases in which there are hardly any entry requirements and the salary offered is abnormally high. What if we've been bitten? In the event that a user suspects they have been the victim of an alleged employment scam through a professional social network, "the steps to take will depend on the personal information they have provided to third parties or the actions they have taken," explain Puebla and Reboleiro. However, if personal and/or professional data has been compromised, you should inform your company in order to prevent possible cybersecurity incidents. If this data is of a financial nature, then your bank should also be contacted as soon as possible in order to take the appropriate measures in this regard. Similarly, cybersecurity specialists should be contacted, especially if the victim's computer has been infected and malicious code may have been deployed. "If an infection by a family of malware such as stealer, keylogger, spyware or similar is discovered, it is highly advisable to modify all the credentials that have been entered on the computer since the compromise," they add.
-
Trend Micro Named a Leader in Endpoint Security
Trend Micro (TYO: 4704; TSE: 4704) today announced its recognition by Forrester as a Leader in endpoint security. The independent market analysis states that "Trend Micro is the veteran that leads with a full-featured endpoint security offering...Trend Micro has continually worked to ensure features function in both environments. This has helped it maintain high customer loyalty for enterprises of all levels on a global basis." To read "The Forrester Wave™: Endpoint Security, Q4 2023" in full, please visit: https://www.trendmicro.com/explore/forrester-wave-xdr Kevin Simzer, COO at Trend: "Do you have a handle on your organization's enterprise attack surface, including endpoints and every asset beyond that? In order to reduce risk, you have to be able to see it. Our platform provides the broadest visibility in the industry, and endpoint is a critical element of that strength." Trend Micro received a maximum possible score of 5.0 in 12 of Forrester's evaluation criteria: exploit prevention, malware prevention, identity protection, network threat detection, application control, mobile device security, endpoint performance impact, innovation, roadmap, adoption, revenue and number of customers. Forrester's report notes that "Trend Micro has benefitted from consistent protection of endpoints," and that Trend "maintains a high level of investment in innovation," and has a roadmap that continues to "ensure endpoint protection is foundational to all its enterprise security offerings." Other notes from the report include: "Attack prevention engines have been a staple of customers who want an endpoint security solution 'that just works'" "Trend Micro is a good fit for customers who want a consistently strong endpoint protection platform that can support evolving to XDR" Trend Vision One™ – Endpoint Security offers threat protection, detection and response across endpoints, servers and cloud workloads—for on-premises, hybrid and multi-cloud environments. A comprehensive range of threat detection capabilities includes high-fidelity machine learning at pre-execution and runtime, behavioral analysis, app control, ransomware rollback and much more. Integrated EDR delivers prioritized, actionable alerting for accelerated incident response alongside threat hunting. Virtual patching leverages Zero Day Initiative intelligence to protect endpoints from unknown threats, and cloud-native security protects and monitors for suspicious activity across containers and workloads.
-
Trend Micro Container Security Evolution Saves SOC Teams Up to Two Weeks of Time Per Incident
Trend Micro (TYO: 4704; TSE: 4704), a global cybersecurity leader, today announced the next evolution of its cloud container security capabilities for its flagship platform. The latest addition to the platform delivers end-to-end protection, detection, and response to drive secure digital transformation. The new capabilities simplify investigations by enabling analysts to prioritize incidents faster and with greater accuracy—reducing the time spent on each container security incident by up to two weeks.* "Nothing is more important than reducing business risks, which we do through increasing the efficiency of our cyber threat detection capabilities" said Fernando Gadelha, head of cybersecurity at ZUP. "Honestly, containers are only a percentage of our efforts, but it is critical to be able to streamline any operations and manage them alongside our broader security efforts – Trend Micro makes that easiest. Big picture, that translates to less time spent on training and moving between screens, and more time and resources driving business transformation." Kevin Simzer, chief operating officer at Trend: "We see modern enterprises increasingly turning to containers to accelerate and scale development alongside evolving market demands—but these advances can lead to missing cloud visibility and new security vulnerabilities. Our platform empowers teams to protect and respond to threats in cloud container environments, using the exact same console and user interface they rely on for managing risks across the rest of the attack surface." The Trend Vision OneTM platform is designed to deliver comprehensive, cross-layer capabilities that eliminate the cost, security gaps, and administrative overhead associated with point solutions. Trend's latest innovation in container security brings unparalleled visibility to the security operations center (SOC) to accelerate threat detection, response, and containment. Specialized cloud security teams will benefit from a tailored approach that protects containerized applications and enables organizations to leverage the full potential of cloud environments securely. According to independent analyst firm Gartner, "Integrating previously isolated security capabilities simplifies security workflows and reduces the complexity associated with managing multiple tools, thus providing better visibility into the security landscape. A centralized platform allows for better coordination and communication between security and development teams, fostering collaboration and enabling incidents to be handled more efficiently."** Trend Vision One™ – Container Security benefits include: Consolidated security: Centralizing container security within a unified platform streamlines security management while delivering unprecedented visibility through deep, correlated telemetry across more native security layers—including endpoint, server, workload, identity, email, and network. This consolidated approach enables security teams to identify threats earlier in the attack lifecycle leading to rapid and effective containment. A platform approach ensures security policies are consistently monitored and applied across the organization. Optimized operational efficiency: Drastically reduces the time spent by SOC teams on container security operations, saving up to two weeks per incident. This efficiency improvement can free up resources for other critical tasks, enabling organizations to operate in the cloud with less risk. Consistency across all cloud environments: Ensures seamless security management is in place across both Kubernetes clusters (multi-cloud and on-premises) and Amazon ECS by simplifying the management of security policies and minimizing the risk of potential security vulnerabilities. Enhanced security: Proactively mitigates risk by searching for bugs in Amazon ECS and Kubernetes. Supports end-to-end protection that secures containers from build to termination, ensuring seamless security across the container lifecycle. To find out more about Trend Vision One – Container Security, please visit: https://www.trendmicro.com/en_hk/business/products/one-platform.html *Projection based upon beta testing and time quantifications. **Gartner, 5 Ways CNAPP Will Improve Your Cloud Security, Fred Sotolongo, 21 September 2023 Gartner is a registered trademark and service mark, Peer Insights and Magic Quadrant are registered trademarks, of Gartner, Inc. and/or its affiliates in the U.S. and internationally and are used herein with permission. All rights reserved. Gartner Peer Insights content consists of the opinions of individual end users based on their own experiences with the vendors listed on the platform, should not be construed as statements of fact, nor do they represent the views of Gartner or its affiliates. Gartner does not endorse any vendor, product or service depicted in this content nor makes any warranties, expressed or implied, with respect to this content, about its accuracy or completeness, including any warranties of merchantability or fitness for a particular purpose. Gartner does not endorse any vendor, product or service depicted in its research publications and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.
-
OPSWAT Unveils CIP Lab at GovWare in Singapore, Showcasing Cutting-Edge IT/OT Cybersecurity Solutions
OPSWAT, a global leader in critical infrastructure protection (CIP) cybersecurity solutions, is pleased to announce the debut of its highly-anticipated Critical Infrastructure Protection (CIP) lab at the prestigious GovWare event in Singapore. The event will take place at the Sands Expo and Convention Centre from 17th to 19th October. As a pioneering cybersecurity firm, OPSWAT is committed to safeguarding the world's critical infrastructure against emerging cyber threats. GovWare serves as the perfect platform for OPSWAT to showcase its comprehensive IT/OT cybersecurity solutions that are designed to fortify critical infrastructure against potential vulnerabilities and attacks. "We are excited to participate in GovWare and unveil our state-of-the-art CIP lab to the cybersecurity community." said Malcolm Rowe, VP APAC at OPSWAT. "This marks a significant milestone in our mission to protect the world's critical infrastructure, and GovWare provides an exceptional opportunity for us to demonstrate the effectiveness of our cutting-edge solutions." At GovWare, OPSWAT's booth (P28) will be strategically located to welcome visitors seeking to gain insights into the latest advancements in cybersecurity technologies. Industry professionals and government representatives are invited to visit the OPSWAT booth to experience hands-on demonstrations of the CIP lab. This interactive experience will showcase OPSWAT's ability to secure and defend critical infrastructures from potential cyber threats and ensure operational continuity. The OPSWAT CIP lab is the embodiment of OPSWAT's dedication to innovation and excellence in cybersecurity. It enables users to experience firsthand how its solutions integrate seamlessly into both IT and OT environments, providing comprehensive protection without compromising operational efficiency. In partnership with ABPSecurite, a CIP lab will also be located at its HQ in Singapore. This serves as a strategic location for OPSWAT's partners and customers in Southeast Asia for in depth demonstrations of our latest solutions and technology, as well as further solidifying the partnership with ABPSecurite as our regional distributor for the Southeast Asia region. "The new physical CIP lab demonstration environment at ABPSecurite's office will provide an excellent platform to showcase our latest solutions and technologies, as well as further strengthen our commitment to invest in the region to support both our partners and customers." stated Jeremy Giam, Regional Manager at OPSWAT. Join OPSWAT at GovWare in Singapore and witness the future of critical infrastructure protection through immersive demonstrations of our groundbreaking IT/OT cybersecurity solutions. Be at the forefront of securing the world's most vital assets and learn how OPSWAT can be your trusted partner in the battle against cyber threats. For more information about OPSWAT and how to schedule a demo at the CIP lab at GovWare or ABPSecurite, visit our website at www.opswat.com or stop by our booth at GovWare (P28).
-
SolarWinds Commemorates Cybersecurity Awareness Month by Highlighting Software Industry’s Secure by Design Progress
SolarWinds (NYSE:SWI), a leading provider of simple, powerful, secure observability and IT management software, commemorates Cybersecurity Awareness Month by highlighting the software industry's progress toward becoming more Secure By Design. Informed by years of experience from industry-leading cybersecurity experts, the SolarWinds Secure by Design initiative is a gold-plated cybersecurity approach to software build systems and processes that set a new standard in software supply chain security. SolarWinds developed Secure By Design to address the evolving threat of highly sophisticated and unforeseeable cyberattacks, including those by advanced nation-state threat actors. As a guiding principle for software security and cyber resiliency, Secure By Design provides an effective and novel defense for thwarting advanced supply chain cyber threats. With a focus on creating more secure environments, the SolarWinds Secure By Design guiding principles were designed to make both the company and the software industry at large safer. "Security is an ongoing journey with no finish line but, as we reflect on the past year, it's clear we've made great progress on the journey towards a Secure by Design industry," said Sudhakar Ramakrishna, CEO and President of SolarWinds. "The increasing frequency and sophistication of cyber threats demand a collective response from the cybersecurity community. It is our shared responsibility to come together, collaborate, and innovate to build a more secure future for all." The past year has seen significant advancement of the adoption and implementation of a more Secure By Design approach, including new community approaches to support cyber resiliency, more secure software build systems, improved information sharing about threats across the industry, and a stronger cyber workforce. Building Out a Community Approach to Support Cyber Resiliency This year marks the 20th annual Cybersecurity Awareness Month, in which the President of the United States and Congress dedicate time to work together with the public and private sectors to raise awareness about the importance of cybersecurity. SolarWinds has continually called for transparent and open information sharing across the industry and more robust public-private partnerships to combat increasingly sophisticated nation-state cyberattacks. SolarWinds recently hosted a panel discussion in Washington, D.C., highlighting several key ways to help the industry stay secure. Ramakrishna was joined by Congressman Darrell Issa (R-CA), Congressman Raja Krishnamoorthi (D-IL), and CISA Executive Assistant Director for Cybersecurity Eric Goldstein for a conversation on why stronger public-private partnerships are needed to enhance the security of the nation's cyberinfrastructure. Additionally, SolarWinds will be in attendance at GovWare 2023, joined by more than ten thousand other policymakers, tech innovators, and end-users. This year's theme, "Fostering Trust Through Collaboration in the New Digital Reality," aims to address the significant link between digital trust and achieving success in today's cyberspace. Developing A Resilient Build Environment with The Next-Generation Build System The SolarWinds Next-Generation Build System, a key component of the company's Secure By Design approach, leverages a unique parallel build process where software is developed in multiple secure, duplicate, and ephemeral environments. First unveiled by SolarWinds last year, the Next-Generation Build System was developed to make supply chain attacks more difficult to execute by prioritizing cybersecurity throughout the entire lifecycle management process. As SolarWinds recently announced, the Next-Generation Build System meets or exceeds the Secure Software Development Framework (SSDF) updated last year by The National Institute of Standards and Technology (NIST®). The build system's alignment with SSDF and CISA's Enduring Security Framework has been a continued driver encouraging more organizations to become Secure By Design. The SolarWinds Next-Generation Build System has received multiple industry recognitions this year, including the CSO50 Award for IT Infrastructure Monitoring and Management, the BIG Innovation Fortress Cyber Security Award and recognition from the Cloud Security Awards. Additionally, SolarWinds Chief Information Security Officer and VP of Security Tim Brown, who has spearheaded the ongoing development of the Next-Generation Build System, was named CISO of the Year by the Globee® Cybersecurity Awards. Improving Security Through a Stronger Cyber Workforce This year, the industry has prioritized growing the cybersecurity workforce, a critical mission as more than 3.4 million positions in the field remain unfilled. The White House recently unveiled a first-of-its-kind National Cyber Workforce and Education Strategy to address both immediate and long-term cyber workforce needs. Alongside this announcement, the U.S. National Science Foundation CyberCorps® Scholarship for Service program will provide more than $24 million over the next four years to support the development of a stronger cybersecurity workforce. SolarWinds has long advocated additional resources for skill and vocational training. The company has taken on a leadership role in this regard, encouraging software companies to allocate the equivalent of one trained, full-time employee to support CISA and foster information-sharing between companies and government agencies. This collaboration across sectors is necessary to create unified best practices and develop shared threat intelligence. For more information on the SolarWinds Secure By Design initiative, please visit: https://www.solarwinds.com/trust-center
-
Trend Micro Recognized as a 2023 Gartner® Peer Insights™ Customers’ Choice for Endpoint Protection
Trend Micro (TYO: 4704; TSE: 4704), a global cybersecurity leader, today announced that it has been recognized as Customers' Choice in the 2023 Gartner Voice of the Customer for Endpoint Protection Platforms by customers on Gartner Peer Insights™. To read more about the Gartner® report, Voice of the Customer for Endpoint Protection Platforms, please visit: https://www.trendmicro.com/explore/gartner-voc-endpoint "The Trend Vision One platform takes modern endpoint protection to a new level by enabling customers to manage policies and bridge the gap between threat protection and cyber risk management across endpoints, servers and cloud workloads all from a single location," said Shannon Murphy, Global Security and Risk Strategist at Trend. "We're delighted this approach is resonating with the market. There's no more important validation for us than from the cybersecurity community through the voices of our customers." The Gartner® Peer Insights™ report for Endpoint Protection Platforms (EPPs) is based on 4,210 published reviews over an 18-month period ending 30 June 2023. To be recognized as a Customers' Choice, vendors must meet or exceed both the average Overall Experience and the average User Interest and Adoption. Of 275 customer reviews for Trend Micro, the vast majority (62%) were five-star, with over a third more (35%) four-star reviews. Trend received an overall rating of 4.6 from its customers and a 93% willingness to recommend for its EPP offering as of June 2023. Trend Vision One™ – Endpoint Security goes beyond typical EPP by offering protection, detection and response across hybrid environments: physical servers, virtual machines, cloud and containers. It integrates EDR/XDR across endpoints, datacenters and cloud workloads to drive enhanced detection and response. And it features comprehensive multi-layered capabilities including anti-malware and ransomware protection, device control, host-based intrusion prevention, application control, file integrity monitoring, log inspection, machine learning/AI and more. In addition to this recognition, Trend Micro has been named a Leader in the Gartner Magic Quadrant™ for Endpoint Protection Platform (EPP) report 17 times since the report was published for the first time in 2002. Trend has also been ranked #1 for Cloud Workload Security Market Share (IDC) for five years in a row. Gartner, Magic Quadrant for Endpoint Protection Platforms, Peter Firstbrook, Chris Silva, 31 December 2022 The report Magic Quadrant for Endpoint Protection Platforms was published as Magic Quadrant for Enterprise Antivirus in 2005-06, as Magic Quadrant for Enterprise Antivirus, 1H03 in 2003 and as Enterprise Antivirus 2Q02 MQ: Room for Improvement in 2002. Gartner is a registered trademark and service mark, Peer Insights and Magic Quadrant are registered trademarks, of Gartner, Inc. and/or its affiliates in the U.S. and internationally and are used herein with permission. All rights reserved. Gartner Peer Insights content consists of the opinions of individual end users based on their own experiences with the vendors listed on the platform, should not be construed as statements of fact, nor do they represent the views of Gartner or its affiliates. Gartner does not endorse any vendor, product or service depicted in this content nor makes any warranties, expressed or implied, with respect to this content, about its accuracy or completeness, including any warranties of merchantability or fitness for a particular purpose. Gartner does not endorse any vendor, product or service depicted in its research publications and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose
-
New Report Highlights Key Elements of Cloud Workload Security Landscape
Trend Micro (TYO: 4704; TSE: 4704), a global cybersecurity leader, today revealed its citation by analyst Forrester in a new report which will help IT buyers better understand the landscape of cloud workload security offerings. To access a full copy of the Forrester report, please visit: https://www.forrester.com/report/the-cloud-workload-security-landscape-q3-2023/RES179850 Forrester's report, The Cloud Workload Security Landscape, Q3 2023, lists Trend Micro as one of six vendors that generate $250m or more in annual revenue from their cloud workload security (CWS) portfolio. The report also covers extended use cases that include three areas of focus for Trend: agent-based cloud workload protection; container protection; and cloud security posture management (CSPM). Trend has decades of experience innovating in all three product areas, and will be showcasing further advancements at AWS re:Invent in November. Container and cloud workload protection will be enhanced, unified and integrated with XDR to deliver centralized detection and response for the cloud (CDR). Trend will also look to integrate its CSPM and container runtime vulnerability capabilities into a major new offering to help customers better manage risk across their cloud attack surface. These enhancements are part of the Trend Vision One™ strategy designed to deliver visibility, control and risk management across the entire IT and OT environment from a single platform. "Trend Micro pioneered cloud security as we know it," said Kevin Simzer, COO at Trend. "We remain focused on innovating for our customers, whatever stage of the cloud journey they're at. Our upcoming announcements at AWS re:Invent will deliver even more value as we accelerate our platform-based security strategy to help global organizations improve attack surface risk management."
-
Cobalt Iron Advances Cyber Recovery With Isolated Vault Services
Cobalt Iron Inc., a leading provider of SaaS-based enterprise data protection, today announced Isolated Vault Services™, a new enhancement available in the Cobalt Iron Compass® enterprise SaaS backup platform. In a simple and unique way, Isolated Vault Services makes it possible to transition normal backup operations into isolated vault recovery services. It is intended for companies needing to recover data in an isolated vault or clean-room environment, typically as part of a declared disaster or cyber recovery operation. The simplicity of switching normal backup operations to isolated vault recovery services is something not experienced with other backup products. With the ubiquity of cyber attacks, companies must continually improve their data resiliency and recovery posture. A critical part of that task is ensuring data is recoverable and then validating the integrity of recovered data after a disaster or cyber event. Data administrators need clean copies of data that they know have been and are isolated from access by bad actors. To that end, they often establish an isolated clean room for purposes of recovering systems, applications, and data. Transitioning normal backup operations into isolated recovery services is challenging because backup infrastructures and operations are based on accessibility and connectivity that are not allowed in a vaulted recovery zone. In addition, typical backup environments have many vulnerabilities and are the target of cyber attacks themselves, so there must be some level of confidence that backup data and operations are sanitized before introducing them into a clean-room recovery environment. As a result, organizations struggle with establishing safe, isolated recovery zones, where production operations can be restored from current backups that are accessible and validated. Cobalt Iron Compass is unique in that all backup data ingested into the platform is vaulted and immutable by design, with no access available to the backup environment. Compass Isolated Vault Services extends these Zero Access™ architectural advantages by allowing administrators to toggle Compass Accelerators — the physical, on-premises devices that deliver the Compass SaaS platform — from normal backup operations into an isolated recovery services mode. At that point, customers can use the Compass Accelerators to restore business data and services inside of an isolated vault zone, completely disconnected from the internet. This vault service functionality is available through the local Compass Accelerator menu services or through the Compass REST API for orchestrated recovery. Isolated Vault Services: (1) Facilitates clean room system, application, and data recoveries. (2) Allows any Compass Accelerator to operate in a completely network-isolated vault mode for safe recovery from cyber events and disasters. (3) Enables automated recovery orchestration via Compass Isolated Vault Services REST API. >Stop, start, restore, and query data protection server instances. >Control, select, and connect Accelerator-protected data storage. >Perform Accelerator-protected client data operations, such as list clients, unlock clients, and change client passwords. Isolated Vault Services frees data administrators from cumbersome isolated recovery processes, such as establishing a recovery infrastructure in the isolated vault zone, manually reconfiguring backup and storage, manually recovering backup data and operations into an isolated vault environment, and validating backup data to ensure it was not infected prior to being made available in the isolated vault zone. Isolated Vault Services is available today at no additional cost to Compass users. "Disasters and cyber attacks can wreak havoc on even the most prepared businesses. We see organizations struggle with restoring data and services in safe, isolated recovery environments," said Richard Spurlock, Cobalt Iron founder and CEO. "Compass Isolated Vault Services transforms the complexity of vaulted recovery zone services into simple and dependable recovery activities for systems, applications, and enterprise data following disaster or cyber events."
-
Arlo Unveils New Essential Cameras and Doorbell To Provide Affordable Smart Home Security that Protects Your Everything
Arlo Technologies, Inc. (NYSE: ARLO), a leading smart home security brand, recently announced its second generation Essential cameras and doorbell that deliver smart home protection at incredible value in the USA. Today, they are available in Australia and New Zealand. The lineup includes a new standard Essential Outdoor Camera, as well as a new Essential Indoor Camera with an automated privacy shield. A new Video Doorbell with head-to-toe 180-degree field of view is also available. "Arlo prides itself in building trusted, lifelong customer relationships with innovative, award-winning security solutions that deliver an exceptional user experience," said Brad Little, Vice President & Managing Director – Arlo APAC. "Our new second generation Essential cameras and doorbell provide the best combination of technology and value Arlo has ever offered, adding to Arlo's wide range of high-quality products and industry-leading AI software to ensure you can protect your everything." The all-new second generation Essential Cameras and Doorbell offer several new advancements, providing customers with powerful smart home security solutions at affordable price points. Additionally, each device features USB-C connections for easy re-charging, and a new quick set-up process offering a faster, more streamlined experience via Bluetooth. Each of Arlo's second-generation Essential Cameras and Doorbell are available in 2K resolution that delivers two times more clarity than HD, allowing consumers great clarity at an affordable price. The new Arlo Essential Cameras and Doorbell include: Essential Outdoor Camera (2nd Generation) Check-in and take action quickly when motion is detected around your home with the Essential Outdoor Camera, featuring a 130-degree viewing angle, colour night vision, noise-cancelling audio and an integrated spotlight to rid any unwanted guests. 130-Degree Viewing Angle: Keep an eye on what matters most with a wide field of view Integrated Spotlight: Shine a light on your yard to ward off unwelcome visitors See More at Night: See videos in colour rather than traditional black and white for better identification Noise-Cancelling Audio: Hear and speak to visitors with clear, two-way audio Integrated Siren: Trigger your siren automatically, or manually from the Arlo app Weather Resistant: Designed to withstand heat, cold, rain, or sun Easy Setup and Install: Easy DIY installation with wire-free setup and mount MSRP of US$99.99 for a single camera kit. Essential Indoor Camera (2nd Generation) Stay connected to what's happening inside your home and keep your private moments yours with Arlo's Essential Indoor Camera featuring an automated privacy shield. Check-in on your home, family or pets anytime with two-way talk and night vision. Automated Privacy Shield: Keep moments private at any time by closing the shield directly through the Arlo Secure App 130-Degree Viewing Angle: Keep an eye on what matters most with a wide field of view Noise-Cancelling Audio with Two-Way Talk: Hear and speak to visitors with clear, two-way audio See at Night: View critical details even without a light with night vision Integrated Siren: Trigger your siren automatically, or manually from the Arlo app Easy Setup and Install: Plug in and connect directly to Wi-Fi and install anywhere MSRP of US$79.99 for a single camera kit. Video Doorbell (2nd Generation) See more at your front door and greet guests from anywhere right from your phone with the Arlo Video Doorbell, featuring two-way audio, night vision, and an integrated siren. Video Call: Answer the doorbell directly from your phone so you never miss a visitor Visitor Messaging: Have your guests leave a voice message if you're unable to answer the door, while listening remotely at your convenience Get the Full Picture: See a person from head to toe and packages on the ground with 180-degree field of view See at Night: View critical details even without a light with night vision Integrated Siren: Trigger your siren automatically, or manually from the Arlo app Weather Resistant: Certified to withstand heat, cold, rain, or sun MSRP of US$129.99. The second-generation Essential cameras and doorbell are fully compatible with Arlo Secure, Arlo's mobile app that allows users to connect and protect what matters most. An easy-to-use interface manages all connected Arlo products, letting users monitor their entire home and take immediate action right from their phone lock screen for ultimate peace of mind. With a paid Arlo Secure plan, users can take their security to the next level with advanced features including 30 days of rolling video history, customisable Smart Activity Zones for alerts that matter most, as well as time-saving automations that can be programmed to trigger events such as geofencing, mode changes, schedules, alarms and more. Accessories for the Arlo second generation Essential Cameras and Doorbell, including a Solar Panel, Outdoor Charging Cable, and Protective Camera Covers, will also become available. The Arlo second generation Essential Cameras and Doorbells are available now on Arlo.com and leading retailers nationwide. For more information on Arlo's full range of smart home security products and services, visit www.Arlo.com
-
Black Box to Showcase AI-Enhanced Solutions for Unified Customer Experience at GITEX GLOBAL
At GITEX GLOBAL, Oct. 16-20 at the Dubai World Trade Center (DWTC), Black Box® (booth H8-30) will showcase customer experience (CX) solutions and consulting services that leverage Conversational AI, Generative AI, and other cutting-edge tools to help businesses dramatically improve customer experiences, reduce costs and ensure optimal ROI from their CX technology investments. With a focus on how AI can improve efficiency and improve employee and customer satisfaction, Black Box will feature world-class services and solutions that help organizations deliver exceptional experiences with consistency across the customer journey. Black Box will partner onsite with Cognigy, which is revolutionizing the customer service industry by providing the most cutting-edge AI workforce on the market, providing solutions for the ultimate customer experience, whether it's an existing or new platform. "The quality of the customer experience can be a key differentiator for businesses today, and when deployed strategically within a larger CX solution, tools such as Conversational AI can deliver a valuable competitive edge," said N Jayantha Prabhu, business head - India, SAARC and MEA at Black Box. "We look forward to showcasing our best-in-class CX solutions and services at GITEX GLOBAL, where we'll offer insights into the value of AI tools and provide guidance with regard to overall CX transformation: choosing the right platforms, applications and business partner to deliver those integrations." Exhibiting within the AI Everything show at GITEX GLOBAL, Black Box will highlight CX transformation solutions and services that empower businesses to improve the experiences they provide to customers while reducing the costs of those services. Black Box experts will be on hand at GITEX GLOBAL to discuss in detail how AI-based tools can be implemented within larger CX solutions and services to help enable exceptional customer experiences. The company will also show how tools and technologies such as chatbots and voicebots, empowered by Conversational AI and Generative AI, can facilitate these goals — accelerating response times, enhancing personalization, reducing wait times, prioritizing issues, answering common questions, routing calls automatically, verifying or confirming customer-specific information, etc. — to help businesses optimize both internal processes and CX. More information about GITEX GLOBAL is available at www.gitex.com Further information about Black Box and the company's products and services is available at www.blackbox.com
-
SeeMetrics Launches *Customizable* Cybersecurity Performance Boards
SeeMetrics, the pioneering Cybersecurity Performance Management (CPM) platform reshaping the landscape of how security leaders measure, track, and improve security performance, is thrilled to launch its latest innovation: Customizable Cybersecurity Performance Boards. This product launch marks a significant milestone as it allows security leaders to communicate their desired narrative to different stakeholders and in the context that matters most to them. This customization comes in two essential dimensions: Security leaders can now instantaneously create their own Cybersecurity Performance Boards, selecting from a library of ready-to-use metrics that align with their specific needs and goals. Secondly, the customization extends to the metrics level as well, allowing leaders to set thresholds, filter business units, timeframes, asset types, geographic considerations and more in a dynamic way. These stack-derived metrics automatically analyze the relevant data and reflect performance in real-time. The genesis of this customization feature can be traced back to the introduction of SeeMetrics' Cybersecurity Performance Boards, spanning Vulnerability Management, Endpoint Protection, Identity Management, Mail Security, Security Awareness, and Incident Response. The new customizable boards were created to help meet the diverse demands of CISOs, each armed with unique objectives and interests, in order to assist them in managing their operations and sharing different narratives with various stakeholders. CISOs and security leaders are increasingly tasked with promptly addressing queries regarding performance, progress, and budget allocation. They require a centralized platform that consolidates, analyzes, and visualizes data from a multitude of operational security tools to communicate the state of operations to a range of different audiences - from security engineering, to management and executive teams. They need to identify trending patterns, identify the critical gaps, and understand how these factors impact overall performance. While SeeMetrics has been delivering out-of-the-box metrics thus far, the maturation of the cybersecurity industry and the increasing interest in metrics necessitate a move towards full customization capabilities, enabling CISOs to measure precisely what aligns with their unique needs. "When it comes to metrics, one size doesn't fit all: each company has their own challenges, priorities and risk appetite, requiring them to filter and focus on their specific business context,” says Shay Haluba, CTO and Co-Founder of SeeMetrics. “SeeMetrics now enables security leaders to easily customize their own metrics, empowering them to craft their own multidimensional security story by leveraging a foundation of out-of-the-box metrics and offering the option to mix and match, and coherently communicate the organization’s up-to-date security-stack performance on a regular basis.” "From my personal experience as a CISO, we all need a direct means to efficiently manage cybersecurity operations and customize them to suit our specific requirements, enhancing our comprehension of our effectiveness. This will lead to more dynamic conversations and better prepared CISOs,” says Julie Tsai, former Roblox CISO and advisor to SeeMetrics. “Metrics undoubtedly facilitate this process, but the ability to customize metrics relevant to my team's needs is a true game-changer."