Showing posts with label Security. Show all posts
Showing posts with label Security. Show all posts

Sunday, August 11, 2019

McAfee acquires NanoSec for container security

McAfee has acquired NanoSec, a start-up offering a multi-cloud, zero-trust application and security platform for containers. Financial terms were not disclosed.

NanoSec developed a wrapper technology that works as an agent and runs on any flavor of Linux and many flavors of Windows OS. NanoSec also provides an agentless Container scanning and Config Audit (including CIS Benchmarks). The NanoSec Intelligent backend can be hosted by the customer on any midsize server on-premise/cloud or as a SaaS service.

Nanosec is based in Santa Clara, California and Bengaluru, Karnataka, India.

McAfee said the acquisition will enable organizations to improve governance and compliance and to reduce risk of their cloud and container deployments. NanoSec’s security capabilities will be applied to applications and workloads deployed in containers and Kubernetes and will be integrated into McAfee MVISION Cloud and MVISION Server Protection offerings. These capabilities include continuous configuration compliance and vulnerability assessment as well as runtime application-level segmentation for detecting and preventing lateral movement of threats.

“NanoSec’s technology is a natural extension for McAfee MVISION Cloud, enhancing our current CASB and CWPP products, and adding to our ‘Shift-Left’ capabilities to deliver on the DevSecOps best practice to improve governance and security," said Rajiv Gupta, senior vice president and general manager of the cloud security business unit, McAfee.

“Joining forces with McAfee means that our groundbreaking capabilities including our unique application-identity based approach for app-level protection and micro-segmentation will be available on a global scale,” said Vishwas Manral, founder and CEO of NanoSec.

Sunday, August 4, 2019

Whitepaper on 5G Security

A newly published whitepaper on The Evolution of Security in 5G, explores improvements in 5G technologies encryption, authentication, integrity protection, privacy and network availability of:

  • the unified authentication framework that enables seamless mobility across different access technologies and support of concurrent connections
  • User privacy protection for vulnerable information often used to identify and track subscribers
  • Secure Service-Based Architecture (SBA) and slice isolation optimizing security that prevents threats from spreading to other network slices
  • Improving SS7 and Diameter protocols for roaming
  • Adding native support for secure steering of roaming (SoR), allowing operators to steer customers to preferred partner networks – improving the customer experience, reducing roaming charges, and preventing roaming fraud
  • Improved rogue base station detection and mitigation techniques
  • And even more proprietary operator and vendor analytics solutions that offer additional layers of security

 The 60-page whitepaper was created by a working group of 5G Americas’ Board of Governors member companies and project leaders Sankar Ray from AT&T and Mike Geller from Cisco.

Huawei joins Paris Call for cybersecurity

Huawei announced its commitment to the Paris Call, a declaration aimed at spurring collective action toward securing cyberspace.

Launched by the French government in November 2018, the Paris Call is a declaration of commitment to work collaboratively on cybersecurity. Other signatories to the Paris Call include 67 states, 139 international and civil society organizations, and 358 private-sector companies.

“The quest for better security serves as the foundation of our existence, said John Suffolk, Global Cyber Security & Privacy Officer at Huawei. “We fully support any endeavor, idea or suggestion that can enhance the resilience and security of products and services for Governments, customers and their customers. We support global collaborative action on improving defenses against cybercrime, including openness, transparency and internationally agreed standards”.

Monday, July 8, 2019

Orange completes acquisition of SecureLink for EUR 515 million

Orange completed its previously-announced acquisition of SecureLink, a leading independent cybersecurity player in Europe, for EUR 515 million.

SecureLink provides a full range of cybersecurity services including specialized security consulting, security maintenance and support with 24/7 service desks (SOCs) as well as advanced managed detection and response capabilities (MDR). The group is also a leading value-added reseller of security software and hardware solutions, holding more than 1,000 technical or sales accreditations with blue chip security vendors.

SecureLink was founded in 2003 and is based in the Netherlands with over 660 employees and 14 offices. In 2018, SecureLink recorded IFRS revenues of €248m.

Orange said the acquisition makes it one of the European leaders of cybersecurity with c.1,800 employees, more than €600m PF revenues in 2018 and strong positions in major local markets through its unique European DNA and a comprehensive cybersecurity services offering.

Orange is already a leading player in the French market through Orange Cyberdefense (€303m revenues in 2018, up 12% vs. 2017).

Monday, July 1, 2019

TrapX raises $18 million for cyber deception technology

TrapX Security, a start-up based in San Jose, California, closed an $18 million financing round for its cyber deception technology.

The funding round was led by Ibex Investors. Existing TrapX investors, such as BRM, Opus Capital, Intel Capital, Liberty Technology Venture Capital, and Strategic Cyber Ventures also participated in the round.

TrapX's deception technology has a unique approach to threat detection as a “right data” problem, rather than a “big data” problem allowing security teams to change the economics of cyber-attacks. The company was founded in 2012.

Last month, TrapX announced the release of the latest enhancements to the company’s DeceptionGrid platform, which allows its customers to launch a virtual army of artificial users to expose cyber attackers. The company has also formed a cyber-deception user community called DeceptionNet to share deception strategies, new types of traps (decoys), and third-party connectors to greatly enhance the effectiveness of deception.

http://www.trapx.com

Tuesday, June 25, 2019

Cybereason uncovers a worldwide hack against telecom operators

Cybereason, a network security firm based in Boston with operations in Tel Aviv, disclosed Operation Soft Cell, an advanced, persistent attack targeting global telecommunications providers. The story was reported by The Wall Street Journal and other publications on Tuesday.

Cybereason says the hacking campaign was carried out by a threat actor using tools and techniques commonly associated with the Chinese-affiliated threat actor APT10. This multi-wave attacks focused on obtaining data of specific, high-value targets and resulted in a complete takeover of the network. The compromised material is believed to include call detail records (CDR) of specific individuals.

The researchers estimate the hack has been going since 2017.

Cybereason asserts that there is "a very high probability that the threat actor behind these malicious operations is backed by a nation state, and is affiliated with China."



https://www.cybereason.com/blog/operation-soft-cell-a-worldwide-campaign-against-telecommunications-providers

Monday, June 24, 2019

Vectra raises $100m for its AI-driven cloud security

Vectra, a start-up based in San Jose, California, announced $100 million in new funding for its artificial intelligence (AI)-driven cloud security using network detection and response.

Vectra's Cognito platform promises 360-degree visibility into cloud, data center, user and internet-of-things (IoT) infrastructure. The company reports 104% growth in annual recurring revenue in 2018 compared to 2017. The company will continue to ramp up initiatives aimed at addressing the global deficit in cloud security, innovating on its existing platform and expanding its global customer base.

The new funding was led by TCV and included existing investors. This brings the company’s total funding to date to more than $200 million.

“The cloud has inherent security blind spots, making it imperative to eliminate cyber-risks as enterprises move their business to the cloud,” said Hitesh Sheth, president and chief executive officer at Vectra. “The Cognito platform enables them to stop hidden cyberattacks in the cloud. We look forward to partnering with TCV and our existing investors as we continue our rapid growth.”

Wednesday, June 12, 2019

Edgewise raises $11 million for microsegmentation

Edgewise Networks, a start-up based in Burlington, Mass, announced $11 million in funding for its microsegmentation platform based on software identity.

The funding round was led by existing investors .406 Ventures and Accomplice, with additional participation from Pillar.

Edgewise reduces the network attack surface in cloud and data center environments. Edgewise said it automatically protects application workloads in seconds, adding provable security to hybrid cloud environments. Machine learning and advanced analytics enable the rapid discovery of application communication topology and attack pathways. This real-time visibility allows security teams to microsegment environments with a single click. Policies are enforced no matter where the application resides — on premises, in the cloud, or in a container — and remain in effect even as the underlying network changes.

“Our innovative, patented approach makes microsegmentation — one of the hardest problems in cybersecurity — incredibly simple to implement,” said Peter Smith, co-founder and chief executive officer at Edgewise Networks. “With Edgewise, companies can operate their applications in hybrid cloud and container environments with peace of mind, knowing that they are protected. This strong support from our investors will enable us to expand to meet the demand for automated microsegmentation.”

https://www.edgewise.net

Thursday, June 6, 2019

NTT Comm signs Zscaler for web security

Zscaler announced a global alliance partnership agreement with NTT Communications to deliver cloud-based internet and web security that scales to all users, regardless of location, enabling enterprises to securely embrace the cloud.

“As a DX Enabler™ of digital transformation, we wish to provide services that help customers transform existing businesses and create new ones. To achieve this aim, we need a cloud platform that is not only flexible and reliable but, also enables utilizing data safely and securely,” said Mr. Fumitaka Takeuchi, a security evangelist at NTT Communications. “By uniting our global communication infrastructure with the world’s highest level of robustness and managed security services with Zscaler’s flexible cloud security services, we provide data management solutions for a new era and support increased resilience in a zero-trust environment.”

“NTT Communications’ reliable communication infrastructure combined with Zscaler’s extensive cloud security platform will enable enterprises to securely transform into cloud-enabled enterprises,” said Al Caravelli, Vice President of Worldwide Global Alliances and Channels at Zscaler.

Thursday, May 30, 2019

Colt Ethernet Line Encryption leverages ADVA FSP 150

Colt Technology Services is using the ADVA FSP 150 with ConnectGuard security technology to deliver its new Ethernet Line Encryption service at up to 10 Gbps.

ADVA’s ConnectGuard Ethernet technology, which is built on an enhanced version of MACsec, uses cryptographic techniques including dynamic key exchange and hardware tamper protection. It also features comprehensive service assurance and testing functionality.

Colt’s Ethernet Line Encryption is now available in Europe, North America and Asia on metro, national and international Ethernet line circuits. Earlier this year, ADVA and Colt jointly displayed the comprehensive Layer 2 encryption service at the Berlinale Film Festival in a live proof of concept demo.

"We’re using the ADVA FSP 150 with ConnectGuard Ethernet encryption to offer robust protection for data in transport. Our Ethernet Line Encryption solution ensures that all data flowing through the Colt IQ Network is safe from attack. But what makes it especially valuable to today’s businesses is how straightforward it is to implement and that it only adds a few microseconds of latency and barely any impact on throughput,” said Peter Coppens, VP, product portfolio, Colt Technology Services. "

“Our FSP 150 ConnectGuard Ethernet technology enables encrypted connectivity with none of the complexity, latency and bandwidth cost associated with IPSec. Developed in compliance with the most stringent security standards, such as the US FIPS, it’s the ideal basis for an encryption-as-a-service offering,” commented Stephan Rettenberger, SVP, marketing and investor relations, ADVA.

http://adva.li/colt-encryption

Thursday, May 23, 2019

Credo announces MACsec device for 400G

Credo introduced a family of PHY devices supporting the IEEE 802.1AE media access controller security (MACsec) and internet protocol security (IPSec) standard for 10G through 400G port interconnects. The MACsec devices integrate 256-bit AES technology.

Credo said its new family of devices addresses security requirements for various Ethernet data link configurations in enterprise, cloud-scale data center, and service provider networks for both commercial and government deployments. This includes links between servers, switches, and routers.

"Adding security functionality to our industry-leading retimer and gearbox devices was a natural step for Credo," said Sandeep Shah, senior director of marketing at Credo. “We are able to deliver these solutions at low power in 28nm CMOS which translates into our customers ability to deploy systems with a competitive edge.”

The first member of the Credo MACsec family, the CMS42550, is available as a pin-compatible upgrade to the production shipping 400G gearbox, the CMX42550KP, which has been deployed in hyperscale data centers. The second member of the family, the CMS50216, doubles the MACsec throughput to 800G.

Highlights:

  • Supports MAC rates of 10G, 25G, 40G, 50G, 100G, 200G and 400G
  • 400G MACsec Gearbox / Retimer (CMS42550)
  • 800G MACsec Retimer (CMS50216)
  • Full MACsec Support
  • 512 Full SecY support
  • IEEE 802.1AE compliant
  • IEEE 802.1AEbn compliant (256-bit key)
  • IEEE 802.1AEbw compliant (extended packet numbering)
  • All cipher suites supported (GCM-AES-128/256, GCM-AES-XPN-128/256)
  • MACsec extensions: passing up to 4 x VLAN tags in clear
  • Full IPsec Support
  • Support for IP/UDP/ESP headers
  • Support for packets with VLAN tags
  • Advanced IPsec features for Enterprise, Data Center and Telecom applications
  • Each port can be configured to MACsec, IPsec or Bypass mode
  • Low power 28nm CMOS


http://www.credosemi.com

Wednesday, April 3, 2019

Aqua raises $62M for cloud-native security

Aqua Security, a start-up based in Tel Aviv, Israel, announced $62 million in Series C funding for its cloud-native security solutions.

Aqua’s Cloud Native Security Platform provides visibility and security automation across the entire application lifecycle, using a zero-touch approach to detect and prevent threats while simplifying regulatory compliance. Aqua has extended its platform to support serverless environments, and all major cloud and orchestration environments. Its solutions are available on demand with consumption-based pricing on the recently launched AWS Marketplace for Containers and Google Kubernetes Apps Marketplace, as well as on Azure Marketplace.

Aqua said it now has more than 100 blue-chip companies across the energy, aerospace, internet, media, travel, retail, pharmaceutical and hospitality sectors among its customers. The company also claims that its platform secures five of the world’s ten largest container production deployments.

“We are thrilled to have Insight Partners as investors to propel Aqua’s next phase of growth,” noted Dror Davidoff, CEO and co-founder of Aqua. “The adoption of cloud native technologies provides an opportunity for security to be redefined, addressing the chronic cybersecurity skills shortage through automation, and creating applications that are secure by design. With this significant investment and our focus on the needs of enterprise customers and product innovation, we can take the next step to realize our vision.”

Tuesday, February 12, 2019

Symantec acquires Luminate Security for perimeter defense

Symantec announced the acquisition of Luminate Security, a privately held company developing Software Defined Perimeter technology. Financial terms were not disclosed.

Luminate enables security and IT teams to create Zero Trust Application Access architecture without traditional VPN appliances.

Luminate's Secure Access Cloud securely connects any user from any device, anywhere in the world to corporate applications, on-premises and in the cloud, while all other corporate resources are cloaked without granting access to the entire network.

The company says its approach prevents any lateral movements to other network resources while eliminating the risk of network-based attacks.

Symantec said Luminate’s Secure Access Cloud technology further extends the power of its own Integrated Cyber Defense Platform to users as they access workloads and applications regardless of where those workloads are deployed or what infrastructure they are accessed through.

http://www.luminate.io

Sunday, February 3, 2019

Orange acquires SecureData, a UK-based consultancy

Orange has acquired SecureData Group, a UK-based cybersecurity service provider, for an undisclosed amount.

SecureData, has over 200 employees in the UK and South Africa, a cybersecurity consultancy with a 25-year track record. The company recorded annual revenues of circa 50 million euros in 2018 and has enjoyed consistent growth rates of approx. 20% since 2016.

Orange said SecureData will help reinforce its strategic position in cyberdefense by bringing a new source of expertise and innovative technology. SecureData also boasts an advanced cyber-SOC (Security Operations Center) in the UK that will reinforce Orange Cyberdefense’s international reach by building upon the existing network of nine cyber-SOCs dedicated to monitoring and responding to security breaches on behalf of its customers.

“We are very proud and happy to announce the acquisition of SecureData, which will mark a major milestone in Orange’s development in Europe’s cybersecurity market. SecureData, just like Orange Cyberdefense, has successfully made the transition toward Managed Security Services, and shares the same passion for Cyber. We will progressively co-build together the operational and commercial synergies, with the patronage and experience of Michel Van Den Berghe, CEO of Orange Cyberdefense. Cybersecurity has become a critical element for both large and small companies as they evolve in an increasing digital-reliant world. We are convinced that the combined expertise of Orange Cyberdefense and SecureData will provide a powerful resource for our customers in ensuring the protection of their valuable data.” said Hugues Foulon, Executive Director of Strategy and Cybersecurity activities at Orange.

Ian Brown, Executive Chairman at SecureData commented “We are both thrilled and excited to be joining the Orange Cyberdefense family. Both organisations share the same vision and aspiration for the cybersecurity market, and have many complementary services and skills. By being part of Orange we will be able to better serve the international needs of many of our existing customers as well as providing enhanced cyber services to Orange customers with the UK”.

Thursday, January 10, 2019

A10 cites five major 5G Gi-LAN security design wins in 2H2018

A10 Networks announced it secured five major 5G network design wins in the second half of 2018 for its A10 Thunder Convergent Firewall Gi/SGi firewall solution, including three wins in the fourth quarter. All five operators are planning to launch their first commercial 5G services in the first quarter of 2019.

The company said it was selected by these carriers in Asia and EMEA because of the Thunder CFW’s ability to meet the massive capacity demands of 4G and 5G networks with performance and scale, comprehensive feature set, and rich automation capabilities. Capacity demands rise significantly in 5G networks due to substantial increases in concurrent sessions, extreme reliability and higher connections per second. As a result, legacy firewalls often cannot handle the traffic.

“A10 is extremely well positioned to address the security needs of mobile carriers and their 4G and 5G networks,” said A10’s CEO Lee Chen. “We secured five major 5G design wins in recent months and are working closely with numerous other leading operators around the world on their 5G security upgrades and transformation projects.”


Tuesday, January 8, 2019

Comcast offers AI-powered home security from Cujo

Comcast launched a new artificial-intelligence-powered service that monitors, blocks and informs customers of online threats to connected devices, and provides seamless digital protection for those devices when connected to their home network's Xfinity Advanced Gateway.

The new Xfinity xFi Advanced Security service is powered by Cujo AI, a start-up based in Mountain View, California. The platform uses AI and machine learning technology to monitor and analyze WiFi traffic in the home, and will automatically block identified suspicious activity in real time.

“As the digital world gets more complex, we wanted to make it simple and easy for our customers to protect their home networks. That’s why we developed xFi Advanced Security,” said Fraser Stirling, Senior Vice President of Digital Home, Devices and AI, Comcast Cable. “We want to give customers digital peace of mind for the devices they already own and the confidence to expand and evolve their connected homes knowing that every new camera, voice-assisted speaker or smart thermostat they add will be protected.”

The service is available for $5.99 per month, and is also available as part of a package in some markets.

Monday, November 5, 2018

Symantec acquires Javelin and Appthority

Symantec announced the acquisition of Javelin Networks and Appthority. Financial terms were not disclosed

Javelin Networks offers advanced software technology to defend enterprises against Active Directory-based (AD) attacks, which recently have risen in frequency and severity. Multiple major advanced persistent threat (APT) campaigns have used AD credentials to move laterally in the network beginning with a single compromised endpoint. Javelin has developed software to protect AD and commonly-used domain resources, including domain controllers, domain identities, and domain credentials. Javelin Networks’ advanced technology can detect AD misconfigurations and backdoors and help prevent AD reconnaissance and credentials misuse by authorized devices and applications. The privately held company was founded in 2014 and has employees based in Israel and the U.S.

“In the cloud generation, identity management services, such as Active Directory, are a critical part of a user’s interaction with their organization’s applications and services. They are also a critical information repository that attackers regularly exploit,” said Javed Hasan, senior vice president of endpoint and data center products, Symantec. “The addition of Javelin Networks technology to our industry-leading endpoint security portfolio gives Symantec customers a unique advantage in one of the most vulnerable and critical areas of IT infrastructure. Most importantly, it can help expose exploitable backdoors in AD and stop attacks at the point of breach while preventing lateral movement.”

Appthority, which was founded in 2011 and is based in San Francisco, offers Mobile Application Security Analysis. The Appthority Mobile Threat Protection (MTP) solution provides threat detection and remediation across a broad range of device, app and data network risks. Last year, Symantec acquired Skycure, a leading Mobile Threat Defense (MTD) technology, that enabled the launch of Symantec Endpoint Protection Mobile (SEP Mobile). Appthority’s technology will be built into SEP Mobile, further enhancing Symantec’s ability to protect the broadest spectrum of modern endpoints and operating systems. Prior to the acquisition, Appthority was a Symantec Ventures portfolio company.

“Mobile apps are a critical threat vector that every company must address to protect their enterprise security,” said Adi Sharabani, SVP, Modern OS Security. “The Appthority technology extends SEP Mobile’s capabilities in limiting unwanted app behaviors, supporting regulatory compliance, and assessing vulnerabilities.”

Thursday, October 4, 2018

IDC: Security spending to reach $133.7 billion in 2022

Worldwide spending on security-related hardware, software, and services is forecast to reach $133.7 billion in 2022, according to an new update to IDC's Worldwide Semiannual Security Spending Guide, amounting to a compound annual growth rate (CAGR) of 9.9%. Security spending is forecasted to be $92.1 billion for 2018.

"Security remains an investment priority in every industry as companies seek to protect themselves from large-scale cyber attacks and to meet expanding regulatory requirements," said Eileen Smith, program director, Customer Insights and Analysis. "While security services are an important part of this investment strategy, companies are also investing in the infrastructure and applications needed to meet the challenges of a steadily evolving threat environment."

Some highlights:

  • Security-related services will be both the largest ($40.2 billion in 2018) and the fastest growing (11.9% CAGR) category of worldwide security spending. 
  • Managed security services will be the largest segment within the services category, delivering nearly 50% of the category total in 2022. 
  • Integration services and consulting services will be responsible for most of the remainder. 
  • Security software is the second-largest category with spending expected to total $34.4 billion in 2018. 
  • Endpoint security software will be the largest software segment throughout the forecast period, followed by identity and access management software and security and vulnerability management software. The latter will be the fastest growing software segment with a CAGR of 10.7%. Hardware spending will be led by unified threat management solutions, followed by firewall and content management.
  • Banking will be the industry making the largest investment in security solutions, growing from $10.5 billion in 2018 to $16.0 billion in 2022. 
  • Security-related services, led by managed security services, will account for more than half of the industry's spend throughout the forecast. The second and third largest industries, discrete manufacturing and federal/central government ($8.9 billion and $7.8 billion in 2018, respectively), will follow a similar pattern with services representing roughly half of each industry's total spending. The industries that will see the fastest growth in security spending will be telecommunications (13.1% CAGR), state/local government (12.3% CAGR), and the resource industry (11.8% CAGR).
  • The United States will be largest geographic market for security solutions with total spending of $39.3 billion this year. 
  • The United Kingdom will be the second largest geographic market in 2018 at $6.1 billion followed by China ($5.6 billion), Japan ($5.1 billion), and Germany ($4.6 billion). 


https://www.idc.com/getdoc.jsp?containerId=prUS44370418


Monday, August 27, 2018

NEC invests in Tascent for its iris biometric system

NEC announced an equity investment in Tascent, a start-up based in Los Gatos, California, that offers a biometric identification based on iris scanning.

Tascent's technologies include optical control technology to remotely capture an accurate, high-quality iris image at high speed, and a user interface (UI) technology that smoothly guides users in support of capturing accurate biometric information. The technology is embedded in security systems used at airports, government agencies and enterprises. The company was founded in 2015.

NEC said its investment and partnership will enable the two companies to jointly enhance the capacity of iris recognition, using Tascent’s optical control and UI technologies and NEC’s advanced biometric engines, and create a next generation iris authentication offering for the public safety market.

Thursday, August 9, 2018

Cohere selects RedShift for UC threat detection and fraud prevention

Cohere Communications, which offer IT support services including cyber protection and crisis management, is deploying RedShift Networks’ Unified Communication Threat Management (UCTM) solution to provide its customers with a comprehensive managed VoIP solution.  The rollout adds an additional layer of security to Cohere’s existing Unified Security Management (USM) Solution.

Cohere said its USM delivers a fully outsourced, end-to-end solution – enabling their customers to seamlessly secure critical systems and sensitive data.

Steven Francesco, Cohere Communications’ Chairman and CEO, said: “Secure voice communications is an essential part of our offering. Our partnership with RedShift Networks, a leader in the space, will further support our mission to provide customers with an all-encompassing Cyber framework – protecting their firm’s network from intruders and potentially catastrophic loss of information, services, and reputation.” Combining our USM Solution with RedShift Networks’ leading solutions, we are aiming to ensure that businesses can proactively respond to evolving threats and fully secure their most valuable assets – their customer and business data.”

“As more and more companies are attacked by damaging security threats such as Ransomware and service-impacting Botnets, it is clear that all companies – regardless of size – require a comprehensive security solution that protects their firm from the network to the core, said Steven Francesco, Chairman and CEO of Cohere Communications. “By joining forces with RedShift Networks, we are providing a comprehensive VoIP detection and response platform, supported by industry experts to ensure our customers are protected against current threats.”

See also