Votiro | October 20, 2022
Votiro, the category leader in Content Disarm and Reconstruction (CDR) technology, today announced its integration with Box’s leading Content Cloud to prevent ransomware and other evasive file-borne threats from entering users’ content collaboration applications and environments. Available today, users can seamlessly connect Votiro Cloud to Box to provide an essential layer of security needed to prevent new and unknown threats by sanitizing content before adding it in Box.
Digital content collaboration capabilities have been paramount in the new hybrid work environment, where bad actors are targeting content and data management platforms, primarily through hidden threats in files. Many of these threats leverage advanced obfuscation techniques that can easily evade detection through traditional security technologies. Through this integration with Box, Votiro Cloud can easily be downloaded and deployed within the customers’ environment, and begin immediately eliminating all malware threats.
Preventing Threats without Ruining Files
Instead of scanning for known malware signatures, Votiro Cloud proactively disarms weaponized files before they enter the network and prevents virtually all attacks, ranging from evasive commodity attacks to zero-day attacks, including ransomware. In addition, Votiro’s solution prioritizes secure collaboration, increasing productivity without compromising security. All incoming files to Box Content Cloud from remote employees, contractors, and 3rd party partners are sanitized and reconstructed to preserve the integrity and functionality of the original file, allowing users to collaborate securely.
"Organizations today need products that are inherently secure to support employees working from anywhere, At Box, we continuously strive to improve our integrations with third-party apps so that it's easier than ever for customers to use Box alongside best-in-class solutions. With today's integration with Votiro, we are providing customers with even more options for additional security controls to further minimize the risk of potential incidents.”
Fred Klein, Vice President of Business and Corporate Development at Box
Votiro applies Zero Trust principles to a customer’s interactions with digital files, automated file processing, or application-to-application file transfer process. Votiro’s scalability, speed, and depth and breadth of accepted file formats best positions them to help enterprises collaborate with third-parties safely while keeping business flowing. Files are processed at scale for high volume operations and within milliseconds, completely transparent to the end user. The company’s cloud-based, open application programming interface (API), and auto-scaling functionality allows for limitless scalability to seamlessly accommodate surges in file throughput. Votiro Cloud is easy to use and the open API fits into existing file flows seamlessly, including to and from content-rich applications and services like customer-facing portals deployed in public cloud platforms, machine-to-machine transfer to cloud content platforms such as AWS S3, Snowflake, and Box.
“Enterprises no longer have to implicitly trust the users interacting with files in the cloud content platforms, but explicitly ensure safe content at all times. As a result, building out a data protection strategy and investing in technologies that adhere to the Zero Trust model is a great way to ensure secure content collaboration,” said Ravi Srinivasan, CEO at Votiro. “Digital collaboration services, like Box, create amazing efficiencies for businesses and - with the right safeguards - also provide a high level of security. We’re proud to integrate with Box to offer an essential layer of security to protect the content and data that organizations’ exchange on a daily basis without inhibiting user productivity.”
Votiro is a zero-trust content security company serving hundreds of commercial and government organizations worldwide. Votiro Cloud is an open, API-centric Content Disarm and Reconstruction (CDR) solution to deliver safe content and eliminate file-borne threats targeting your remote workers, content-rich apps, data lakes, supply chain and B2C digital interactions. Votiro is headquartered in the United States, with offices in Australia, Israel, and Singapore.
Sigma | September 15, 2022
Forescout Technologies, the global leader in automated cybersecurity, today announced a new healthcare cybersecurity partnership with First Health Advisory, a leader in healthcare IT risk management. The partnership creates an innovative approach to connected asset risk management by automating the technical data collection, mitigation and risk reduction measures for a healthcare organization’s entire network that encompasses IT, IoT, OT, and IoMT assets.
Healthcare organizations’ networks are under constant attack and often do not have the necessary human capital to oversee the work necessary to thwart a potential threat or attack through quick response. This challenge places added importance on the need to obtain highly skilled outside expertise to operationalize a program and execute ongoing asset risk assessments across the network.
“Cybersecurity risk assessments for healthcare organizations are incredibly time consuming, static in nature, and mandated by regulatory requirements. Moreover, the steps to mitigate assessment findings and lower risk are difficult to complete with the current cyber skills shortage, This partnership and new approach that combines intuitive risk assessment and automated mitigation technology will allow healthcare organizations to not only make risk assessments easier and faster to complete, but also free up internal resources to support other critical aspects of the patient experience.”
Tamer Baker, vice president, global healthcare, Forescout
The audit experience will also see a major transformation through this new partnership. Organizations will have an ability to automate evidence collection and receive ongoing mitigation and vulnerability management support from First Health Advisory staff year-round.
“Our partnership delivers the optimal solution healthcare organizations are looking for – the right balance of highly skilled, multi-disciplinary risk assessment personnel with deep understanding of the regulatory landscape together with a dependable cybersecurity platform that can automate risk reduction actions,” said Will Long, CSO of Enterprise Security & Technology at First Health Advisory. “We’re excited about this collaboration and together with Forescout, look forward to helping more healthcare organizations improve their security posture.”
Forescout Technologies, Inc. delivers cybersecurity automation across the digital terrain, maintaining continuous alignment of customers’ security frameworks with their digital realities, including all asset types – IT, OT, IoT, IoMT. The Forescout Continuum Platform provides complete asset visibility, continuous compliance, network segmentation and a strong foundation for Zero Trust. For more than 20 years, Fortune 100 organizations and government agencies have trusted Forescout to provide automated cybersecurity at scale. Forescout arms customers with data-powered intelligence to accurately detect risks and quickly remediate cyberthreats without disruption of critical business assets.
CLOUD DEPLOYMENT MODELS
CoreStack | September 07, 2022
CoreStack, a global cloud governance provider that empowers enterprises to unleash the power of the cloud by enabling continuous and autonomous cloud governance at scale, today announced that it is participating in the Amazon Web Services (AWS) Marketplace Vendor Insights preview, which streamlines the complex third-party software risk assessment process by enabling sellers to make security and compliance information available through AWS Marketplace, a curated digital catalog that customers can use to find, buy, deploy, and manage third-party software, data, and services to build solutions and run their businesses. CoreStack’s NextGen Cloud Governance solutions — FinOps, SecOps and CloudOps — are now available via a unified web-based dashboard as part of AWS Marketplace Vendor Insights to give customers access to security and compliance information.
AWS Marketplace Vendor Insights helps streamline the procurement process by granting buyers access to evidence made available by sellers related to data privacy and residency, application security, and access control.
“We created AWS Marketplace Vendor Insights to serve customers that need help validating third-party software that meets their compliance needs, We are glad to see CoreStack participating in the Vendor Insights preview and their commitment to trust and transparency. Companies like CoreStack work with AWS to showcase their validated security profile, saving customers months of effort, reducing the software risk assessment lead time for customers while assuring them of continuous monitoring of vendor security.”
Jason Timmes, General Manager, AWS Marketplace Seller Services
Using Vendor Insights can help buyers reduce assessment lead time to a few hours by allowing buyers to access the vendor’s validated security profile, saving months of effort from questionnaires and back-and-forth with vendors. The dashboard also provides evidence backed by AWS Config and AWS Audit Manager assessments, external audit reports, and software vendor self-assessments to help customers perform continual compliance monitoring.
"Vendor Insights provides ongoing visibility and alerts about the vendor’s security hygiene,” said Satyam Patel, Vice President & Chief Information Security Officer at 7.ai. “Using Vendor Insight notifications helps us remove the need for periodic reassessments and brings in agility in the procurement process.”
The CoreStack platform, built on cloud-native services, empowers AWS customers to achieve security and compliance, enhance cloud operational efficiencies as well as optimize costs. It applies a unique cloud-as-code approach that leverages deep artificial intelligence (AI) / machine learning (ML), declarative definitions, and a patented cloud service-chaining technology. Customers can leverage CoreStack’s powerful NextGen Cloud Governance offerings — FinOps, SecOps and CloudOps — to govern operations, security, cost, access, and resources across multiple cloud accounts.
“We take pride in helping customers embrace, expand and enhance cloud through our NextGen Cloud Governance, and we are proud to showcase our validated and strong security story with customers through Vendor Insights,” said Parul Chheda, Vice President of Strategic Alliances at CoreStack. “Security is a shared responsibility, and we are happy that AWS Marketplace customers can directly monitor and inspect configuration of our technology resources and collect other critical information to deliver up-to-date security posture metrics and artifacts. We look forward to working with AWS to fast-track due diligence and further the value we can offer to our customers.”
CoreStack is a NextGen cloud business accelerator that empowers enterprises to predictably increase top-line revenues, improve bottom-line efficiencies, and gain a competitive edge through AI-powered real-time cloud governance on autopilot. CoreStack's FinOps, SecOps and CloudOps solutions embrace, enhance, and extend native-cloud, enable reporting, recommendation, remediation and provide single pane-of-glass governance across multi-cloud. Through executive dashboards for comprehensive real-time insights, CoreStack delivers transformative value such as 40% increase in operational efficiencies, 50% decrease in cloud costs, and 100% security assurance and compliance. CoreStack helps 500+ global enterprises govern $2B+ in annual cloud consumption.
Lacework | October 27, 2022
Lacework, the data-driven cloud security company, today announced a new integration with Google Cloud's Chronicle Security Operations, bringing its cloud-native application protection platform (CNAPP) capabilities to Chronicle deployments. By tapping into rich multicloud runtime alerts from the Lacework Polygraph Data Platform, organizations using Chronicle Security Operations gain better insight into cloud threats, helping them understand, respond to, and remediate incidents more effectively than ever before. Lacework fully integrates multicloud runtime telemetry with Chronicle Security Operations.
SOC teams that rely on legacy security solutions, which are based on static, manually-written rules, can't keep up with the rate and scale of changes in cloud environments. They are then forced to spend an increasing amount of analyst time and energy sifting through an overwhelming volume of low-context alerts. SOC teams need a modern threat management solution that can keep up with the constantly changing nature of the cloud, and allows them — and their company overall — to operate and innovate effectively at scale.
With this integration, organizations using Chronicle Security Operations can now access runtime alerts and anomalous activity from multicloud environments, generated by the Lacework Polygraph Data Platform. The Lacework Polygraph Data Platform uses automation to provide teams with an improved signal-to-noise ratio compared to traditional solutions that are not built for the cloud, without the need for manual intervention. The addition of these high-context alerts allows SOC teams to quicken investigation and remediation, and closes the gap between SOC and security teams by embedding Lacework into security playbooks.
"Enterprises transforming their security strategies for the cloud require technologies that easily deliver comprehensive visibility across their multicloud environments, Lacework's integration with Chronicle Security Operations enables organizations to detect and address the right threats via contextual insights that matter the most across their diverse environments."
Sunil Potti, VP/GM of Security, Google Cloud
Key capabilities of this integration include:
Anomaly detections from Lacework, including the cloud control plane, audit logs, cloud, and container instances for Google Cloud, AWS, and Microsoft Azure are all shared with Chronicle Security Operations.
Using Chronicle's Universal Data Model parsers, customers can easily onboard this integration within their existing Chronicle instance.
Customers will be able to create automation, orchestration and response playbooks using Chronicle SOAR to quickly react to and address issues.
"Cloud threats are only becoming more sophisticated over time, so it's critical for security teams to have the right context to make the right decisions to remediate issues quickly," said Jay Parikh, co-CEO, Lacework. "Through our continued partnership with Google Cloud, we're making it easier for joint customers to take advantage of the richness of Lacework data so they can get a better understanding of what's happening across their multicloud environments and continue to innovate with confidence."
The Lacework integration with Chronicle Security Operations will be available to organizations via Google Cloud Marketplace
Lacework is the data-driven security company for the cloud. The Lacework Polygraph Data Platform automates cloud security at scale so our customers can innovate with speed and safety. Only Lacework can collect, analyze, and accurately correlate data across an organization's cloud and Kubernetes environments, and narrow it down to the handful of security events that matter. Customers all over the globe depend on Lacework to drive revenue, bring products to market faster and safer, and consolidate point security solutions into a single platform. Founded in 2015 and headquartered in San Jose, Calif., Lacework is backed by leading investors like Sutter Hill Ventures, Altimeter Capital, D1 Capital Partners, Tiger Global Management, Counterpoint Global (Morgan Stanley), Franklin Templeton, Durable Capital, GV, General Catalyst, XN, Coatue, Dragoneer, Liberty Global Ventures, and Snowflake Ventures, among others.