Insight Enterprises expanded its Managed XDR

Insight Enterprises announced the expansion of its managed security service with new extended detection and response (XDR) capabilities to help enterprises modernize and strengthen their security posture without adding overhead for internal IT teams. 

Stephen Moss, senior vice president of managed services at Insight stated, “There’s no doubt that finding the right skills in security — like many other technology disciplines — is incredibly difficult today. Our clients are seeing a dramatic decrease in security fatigue and burnout through the automation that this service provides — building correlations in the background eliminates manual interventions and transforms reaction time drastically. Our clients are consuming a service that’s outcome-based while leaning on a full-spectrum security provider they can trust. This not only spans managed service but consulting and project services for an end-to-end experience.” 

The Insight Managed XDR service is part of managed IT services offered by Insight that simplify asset management, quicken issue resolution, cut down on operational costs, and free up in-house IT staff to concentrate on strategic initiatives. This allows CISOs and CIOs to source all their technology requirements from a single partner and extends Insight’s security architecture and overall IT modernization services. 

By giving 24/7 visibility into the entire IT environment and covering the entire digital estate, including endpoints, cloud, and data center infrastructure. Insight Managed XDR both lowers risk and streamlines security management by removing simple fixes for every attack surface. Utilizing analytics powered by AI and machine learning to identify threats and reducing the months-long process of discovering a security breach attempt to hours or even minutes. Providing automated orchestration and built-in orchestration for quick incident response and remediation. 

Asigra launched Tigris Data Protection

Asigra launched Tigris Data Protection software with CDR (Content Disarm & Reconstruction). Asigra Tigris Data Protection software now includes CDR for protection against deeply embedded malware to address the ransomware threat, which now significantly increases the risk to both primary and backup data. 

The most recent generation of ransomware hides harmful code within content files that are frequently nested and compressed. Cybercriminals know that antimalware cannot scan what it cannot see, so they can avoid detection by using deeply embedded code. The data protection platform Asigra Tigris unifies cybersecurity and backup, fostering new levels of collaboration between data protection and security experts. 

Val Silva, CTO of Asigra “Worrisome increases in cybersecurity attacks on critical business systems has followed the rise in remote work environments over the past couple years. These attacks are commonly finding their way within corporate networks, and in many cases, specifically targeting backup systems. 

With Asigra CDR, Tigris Data Protection has reset the bar with ultra-secure backup that ensures organizations meet their business continuity objectives for absolute confidence in the ability to recover mission-critical data when needed.” 

The brand-new security feature, CDR, breaks down supported files into their smallest parts to find any embedded malicious code, macros, links, or executables. CDR reconstructs the original file without the malware after filtering and containing the malware. The technology eliminates any potential payload threats that are deeply buried within each file, outperforming predictive detection-based techniques. By maintaining file functionality and authenticity without the use of malicious code, the new CDR functionality ensures the integrity of the files. 

Asigra’s security architecture now includes soft-delete support, FIPS 140-2 certified encryption, bidirectional CDR, zero-day exploit protection, variable repository naming to non-standard names to prevent recognition, deep MFA (multi-factor authentication), and variable repository sanitization with inline detection on both the backup and recovery streams. 

D3 Security launched D3 Chronos

D3 Security has introduced D3 Chronos, a simplified SOAR package for managed security services providers (MSSPs) that can reduce alert-handling times by 90% in under two weeks. D3 Chronos is designed to provide return on investment and prioritize MSSPs’ effectiveness and business outcomes, in contrast to full-scale SOAR implementations that can take months. By optimizing the customer-to-analyst ratios, D3 Chronos enables MSSPs to onboard their clients and automate triage, both of which boost profitability. 

Denis Barnett, VP of Sales at D3 Security, “In today’s competitive managed services landscape, everyone needs automation, but not every MSSP has the resources to commit to a full-scale SOAR implementation. D3 Chronos fills a critical gap in the market by making the revenue-generating potential of SOAR immediately accessible to every MSSP without compromising the power of the software.” 

MSSPs can begin saving time and money by connecting D3 Chronos to the alert sources of their clients. The pricing structure of D3 Chronos is flexible, and it includes a pay-monthly option for smaller businesses that fits the revenue cycle of MSSPs while assisting them in reducing capital expenditures. 

D3 Security’s Event Pipeline, a SOAR technology that works globally to normalize, deduplicate, and triage incoming events, filtering out 90-98% of events and removing false positives before they reach a human analyst, recently made a breakthrough that allowed the development of D3 Chronos. 

D3 Chronos is made for busy MSSPs who want to automate their client growth and increase profits. According to D3 Security, automating triage alone can result in annual savings of more than $1 million for an MSSP processing 400 events per day. 

D3 Chronos also automates tracking of client SLAs and billable hours in addition to the triage and enrichment pipeline. When a situation necessitates a second level of investigation, D3 Chronos compiles the findings into a report for the client, saving MSSP analysts a tremendous amount of time. Growing D3 Chronos MSSPs are supported as they develop with new SOAR options that are suited to their requirements. 

Read More : Security Automation & Orchestration (SOAR)

N-able adds Private Portal, an extra layer of security for sensitive and business-critical emails

N-able has added Private Portal, an additional layer of email security, to N-able Mail Assure in order to help safeguard crucial business data. 

Based on the policies set up by the user or company, Private Portal, which is free with Mail Assure, notifies recipients when they receive an email with business-critical information. 

Mike Adler, chief technology and product officer at N-able “This free, easy-to-use feature enhancement of our Mail Assure product makes new capabilities available for our partners while extending the bubble of protection to cover mail that is sent beyond protected devices. 

Email is a huge communication channel. The approximate number of business and consumer emails sent and received per day exceeds an astounding 319 billion, and it continues to be one of the top attack vectors for cybercriminals. If sensitive business data got in the hands of the wrong person, it could have serious consequences—the best steps to take to reduce this threat is to be proactive and work smarter, not harder, by having the right tools in place.” 

Recipients can view and respond to the private emails in the Private Portal by clicking the link provided in the notification. 

The closed web-mail system can then be used by end users, who are a common source of vulnerability for MSPs. There, emails will be automatically deleted after 30 days, providing a crucial layer of defense against attackers searching inbox histories for crucial data. 

The recent significant release for Mail Assure includes more than just the Private Portal. Another new integration being introduced is one with the Splunk platform, which enables users to instantly send message audit data to that platform in order to create a dedicated integration of insights from that data into the larger SIEM processes. 

Users of the Mail Assure Private Portal can encrypt emails using the Advanced Encryption Standard (AES)-256 at rest and the Transport Layer Security (TLS) protocol standard while they are in transit. Users can create their own secure email policies, including the recipients of those policies, the rules for filtering messages, and the types of content those policies will affect. Users can access a “Log Search” page for emails stored in the Private Portal, as well as an “Audit log” where they can see every message’s path in detail, giving them visibility into every message kept in the Private Portal. 

Read More : Cloud Security; concerns, and safety

Elevate Security launched a new SaaS offering to its cyber risk intelligence capabilities

Elevate Security launched a new SaaS offering building on Elevate’s cyber risk intelligence capabilities to deliver risk assessments, visibility to company-wide internal cyber risk, and the ability to deliver risk-adjusted security controls at the individual worker level. Elevate offers a comprehensive user risk analysis that is based on millions of independent data points. 

The need for aggressive management of internal threats is now gaining prominence, even though many organizations have implemented external security measures. With the current spikes in ransomware, malware, and supply chain attacks making headlines, several recent research reports identify worker risk as the new primary reason behind cyberattacks. 

Robert Fly, CEO at Elevate stated, “The inspiration for Elevate’s unique approach grew out of our own frustration identifying and deterring high risk workers. Our customers are now benefiting across security operations, governance and risk management, insurance, and strategy. Today’s announcement helps further address growing customer demand with easy to implement out-of-the-box solutions tailored for specific situations and cyber maturity levels.” 

Elevate reduces workforce risk by integrating data feeds from different parts of the company and outside sources to generate a unique risk score for each employee, which works a lot like a credit score. 

An ever-evolving Human Risk Score is created by combining risk factors like employee susceptibility to phishing, sensitive data handling, safe browsing, and password management with demographics and other traits. 

Elevate’s Human Risk Score can influence every aspect of an organization’s security posture, from zero trust to data protection and more, thanks to its close integration with security controls. 

Controls can then be tailored to each individual’s risk level, ensuring that the entire workforce is productive while also safeguarding high-risk individuals, the organization, and itself from employee-predator attacks. 

The Elevate platform was developed to address unintentional user risk: 

  • predicts when and how attackers will target risky users by identifying them 
  • uses risk-based safety measures to keep them and the company safe 
  • automates giving managers and users personalized feedback 
  • The idea for Elevate’s distinctive approach originated from our own 

ThreatLocker Adds Network Access Control to Company’s Zero Trust Platform

ThreatLocker, a cybersecurity company that provides businesses and managed service providers (MSPs) with enterprise-level tools to protect endpoints, announced the release of ThreatLocker Network Access Control (NAC), which controls inbound traffic to endpoints to add a new layer of security to the company’s zero trust platform. 

Danny Jenkins, CEO of ThreatLocker, said “With remote work as the standard practice, the local network is no more. Companies need to have full visibility of the traffic going to their endpoints, as nation-state threat actors and everyday cybercriminals are hitting targets across every industry. This is a pivotal moment in the battle to stop attacks that have been launched on remotely accessible servers, including MSPs RMM servers. 

Customers can now configure network access to endpoints using global policies thanks to ThreatLocker’s introduction of NAC. Whether it’s a local server or a remote laptop, the solution provides visibility into all permitted and denied inbound traffic within a single audit. Like a typical firewall, policies can be created. A centralized view of endpoints is offered to clients by the cloud-managed system. 

Neal Juern from Juern Technology, a Texas-based MSP stated, “We now have the ability to take RMM servers off the general internet while dynamically allowing agents to connect from where they are without a VPN… This gives us peace of mind knowing that we are protected against an RMM vulnerability that could allow an attacker to use our tools to push ransomware to clients.” 

Zyxel upgrades Nebula Cloud Networking Solutions

Zyxel Networks launched significant updates to its Nebula Cloud Networking Solution. Zyxel Networks is a pioneer in providing secure, AI- and cloud-powered enterprise and residential networking solutions. By streamlining licensing sales, guiding users through Nebula’s premium features, enhancing usability, and boosting security and resilience across managed Nebula switches, the new Phase 15 upgrade (P15) further improves the user experience.  

Access points, switches, security firewalls, and LTE mobile routers are just a few examples of the extensive array of wireless and wired networking hardware that can be deployed, configured, monitored, and managed with ease using Nebula Cloud Networking Solution. By reducing the complexities of remote site access, the user-friendly interface enables all Nebula distributed networks to be monitored and managed from a single screen via the cloud. 

Shawn Rogers, Market Development Manager at Zyxel Networks stated, “The enhancements delivered to Nebula Cloud Management Solution through this update incorporate features designed to address pain points provided through the extensive feedback and insight that we have received from our customers. This update makes the experience of using Nebula easier and more convenient than ever and includes some new security features that all contribute to making our solution one of the best-in-class networking solutions for SMBs and solution providers.” 

The new features of the New P15 Update to Nebula Cloud Networking Solution: 

Security and Resilience for Nebula Switches 

Remote Configurator for Mobile Routers 

In-Line Overview of Premium Features  

Streamlined License Buying 

Anytime Trials 

Flexible Firmware Upgrades 

High-performance switches, firewalls, security gateways, and access points from the Zyxel Nebula Cloud Management Solution range are currently offered by all Zyxel authorized resellers and online retailers with limited lifetime warranties. 

Read More : Cloud Security; concerns, and safety

SoftIron launched HyperCloud

SoftIron launched HyperCloud, a fully turnkey and supported Intelligent Cloud Fabric. HyperCloud is a fully integrated platform that eliminates the complexity of integrating the numerous independent hardware and software layers required to build and operate a unified private or hybrid cloud. It was created from the ground up by SoftIron in its own factories.  

HyperCloud fully automates the provisioning of storage, compute, networking, and infrastructure services using pre-integrated building blocks. As a result, a fully functional, multi-tenant cloud can be set up in as little as half a day and with less than half a rack, and it can scale almost infinitely. 

Kenny Van Alstyne, CTO of SoftIron commented, “Building and running clouds today is overly complex as engineers battle to integrate disparate layers of technology into a resilient, performant, and scalable solution. It was time to take a step back and architect an entire platform, from the ground up, with the single task of making cloud consumable. HyperCloud removes the complexity of integrating the many independent hardware and software layers needed to build a cloud into a unified purpose-built fabric.” 

The purpose of an intelligent cloud fabric is to provide stateless building blocks that are holistically designed and pre-integrated for assimilation by a distributed cloud orchestration control plane. This will significantly reduce the complexity of managing a resilient, multi-site hybrid cloud. With the help of these building blocks, adding more storage and/or computing resources is as easy as “plug and play.” As a result, creating a cloud architecture is drastically simplified, allowing operations teams to quickly give application owners and data users the ability to use and manage services invisibly across private and public resources. 

HyperCloud, which is independent of all public cloud providers, gives IT specialists the ability to create and manage highly complex hybrid or multi-cloud infrastructures that function with a level of dependability, availability, elasticity, and serviceability that was previously only possible for hyperscale cloud builders with specialized knowledge and access to large engineering teams. Because of the modular design of HyperCloud, the ease with which new compute and storage resources can be added, as well as the out-of-the-box secure multi-tenancy capabilities, the cloud fabric can be scaled up or down just in time, preventing unnecessary over-provisioning and lowering costs. 

Phil Straw, CEO of SoftIron stated, “Public Cloud is popular because it creates a consumption-based experience hiding the complexity of operating a resilient, elastic infrastructure, and the sheer brute force of engineering that is needed to accomplish it – historically, that’s only been possible at hyperscale. 

It’s a useful utility in your IT tool belt, but most organisations today want a hybrid model. Creating a complexity breakthrough required a totally new approach to deliver the first and only complete technology to be used specifically for building clouds. After a decade of innovation, HyperCloud realises that goal and will forever change expectations of how clouds can and should be built.” 

Read More : Cloud Security; concerns, and safety

HelpSystems acquires Outflank to help address dangerous IT vulnerabilities

HelpSystems acquired Outflank, an Amsterdam-based team of professionals who collaborates with financial institutions, multinational corporations, and other organizations that demand the highest level of security by using ethical hacking techniques that closely resemble those used by cybercriminals in the real world. 

To assist clients in assessing and preventing risk from various perspectives, the company has joined the HelpSystems Offensive Security portfolio of solutions for vulnerability management, penetration testing, and red teaming/adversary simulation. 

Kate Bolseth, CEO, HelpSystems commented, “This is an incredibly fast-moving and exciting space, and we’re thrilled to welcome the Outflank experts to the HelpSystems family. Offensive security tactics like adversary simulation are an essential part of a well-rounded cybersecurity strategy, particularly for organizations operating in complex, sensitive IT environments. Our customers can rest assured that we’re able to support them with an unparalleled combination of targeted software and expert-led services.” 

In the form of red teaming operations, advanced security assessments are sought after by many organizations, but few possess the internal resources to successfully complete this crucial task. 

Some members of the red team create their own tools or search for specialized open-source solutions before starting an engagement. 

In order to help rigorously vetted organizations, assess their defenses in light of the current high-stakes security environment, Outflank offers consulting, training, and a SaaS-based software toolkit. In fact, the company created its Outflank Security Tooling solution to collaborate with Cobalt Strike from HelpSystems for a powerful adversary simulation strategy. 

Outflank team stated, “Our team is passionate about offensive security and proud of our critical role as a red teaming leader in the cybersecurity industry. We excel at supporting, challenging, and training security teams to identify and correct gaps in their defenses through advanced adversary simulations. With our SaaS solution for red teams, we offer an extremely powerful toolset to our customers so they can execute sophisticated attack scenarios themselves. As part of HelpSystems, we can expand our market reach and support more security teams, while continuing to apply stringent controls over the access to our powerful toolset and staying mindful of how our solution is used.”

Box Upgrades Box Sign To Make Digital Transactions Convenient!

Box Inc., the industry-leading provider of content clouds, unveiled a new set of features for Box Sign, its built-in e-signature functionality. This decision was taken to encourage clients to transfer more of their transactions to the cloud. Through this, users can publish documents for electronic signature, update signature requests in flight, enhance the signer experience, and more using these features, which are already available. 

Box additionally declared that starting right now, Box Sign is accessible to all Box users at no additional charge. 

Diego Dugatkin, Chief Product Officer at Box stated, “The future of work is digital-first and paper-based processes hold companies back from reaching their full potential. Since entering the e-signature space, our north star has been to deliver all customers with a simple, secure, and cost-effective e-signature solution. Today, we take another big step towards achieving that goal by expanding Box Sign’s core capabilities so that customers can do more with The Box Content Cloud without added costs. We are just getting started within this space, and customers can expect to see even more innovation for Box Sign in the future.” 

Features of the new box sign 

Box Sign, a feature included in all Box plans, enables users to complete employee, customer, and partner transactions digitally and gives them access to e-signature capabilities. Box Sign is already being used by more than 500,000 Box users to speed up digital transactions, and this number will increase as new use cases are opened by improved Box Sign features. With the enhancements made today, users of Box Sign can now streamline high-volume business procedures for standardized documents including NDAs, event registrations, liability waivers, and more. Businesses can now use the Box Content Cloud to quickly and securely complete more of their signature-based business operations, thereby lowering their IT costs.  

Read More : CFBD and Resecurity Collaborate to Provide Cyber Threat Protection