Authomize expanded its REST API framework

Authomize announced the expansion of its REST API framework to enable customers to build their own custom connectors to their cloud and homegrown applications and services in a couple of hours. With the help of Authomize’s Software-as-a-Service (SaaS) solution, businesses can automatically secure access rights across every cloud service they use, including IaaS, SaaS, and IAM solutions. 

Guy Katzir, Head of Product at Authomize stated, “Authomize’s exceedingly granular connectors allow us to provide in-depth visibility into the most complex IAM permission models, including users, groups, roles, access privileges, assets, and activity. Our ability to map and understand the hierarchy structures within assets and groups gives customers the fine-grained insights they need to apply the most effective identities and access security controls and perform the most thorough incident investigations. 

We are already seeing customers using the REST API to build integrations to Coupa, Workday, Zuora, Chef, NetSuite, and and more. They are using these connectors to get the same high level of IAM permission modeling and depth of visibility value that we provide for our native connectors. Our new framework enables them to perform all functions they look to Authomize for, from running accurate streamlined User Access Reviews to enforcing security policies with continuous monitoring.” 

Authomize can ingest, normalize, and analyze identity and access data from any cloud, on-premises, or custom application or service by using native connectors, REST APIs, SCIM connectors, and a file uploader. Using this data as a foundation, Authomize can gain deep insights into the efficient access paths that would otherwise be hidden by the proliferation of IAM structures and siloed environments across multiple clouds. To enable users to connect more of their applications and services with the same level of granularity and coverage as the native connectors, Authomize has just released a new version of its API. 

Businesses can integrate Authomize with every component of their security infrastructure, including the top SIEMs, SOARs, and ITSMs, using the new REST API. 

Along with the recently released APIs, users can now take advantage of new webhook functionalities to automate access privilege revocation directly through Okta, send alerts to security orchestration tools like Microsoft Sentinel, and open tickets in ServiceNow and Jira, enhancing the value of the rest of their tooling ecosystem with Authomize’s identity and access data enrichment. 

Authomize has expanded its integrations by including Identity Providers (IdPs) OneLogin and JumpCloud, as well as Bamboo HR and Delinea’s Secret Server, which will enable them to track users between Secret Server and AWS, assisting clients in locating stale accounts and secrets. 

Read More : API Security Should Be Your Priority in 2022

iBASIS partners with jtendo to protect signaling networks

iBASIS  and jtendo have partnered to integrate the multi-protocol signaling firewall of jtendo to iBASIS Security iQ360, managed cloud-based security portfolio. To monitor, analyze, detect, and prevent security breaches, it is necessary to use advanced testing features and cross-protocol correlation due to the growth in network protocols (including those for 5G) and technologies, as well as roaming traffic. 

Piotr Szymański, CEO of jtendo stated, “We are very proud to partner with one of the largest international signaling, voice, and data networks and complement iBASIS’ 360-degree intelligence-based solution. Mobile operators are increasingly searching for threat management that continuously adapts to their ever-changing network landscape, offering a flexible managed solution hosted on the IPX network is an effective way to secure their signaling network as an ongoing process. We are always there to support our customers in keeping their network safe in all areas.” 

The strategic alliance brings together the global and managed cloud-based expertise of iBASIS with the security audit experience, in-depth technical knowledge of telco protocols, and cross-protocol correlation expertise of Jtendo. 

The iBASIS Security iQ360 platform gives MNOs process automation to identify security risks and address vulnerabilities. In-depth visibility, monitoring, and attack detection are the foundation of the solution, which also includes automatic rule updates for protection against continuously evolving threats. 

Guillaume Klein, iBASIS Vice President of Product Management expressed, “The growing threat trend around today’s telecom networks drives the need for innovative security management solutions that can adapt quickly to new threats. We are thrilled to collaborate with jtendo to achieve effective threat management and be able to leverage their unique auditing and multiprotocol expertise to raise the level of protection even further.” 

Read More : Cloud Security; concerns, and safety

N-able adds Private Portal, an extra layer of security for sensitive and business-critical emails

N-able has added Private Portal, an additional layer of email security, to N-able Mail Assure in order to help safeguard crucial business data. 

Based on the policies set up by the user or company, Private Portal, which is free with Mail Assure, notifies recipients when they receive an email with business-critical information. 

Mike Adler, chief technology and product officer at N-able “This free, easy-to-use feature enhancement of our Mail Assure product makes new capabilities available for our partners while extending the bubble of protection to cover mail that is sent beyond protected devices. 

Email is a huge communication channel. The approximate number of business and consumer emails sent and received per day exceeds an astounding 319 billion, and it continues to be one of the top attack vectors for cybercriminals. If sensitive business data got in the hands of the wrong person, it could have serious consequences—the best steps to take to reduce this threat is to be proactive and work smarter, not harder, by having the right tools in place.” 

Recipients can view and respond to the private emails in the Private Portal by clicking the link provided in the notification. 

The closed web-mail system can then be used by end users, who are a common source of vulnerability for MSPs. There, emails will be automatically deleted after 30 days, providing a crucial layer of defense against attackers searching inbox histories for crucial data. 

The recent significant release for Mail Assure includes more than just the Private Portal. Another new integration being introduced is one with the Splunk platform, which enables users to instantly send message audit data to that platform in order to create a dedicated integration of insights from that data into the larger SIEM processes. 

Users of the Mail Assure Private Portal can encrypt emails using the Advanced Encryption Standard (AES)-256 at rest and the Transport Layer Security (TLS) protocol standard while they are in transit. Users can create their own secure email policies, including the recipients of those policies, the rules for filtering messages, and the types of content those policies will affect. Users can access a “Log Search” page for emails stored in the Private Portal, as well as an “Audit log” where they can see every message’s path in detail, giving them visibility into every message kept in the Private Portal. 

Read More : Cloud Security; concerns, and safety

Zyxel upgrades Nebula Cloud Networking Solutions

Zyxel Networks launched significant updates to its Nebula Cloud Networking Solution. Zyxel Networks is a pioneer in providing secure, AI- and cloud-powered enterprise and residential networking solutions. By streamlining licensing sales, guiding users through Nebula’s premium features, enhancing usability, and boosting security and resilience across managed Nebula switches, the new Phase 15 upgrade (P15) further improves the user experience.  

Access points, switches, security firewalls, and LTE mobile routers are just a few examples of the extensive array of wireless and wired networking hardware that can be deployed, configured, monitored, and managed with ease using Nebula Cloud Networking Solution. By reducing the complexities of remote site access, the user-friendly interface enables all Nebula distributed networks to be monitored and managed from a single screen via the cloud. 

Shawn Rogers, Market Development Manager at Zyxel Networks stated, “The enhancements delivered to Nebula Cloud Management Solution through this update incorporate features designed to address pain points provided through the extensive feedback and insight that we have received from our customers. This update makes the experience of using Nebula easier and more convenient than ever and includes some new security features that all contribute to making our solution one of the best-in-class networking solutions for SMBs and solution providers.” 

The new features of the New P15 Update to Nebula Cloud Networking Solution: 

Security and Resilience for Nebula Switches 

Remote Configurator for Mobile Routers 

In-Line Overview of Premium Features  

Streamlined License Buying 

Anytime Trials 

Flexible Firmware Upgrades 

High-performance switches, firewalls, security gateways, and access points from the Zyxel Nebula Cloud Management Solution range are currently offered by all Zyxel authorized resellers and online retailers with limited lifetime warranties. 

Read More : Cloud Security; concerns, and safety

SoftIron launched HyperCloud

SoftIron launched HyperCloud, a fully turnkey and supported Intelligent Cloud Fabric. HyperCloud is a fully integrated platform that eliminates the complexity of integrating the numerous independent hardware and software layers required to build and operate a unified private or hybrid cloud. It was created from the ground up by SoftIron in its own factories.  

HyperCloud fully automates the provisioning of storage, compute, networking, and infrastructure services using pre-integrated building blocks. As a result, a fully functional, multi-tenant cloud can be set up in as little as half a day and with less than half a rack, and it can scale almost infinitely. 

Kenny Van Alstyne, CTO of SoftIron commented, “Building and running clouds today is overly complex as engineers battle to integrate disparate layers of technology into a resilient, performant, and scalable solution. It was time to take a step back and architect an entire platform, from the ground up, with the single task of making cloud consumable. HyperCloud removes the complexity of integrating the many independent hardware and software layers needed to build a cloud into a unified purpose-built fabric.” 

The purpose of an intelligent cloud fabric is to provide stateless building blocks that are holistically designed and pre-integrated for assimilation by a distributed cloud orchestration control plane. This will significantly reduce the complexity of managing a resilient, multi-site hybrid cloud. With the help of these building blocks, adding more storage and/or computing resources is as easy as “plug and play.” As a result, creating a cloud architecture is drastically simplified, allowing operations teams to quickly give application owners and data users the ability to use and manage services invisibly across private and public resources. 

HyperCloud, which is independent of all public cloud providers, gives IT specialists the ability to create and manage highly complex hybrid or multi-cloud infrastructures that function with a level of dependability, availability, elasticity, and serviceability that was previously only possible for hyperscale cloud builders with specialized knowledge and access to large engineering teams. Because of the modular design of HyperCloud, the ease with which new compute and storage resources can be added, as well as the out-of-the-box secure multi-tenancy capabilities, the cloud fabric can be scaled up or down just in time, preventing unnecessary over-provisioning and lowering costs. 

Phil Straw, CEO of SoftIron stated, “Public Cloud is popular because it creates a consumption-based experience hiding the complexity of operating a resilient, elastic infrastructure, and the sheer brute force of engineering that is needed to accomplish it – historically, that’s only been possible at hyperscale. 

It’s a useful utility in your IT tool belt, but most organisations today want a hybrid model. Creating a complexity breakthrough required a totally new approach to deliver the first and only complete technology to be used specifically for building clouds. After a decade of innovation, HyperCloud realises that goal and will forever change expectations of how clouds can and should be built.” 

Read More : Cloud Security; concerns, and safety

Styra added Repo Scan in its Declarative Authorization Service

Styra  has added Repo Scan as a feature in the Styra Declarative Authorization Service (DAS). This addition will provide Styra with scanning of configuration files in GitHub so that the platform teams have the power to prevent errors from making their way into production. 

Cloud platforms like Amazon Web Services, Google Cloud Platform, and Microsoft Azure, as well as the individual components of cloud applications, are all governed and managed by automated, adaptable tooling. It takes thousands of lines of configuration code to manage all of this tooling. This massive collection of code-based instructions has grown so complicated that it frequently creates room for error and raises the possibility of violating the law. 

Chris Hendrix, Director of Product Management at Styra stated, “No human can keep up with scanning thousands of lines of code, with infinite repetition, to ensure configuration changes and app updates don’t have unintended consequences. At Styra, we want to make our users’ jobs easier while ensuring that the applications and infrastructure they’re building are secure and compliant. This new addition to Styra DAS lets our customers shift their security policy left, all the way to code check-in time, to catch errors even earlier, and remediate risk from the start.” 

Platform teams now have a way to scan policy-as-code files in GitHub, and Repo Scan finds and flags problems to reduce the risk to availability, compliance, or security. Customers of Styra will be able to quickly identify errors and demonstrate their correction through dynamic compliance reporting thanks to this new capability. Utilizing an OPA-based policy that is completely extensible across platforms and tooling, empowers developers and promotes tool diversity. Automated policy enforcement that tracks and upholds policy boundaries from GitHub check-in to CICD to production deployment will increase productivity. 

Styra offers an OPA-based authorization platform for access control and security across cloud-native systems and applications. Styra expanded its policy-based authorization to microservices, gateways, and cloud-native entitlements management after focusing on policy-as-code guardrails for Kubernetes initially to ensure workload compliance for internal and external regulations. The business continues to offer clients and the OPA community enterprise authorization with the additions of Repo Scan to Styra DAS. 

Read More : Cloud Security; concerns, and safety

NetApp and VMware Expand Global Partnership!

VMware, and NetApp, a multinational, cloud-driven, data-centric software company, today announced the expansion of their long-standing international partnership. The cost, complexity, and risk associated with moving and modernizing enterprise-class workloads in multi-cloud settings are being reduced for clients by NetApp and VMware through novel solutions and go-to-market strategies. Additionally, new connections between the VMware and NetApp data management architecture enable enterprises to streamline daily operations while speeding up the performance and delivery of both old-fashioned and new-age apps. 

George Kurian, Chief Executive Officer, NetApp said, “Customers today are faced with complex challenges to optimize their current IT investments while laying a path forward to modernize and accelerate their business. Together, NetApp and VMware have helped thousands of customers solve their multi-cloud challenges by effectively managing their enterprise workloads in any environment. By delivering powerful new solutions that help companies optimize their virtual data centers, modernize their applications, and provide cost-efficient, enterprise-class data management services to VMware Cloud, we can meet customers anywhere they are on their cloud journey.” 

The core of the NetApp and VMware cooperation is shared expertise servicing 20,000 shared customers over a period of more than 20 years. In addition to VMware vSphere, VMware Cloud Foundation, and several VMware Cross-Cloud services, NetApp is a consistent VMware strategic design partner. Through their collaborative project on customer-driven co-engineering, NetApp and VMware are assisting customers in effectively managing, sharing, and protecting their hybrid and multi-cloud settings while providing cutting-edge solutions in a rapidly evolving technological environment. 

Raghu Raghuram, Chief Executive Officer, of VMware, said “At this stage, it’s clear: multi-cloud is the model we’re going to rely on for many years to come. It is the de facto operating model for the digital era, giving customers the freedom required to build, deploy, and manage applications in the way that best suits their business requirements. Together, VMware and NetApp offer businesses the multi-cloud flexibility and choice they need to leverage the best innovations in any cloud environment.” 

Read More : Cloud Security; concerns, and safety

DataMotion introduced DataMotion No-Code Experience

DataMotion introduced DataMotion No-Code Experience for mobile applications and portals. It offers a more user-friendly method of accessing the DataMotion platform after considering the market conditions now and the associated limitations faced by enterprise and healthcare development teams. 

The No-Code Experience is launched as a web component, with the goal of providing a simple and secure customer experience that requires few or no development resources. Customers can drop the No-Code web component into their responsive webpage by making a few settings changes in an intuitive user interface and gathering the necessary code snippet. In the client’s mobile app or portal, this develops a personalized, secure message center. Customers using the No-Code Experience can configure the web component to suit their unique use case. 

Bob Janacek, CEO of DataMotion commented, “DataMotion provides APIs and pre-built solutions so that our customers can introduce and enhance their secure exchange workflows where they need it. Currently, our API-first approach requires customers to develop their user interface to call our platform. But in looking at market conditions, it is obvious that the impact of the ‘Great Resignation’ has stretched our customers’ development resources too thin. The team at DataMotion stepped back, reimagined how we can deliver services to our customers, and concluded that our best approach was to develop the No-Code Experience. This experience brings the solution to market quickly, and results in compliance win immediately.” 

The enterprise portal’s features have been carefully incorporated into the web component’s design. This also involves inheriting CSS and branding with unique colors in the settings screen for a fully responsive solution. It’s easy to have complete control over what users see on the screen. The DataMotion No-Code Experience is integrated with providers of enterprise single sign-on (SSO) solutions, which makes deployment even easier. 

“This solution allows us to simplify the use of DataMotion’s platform where it is needed, without the enterprise having to build the UI. We deliver secure content exchange to the customer’s website, mobile site, and anywhere it is needed.”, Janacek continued. 

Read More : API Security Should Be Your Priority in 2022

Cloud Security; concerns, and safety

Cloud computing comprises software and services that operate on the Internet instead of on a local computer or a network of on-site servers. Businesses use cloud adoption as a way to improve the scalability of their Internet-based database capabilities while reducing cost and risk. To do this, businesses use cloud computing, which allows them to store, manage, and process essential data on remote servers that are hosted on the Internet. Many industries, such as healthcare, marketing, advertising, retail, finance, and education, can benefit from using the cloud. When moving to the cloud, it’s natural for businesses to worry about the safety of the company and sensitive customer data. There is significant concern about the security of areas such as external data storage, reliance on the internet, lack of control, multi-tenancy, and integration with internal security.

Enterprises find it difficult to move critical applications and sensitive data to public cloud environments without having control over their data center. Enterprises require a cloud solution with effective security and privacy controls over their applications and services, along with security and compliance.

Major cloud security concerns

Privacy and safety across webbased infrastructure, applications, and platforms have become a major concern for enterprises and solution providers. As devices, data centers, business processes, and other assets are rapidly moving to the cloud, ensuring quality cloud security necessitates comprehensive security policies, a security-conscious organizational culture, and effective cloud security solutions. Here are some of the cloud-native security concerns that organizations should aim to address if they want to build a strong security strategy.

  • Increased attack surface

Hackers now use the public cloud environment as a sizable and appealing attack surface, taking advantage of unsecured cloud ingress ports to gain access to and disrupt workloads and data in the cloud. Numerous hostile threats, including malware, zero-day vulnerabilities, account takeovers, and others, are now commonplace for threat actors.

  • Lack of visibility and tracking

Cloud providers have complete control over the infrastructure layer in the infrastructure as a service (IaaS) model and they do not expose it to their customers. The lack of visibility and control is intensified in the platform as a service (PaaS) and software as a service (SaaS) model. Cloud customers frequently struggle to identify, quantify, and visualize their cloud assets due to the lack of visibility and tracking in these models.

  • DevOps, DevSecOps, and Automation

Organizations that have adopted the highly automated DevOps culture need to ensure that appropriate security controls are identified early in the development cycle and embedded in code and templates. Security-related changes made after a workload has been deployed in production can jeopardize the organization’s security posture and increase time to market.

  • Granular privilege and key management

Cloud enterprise’s roles are frequently configured arbitrarily, granting extensive privileges that are not intended or required. Incase if organizations provide access to untrained enterprises or enterprises who have no business necessity to delete or add database assets can be risky. Such acts are vulnerable to security threats at the application level due to inadequately configured keys and privileges.

  • Cloud compliance and governance

Data privacy has become a significant concern, so compliance rules and industry standards like GDPR, HIPAA, and PCI DSS are getting stricter. Keeping track of who has access to data and what they are allowed to do with it is one way to make sure compliance is upheld. Cloud systems usually allow multiple users to access them, so if the right security measures (like access controls) aren’t in place, it can be hard to keep track of who is using the network. Enterprises also need to make sure that the provider follows these compliances strictly.

Robust Cloud Security Measures

Cloud providers offer many cloud-native security features and services, but enterprises require more effective solutions to achieve enterprise-grade cloud workload protection against breaches, data leaks, and targeted attacks in the cloud environment. Only an integrated cloud-native security stack can offer centralized visibility and policy-based granularity.

  • Policy-based IAM and authentication controls

As business requirements keep changing, it will be simpler to update Identity and access management (IAM) definitions if enterprises work with groups and roles rather than with individual enterprises. Higher level of authentication corresponds to a wider range of privileges, restricting access to a group or role to the assets and APIs necessary for that group or role to carry out its duties. Enterprises should follow good IAM hygiene, like enforcing strong password policies and permission time-outs.

  • Enforcement of virtual server protection policies

Cloud security vendors provide robust Cloud Security Posture Management, which consistently applies governance and compliance rules and templates when provisioning virtual servers, audits for configuration deviations, and where possible performs remediation automatically.

  • Safeguarding applications

Web application firewall (WAF) granularly inspects and controls traffic to and from web application servers, it automatically updates WAF rules in response to changes in traffic behavior and is deployed closer to workload-running microservices.

  • Enhanced data protection

Enterprises need to have enhanced data security through encryption at all transport layers, secure file shares, and communications, continuous compliance risk management, and good data storage resource hygiene such as detecting misconfigured buckets and terminating orphan resources.

  • Real-time threat intelligence 

Threat intelligence management solutions provide context to large and diverse streams of cloud-native logs by intelligently cross-referencing aggregated log data with internal data sources such as asset and configuration management systems, vulnerability scanners, and so on. They also provide tools to help visualize and query the threat landscape and promote faster incident response times.

  • Zero trust security

Zero Trust only grants enterprises access to the resources they require to carry out their duties. It also encourages developers to ensure that web-facing applications are properly secured. If the developer does not consistently block ports or implement permissions on an “as needed” basis, a hacker who takes over the application will have access to the database and will be able to retrieve and modify data.

Furthermore, Zero Trust networks employ micro-segmentation to increase the granularity of cloud network security. Micro-segmentation creates secure zones in data centers and cloud deployments, separating workloads from one another, securing everything within the zone, and applying policies to secure traffic between zones.

The way ahead

Cloud computing has made previously inaccessible levels of storage, accessibility, flexibility, and productivity available to users. As more and more businesses transfer their operations to the cloud, implementing preventative cybersecurity measures will become increasingly crucial for guaranteeing a smooth transition to more dynamic cloud environments. With an understanding of the above-mentioned concerns and measures, organizations will be better equipped to devise a cloud security strategy that will keep the cloud environment safe.

Tenacity platform added enhancements to provide visibility into cloud infrastructure

Tenacity Cloud’s platform now supports agentless, automated, and self-directed activation, with immediate deployment. Mid-market and enterprise IT organizations can set up an account and integrate their environment with AWS in seconds with just a few clicks. Within minutes, asset data begins to populate, and users begin to discover misconfigurations, cost overruns, and compliance issues caused by configuration-level errors. 

Jason Yaeger, co-founder & CEO at Tenacity stated, “Security missteps, unused resources, and spending unknowns tend to happen at every business along the way. Tenacity installations uncover unknown assets in 100% of installs. Ensuring a constant secure environment is a monumental DevOps challenge, but it’s also essential to business survival. Our mission is to create the fastest and easiest way to reach cloud security, and we’re proud to be delivering unprecedented agility and speed to observability through an easy-to-use and cost-effective platform.” 

Tenacity’s platform provides users with instant and complete visibility into their entire AWS and Azure cloud infrastructure, as well as a comprehensive view of security, compliance, and cost for all cloud assets. Tenacity monitors hundreds of different AWS and Azure vulnerabilities and cloud security risks on a continuous basis. All vulnerable assets and misconfigurations are automatically identified, grouped, and ranked by severity, allowing users to prioritize which risks addressing first. Then, step-by-step remediation instructions are provided. 

Furthermore, Tenacity continuously monitors cloud spending and automatically identifies abandoned or underutilized resources that are ready to be decommissioned in order to uncover hidden savings and reduce potential risk. Compliance audits are also performed automatically. 

Wasted cloud spending is a major issue that is becoming more pressing as cloud usage and costs rise. According to the Flexera 2022 State of the Cloud Report, 32% of enterprise spending on cloud infrastructure is wasted. Tenacity recently assisted a customer in discovering more than $150,000 in unused resources. Another Tenacity customer recently discovered $35,000 in compute that had been spun up and forgotten about.