Cloud App Development, Cloud App Management, Cloud Deployment Models

Eagle Eye Networks and Sensorlink to Bring Cloud Video Surveillance to Malaysia

Eagle Eye Networks and Sensorlink to Bring Cloud Video Surveillance

Eagle Eye Networks, the global leader in cloud video surveillance, today announced a partnership with national distributor Sensorlink to bring cloud video surveillance products to its extensive network of systems integrators and to businesses throughout Malaysia.

Founded in 1997 by Owen Aw, who serves as managing director, Sensorlink is the leading security product distributor in Malaysia. Sensorlink has deep expertise in banking, manufacturing, energy, commercial buildings and retail. Its established network of resellers include the largest international and local security systems integrators.

The Sensorlink team is known for solution-selling and its extensive experience in systems design. The company sees a huge opportunity for cloud video surveillance in Malaysia.

“In the future, all access control and video will be in the cloud, it’s just a matter of time,” said Aw. “Eagle Eye Networks has a 10-year track record of providing cloud video surveillance with AI analytics to secure businesses and improve efficiency, as well as a commitment to cybersecurity, all of which are very important to business customers in Malaysia.”

CIOs, CISOs and other IT executives, who have been cloud advocates for other business systems, are propelling Malaysia’s move to cloud security.

“CIOs leading the charge to cloud is a trend we’re seeing across the globe,” said Dean Drako, Eagle Eye Networks Founder and CEO. “Today’s IT-savvy security directors want the benefits of a cloud video surveillance system that is reliable, cybersecure, open, easy-to-operate and maintain, and able to scale as their businesses grow. We are excited to work with Sensorlink to bring the substantial advantages of cloud video surveillance to organizations in this region.”

ABOUT EAGLE EYE NETWORKS

Eagle Eye Networks is the global leader in cloud video surveillance, delivering cyber-secure cloud-based video with artificial intelligence (AI) and analytics to make businesses more efficient and the world a safer place. The Eagle Eye Cloud VMS (video management system) is the only platform robust and flexible enough to power the future of video surveillance and intelligence. Eagle Eye is based in Austin, Texas with offices in Amsterdam, Bangalore, and Tokyo. Learn more at een.com.

Spotlight

Other News
Cloud Security

Sysdig Debuts New Benchmark for Cloud Detection and Response

Business Wire | November 03, 2023

Sysdig, the leader in cloud security powered by runtime insights, today released at SANS CyberFest 2023 the 5/5/5 Benchmark for Cloud Detection and Response, a new framework that outlines how quickly organizations should detect, triage, and respond to attacks in the cloud. Operating securely in the cloud requires a mindset shift in regard to time, and with that, cloud security programs need to hold themselves to a modernized benchmark: five seconds to detect, five minutes to correlate insights and understand what’s happening, and five additional minutes to respond. Recent findings by the Sysdig Threat Research Team published in the 2023 Global Cloud Threat Report note that, after discovering an exploitable target, malicious actors require less than 10 minutes to execute an attack. Cloud attacks are swift and sophisticated, requiring robust threat detection and response programs that move at the speed of the cloud. On-premises attacks take 16 days on average and antiquated frameworks challenge security teams to respond to a breach within 60 minutes, which is simply insufficient for the cloud. Bad actors are exploiting the automation and scale of the cloud, along with new techniques, to accelerate all stages of an attack and inflict damage within minutes. The 5/5/5 Benchmark guides organizations to detect and respond to cloud attacks faster than adversaries can complete them. The Challenge Detect threats within five seconds.Organizations should be able to gather detection signals from their cloud security tools in real time to ensure visibility into ephemeral assets. Correlate and triage within five minutes.Teams should be able to gather full context for all correlated signals within five minutes of receiving the first relevant alert. Initiate a response within five minutes.Organizations should be able to initiate a tactical response within five minutes of confirming that an attack is in progress. What people are saying People are always looking for security metrics, especially when the industry evolves into new operating models. We have plenty of 'best practices,' but no real way to quantify cloud security agility — until now, said Anna Belak, Director, Office of Cybersecurity Strategy at Sysdig. The 5/5/5 Benchmark, built in partnership with our customers, industry analysts, and the Sysdig Threat Research Team, sets a new standard for operating securely in the cloud. “As organizations move to the cloud, traditional on-premises security standards become outdated and too slow. In the cloud, both innovation and attacks happen quickly – companies need security tools, processes, and standards designed to operate at the speed of cloud-native environments,” said Phil Bues, Research Manager for IDC Cloud Security. “I don’t want to know 15 minutes after someone breached my system. I need to know instantly so that we can shut it down before the blast radius expands,” said Kuldeep Tomar, Head of Information Security at India’s leading digital skill games company and 5/5/5 Benchmark Advisor. “To move at the necessary speed, you need to not only be alerted to the right things, but also respond appropriately. Having a benchmark gives us a goal to hold ourselves to.” About Sysdig In the cloud, every second counts. Attacks move at warp speed, and security teams must protect the business without slowing it down. Sysdig stops cloud attacks in real time, instantly detecting changes in risk with runtime insights and open source Falco. Sysdig correlates signals across cloud workloads, identities, and services to uncover hidden attack paths and prioritize real risk. From prevention to defense, Sysdig helps enterprises focus on what matters: innovation. Sysdig. Secure Every Second.

Read More

Cloud Security

Lookout Increases Strategic Investment in Data-centric Cloud Security

Business Wire | October 27, 2023

Lookout, Inc., the data-centric cloud security company, today announced enhancements to its Lookout Cloud Security Platform that are designed to help organizations better discover, assess and protect their data as it moves across any network, from the endpoint to the cloud. These enhancements provide organizations with a unified solution that will expertly secure their data by maximizing visibility and protecting access across all applications. The Lookout Cloud Security Platform, the Company’s Security Service Edge (SSE) offering, continuously monitors the risk posture of users and their devices to provide dynamic and granular zero-trust access based on the sensitivity level of apps and data, enabling organizations to protect their workers, devices, applications and data from unauthorized access and modern-day internet-based threats. Services in the platform include: Secure Private Access (ZTNA), Secure Internet Access (SWG) and Secure Cloud Access (CASB). Lookout’s data-centric cloud security innovation helps safeguard customers’ sensitive information as it moves across networks, clouds, applications and devices: Discover and onboard all private apps with enterprise app discovery:When it comes to protecting sensitive corporate data, ZTNA offers a far more secure approach compared to traditional VPNs.Unlike VPNs that provide access to the entire network for example, ZTNA offers granular access control, which limits users to specific applications. This reduces the overall attack surface and prevents lateral movement of threats, minimizing the risk of compromised accounts or devices compromising the entire infrastructure.Lookout Secure Private Accessdiscovers and helps onboard private applications running on an organization’s network hosted on-prem or in the cloud, and currently being accessed by a VPN. Using this functionality, IT can now see all private applications being accessed by their users and take steps to seamlessly define and enforce access and data protection policies for these apps. Extend zero trust protection with firewall as a service:The Lookout Cloud Security Platform has an integrated cloud firewall that extends inspection of incoming and outgoing traffic across all ports and protocols, enabling granular visibility and access control into non-web traffic to stop zero-day threats. With this enhancement, customers can apply more granular security and access policies across all of their apps (web, TCP, UDP, ICMP) and both internet and intranet traffic. Expand data classification and protection capabilities in Google Drive:Google Labels Classification expands data classification capabilities across the Lookout Cloud Security Platform through an integration with Google Drive labels. This integration helps Lookout customers classify sensitive data with Google Drive labels and enforce security policies based on these labels to protect sensitive data stored in Google Drive’s API mode. Secure traffic and enforce policies on guest networks and IoT devices:Organizations need visibility and control over all endpoints and users within their network in order to reduce the risk of malware infections and data exfiltration through these channels. Lookout has enhanced traffic inspection capabilities, expanding data and threat protection to guest users of company networks and traffic coming from IoT devices. This helps ensure company networks are not compromised from these access points, thereby preventing data exfiltration. Advanced threat protection from phishing and zero-day threats:Lookout has enhanced its integration with remote browser isolation (RBI) and cloud sandboxing to improve the user experience and provide robust threat protection for organizations, preventing users from accessing malicious sites and content. “In today’s digital world, data is the lifeblood of every organization,” said Pete Finalle, Research Manager, IDC. “It is vitally important that organizations protect their data and ensure that it is secure, no matter where it resides or how it is accessed. Lookout's new cloud security features offer greater assurance to IT organizations that their data is safe and their users are protected.” Lookout continues to innovate the Lookout Cloud Security Platform in ways that strengthen the protection of users and data from security threats and enhance the end-user experience, said Aaron Cockerill, Executive Vice President of Product, Lookout. We are the only vendor that unifies cloud and endpoint security into one platform. With this latest release, Lookout continues to build upon our strategic vision to put data security at the intersection of today’s workplace and modern cybersecurity threats. About Lookout Lookout, Inc. is the data-centric cloud security company that delivers zero trust security by reducing risk and protecting data wherever it goes, without boundaries or limits. Our unified, cloud-native platform safeguards corporate data across devices, apps, networks and clouds and is as adaptive and simple as the modern digital world. Lookout is trusted by enterprises and government agencies of all sizes to protect the sensitive data they care about most, enabling them to work and connect freely and safely. To learn more about the Lookout Cloud Security Platform, visit www.lookout.com and follow Lookout on our blog, LinkedIn and Twitter.

Read More

Cloud Deployment Models

Mirantis’ Lens AppIQ: Upgrading Kubernetes Application Management

Mirantis | September 22, 2023

Mirantis has introduced Lens AppIQ, a new tool designed to simplify Kubernetes application management. Available directly to the 50,000 organizations using Lens, Lens AppIQ offers application intelligence, making it accessible for non-Kubernetes specialists to oversee applications across multiple clusters. Lens AppIQ aggregates information from various configuration files and sources, presenting it in a user-friendly tabbed display. This feature allows cloud-native developers to streamline the deployment and management of Kubernetes applications, offering web-based tools for viewing application details, configuring security measures, and automating deployment processes. With a quick launch time of under a minute, Lens AppIQ swiftly identifies applications in connected clusters and maps their components. Developers can access application architecture, metadata, logs, events, and more through Lens Desktop’s new 'Applications' view or the Lens AppIQ web portal, simplifying debugging, accelerating code releases, and enhancing performance optimization. DevOps professionals, platform engineers, and operators can utilize Lens AppIQ to define, monitor, and enforce policies related to application performance, security, and compliance. Automation features in Lens AppIQ facilitate repeatable deployments and enable effortless application migration to new Kubernetes environments. Miska Kaipiainen, Vice President of Engineering at Mirantis, reportedly stated, While Lens Desktop already provides an incredibly user-friendly experience for Kubernetes management, we understand that cloud-native development doesn't end there. That's why we've created Lens AppIQ. Lens AppIQ complements Lens Desktop by offering real-time intelligence and additional insights into the apps running on your Kubernetes clusters. This not only makes debugging, operation, and security easier but also opens up Kubernetes to a broader audience of developers who can benefit from streamlined processes without having to become Kubernetes experts. [Source – Businesswire] Lens AppIQ is available for free for small-scale and trial use, accommodating up to 10 nodes, two clusters, and two users. A Pro plan is available for larger-scale use, supporting up to 100 nodes, 10 clusters, and 50 users, priced at $35 per node monthly, inclusive of 8 hours/5-day business hours support. Enterprises can opt for a bespoke version with 24/7 support and custom pricing. Lens AppIQ is accessible within Lens Desktop for the 50,000 organizations currently using Lens and is also available as a Software as a Service (SaaS) solution. About Lens With over 1 million users worldwide, Lens Desktop is a leading tool for boosting productivity in Kubernetes application development and management. This desktop application breaks down barriers for newcomers to Kubernetes while significantly enhancing the efficiency of experienced users. Lens supports all certified Kubernetes distributions on any infrastructure and seamlessly runs on Linux, macOS, and Windows. As the world's largest and most advanced Kubernetes platform, it provides real-time workload management, development, debugging, monitoring, and troubleshooting across multiple clusters. Built on open-source principles, Lens enjoys a strong community with over 20,000 stars on GitHub. About Mirantis Mirantis is a leading company streamlining code delivery on public and private clouds with a ZeroOps approach to Kubernetes. It serves global enterprises, enhancing developer productivity and offering secure cloud solutions. Its clients include Adobe, DocuSign, PayPal, and others across diverse industries. Mirantis contributes to open-source projects like Lens and Kubernetes, empowering businesses to tackle complex challenges.

Read More

Cloud App Management

Cohesity Launches Cohesity SmartFiles Integration on the Snowflake Data Cloud

Business Wire | November 01, 2023

Cohesity, a leader in AI-powered data security and management, today announced the launch of Cohesity SmartFiles on the Snowflake Data Cloud. This new integration enables businesses to derive analytical insights from their on-premises and cloud data while maintaining data sovereignty and meeting compliance requirements. Snowflake recognizes the critical importance of providing customers with advanced data security and management while mining their data for strategic insights, said Kit Beall, Chief Revenue Officer, Cohesity. As a leader in AI-powered enterprise data security and management, we seek partners equally dedicated to the secure storage and management of customer data. That is why we are delighted to partner with Snowflake to continue delivering innovative and secure solutions that our customers can confidently rely on. By leveraging the Snowflake Data Cloud, Cohesity is joining Snowflake in mobilizing the world’s data to help organizations reap the benefits of their analytics capabilities without having to move their data to the cloud for analysis. With Cohesity SmartFiles, joint customers can store their data locally in SmartFiles and leverage Snowflake’s analytics capabilities with the flexibility to keep data either on-premises or in the cloud. This integration provides customers with broader access and choice while allowing them to adhere to strict internal policies. Cohesity SmartFiles augments customers’ cloud-native Snowflake Data Cloud to include on-premises repositories and extends secure access to sensitive local data records. Cohesity SmartFiles also provides a secure platform for consolidating application data that is designed to improve storage efficiency and reduce overall cost of ownership for local Snowflake repositories. “Cohesity’s commitment to helping Snowflake mobilize the world’s data can be seen through the launch of the SmartFiles integration,” said Tarik Dwiek, Head of Technology Alliances, Snowflake. “We look forward to partnering with Cohesity to allow access to SmartFiles in the cloud or on-premises through Snowflake’s single, integrated platform.” This collaboration with Snowflake and Cohesity enables joint customers to gain more value from their data while optimizing cost, scale, and efficiency for their Snowflake data. About Cohesity Cohesity is a leader in AI-powered data security and management. Aided by an extensive ecosystem of partners, Cohesity makes it easier to protect, manage, and get value from data – across the data center, edge, and cloud. Cohesity helps organizations defend against cybersecurity threats with comprehensive data security and management capabilities, including immutable backup snapshots, AI-based threat detection, monitoring for malicious behavior, and rapid recovery at scale. Cohesity solutions can be delivered as a service, self-managed, or provided by a Cohesity-powered partner. Cohesity is headquartered in San Jose, CA, and is trusted by the world’s largest enterprises, including six of the Fortune 10 and 42 of the Fortune 100.

Read More