Remediant launched Remediant PAM+

Remediant has launched Remediant PAM+, a strategy designed to safeguard access while speeding up enterprise zero trust initiatives. With its agentless SecureONE product, Remediant is at the forefront of the PAM+ movement. In the last twelve months, the company has doubled its ARR and deployments, and more than half of these deployments have fulfilled functionality commitments made by antiquated PAM vendors but never kept. 

Raj Dodhiawala, Remediant President & CEO stated, “Privilege sprawl and credential misuse is a factor in nearly every cyberattack, so much so that both are being specifically identified as reasons for rapidly increasing cyber insurance premiums. The innovative PAM+ strategy promises to disrupt the stagnant PAM solutions market and truly solve for the today’s operational and cybersecurity pains. Remediant is laser-focused on protecting access, thereby preventing lateral movement for every customer – regardless of size, architecture model or vendor ecosystem.” 

Customers have confirmed that SecureONE prevents lateral movement, frustrates red teams, and satisfies cyber insurance requirements for lower premiums. Legacy PAM falls short of this level of security, bolstering Remediant’s PAM+ strategy. For the second year in a row, Remediant was named as an Honorable Mention in the Gartner Magic Quadrant for Privileged Access Management in 2022. 

These days, password protection is insufficient. Because of privileged identity sprawl, a huge attack surface that attackers covet, cyberattacks continue to be successful despite significant investments in legacy PAM solutions. 

According to the MITRE ATT&CK framework, admin credentials are essential to every successful cyberattack because they allow attackers to take advantage of privilege sprawl and move laterally to access an organization’s most valuable data and intellectual property. 

PAM+ goes above and beyond traditional PAM methods to tackle these risks head-on. PAM+ adds value to the customer’s zero trust journey through six capabilities: 

  • Eliminates the pointless privilege access that is always on and available. 
  • Minimizes the effects of hacked admin credentials 
  • Makes malware that steals passwords ineffective 
  • Utilizes multi-factor authentication to route all administrative access 
  • Increased IAM/PAM program maturity through access protection 
  • Delivers value quickly and integrates seamlessly into IT and security workflows without using agents. 

Netskope Improvised Netskope Private Access

Netskope announced significant improvements to Netskope Private Access, the zero-trust network access (ZTNA) foundation of its security platform. Customers of Netskope can now apply zero trust principles to the broadest range of hybrid work security requirements, including SaaS, IaaS, private applications, web, e-mail, and endpoint devices.

In hybrid work environments, enterprises are rapidly adopting Secure Access Service Edge (SASE) technology architecture. ZTNA is critical to SASE, it enables organizations to transition from legacy remote access VPN infrastructure to a modern, efficient, and secure infrastructure.

Netskope Private Access, which provides ZTNA services, is an essential component of the Netskope Intelligent SSE platform. It connects users to corporate resources anywhere, using any device, and continuously evaluates context and adapts to reduce risk. This context has now been extended to the enterprise data layer, leveraging Netskope’s unified DLP capabilities. Netskope provides advanced data protection capabilities, which are highlighted as an area where other SASE and SSE vendors fall short.

John Martin, Chief Product Officer at Netskope stated, “Enterprises need data-centric ZTNA—period. Private applications often house some of an organization’s most valuable information, including trade secrets and code repositories, and are an absolute must for comprehensive data protection capabilities. These key enhancements to Netskope Private Access extend Netskope’s award-winning zero-trust data protection capabilities that much further, offering enterprises multiple options to protect the information, from inspecting private application traffic to applying DLP in risky use cases such as third-party access and BYOD.”

A hybrid work environment needs the ability to apply zero trust principles to govern user, device, network, application, and data behavior, thereby increasing confidence in policy enforcement everywhere. Under zero trust, technology resources no longer implicitly trust any entity seeking to connect. The resource can determine an appropriate level of confidence, or trust, only for that specific interaction and by evaluating several contextual elements such as user role and identity, device identity and security posture, time of day, data sensitivity level, and more. Businesses become more agile, reduce risk, and streamline application deployment and ongoing maintenance because of using Netskope Intelligent SSE with zero trust data protection throughout.

Chris Rodriguez, Research Director of Security & Trust at IDC stated, “Zero trust network access is all about optimizing the balance of enabling access and mitigating risk, and the most effective ZTNA solutions, including Netskope Private Access, help reduce the risk and exposure associated with legacy remote-access VPNs. Enterprises should be pleased to see that Netskope continues to innovate and has now added capabilities to strengthen data protection policies across the widest range of use cases, from SaaS to private apps.”

Read more articles:

Everything you need to know about Zero Trust Security in 2022!

SecZetta & Active Cyber Partnered for Identity Governance

SecZetta has collaborated with Active Cyber, a cloud consultancy firm that specializes in the implementation of cloud-based Identity & Access Management (IAM) solutions. SecZetta’s Third-Party Identity Risk solution will be sold by Active Cyber. It will also offer consulting and implementation services to organizations interested in implementing a comprehensive, zero-trust solution to their third-party non-employee challenges.

Kishore Vankayalapati, CIAM Practice Leader at Active Cyber commented, “Organizations are investing heavily in cybersecurity programs to make them more resilient against cyber-incidents and enable them to detect attacks in a shorter timeframe to minimize the costs associated with breaches.”

Almost every industry relies on a growing and increasingly diverse number of third parties to provide the elasticity required to respond to operational needs quickly and cost-effectively. Most organizations, however, lack a centralized way to track and manage their relationships with this growing number of non-employees, as well as the access to enterprise assets that they require.

SecZetta bridges the technological gap in third-party identity governance by providing third-party identity risk solutions that are simple to use and purpose-built to assist organizations in implementing risk-based identity access and lifecycle strategies for third-party non-employee populations. SecZetta adds the most value when combined with industry-leading IGA solutions like Okta and SailPoint.

Active Cyber adds value throughout the sales and delivery process by consulting with and advising customers on a complete, zero-trust solution to their third-party challenges, which includes SecZetta in addition to these other industry-leading identity solutions.

Jeremy Rohrs, SVP, global channel, alliances, and corporate development, SecZetta stated, “Active Cyber’s expertise uniquely positions them to advise clients around a true zero-trust approach to identity, ensuring both internal and external workforce needs are met for trusted, authoritative identity data that is essential for end-to-end identity governance. Non-employee identity governance is critical to limiting the attack surface of organizations relying on third-party services. We look forward to collaborating with Active Cyber to empower customers to maximize their use of third-party resources to support their business needs by managing the identity lifecycle and risk of third-party users and strengthening their resilience to identity-related cyber incidents.”

Read more articles:

Identity and Access Management in 2022!

Everything you need to know about Zero Trust Security in 2022!

Before being permitted or maintaining access to applications and data, all users, whether inside or outside the organization’s network, must be verified, authorised and continually checked for security configuration and posture. Zero Trust presupposes that there is no typical network edge; networks can be local, cloud-based, or a blend of the two, with resources and workers located anywhere.

For today’s modern digital transformation, Zero Trust is a framework for safeguarding infrastructure and data. It specifically addresses today’s business concerns, such as securing remote workers, hybrid cloud systems, and ransomware attacks. While several suppliers have attempted to define their own terms.

Why adopt a zero-trust security model?

Cybercriminals targeting business-critical and sensitive data, such as personally identifiable information (PII), intellectual property (IP), and financial information, may find cloud settings appealing targets.

Even though all data breaches will never be completely eradicated, and no security plan is perfect, zero trust remains one of the most effective security solutions today. Zero trust minimizes the attack surface and negates the effect and intensity of cyberattacks, saving time and money in the aftermath of a breach.

Benefits of zero trust

1. Minimize company and organizational risk

Zero trust solutions prevent all apps and services from communicating until their identity attributes—immutable qualities that comply with predefined trust rules like authentication and authorization—are confirmed.

As a result, zero trust decreases risk by revealing what’s on the network and how those assets communicate. After baselines are established, a zero-trust strategy reduces risk by eliminating overprovisioned software and services and reviewing the “credentials” of every communication asset on a regular basis.

2. Take command of cloud and container environments.

Security professionals’ biggest concerns about going to the cloud are access management and visibility loss. Despite improvements in CSP security, workload security is still a shared responsibility between your company and the CSP. However, you can only influence so much within the CSP’s cloud.

Security policies are imposed depending on the identity of communicating workloads and are related directly to the workloads themselves in a zero-trust security architecture. This keeps security as close to the assets that need to be protected as feasible, independent of network constructions like IP addresses, ports, and protocols. Protection follows the workload and remains consistent when the environment shifts. 

3. Reduce the possibility of a data breach

Every entity is assumed hostile based on the concept of least privilege. Before “trust” is provided, each request is examined, users and devices are authenticated, and permissions are evaluated. As the context changes, such as the user’s location or the data being accessed, this “trust” is regularly reviewed.

An attacker who gains access to your network or cloud instance via a compromised device or other vulnerability will be unable to access or steal your data if you lack trust. Furthermore, the attacker will have nowhere to go because the zero-trust architecture produces a “safe section of one” with no way to move laterally.

Absolute Software Enhances its Security Access Product Portfolio!

Absolute Software, today announced new platform advancements that will allow clients to identify, and respond to possible endpoint security access threats across distant, distributed device fleets more quickly. This company is a leading provider of endpoint resilience solutions.

“The number of endpoint devices operating out of physical reach and off the corporate network has made it more challenging than ever for IT and Security admins to identify where their organization might be most vulnerable or exposed to risk,” said Ameer Karim, Executive VP of Product Management at Absolute. “These platform enhancements signal our ongoing commitment to delivering the visibility, intelligence, and self-healing capabilities our customers need to ensure devices and data remain protected, and critical applications stay healthy and resilient.”

IT and security professionals can now protect essential infrastructure, applications, devices, and data without sacrificing user productivity thanks to these product upgrades.

Benefits to users:

  1. Security access enforcement and dynamic re-authentication:

Customers may now more simply deploy current cloud authentication solutions to reduce the risk of compromised credentials. The ability to challenge a user’s security credentials if the conditions or environment change, forcing them to re-authenticate using existing technology such as Multi-factor Authentication, is one of the new features.

2. Foundational zero trust security:

New ZTNA policy actions improve the capacity to protect employees against harmful applications and network destinations, as well as prohibit lateral movement.

3. Resilient deployment architecture:

Using active server technology, Absolute has added Resilience to its distributed network architecture, bringing the benefits of Software-as-a-Service (SaaS) to customer-managed environments, including high availability, horizontal scale-out, and zero downtime upgrades. Improved diagnostics and monitoring capabilities:

4. Truly resilient ZTNA:

Absolute’s self-healing ZTNA client for Windows is capable of autonomously reinstalling itself if it is tampered with, accidentally uninstalled, or otherwise stops working, ensuring that it remains healthy and offers the full value intended.

Read more related news:

Absolute Software Announces New Product to Track Critical Performances

Banyan Security Released Team Edition a Zero trust Solution

A global provider of Zero Trust Network Access solutions, Banyan Security released Team Edition a Zero trust Solution. This solution is a costless version of the company’s robust Zero Trust Remote Access platform which is accessible and designed for around 20 users. Team Edition is meant to give teams zero-trust access to hosted applications and infrastructure services with a single click, eliminating the need for legacy VPNs, inbound firewall ports, or DNS management.  

CEO & co-founder at Banyan Security, Jayanth Gummaraju, stated, “Zero trust remote access is about making it easier for people to securely access the resources they need from wherever they are. Unlike most zero trust vendors, we are taking a comprehensive approach to improving security by leveraging principles like least privilege access, user trust, continuous authorization with device trust, and trust-based access control. Team Edition makes it so easy – in 15 minutes, one can set up and manage zero trust access for their team. There’s no integration, no complex enrollment, and no charge. It’s a solution designed to provide the best admin, management, and end user experiences.”  

For decades at least, IT, Security, and DevOps have had to put up with substandard application and resource access solutions. As a result, there has been inconsistency in performance and less-than-ideal user experiences, which has harmed company security and employee productivity. By integrating least privilege access and continuous authorization to validate access based on real-time user and device trust, Team Edition overcomes these fundamental difficulties in just no time. Also, device trust reduces the risks of credential theft or loss, allowing users to use their chosen devices without affecting security. The Banyan TrustScore feature provides additional protection by quantifying user and device trust with a device security posture.

Banyan Security released Team Edition an award-winning Zero Trust Remote Access platform. This solution. This solution enables IT, Security, and DevOps team leaders the power and security of zero-trust remote access, as well as the increased productivity of users who have access to all provisioned services. With trust-based policy control, least privilege access, and continuous authorization, new infrastructure services, and hosted apps may be made accessible in minutes rather than days or weeks, while ensuring admin visibility, control, and security.

Related News :

Zentera Helps Enterprises Protect Against Insider Threats And Ransomware

Keeper Secrets Manager, the First Zero-Trust, Zero-Knowledge and Cloud-Native Solution for Securing Infrastructure Secrets

Zentera Helps Enterprises Protect Against Insider Threats And Ransomware

Zentera System has announced a major update to its Zentera Air Zero Trust Services platform, which now offers a variety of choices for SMEs to manage common cybersecurity concerns using next-generation Zero Trust Security technology. 

Many of the same cybersecurity challenges affect SMEs and large corporations: ransomware affects business continuity, external compromise generates compliance and data security issues, and theft by malicious insiders jeopardizes a company’s long-term competitiveness.

Both have a spread workforce and a reliance on third-party contractors, and both are moving to cloud computing. SMEs, unlike large corporations, often have limited IT and Infosec resources and do not have the financial resources to invest in substantial infrastructure updates to stay up with the shifting threat landscape.

Zentera Air’s newer technologies are based on the CoIP Access platform’s proven security, which has been used at scale by major businesses, and has been tuned to enable Zero Trust Security controls easy to deploy in minutes.

After signing up for Zentera Air services from one of Zentera’s worldwide ports of presence, administrators may easily onboard essential application servers and begin limiting user and application access to enforce Zero Trust principles.

Zentera’s CEO, Jaushin Lee said, “Zero Trust is one of the hottest topics in cybersecurity, but real adoption has been limited to the largest enterprises due to infrastructure and operational concerns. Zentera Air brings the game-changing benefits of Zero Trust Security to SMEs with a non-disruptive, overlay-based solution that is easy to adopt. Our simple flows and ML-assisted configuration makes it possible for SMEs to embrace Zero Trust Security, even if they are short of cybersecurity expertise.”

Codenotary Cloud Detects Vulnerabilities In The System Development

Codenotary has released Codenotary Cloud, a low-cost way to identify where a vulnerability like Log4j resides.

Codenotary Cloud lowers the cost of detecting and analyzing unnecessary artifacts by up to 80%, ensuring compliance with the United States’ Executive Order on Improving National Cybersecurity.

Codenotary Cloud offers an end-to-end trusted software supply chain that is both authentic and trustworthy. It can scale to millions of integrity verifications per second and provides a way for developers to attach a tamper-proof SBOM for development artifacts such as source code, builds, repositories, and more, as well as Docker container images for their software and Kubernetes deployments. Customers, auditors, and compliance professionals can all see them right away through the SBOM.

The Co-founder and CEO, Codenotary, Moshe Bar said, “A vulnerability scan tells you a malware is present, but then the problem is you need to find all the places it exists and that can often take weeks or months. With Codenotary Cloud, it’s possible to do that in seconds – with the ability to create, track, and query your software including the Software Bill of Materials (SBOM).”

Most vulnerability scanners and major cloud-native continuous integration/continuous delivery (CI/CD) solutions can be fully integrated with Codenotary Cloud. The DevOps attestation service is available as a managed service on any cloud or host, or customers can host it themselves.

Keeper Secrets Manager, the First Zero-Trust, Zero-Knowledge and Cloud-Native Solution for Securing Infrastructure Secrets

Keeper Security, a global leading provider of zero-trust and zero-knowledge cybersecurity software that includes password management, dark web monitoring, digital file storage, and messaging, has launched Keeper Secrets Manager, a new cloud-based, zero-knowledge solution for securing infrastructure secrets such as API keys, certificates, database passwords, access keys, and other types of private information.

“Over 80% of successful data breaches involve compromised credentials, and to a cybercriminal, the most desirable credentials are the ones with full access to an organization’s most sensitive data. Yet these highly sensitive and privileged credentials are almost always hardcoded into source code, CI/CD systems or config files. Keeper Secrets Manager enables organizations to protect these ‘hidden’ credentials across all of its infrastructure,” says Darren Guccione, CEO and Co-founder of Keeper Security.

Keeper Secrets Manager is a completely managed and cloud-based security solution that leverages an innovative patent-pending security architecture. Keeper’s top-rated enterprise password management (EPM) technology also uses the same zero-knowledge security methodology. Keeper Secrets Manager seamlessly integrates into nearly any data environment without requiring additional hardware or cloud-hosted infrastructure, whereas competing secrets management solutions require customers to buy special hardware, install a proxy service, or use a specific cloud services provider. It integrates with a range of DevOps tools out of the box, including Github Actions, Kubernetes, Ansible, and others.

“Fast and seamless integration into organizations’ existing tech stacks is where Keeper Secrets Manager shines. Organizations can get Keeper Secrets Manager up and running in about 20 minutes, which is less than the time it would take just to download competing solutions’ appliances.  Keeper Secrets Manager is an elegant and secure solution for managing infrastructure secrets, without any added complexity, maintenance or security issues,” notes Craig Lurey, CTO and Co-founder of Keeper Security.

Keeper Secrets Manager is a logical complement to Keeper Enterprise Password Management (EPM). Keeper’s Advanced Reporting and Alerts Module (ARAM), BreachWatch, Webhooks, SIEM connectivity, and compliance tools are all integrated within the Keeper Web Vault, Desktop App, and Admin Console.

Prosimo and AWS Bring New Advanced Services to Simplify Cloud Networking

Prosimo, an Application Experience Infrastructure firm, announced new cloud networking features developed on Amazon Web Services (AWS) innovations to ease hybrid and multi-cloud networking. Clients who want to develop an elastic and scalable transit with AWS Cloud WAN for cross-region connectivity can use the Prosimo Application eXperience Infrastructure (AXI) platform, which includes cloud-native integrations. Furthermore, the availability of Containers Everywhere in the AWS Marketplace allows businesses to deploy Prosimo AXI edges across their hybrid architecture using a single AWS portal. Businesses prefer a secure and optimised network transit that utilises cloud-native constructs, auto-scales as the footprint tends to grow as business requirements change, and continues to work consistently across multiple cloud regions, edge locations, and co-locations.

“AWS is delighted to work closely with Prosimo as we share a common vision in helping customers simplify and automate cloud networking to support distributed workforces and digital transformation strategies. This work delivers tightly integrated services that leverage Prosimo AXI for comprehensive hybrid and multi-cloud networking with industry-leading cloud services from AWS to simplify the onramp, migration and management of the enterprise journey in the cloud of our customers,” said Chris Grusz, Director of Business Development, AWS Marketplace.

Hybrid architectures and multi-cloud networks have become progressively complex and dynamic as a result of the heterogeneous nature of enterprise cloud adoption. For enterprises to support distributed workplaces and deliver excellent customer experience, enterprises must provide a consistent, reliable, and secure experience throughout all business-critical and latency-sensitive applications for clients in any location. Moreover, as more organisations use cloud-native architectures to revamp application frameworks and deliver applications faster, ‘application to application’ networking offers a simplified, elastic, and scalable solution.

Prosimo AXI is a self-contained multi-cloud networking solution built on cloud-native frameworks that provide complete and accurate observability as well as ML-insight-driven recommendations and orchestration. Prosimo AXI provides enterprises with fine-grained command over routing for optimised application performance, as well as the capacity to create security policies based on a Zero Trust framework.

“Our work with AWS makes it easy and seamless for any enterprise to simplify and realize autonomous cloud networking at any stage of the multi-cloud journey from hybrid cloud, multi-cloud and to the edge. We are ecstatic to be working closely with AWS on go-to-market, collaborating on product integrations and delivering compelling new services to customers,” said Ramesh Prabagaran, CEO and co-founder of Prosimo.

“With these new features and functionality on the AXI Platform, Prosimo will be ideally suited to meet our goals:  enable modern infrastructure capabilities using newer AWS networking constructs such as CloudWAN, built-in observability for applications, and remove as much complexity as possible,” said Kevin Paige , CISO, Flexport.

 Clients can now orchestrate Transit Gateway, Virtual Private Cloud peering and PrivateLink, as well as AWS CloudWAN, using the Prosimo AXI platform, which utilises cloud-native connectivity frameworks. Clients can also easily migrate to the favoured cloud-native networking option, such as AWS CloudWAN, and create detailed, accurate and contextual policies while offering a fast, secure, and smooth on-demand application experience for users worldwide with no disruption to end-users using Prosimo AXI.