CLOUD SECURITY

Wolters Kluwer cloud-based global expert solution named a global leader in cloud computing

Wolters Kluwer | September 30, 2022 | Read time : 02:00 min

Wolters Kluwer
Wolters Kluwer Tax & Accounting announced that its innovative TeamMate+ suite of cloud-based expert audit solutions was recognized by the Business Intelligence Group as a global leader in cloud computing and awarded the 2022 Stratus Awards for Cloud Computing in their annual business award program. TeamMate+ was recognized as a global leader in the Software as a Service category. Through these awards, the Business Intelligence Group sought to identify the companies, products and people that are offering unique solutions and technology that will continue to lead the industry.

“We are honored to be recognized by the Business Intelligence Group for our part in the evolution of cloud solutions for the internal audit profession, TeamMate continues to help organizations redefine their risk assessment methodology to ensure they stay ahead of risk while optimizing human resources and adhering to professional standards.”

Frans Klaassen, Senior Vice President & General Manager, Wolters Kluwer TeamMate

TeamMate+ supports all phases of audit work, from overarching audit plans aligned with organizational objectives to individual project planning, which guides day-to-day work. It enhances workflow using request and tracking features to ensure appropriate data is provided and captured within the tool during audit execution. And provides reporting capabilities that allow audit teams to craft output appropriate to various audiences including audit management and stakeholders. In addition, the TeamCloud hosting provides a secure and stable environment to access a customizable TeamMate environment from the web.

Earlier this year, TeamMate achieved authorization status from the Federal Risk and Authorization Management Program (FedRAMP) for the TeamMate+ FedRAMP cloud hosting environment. Achieving authorization means that auditors within US Federal agencies can create, manage, and execute audits all while staying aligned with the Red and Yellow Book standards.

“Wolters Kluwer is at the forefront of the cloud helping to drive practical innovations in the cloud,” said Maria Jimenez, Chief Nominations Officer of Business Intelligence Group. “The cloud is now part of the fabric of our society, and we are thrilled that our volunteer judges were able to help promote all of these innovative services, organizations and executives.”

About Business Intelligence Group
The Business Intelligence Group was founded with the mission of recognizing true talent and superior performance in the business world. Unlike other industry and business award programs, business executives—those with experience and knowledgejudge the programs. The organization’s proprietary and unique scoring system selectively measures performance across multiple business domains and then rewards those companies whose achievements stand above those of their peers.

About Wolters Kluwer
Wolters Kluwer (WKL) is a global leader in professional information, software solutions, and services for the healthcare; tax and accounting; governance, risk and compliance; and legal and regulatory sectors. We help our customers make critical decisions every day by providing expert solutions that combine deep domain knowledge with advanced technology and services.

Wolters Kluwer reported 2021 annual revenues of €4.8 billion. The group serves customers in over 180 countries, maintains operations in over 40 countries, and employs approximately 19,800 people worldwide. The company is headquartered in Alphen aan den Rijn, the Netherlands.

Wolters Kluwer shares are listed on Euronext Amsterdam (WKL) and are included in the AEX and Euronext 100 indices. Wolters Kluwer has a sponsored Level 1 American Depositary Receipt (ADR) program. The ADRs are traded on the over-the-counter market in the U.S. (WTKWY).

Spotlight

1,000,000 API Calls per Month: is 1,000,000 API calls or notifications consumed by any application built on the Oracle Cloud Service during a month. 1,000,000 DNS Traffic Management Queries: is defined as 1,000,000 DNS Traffic Management queries received by the OCI authoritative DNS nameserver infrastructure during the monthly billing period. Oracle will charge You for the number of DNS Traffic Management queries received by the Public DNS Authoritative Service at a prorated cost of $4.00 per 1 Million Traffic Management queries during the billing period (e.g., 100 Million Traffic Management queries received will be charged 100 x $4.00 = $400).


Other News
CLOUD DEPLOYMENT MODELS

eSentire Announces Global Partnership with Lacework to Reduce Cloud Security Risk

eSentire | November 02, 2022

eSentire Inc., the Authority in Managed Detection and Response (MDR), announced today its global partnership with Lacework®, the data-driven cloud security company, advancing its protection of cloud workloads, containers, applications, and Kubernetes with 24/7 Multi-Signal MDR and Cloud Security Posture Management (CSPM) services, utilizing the Lacework Polygraph® Data Platform. eSentire is Lacework’s first global MDR partner. With 95% of organizations leveraging at least one cloud service1 and 70% running more than two containerized applications by 20232, security leaders must seek out partners who align cloud protection to each organization’s business strategy. Widespread adoption of cloud Infrastructure (IaaS), Platform (PaaS), and Software as a Service (SaaS) models demonstrate an undisputed business ambition to innovate and scale quickly. eSentire uniquely embraces the balance between business strategy and cloud security, delivering first and foremost on the mission to protect the risk in order to prevent business disruption. “eSentire understands that cloud security isn’t a journey to shift left for every organization. It’s about protecting what matters most to your business because a risk is a risk, no matter where your users and data reside, This partnership with Lacework demonstrates our commitment to driving the most proactive threat response outcomes forward on behalf of our global customer base. Our message to security leaders is that you’re in the cloud, and we’re all-in to protect you.” Rahul Bakshi, Chief Product Officer, eSentire Using machine learning, artificial intelligence, and cloud behavioral analytics, the Lacework Polygraph® Data Platform automatically learns and understands behaviors across an organization’s cloud environment. eSentire’s new partnership with Lacework expands its deep expertise across AWS, Azure and Google Cloud with further visibility, differentiated behavior-based threat detection, and context-rich insights to fuel its multi-signal investigations. From there, eSentire’s 24/7 SOC analysts and renowned Threat Response Unit (TRU) stop active threats before they spread to become business disrupting, with a Mean Time to Contain of less than 15 minutes. eSentire’s Cyber Risk Advisors act as an extension of the customer’s team, supporting their risk-based strategy with the contextual industry and business awareness required to provide actionable recommendations to improve cyber resilience across on-premise, cloud, and hybrid environments. Additional eSentire and Lacework mutual service benefits include: Identified and prioritized misconfigurations across the three major cloud providers – Azure, AWS, and Google Cloud Findings mapped against recognized industry frameworks, including HIPAA, CIS, and SOC 2 Complete multi-signal threat investigation visibility within eSentire’s Atlas Insight Portal Detection, investigation, and containment of threats to virtual machine (VM) workloads and containers up to 10x faster A 342% return on investment, 100:1 alert reduction, and 80% faster investigation capability “As threats continue to increase in speed and sophistication, customers are looking for security solutions which can help them continue to innovate quickly with the confidence they’re prioritizing security and compliance,” said Brian Lanigan, VP, Worldwide Channels and Alliances, Lacework. “Together with eSentire, we’re delivering a fully managed solution that provides complete cloud detection, investigation, and proactive threat response. This puts the customer’s protection at the forefront, mitigating cloud security risks with transparent visibility and co-management capabilities.” eSentire MDR for Cloud and Cloud Security Posture Management protection with Lacework is available now. eSentire and Lacework will be hosting an executive fireside chat on Thursday, December 7, 2022, with industry experts Tia Hopkins (Field CTO and Chief Cyber Risk Strategist, eSentire) and Erin K. Banks (Senior Director of Product Marketing, Partners & Alliances, Lacework) entitled: Risk is Risk - Is Cloud Security The Journey or The Destination? To register and participate in this engaging conversation, visit: mdr.esentire.com/lacework. About eSentire eSentire, Inc. is the Authority in Managed Detection and Response, protecting the critical data and applications of 1,500+ organizations in 80+ countries, representing 35 industries from known and unknown cyber threats. Founded in 2001, the company’s mission is to hunt, investigate and stop cyber threats before they become business disrupting events. Combining cutting-edge machine learning XDR technology, 24/7 Threat Hunting, and proven security operations leadership, eSentire mitigates business risk, and enables security at scale. The Team eSentire difference means enterprises are protected by the best in the business with a named Cyber Risk Advisor, 24/7 access to SOC Cyber Analysts, Elite Threat Hunters, and industry-leading threat intelligence research from eSentire’s Threat Response Unit (TRU). eSentire provides Managed Risk, Managed Detection and Response and Incident Response services.

Read More

CLOUD SECURITY

Sigma Computing Partners with Snowflake to Launch Solution on Healthcare & Life Sciences Data Cloud

Sigma | September 15, 2022

Forescout Technologies, the global leader in automated cybersecurity, today announced a new healthcare cybersecurity partnership with First Health Advisory, a leader in healthcare IT risk management. The partnership creates an innovative approach to connected asset risk management by automating the technical data collection, mitigation and risk reduction measures for a healthcare organization’s entire network that encompasses IT, IoT, OT, and IoMT assets. Healthcare organizations’ networks are under constant attack and often do not have the necessary human capital to oversee the work necessary to thwart a potential threat or attack through quick response. This challenge places added importance on the need to obtain highly skilled outside expertise to operationalize a program and execute ongoing asset risk assessments across the network. “Cybersecurity risk assessments for healthcare organizations are incredibly time consuming, static in nature, and mandated by regulatory requirements. Moreover, the steps to mitigate assessment findings and lower risk are difficult to complete with the current cyber skills shortage, This partnership and new approach that combines intuitive risk assessment and automated mitigation technology will allow healthcare organizations to not only make risk assessments easier and faster to complete, but also free up internal resources to support other critical aspects of the patient experience.” Tamer Baker, vice president, global healthcare, Forescout The audit experience will also see a major transformation through this new partnership. Organizations will have an ability to automate evidence collection and receive ongoing mitigation and vulnerability management support from First Health Advisory staff year-round. “Our partnership delivers the optimal solution healthcare organizations are looking for – the right balance of highly skilled, multi-disciplinary risk assessment personnel with deep understanding of the regulatory landscape together with a dependable cybersecurity platform that can automate risk reduction actions,” said Will Long, CSO of Enterprise Security & Technology at First Health Advisory. “We’re excited about this collaboration and together with Forescout, look forward to helping more healthcare organizations improve their security posture.” About Forescout Forescout Technologies, Inc. delivers cybersecurity automation across the digital terrain, maintaining continuous alignment of customers’ security frameworks with their digital realities, including all asset types – IT, OT, IoT, IoMT. The Forescout Continuum Platform provides complete asset visibility, continuous compliance, network segmentation and a strong foundation for Zero Trust. For more than 20 years, Fortune 100 organizations and government agencies have trusted Forescout to provide automated cybersecurity at scale. Forescout arms customers with data-powered intelligence to accurately detect risks and quickly remediate cyberthreats without disruption of critical business assets.

Read More

CLOUD SECURITY

Raytheon Technologies collaborates with Microsoft to accelerate key business priorities through cloud adoption

Raytheon Technologies | November 08, 2022

Raytheon Technologies is deepening its collaboration with Microsoft Corp. (Nasdaq: MSFT) to equip the aerospace and defense company's employees with cloud-based tools, technologies, and platforms to enhance collaboration, optimize operations and unlock intelligent insights that drive greater value for customers. The effort includes co-development of capabilities, as well as Raytheon Technologies' use of existing or modified versions of popular Microsoft solutions such as Microsoft Teams. It is part of the company's strategy to optimize operations and give employees access to standardized digital tools globally. "At Raytheon Technologies, our employees and customers are at the heart of everything we do, Strategic partnerships such as this one act as an accelerant toward our goal of leveraging the power of digital transformation to support business growth, drive operational excellence, and equip our employees with the tools they need to be productive wherever they work." Vince Campisi, Raytheon Technologies' chief digital officer and senior vice president for Enterprise Services Using the cloud to drive collaboration, efficiency and speed to market Moving to Microsoft 365 has helped Raytheon Technologies reduce its landscape of mail and communication platforms by more than 90%, making it easier for employees to work effectively in a variety of settings including on-site and remote workplaces in 40 countries. The extensible capabilities of Microsoft 365 will help Raytheon Technologies address it's unique needs as a large, international company in a highly regulated industry. The collaboration will support Raytheon Technologies' ongoing efforts to reduce the footprint of its data centers by 60%, resulting in faster speed-to-market for products, continuous automation for applications, and greater efficiency, data security and scalability overall. Creating data-driven insights to deliver new forms of customer value Raytheon Technologies is leveraging Microsoft Azure to enhance data-driven insights to deliver new forms of customer value through predictive analytics, helping customers stay ahead of potential challenges before they arise. "The cloud is a huge enabler for Raytheon Technologies' strategy to drive innovation and growth combined with operational excellence," said Deb Cupp, president, Microsoft US. "We are excited to partner with them on the move to Azure and Microsoft 365 for seamless, secure collaboration; integrated data platform insights; data center consolidation; and faster time to market for products and services. Through our joint operating model, we remain committed to helping Raytheon execute their digital transformation." About Raytheon Technologies Raytheon Technologies Corporation is an aerospace and defense company that provides advanced systems and services for commercial, military and government customers worldwide. With four industry-leading businesses ― Collins Aerospace, Pratt & Whitney, Raytheon Intelligence & Space and Raytheon Missiles & Defense ― the company delivers solutions that push the boundaries in avionics, cybersecurity, directed energy, electric propulsion, hypersonics, and quantum physics. The company, formed in 2020 through the combination of Raytheon Company and the United Technologies Corporation aerospace businesses, is headquartered in Arlington, Virginia.

Read More

CLOUD SECURITY

Prisma Cloud Delivers Context-Aware Software Composition Analysis to Secure Deployment of Open Source Software

Palo Alto Network | September 23, 2022

Open source software is a critical component of cloud-native applications, allowing developers greater speed and modularity without having to reinvent the wheel each time they code. However, as the Unit 42 Cloud Threat Report, 2H 2021 found, open source software can often contain known vulnerabilities, which can open organizations up to significant risk. Palo Alto Networks (NASDAQ: PANW), the global cybersecurity leader, today introduced the industry's first context-aware software composition analysis (SCA) solution to help developers safely use open source software components. The integration of SCA into Prisma® Cloud further demonstrates why Palo Alto Networks is the leading provider of cloud-native security. Traditional SCA solutions are standalone products that can produce a large number of alerts but lack the runtime context to help fix vulnerabilities. With the addition of SCA to the Prisma Cloud platform, developers and security teams can proactively surface and prioritize known vulnerabilities that impact the application lifecycle (i.e., code, build, deploy and run). Prisma Cloud SCA delivers deep dependency detection and remediation of vulnerabilities in open source software before applications reach production. It can also help developers prioritize remediation based on software components that are already in use. These capabilities are not possible when SCA solutions are deployed as single point products. "Developers leveraging open source software should be able to build applications with the confidence they aren't opening the organization up to risk, With the average application consisting of 75% open source components, SCA on Prisma Cloud is key to protecting the organization from code to cloud and empowering developers to build with speed." Ankur Shah, senior vice president, Prisma Cloud, Palo Alto Networks As a complete cloud-native application protection platform (CNAPP), Prisma Cloud is context-aware at every stage of the application lifecycle to provide a unified view of risk across organizations' cloud environments. Where current approaches to cloud security rely on siloed products that provide intermittent visibility without remediation, Prisma Cloud approaches cloud security with a comprehensive, prevention-first framework. With 188% increase in cloud incident response cases over the past three years, this shift in approach has become mandatory. A complete code-to cloud CNAPP needs to incorporate the following five key principles in order to keep organizations safe: Security from code to cloud — protects applications at every stage of the development lifecycle — from code, build, deploy and run. Continuous, real time visibility — uses real-time and contextual security analysis of cloud environments to help prevent misconfigurations, vulnerabilities and threats. Prevention-first protection — stopping attacks and defending against zero-day vulnerabilities to drive down mean time to remediation. Choice for every cloud journey — aligning security needs with current and future cloud priorities by supporting a breadth of cloud service providers, workload architectures, continuous integration and continuous delivery (CI/CD) pipelines, integrated development environments (IDEs), and repositories with a unified platform Cloud scale security — consistently secures applications as cloud environments scale. In addition to SCA and to further increase the safety of cloud-native applications, Prisma Cloud introduced a software bill of materials (SBOM) among other capabilities for developers to easily maintain and reference a complete codebase inventory of every application component used across cloud environments. Implementing SCA and SBOM ensures Prisma Cloud aligns with these principles. "Buyers looking for cloud-native security solutions need to keep the requirements of microservices security protection in mind. The 'bolted-on' and 'whack-a-mole' approaches are a thing of the past," said Frank Dickson, program vice president, Security and Trust at IDC. "Security should be embedded throughout the application development life cycle. This means that buyers need to fundamentally change their approach to security, although they need to continue to protect their run-time environments, they must also embrace solutions that embed security in the application development process, an approach referred to as 'shift left.' Shift left requires one to think less about security products and more about continuous security processes." About Palo Alto Networks Palo Alto Networks is the world's cybersecurity leader. We innovate to outpace cyberthreats, so organizations can embrace technology with confidence. We provide next-gen cybersecurity to thousands of customers globally, across all sectors. Our best-in-class cybersecurity platforms and services are backed by industry-leading threat intelligence and strengthened by state-of-the-art automation. Whether deploying our products to enable the Zero Trust Enterprise, responding to a security incident, or partnering to deliver better security outcomes through a world-class partner ecosystem, we're committed to helping ensure each day is safer than the one before. It's what makes us the cybersecurity partner of choice.

Read More

Spotlight

1,000,000 API Calls per Month: is 1,000,000 API calls or notifications consumed by any application built on the Oracle Cloud Service during a month. 1,000,000 DNS Traffic Management Queries: is defined as 1,000,000 DNS Traffic Management queries received by the OCI authoritative DNS nameserver infrastructure during the monthly billing period. Oracle will charge You for the number of DNS Traffic Management queries received by the Public DNS Authoritative Service at a prorated cost of $4.00 per 1 Million Traffic Management queries during the billing period (e.g., 100 Million Traffic Management queries received will be charged 100 x $4.00 = $400).

Resources