Slack Gets Protected with First-of-its-kind Cloud-Based Security from Avanan

Avanan | May 13, 2020

  • Avanan is the first and only email security solution to extend the same level of protection to Slack as it does to Office 365, G-Suite and other popular collaboration platforms.

  • Slack is a leading instant messaging platform that allows users to create channels and groups and easily share files and information with co-workers and external partners.

  • Slack is protected by the same, easy-to-use Avanan security protocols that secure other collaboration services like Microsoft OneDrive, Google Drive, Dropbox, Citrix ShareFile and Box.


Avanan, the leading security solution for cloud-based email and collaboration suites, announced today new security protocols to protect Slack. Avanan is the first and only email security solution to extend the same level of protection to Slack as it does to Office 365, G-Suite and other popular collaboration platforms.

Read more: 100k Premium .Cloud Domain Names Now Available at Affordable Pricing

Slack is a leading instant messaging platform that allows users to create channels and groups and easily share files and information with co-workers and external partners. At the start of the work-from-home movement in March, Slack grew from 10 to 12.5 million simultaneous users within a matter of days. What was once an important part of business communication is now essential.

Slack has become one of the go-to platforms for information sharing and collaboration, and its usage is increasing at rapid rates due to the switch to remote work caused by the COVID-19 pandemic.


Avanan, the highest-rated cloud email security vendor, is bringing the same protections against malware and data loss protection (DLP) to Slack, becoming the first security solution to protect collaboration and messaging apps with the same advanced technology as email. All of Avanan’s email security tools are available for Slack including:
• Scanning, or blocking, for malicious links or malware
• Protections against data leakage so that sensitive company information doesn’t flow between departments or outside the organization
• Defenses against impersonation attacks
• Reviewing of all security events within a single UI
• Detection and protection against east-west internal attacks
• One-click installation

Any malware or potentially sensitive messages can be automatically blocked or quarantined while the system administrator and content owners are immediately notified.


As communication continues to move from email to multiple collaboration channels, these newly announced capabilities from Avanan further expand its support for leading cloud-based platforms and improve the security of the information that employees share with their co-workers and external parties.

Read more: Gartner 2020 Magic Quadrant Names Logicworks a Leader in Public Cloud Infrastructure Professional and Managed Services

Avanan promotes transparent, non-disruptive business communication without the risk of malware, phishing or other attacks. Slack is protected by the same, easy-to-use Avanan security protocols that secure other collaboration services like Microsoft OneDrive, Google Drive, Dropbox, Citrix ShareFile and Box. Avanan’s unique approach to protecting these services allows for the rapid reviewing of all security events generated by the protected email services, file sharing, collaboration and messaging platforms in a single console, as well as enabling security analysts to quickly mitigate any potential attack.

About Avanan:

Avanan catches the advanced attacks that evade default and advanced security tools. Its invisible, multi-layer security enables full-suite protection for cloud collaboration solutions such as Office 365™, G-Suite™ and Slack™. The platform deploys in one click via API to prevent Business Email Compromise and block phishing, malware, data leakage, account takeover and shadow IT across the enterprise. Avanan replaces the need for multiple tools to secure the entire cloud collaboration suite, with a patented solution that goes far beyond any other Cloud Email Security Supplement.

Spotlight

In this session, Sufyaan Kazi and David Pinto will walk attendees through the basics of a Spring Boot application and how Spring Cloud allows you to deploy this app to Cloud Foundry. You will get to run and execute a Spring Boot app on your machine and then push this app to Cloud Foundry to connect to other Microservices.


Other News
CLOUD SECURITY

Xanadu launches first public cloud-deployed computer with quantum computational advantage

Xanadu | June 02, 2022

Xanadu has demonstrated quantum computational advantage using Borealis, their newest photonic quantum computer. It is the first photonic quantum computer offering full programmability of all its gates to demonstrate quantum computational advantage, and the first time that a machine capable of quantum advantage has been made available to the public in the cloud. This achievement, published in Nature, is a significant milestone on the path to building a large-scale, fault-tolerant quantum computer, and a pivotal step in Xanadu's mission to build quantum computers that are useful and available to people everywhere. Quantum computational advantage is achieved when a quantum computer outperforms the world's fastest supercomputers, running the best known algorithms, on a well-defined task. Borealis synthesizes a quantum state of 216 squeezed-state qubits, entangled in three dimensions according to the user's specified program. It then generates samples from this state at a rate exceeding the capabilities of any existing classical supercomputer. Using direct simulation, the fastest supercomputer in the world would take approximately 9,000 years to generate a single such sample, compared to 36 microseconds for Borealis. This runtime advantage is more than 50 million times larger than that of earlier photonic demonstrations. "We are thrilled to have deployed quantum computational advantage on the cloud publicly for the very first time for users around the world, This is another big milestone for quantum computing. And it shows the exceptional talent we have here at Xanadu as well as the ability for photonic quantum computers to scale up." Christian Weedbrook, founder and CEO of Xanadu This demonstration marks the first time quantum computational advantage has been achieved in Canada, and also the first time anywhere by a startup company. Additionally, several technologies developed for this machine solve key challenges in the development of fault-tolerant quantum computers. Such computers have the potential to unlock computational power that will solve an array of intractable problems in fields as diverse as next generation battery development, drug discovery, finance, and logistics. Borealis is accessible to anyone with an internet connection over Xanadu Cloud, and will also be available via Amazon Braket, the fully managed quantum computing service from AWS. "With Borealis on Amazon Braket, for the first time, any researcher or developer will be able to validate a claim of quantum advantage and evaluate how photonic quantum computing may eventually expand their choice of compute technologies, enabling them to innovate more quickly," said Richard Moulds, General Manager of Amazon Braket at AWS. The team at Xanadu continues to focus on the next monumental hurdle in quantum computing — achieving fault-tolerant quantum computation and developing industry-relevant applications. Customers can access Borealis on Xanadu Cloud beginning today or soon via Amazon Braket. About Xanadu: Xanadu is a Canadian quantum technology company with the mission to build quantum computers that are useful and available to people everywhere. Founded in 2016, Xanadu has become one of the world's leading quantum hardware and software companies. The company also leads the development of PennyLane, an open-source software library for quantum computing and application development.

Read More

CLOUD APP MANAGEMENT

Launch of Deepfence Cloud Delivers Cloud Native Security On Demand

Deepfence | May 18, 2022

Deepfence, a pioneer in the emerging security observability and protection space, today announced at KubeCon + CloudNativeCon Europe 2022 the launch of Deepfence Cloud, a fully managed offering that enables customers to deploy Deepfence’s security observability solution across multiple cloud platforms. With Deepfence Cloud, enterprise security teams can now gain comprehensive visibility across their entire cloud native infrastructure in minutes, without the administrative burden of deploying and managing on-premises resources. Modern applications are cloud based, highly distributed, and constantly changing, which makes intelligent and timely security observability essential for organizations striving to protect their customers and themselves while staying ahead of attackers. Deepfence Cloud, built on the ThreatStryker offering from Deepfence, observes runtime indicators of attack (IoA) and indicators of compromise (IoC) and correlates events to tell the story of each attack as it evolves. With Deepfence Cloud, enterprises can easily tap into ThreatStryker to provide targeted security for their applications against known and unknown threats, in real time, with faster deployment and lower overhead. “At Deepfence, we’re on a mission to help enterprises secure all their cloud native applications and infrastructure against the increasing onslaught of cybersecurity threats. With the launch of Deepfence Cloud, we’re making the product more flexible and accessible, so customers at any stage of their security journey will be better protected by our powerful suite of security observability technologies. Better, more accessible protection will empower security teams to do what they do best—focus on protecting their applications, businesses, and customers.” Shyam Krishnaswamy, Co-Founder and CTO at Deepfence. Deepfence Cloud is a fully-managed security solution for users who need to integrate Deepfence’s powerful security solutions across multiple cloud platforms, with simple user management, access control, scaling, and integration. From a single Deepfence Cloud dashboard, customers can view their entire cloud estate and drill down to individual applications and functions, with SSO and integration with enterprise identity platforms. Deepfence Cloud comes with a free trial that makes it easy for security professionals to evaluate Deepfence as the cloud native security observability platform for their production workloads. To learn more and sign up for free, visit deepfence.io/cloud. About Deepfence Deepfence is an essential security observability platform for cloud and container native environments. Based on a “security as a microservice” model, Deepfence measures and maps runtime attack surfaces, and provides full-stack protection from known and unknown threats. Deepfence ThreatMapper helps protect the increasingly vulnerable software supply chain by automatically scanning, mapping and ranking application vulnerabilities and sensitive secrets in running containers, images, hosts and repositories—from development through production. Deepfence ThreatStryker uses industry attack heuristics to interpret ThreatMapper intelligence and telemetry, identifying attacks-in-progress and deploying mitigating firewall and quarantine measures.

Read More

CLOUD SECURITY

A10 Networks Recognized by Frost & Sullivan for Providing Sophisticated Cybersecurity Multi-Cloud Solutions

A10 Networks | March 29, 2022

Based on its recent analysis of the Global DDoS Mitigation Industry, Frost & Sullivan recognizes A10 Networks with the 2021 Customer Value Leadership Award for delivering secure business applications for multi-cloud environments. A10 Networks provides scalable and secure applications to enable companies and service providers to automate application management, simplify multi-cloud complexity, gain detailed business performance insights, and secure 5G networks. A10 Networks is one of the leading choices for large corporations to effectively mitigate the risks of DDoS attacks that have been growing significantly due to the digital transformation accelerated by the COVID-19 Pandemic. A10 Networks also leverages artificial intelligence and machine learning to help its clients face attacks and ensure the security of its applications. A10 has invested in strengthening processes and increasing efficiency over the years and is now in a position to extend the accrued benefits to its customers. Its ability to scale and automate DDoS protection solutions reflects a commitment to its target market of those who operate large data centers, from service providers, gaming, large enterprises, universities, and more. The company harnesses the expertise of its employees and enables an environment to ensure that their innovative ideas and relevant initiatives are leveraged to enhance customer value." Deepali Sathe, Senior Industry Analyst at Frost & Sullivan. A10 Networks implements continuous improvements based on customer feedback, and its deep understanding of modern business needs allows the company to cater to evolving customer demands. A10 leverages this customer-centric approach to offer excellent customer service that guarantees 24/7 support and rapid response to any DDoS attack that could severely affect business performance. The company is well-positioned in the market with a strong presence in more than 117 countries and it has notable customers such as Microsoft, Uber, LinkedIn, Samsung, UCLA, Godaddy, Comcast, among others. "A deep understanding of customer challenges in dealing with DDoS mitigation, and highly relevant solutions helped A10 enhance the customer experience. It continues to invest in innovative techniques to become the preferred option for large companies looking to mitigate DDoS attacks on a global scale and become a more recognized brand, rather than a best kept secret," noted Sathe. "A10 differentiates by providing a dedicated support hotline to experts assigned to its DDoS security incident response team (DSIRT) for its Thunder TPS customers, above and beyond regular support services. In the event of disruption despite the presence of a DDoS solution, DSIRT helps to diagnose, interpret, and stop an attack." Each year, Frost & Sullivan presents this award to the company that demonstrates excellence in implementing strategies that proactively create value for its customers, focusing on improving the return on the investment that customers make in its services or products. The award recognizes A10 Networks' unique focus on augmenting its customers' value, beyond simply good customer service, leading to improved customer retention and customer base expansion. Frost & Sullivan Best Practices awards recognize companies in various regional and global markets for demonstrating outstanding achievement and superior performance in leadership, technological innovation, customer service, and strategic product development. Industry analysts compare market participants and measure performance through in-depth interviews, analyses, and extensive secondary research to identify best practices in the industry. About Frost & Sullivan For six decades, Frost & Sullivan has been world-renowned for its role in helping investors, corporate leaders, and governments navigate economic changes and identify disruptive technologies, Mega Trends, new business models, and companies to action, resulting in a continuous flow of growth opportunities to drive future success. Contact us: Start the discussion.

Read More

CLOUD APP MANAGEMENT

Cloud Data Breaches and Cloud Complexity on the Rise, Reveals Thales

Thales | June 08, 2022

The 2022 Thales Cloud Security Report, conducted by 451 Research, part of S&P Global Market Intelligence, reports that 45% of businesses have experienced a cloud-based data breach or failed audit in the past 12 months, up 5% from the previous year1, raising even greater concerns regarding to protecting sensitive data from cybercriminals. Globally, cloud adoption and notably multicloud adoption, remains on the rise. In 2021, organisations worldwide were using an average amount of 110 software as a service (SaaS) applications2, compared with just eight in 2015, showcasing a startlingly rapid increase. There has been a notable expansion in the use of multiple IaaS providers, with almost three-quarters (72%) of businesses using multiple IaaS providers, up from 57% the year before. The use of multiple providers has almost doubled in the last year, with one in five (20%) of respondents reporting using three or more providers. Despite their increasing prevalence and use, businesses share common concerns about the increasing complexity of cloud services with the majority (51%) of IT professionals agreeing that it is more complex to manage privacy and data protection in the cloud. Additionally, the journey to the cloud is also becoming more complex, with the percentage of respondents reporting that they’re expecting to lift and shift, the simplest of migration tactics, dropping from 55% in 2021 to 24% currently. Security Challenges of Multicloud Complexity With increasing complexity comes an even greater need for robust cybersecurity. When asked what percentage of their sensitive data is stored in the cloud, a solid majority (66%) said between 21-60%. However, only a quarter (25%) said they could fully classify all data. Additionally, nearly a third (32%) of respondents admitted to having to issue a breach notification to a government agency, customer, partner or employees. This should be a cause for concern among enterprises with sensitive data, particularly in highly regulated industries. Cyber-attacks also present an ongoing risk to cloud applications and data. Respondents reported an increasing prevalence of attacks, with a quarter (26%) citing an increase in malware, 25% in ransomware and one-fifth (19%) reporting seeing an increase in phishing/ whaling. Protecting Sensitive Data When it comes to securing data in multicloud environments, IT professionals view encryption as a critical security control. The majority of respondents cited encryption (59%) and key management (52%) as the security technologies they currently use to protect sensitive data in the cloud. However, when asked what percentage of their data in the cloud is encrypted, only one in ten (11%) of respondents said between 81-100% is encrypted. Additionally, key management platform sprawl may be an issue for enterprises. Only 10% of respondents use one to two platforms, 90% use three or more, and almost one in five (17%) admitted using eight or more platforms. Encryption should be a priority area for enterprises to focus on when it comes to securing data in the cloud. In fact, 40% of respondents stated that they were able to avoid the breach notification process because the stolen or leaked data was encrypted or tokenised, showcasing the tangible value of encryption platforms. Additionally, it is encouraging to see signs enterprises embrace Zero Trust and investing accordingly. Nearly a third of respondents (29%) said they are already executing a Zero Trust strategy, a quarter (27%) said they are evaluating and planning one and, 23% said they are considering it. This is a positive result, but there is certainly still room to grow. “The complexity of managing multicloud environments cannot be overstated. Additionally, the growing importance of data sovereignty is increasingly raising questions for CISOs and Data Protection Officers when considering their cloud strategy, governance, and risk management. The challenge is not only where the sensitive data resides geographically, but even who has access to sensitive data inside the organisation. There are various solutions such as encryption and key management. Last but not least, continuing to embrace a Zero Trust strategy will be essential in securing these complex environments, helping to ensure organisations can support their data and manage future challenges.” Sebastien Cano, Senior Vice President for Cloud Protection and Licensing activities at Thales Thales and 451 Research will discuss the findings in more detail during a webinar on 23 June 2022. To join, please visit the registration page. About the 2022 Thales Global Cloud Security Study As organizations step beyond the urgent actions of the last two years, they’re grappling with securing the more complex environments in which they now operate. The global edition of the 2022 Thales Cloud Security Study looked at various aspects of those impacts in a wide-ranging survey of security professionals and executive leadership that touched on issues including accelerated digital transformation, cloud migration, and the complexities of managing security in a multicloud world. The 2022 Thales Cloud Security Study is based on data from a survey of almost 2,800 security professionals and executive leaders. This research was conducted as an observational study and makes no causal claims. About Thales Thales (Euronext Paris: HO) is a global leader in advanced technologies, investing in digital and “deep tech” innovations – connectivity, big data, artificial intelligence, cybersecurity and quantum computing – to build a confident future crucial for the development of our societies. The Group provides its customers – businesses, organisations and governments – in the defense, aeronautics, space, transport, and digital identity and security domains with solutions, services and products that help them fulfil their critical role, consideration for the individual being the driving force behind all decisions.

Read More

Spotlight

In this session, Sufyaan Kazi and David Pinto will walk attendees through the basics of a Spring Boot application and how Spring Cloud allows you to deploy this app to Cloud Foundry. You will get to run and execute a Spring Boot app on your machine and then push this app to Cloud Foundry to connect to other Microservices.

Resources