Cloud Storage

Votiro Cloud Integrates With Box Content Cloud to Provide Zero Trust Content Security

Votiro
Votiro, the category leader in Content Disarm and Reconstruction (CDR) technology, today announced its integration with Box’s leading Content Cloud to prevent ransomware and other evasive file-borne threats from entering users’ content collaboration applications and environments. Available today, users can seamlessly connect Votiro Cloud to Box to provide an essential layer of security needed to prevent new and unknown threats by sanitizing content before adding it in Box.

Digital content collaboration capabilities have been paramount in the new hybrid work environment, where bad actors are targeting content and data management platforms, primarily through hidden threats in files. Many of these threats leverage advanced obfuscation techniques that can easily evade detection through traditional security technologies. Through this integration with Box, Votiro Cloud can easily be downloaded and deployed within the customers’ environment, and begin immediately eliminating all malware threats.

Preventing Threats without Ruining Files
Instead of scanning for known malware signatures, Votiro Cloud proactively disarms weaponized files before they enter the network and prevents virtually all attacks, ranging from evasive commodity attacks to zero-day attacks, including ransomware. In addition, Votiro’s solution prioritizes secure collaboration, increasing productivity without compromising security. All incoming files to Box Content Cloud from remote employees, contractors, and 3rd party partners are sanitized and reconstructed to preserve the integrity and functionality of the original file, allowing users to collaborate securely.

"Organizations today need products that are inherently secure to support employees working from anywhere, At Box, we continuously strive to improve our integrations with third-party apps so that it's easier than ever for customers to use Box alongside best-in-class solutions. With today's integration with Votiro, we are providing customers with even more options for additional security controls to further minimize the risk of potential incidents.”

Fred Klein, Vice President of Business and Corporate Development at Box

Votiro applies Zero Trust principles to a customer’s interactions with digital files, automated file processing, or application-to-application file transfer process. Votiro’s scalability, speed, and depth and breadth of accepted file formats best positions them to help enterprises collaborate with third-parties safely while keeping business flowing. Files are processed at scale for high volume operations and within milliseconds, completely transparent to the end user. The company’s cloud-based, open application programming interface (API), and auto-scaling functionality allows for limitless scalability to seamlessly accommodate surges in file throughput. Votiro Cloud is easy to use and the open API fits into existing file flows seamlessly, including to and from content-rich applications and services like customer-facing portals deployed in public cloud platforms, machine-to-machine transfer to cloud content platforms such as AWS S3, Snowflake, and Box.

“Enterprises no longer have to implicitly trust the users interacting with files in the cloud content platforms, but explicitly ensure safe content at all times. As a result, building out a data protection strategy and investing in technologies that adhere to the Zero Trust model is a great way to ensure secure content collaboration,” said Ravi Srinivasan, CEO at Votiro. “Digital collaboration services, like Box, create amazing efficiencies for businesses and - with the right safeguards - also provide a high level of security. We’re proud to integrate with Box to offer an essential layer of security to protect the content and data that organizations’ exchange on a daily basis without inhibiting user productivity.”

About Votiro
Votiro is a zero-trust content security company serving hundreds of commercial and government organizations worldwide. Votiro Cloud is an open, API-centric Content Disarm and Reconstruction (CDR) solution to deliver safe content and eliminate file-borne threats targeting your remote workers, content-rich apps, data lakes, supply chain and B2C digital interactions. Votiro is headquartered in the United States, with offices in Australia, Israel, and Singapore.

Spotlight

Other News
Cloud Security

Sysdig Debuts New Benchmark for Cloud Detection and Response

Business Wire | November 03, 2023

Sysdig, the leader in cloud security powered by runtime insights, today released at SANS CyberFest 2023 the 5/5/5 Benchmark for Cloud Detection and Response, a new framework that outlines how quickly organizations should detect, triage, and respond to attacks in the cloud. Operating securely in the cloud requires a mindset shift in regard to time, and with that, cloud security programs need to hold themselves to a modernized benchmark: five seconds to detect, five minutes to correlate insights and understand what’s happening, and five additional minutes to respond. Recent findings by the Sysdig Threat Research Team published in the 2023 Global Cloud Threat Report note that, after discovering an exploitable target, malicious actors require less than 10 minutes to execute an attack. Cloud attacks are swift and sophisticated, requiring robust threat detection and response programs that move at the speed of the cloud. On-premises attacks take 16 days on average and antiquated frameworks challenge security teams to respond to a breach within 60 minutes, which is simply insufficient for the cloud. Bad actors are exploiting the automation and scale of the cloud, along with new techniques, to accelerate all stages of an attack and inflict damage within minutes. The 5/5/5 Benchmark guides organizations to detect and respond to cloud attacks faster than adversaries can complete them. The Challenge Detect threats within five seconds.Organizations should be able to gather detection signals from their cloud security tools in real time to ensure visibility into ephemeral assets. Correlate and triage within five minutes.Teams should be able to gather full context for all correlated signals within five minutes of receiving the first relevant alert. Initiate a response within five minutes.Organizations should be able to initiate a tactical response within five minutes of confirming that an attack is in progress. What people are saying People are always looking for security metrics, especially when the industry evolves into new operating models. We have plenty of 'best practices,' but no real way to quantify cloud security agility — until now, said Anna Belak, Director, Office of Cybersecurity Strategy at Sysdig. The 5/5/5 Benchmark, built in partnership with our customers, industry analysts, and the Sysdig Threat Research Team, sets a new standard for operating securely in the cloud. “As organizations move to the cloud, traditional on-premises security standards become outdated and too slow. In the cloud, both innovation and attacks happen quickly – companies need security tools, processes, and standards designed to operate at the speed of cloud-native environments,” said Phil Bues, Research Manager for IDC Cloud Security. “I don’t want to know 15 minutes after someone breached my system. I need to know instantly so that we can shut it down before the blast radius expands,” said Kuldeep Tomar, Head of Information Security at India’s leading digital skill games company and 5/5/5 Benchmark Advisor. “To move at the necessary speed, you need to not only be alerted to the right things, but also respond appropriately. Having a benchmark gives us a goal to hold ourselves to.” About Sysdig In the cloud, every second counts. Attacks move at warp speed, and security teams must protect the business without slowing it down. Sysdig stops cloud attacks in real time, instantly detecting changes in risk with runtime insights and open source Falco. Sysdig correlates signals across cloud workloads, identities, and services to uncover hidden attack paths and prioritize real risk. From prevention to defense, Sysdig helps enterprises focus on what matters: innovation. Sysdig. Secure Every Second.

Read More

Cloud Security

Lacework Announces Enterprise Multicloud Platform Updates

PR Newswire | October 25, 2023

Lacework, the data-driven cloud security company, today announced a series of updates that expand the platform's enterprise-grade capabilities to help customers do more in the cloud, securely. Lacework is extending its platform support to new cloud providers in order to give customers more choice as they secure their multicloud environments, adding integrations into leading project management tools to increase operational efficiency around risk management, and enhancing agentless workload scanning, among other updates. Expanded Enterprise Multicloud Support Enterprises implement multicloud strategies for various economic, technical, and legal reasons, and Lacework is committed to supporting its customers' cloud or clouds of choice. Lacework has extended cloud security posture management to Oracle Cloud Infrastructure (OCI), giving teams visibility into their OCI resources and their associated risks. Whether enterprises are using Amazon Web Services, Google Cloud, Azure, OCI or a combination, the unified Lacework platform gives them visibility from a single location, resulting in better context, better outcomes, and faster investigations. We are excited that Lacework has added support for Oracle Cloud Infrastructure. It gives us the opportunity to utilize Cloud Security Posture Management capabilities across our multicloud environment with a single platform, said Karen Prichard, Managing Director Group Security, Liberty Global. Our team can continue to reduce our risk and address our threats quicker with the added visibility and context provided by this new integration. Additionally, the Lacework platform is expanding its industry-leading attack path analysis to Google Cloud and Azure. Attack path analysis from Lacework allows security teams to see their cloud environment through the eyes of an attacker, identifying targets and mapping out how each threat could be exploited to breach a cloud environment. Now Lacework customers leveraging Google Cloud or Azure can gain attack path analysis that is bespoke to each cloud's unique environment. "My colleague already had the chance to identify configuration issues, it immediately flagged something we had to look at — giving us the opportunity to fix it," Simen Kildahl Eriksen, Security Engineer at Cognite, shares. "It provides an invaluable means of identifying potential configuration problems before they escalate into more significant security breaches." In the cloud, organizations routinely create and tear down services and containers quickly in order to meet changing demands. Whether testing-development or running batch jobs, ephemeral workloads and containers are opportunities for bad actors to gain access. It's important that security teams do not lose sight of these short-lived instances. To meet this growing need, Lacework agentless workload scanning has been upgraded to check customer workloads every five minutes for new instances. This granular visibility of what is running and its associated risk assures teams that they have comprehensive visibility into rapidly changing environments and gives confidence that short-lived instances are not falling through the security cracks. Operationalized Risk Management with ServiceNow and Jira Integrations It's not enough for an organization to have a list of vulnerabilities, they need to be able to quickly fix them. To enhance its industry-leading threat visibility tools, the Lacework platform now features integrations with ServiceNow and Jira that improve the process of mitigating vulnerabilities. Now, security and development teams have the premium vulnerability feeds with all the context Lacework is known for integrated into their ticketing system of choice. By connecting these systems to streamline response efforts, the appropriate teams can move faster when securing vulnerabilities. "With the rise of cloud adoption and migration, securing the enterprise has never been more important for organizations," said Deepak Kolingivadi, Head of Security Products at ServiceNow. "The Lacework integration with ServiceNow Vulnerability Response enables our enterprise customers to streamline their response processes by simplifying assignment, collaboration, and remediation of critical vulnerabilities. Using business context in ServiceNow, customers can detect and report the security posture of IT and application environments within the Now Platform. We look forward to continuing our partnership with Lacework and helping mutual customers address cybersecurity threats more quickly and efficiently." Lacework's integration with ServiceNow Vulnerability Response offerings for infrastructure and container applications is currently available in the ServiceNow marketplace. Lacework's integration to Security in Jira is in private preview. About Lacework Lacework keeps organizations secure in the cloud, allowing them to innovate faster with confidence. Cloud security requires a fundamentally new approach and the Lacework platform is designed to scale with the volume, variety, and velocity of cloud data across an organization's cloud environment: code, identities, containers, and multi-cloud infrastructure. Only Lacework provides Security and Development teams with a correlated and prioritized end-to-end view that pinpoints the largest risks and handful of security events that matter most. Learn more at www.lacework.com.

Read More

Cloud Security

Orca Security Simplifies Cloud Asset Discovery with AI Technology

Orca Security | September 14, 2023

Orca Security, a leader in agentless cloud security, has unveiled a groundbreaking AI-driven cloud asset search feature within its Orca Cloud Security Platform. This innovation positions Orca as the first provider to offer an AI-powered cloud asset search that's as simple as asking a question. This development empowers not only security professionals but also developers, DevOps teams, cloud architects, and risk governance and compliance teams to swiftly and effortlessly gain insights into their cloud environments. Building upon its existing integrations with ChatGPT and Microsoft Azure OpenAI GPT-4 for generating remediation instructions, Orca's new AI-driven search functionality revolutionizes accessibility by enabling users to pose natural language queries like, ‘Do I have any Log4j vulnerabilities exposed to the public?’ or ‘Are there any unencrypted databases with sensitive data accessible on the internet?’ This democratizes cloud security, making it accessible to individuals across the organization, regardless of their expertise, to rapidly respond to zero-day risks, optimize cloud assets, and assess exposure to threats. Gil Geron, CEO and co-founder of Orca Security, emphasized the platform's user friendliness, stating, With our latest AI-powered cloud asset search, we are delivering on our promise to provide cloud security that is easy to operate. We built the industry’s first agentless cloud security platform to eliminate lengthy and labor-intensive deployments. Now we are focused on democratizing cloud security by introducing solutions that do not require reading through lengthy documentation or extensive training to operationalize, allowing security teams, developers, and DevOps teams to get value from day one. [Source: Business wire] Cloud asset discovery is a critical process involving the identification, categorization, and mapping of all digital assets within a cloud environment. This includes virtual machines, databases, storage instances, containers, networking components, and applications. Yet many organizations lack access to this vital information. Orca's patented SideScanning technology offers 100% visibility for asset discovery and is now presenting this data intuitively to various teams across organizations, enabling a comprehensive understanding of their cloud environments. This capability is particularly crucial during zero-day threats, where speed is essential, facilitating faster and more effective mitigations. Orca's solution also eliminates the need for users to understand different naming conventions for each cloud provider. Instead, users can ask general questions, and Orca will automatically search for the relevant status names for each provider, streamlining the search process and ensuring accurate results. The AI-powered cloud asset search feature is immediately available through a feature request in the Orca Cloud Security Platform. About Orca Security Orca Security is a leading provider of cloud security solutions that offer full-stack visibility of the complete cloud infrastructure. It provides deep insights into vulnerabilities, malware, misconfigurations, and more across various platforms, including AWS, Azure, Google Cloud, Alibaba Cloud, and Kubernetes. The platform is designed to provide complete visibility of the entire cloud estate, from development to production, without requiring an agent. The company is known for innovative SideScanning technology that delivers instant-on, workload-level security.

Read More

Cloud Deployment Models

LightEdge Offers Secure, Scalable LightEdge Cloud with 100% Uptime

LightEdge | October 12, 2023

LightEdge, a prominent cloud and colocation provider, introduces its robust cloud offering, LightEdge Cloud. This cloud solution blends the flexibility of public clouds with private cloud-grade security, incorporating robust connectivity options and compliance expertise for heavily regulated industries. It comes with a 100% uptime guarantee and round-the-clock performance monitoring by a dedicated team of cloud engineers. LightEdge Cloud offers a secure and customizable enterprise cloud experience, emphasizing co-management and transparency. Jim Masterson, the CEO of LightEdge, emphasized that the LightEdge Cloud provides support for any enterprise workload with a scalable, transparent, and, most importantly, highly secure solution. Key features of LightEdge Cloud: Managed by experienced data center and cloud engineers for proactive performance maintenance. Transparent pricing with no hidden costs, including data egress fees and per-IP charges. Compatibility with various enterprise workloads, such as VMware-based, IBM-based, and container-based workloads Integration with VMware Cloud Director for enhanced transparency and management Enhanced security features include microsegmentation, a virtual firewall, DDoS protection, and load balancing. Supported by LightEdge's secure, redundant network developed over 25 years. Dale Dawson, the VP of Product at LightEdge, emphasized that the LightEdge Cloud offers identical advantages to any public cloud but at a more cost-effective and transparent price point, with a complete team of cloud experts prepared to intervene when necessary. LightEdge Cloud provides a secure platform for enterprise workloads, supported by cloud infrastructure and management solutions from VMware and Dell Technologies. Co-management may limit independence, and competition with established cloud providers may pose challenges. Performance and scalability should be evaluated against larger platforms. LightEdge Cloud offers robust security, 100% uptime, transparent pricing, and compatibility with various enterprise workloads, making it attractive for regulated industries. Proactive maintenance, integration with VMware Cloud Director, and a secure network boost reliability. About LightEdge LightEdge, founded in 1996, is a trusted provider of secure cloud and colocation services, with a strong emphasis on security, observability, and compliance. Serving over 1,300 clients, the company offers tailored public cloud solutions and simplifies multi-cloud environments. With a focus on reducing complexity and enhancing security, LightEdge allows clients to allocate resources to innovation over maintenance.

Read More