Tag Archive for: Extends

Lookout Extends Partnership With Verizon to Bring Data-Centric Cloud Security to Business Customers


The Lookout Cloud Security Platform enables organizations to safeguard data across the web, cloud and private apps; reduces complexity, costs and management overhead

SAN FRANCISCO, Sept. 21, 2022 /PRNewswire/ — Lookout, Inc., a leading provider of endpoint and cloud security solutions, today announced the expansion of its partnership with Verizon to deliver the Lookout Cloud Security Platform to Verizon business customers. The Lookout Cloud Security Platform helps safeguard an organizations’ data, identify and mitigate threats and facilitates secure access to the web, private apps and cloud services (SaaS) deployed in a multi-cloud environment.

The Lookout Cloud Security Platform Safeguards Data Everywhere It Goes

While cloud connectivity has boosted productivity and collaboration, it has also amplified security gaps as customers continue to use on-premises, appliance-based security solutions. To prevent data leakage and cover security gaps in this work-from-anywhere environment, organizations need a unified cloud-delivered platform that protects users, devices, access and data across all apps and devices from any modern day cyber threats. The Lookout Cloud Security Platform delivers SSE solution combines Cloud Access Security Broker (CASB), Zero Trust Network Access (ZTNA) and Secure Web Gateway (SWG) natively in a single platform, significantly reducing the complexity, costs and number of security vendors and point solutions an IT department has to manage. It also provides the agility and scalability to keep pace with evolving, increasingly sophisticated threats.

According to Gartner®, “By 2025, 80% of organizations seeking to procure SSE-related security services will purchase a consolidated SSE solution rather than stand-alone CASB, SSE, and ZTNA offerings, up from 15% in 2021.” Earlier this year, Gartner released its 2022 Gartner® Magic Quadrant™ for Security Service Edge in which Lookout has been recognized in the Visionary quadrant.1 The companion 2022 Gartner Critical Capabilities for SSE report ranked Lookout in the top three for all vendors across four predefined Use Cases.2

More Than 1.9 Million Licenses and Counting

Verizon and Lookout have been providing…

Source…

HPE extends Trusted Supply Chain initiative globally for ProLiant servers


Hewlett Packard Enterprise Co. is making a global push for supply chain security in its server line.

Two years ago, HPE launched its Trusted Supply Chain initiative to advance end-to-end security in servers for U.S. federal and public sector customers. This month, HPE is announcing an expansion of this program globally for its ProLiant server portfolio.

“We have launched a comparable service globally called HPE Server Security Optimization Service for ProLiant,” said Cole Humphreys (pictured, right), global server security product manager at HPE. “We can deliver it in the European markets and now in the Asia-Pacific markets. It is a big deal for us, because now we have activated a meaningful supply chain security benefit for our entire global network of partners and customers.”

Humphreys spoke with Lisa Martin, industry analyst for theCUBE, SiliconANGLE Media’s livestreaming studio. He was joined by Ann Potten (pictured, left), trusted supply chain program lead at HPE, and they discussed rising costs of cybercrime, a 360-degree approach to computer security, new tools for component tracking, and protection for hardware end-of-life. (* Disclosure below.)

Supply chain risk

HPE’s drive for meaningful supply chain security comes at a time when the topic is generating significant enterprise interest. Recent compromises of the software supply chain, through exploits such as the SolarWinds attack, have led to greater awareness of software and hardware components.

HPE’s Trusted Supply Chain initiative in 2020 focused on providing customers with cyber assurance to ensure they were receiving verifiably authentic and uncompromised products. The cost of ransomware attacks and breaches has escalated since then, and HPE is seeking to expand enterprise protection.

“It’s estimated that cybercrime cost will reach over $10.5 trillion by 2025 and will be even more profitable than the global transfer of all major illegal drugs combined,” Potten said. “The SolarWinds software supply chain was attacked two years ago, which unfortunately went unnoticed for several months. These things together and coming from multiple directions presents a cybersecurity challenge for an…

Source…

CrowdStrike Racing Extends Championship Leads at The Glen




CrowdStrike Racing Extends Championship Leads at The Glen

27.07.2022: · Four victories in six SRO America races for CrowdStrike Racing program


· George Kurtz, Colin Braun score overall win, runner-up in GT World Challenge America


 
· Four victories in six SRO America races for CrowdStrike Racing program

· George Kurtz, Colin Braun score overall win, runner-up in GT World Challenge America

· Two race wins and pole positions for Kurtz in GT America

· Boehm takes fifth TC win and runner-up in CrowdStrike/AWS HPD Civic

· CrowdStrike also active as Official Cloud and Internet Security Provider of SRO

 

CrowdStrike Racing put on another motorsports clinic in SRO Motorsports America competition with four victories in six races at Watkins Glen International.
 

Drivers George Kurtz, Colin Braun and Kevin Boehm each claimed at least one victory during the two days at The Glen. The results also cemented CrowdStrike Racing teams and drivers into the leads of their respective championships.
 

Kurtz, CrowdStrike co-founder and CEO, scored three victories on the weekend: an overall win Sunday alongside Braun in GT World Challenge America Powered by AWS, and a pair of pole positions and wins in GT America Powered by AWS. Each win came in separate but familiar No. 04 CrowdStrike/AWS Mercedes-AMG GT3s.
 

Kevin Boehm also found success with a win and runner-up finish with his No. 9 CrowdStrike/AWS Honda Performance Development Type R TC in the TC America Powered by Skip Barber Racing School.
 

Just as CrowdStrike Racing was winning on the track, CrowdStrike protected sensitive operational data as the Official Cloud and Internet Security Provider of SRO Motorsports.
 

CrowdStrike is on the front line of protecting data and preventing security breaches, while also being on the starting line in many of SRO America’s racing categories – including the premier GT World Challenge America. The company’s powerful Falcon graphic is the dominant feature on all CrowdStrike Racing entries in SRO America competition.
 

The Falcon was proudly flying around The Glen all weekend. The culmination came Sunday in the 90-minute GT World Challenge America race for CrowdStrike Racing by Riley Motorsports. Kurtz and…

Source…

Nebulon extends 4-minute ransomware recovery for 2-node management clusters on Dell PowerEdge servers


Nebulon announced support for 2-node management clusters on Dell PowerEdge servers with its 4-minute ransomware recovery solution, Nebulon TimeJump.

Nebulon 4-minute ransomware recovery

Nebulon provides enterprises with a 2-node alternative for their management infrastructure with near-instant recovery capabilities that occupies a 33% smaller footprint as compared to 3-node-minimum hyperconverged infrastructure solutions, which also take hours or even days to fully recover from ransomware attacks.

Many medium-sized organizations rely on small management infrastructure clusters—with services such as PXE, DNS, DHCP, LDAP, NTP, Radius, VPN and license servers—to quickly recover their production application environment from a ransomware attack. However, since that infrastructure is on a network, it can be compromised by ransomware, malware or wiper attacks, delaying recovery of the production environment by hours or even days.

By extending the TimeJump 4-minute ransomware recovery solution to support Dell PowerEdge-based 2-node management clusters, Nebulon quickly restores the management infrastructure back online, a necessary requirement for recovering production systems.

To achieve this, TimeJump protects both the operating system and application data, which avoids the manual rebuild of servers and operating systems, saving organizations precious time. In addition, Nebulon data security software operates in an isolated domain within the server, thereby protecting critical data even if the management servers are infected.

With Nebulon TimeJump, users have access to the first and only combined server and storage solution to deliver 4-minute ransomware recovery solution on the market. They also can now deploy ransomware protection for small, 2-node management infrastructure clusters, reducing server purchases, data center space, power and cooling costs by 33% as compared to the 3-node requirements of HCI.

Cybersecurity and protection from ransomware attack is a core aspect of Nebulon smartInfrastructure. Nebulon ON, the smartInfrastructure cloud control plane, uses mandatory multi-factor authentication (MFA) to prevent unauthorized login. Additionally, role-based access control (RBAC), which further…

Source…