Cyber Security Archives - AiThority https://aithority.com/tag/cyber-security/ Artificial Intelligence | News | Insights | AiThority Tue, 06 Aug 2024 15:11:33 +0000 en-US hourly 1 https://wordpress.org/?v=6.6.1 https://aithority.com/wp-content/uploads/2023/09/cropped-0-2951_aithority-logo-hd-png-download-removebg-preview-32x32.png Cyber Security Archives - AiThority https://aithority.com/tag/cyber-security/ 32 32 RAD Security Launches First AI-Powered Incident Investigation with Behavioral Detection & Response Platform https://aithority.com/machine-learning/rad-security-launches-first-ai-powered-incident-investigation-with-behavioral-detection-response-platform/ Tue, 06 Aug 2024 15:11:33 +0000 https://aithority.com/?p=574922 RAD Security Launches First AI-Powered Incident Investigation with Behavioral Detection & Response Platform

AI-powered investigation combined with behavioral detection and response reduces false positives for time-strapped detection engineers RAD Security takes the stage as a finalist in the Black Hat Startup Spotlight Competition, it unveils the first-ever AI-powered incident investigation capability for behavioral detection and response. Today, cloud security is based almost exclusively on signature-based detections, which are […]

The post RAD Security Launches First AI-Powered Incident Investigation with Behavioral Detection & Response Platform appeared first on AiThority.

]]>
RAD Security Launches First AI-Powered Incident Investigation with Behavioral Detection & Response Platform


AI-powered investigation combined with behavioral detection and response reduces false positives for time-strapped detection engineers

RAD Security takes the stage as a finalist in the Black Hat Startup Spotlight Competition, it unveils the first-ever AI-powered incident investigation capability for behavioral detection and response. Today, cloud security is based almost exclusively on signature-based detections, which are notorious for burdening security teams with false positives. RAD Security is the first to combine AI-powered incident investigation with behavioral, signature-less detections, to significantly reduce false positives and provide much-needed relief for overburdened security teams.

Also Listen: AI Inspired Series by AiThority.com: Featuring Bradley Jenkins, Intel’s EMEA lead for AI PC & ISV strategies

“By definition, signatures are stateless, making investigations based on the signature-focused approach inaccurate and tedious,” says CTO and Co-Founder Jimmy Mesta. “By adding AI-powered investigations to behavioral detection, which is already a step ahead of signature-based detection in accuracy, security teams can quickly get light years ahead in the accurate assessment of incidents.”

RAD’s behavioral approach and AI-powered investigations result in the lowering of false positives on their own; but by putting these two capabilities together, RAD enables security teams to achieve a multiplier effect. The enhanced accuracy of behavioral methods versus signature-based methods is easily demonstrated using multiple examples of attack tactics like reverse shells, access to sensitive data, and a Sudo CVE. In these examples, while signatures can be easily bypassed by avoiding the exact parameters, they are detected by RAD’s behavioral solution. By the same token, a behavioral drift event is not always a malicious event, so the addition of the AI investigation capability ensures additional accuracy. AI is particularly suited for looking across large sets of data and quick contextualization, making it a natural investigation tool and engine to analyze benign versus malicious drift.

Throughout the history of cyber security, and most famously in the endpoint and network security markets, signatures have eventually been replaced by behavioral methods in response to an evolving threat landscape. Today, the cloud security category is nearly entirely composed of signature-based approaches with runtime security and Cloud Workload Protection (CWPP) that are standalone or part of a broader Cloud Native Application Protection Platform (CNAPP). In sharp contrast to signature-based CNAPPs, or posture-focused Cloud Security Posture Management (CSPM), RAD Security’s Cloud Detection and Response (CDR) solution creates behavioral baselines of unique good behavior to detect zero day attacks, enriching detections with real-time identity and infrastructure context that inform response actions.

More and more, detection and response is being accomplished by fewer and fewer dedicated people, with 22% of security professionals reporting recent layoffs at their company. The workforce reductions are an even more acute pain in cloud security, with 65% of cybersecurity and infosecurity professionals claiming burnout due to skill gaps. Even though a full 95% of IT decision makers feel their team has been negatively impacted by the cloud security skills gap, cloud native adoption continues, and analysts predict that, by 2025, 95% of new applications will be built using cloud native workloads.

Zero days like the XZ Backdoor are now a regular occurrence, making detection and response in cloud native environments more important than ever.

Also Read: Humanoid Robots And Their Potential Impact On the Future of Work

RAD Security has introduced multiple new features to help security teams adopt new innovation that will help them address these alarming trends and emerging threats:
– Amazon EKS Add-on: RAD Security is now available as an Amazon EKS Add-on in the AWS Marketplace for Containers. This means customers can now provision the real-time KSPM and runtime features of the RAD platform directly from EKS, for real-time visibility into their Kubernetes risk as well as signatureless cloud detection and response.
– Automated AI-Powered Investigation: RAD Security uses LLMs to quickly analyze multiple behavioral detections and determine whether an incident is malicious or benign, including real-time infrastructure and identity context.
– Findings Center: All incidents are now available in an easy to navigate console, making detection and investigation easier and quicker.
– RAD Open Source Catalog: New version details and new open source images have now been added to the RAD Catalog, detailing the changes in behavioral fingerprints over time and bolstering the behavioral workload fingerprint standard.

Schedule a meeting with the RAD Security team at the Black Hat Conference this week to discuss improving detection accuracy for attacks in your cloud environments. The team will be exhibiting at booth #219 in Startup City, and at 4:45PM EST they will be presenting at the Innovators and Investors Summit as one of the four finalists in the Startup Spotlight competition.

Don’t miss this out: More than 500 AI Models Run Optimized on Intel Core Ultra Processors

[To share your insights with us as part of editorial or sponsored content, please write to psen@itechseries.com]

The post RAD Security Launches First AI-Powered Incident Investigation with Behavioral Detection & Response Platform appeared first on AiThority.

]]>
Radware Introduces a Real-Time, AI-Powered API Protection Engine to Combat Business Logic Attacks https://aithority.com/machine-learning/radware-introduces-a-real-time-ai-powered-api-protection-engine-to-combat-business-logic-attacks/ Thu, 27 Jun 2024 15:17:24 +0000 https://aithority.com/?p=573212 Radware Introduces a Real-Time, AI-Powered API Protection Engine to Combat Business Logic Attacks

Automatically and continuously learns business logic to block attacks as they occur Radware, a leading provider of cyber security and application delivery solutions, announced it has enhanced its API Protection solution with a new AI-driven, auto-learning protection engine designed to immediately detect and mitigate business logic attacks. Working in real-time, the engine exposes bad actors’ identities […]

The post Radware Introduces a Real-Time, AI-Powered API Protection Engine to Combat Business Logic Attacks appeared first on AiThority.

]]>
Radware Introduces a Real-Time, AI-Powered API Protection Engine to Combat Business Logic Attacks

Automatically and continuously learns business logic to block attacks as they occur

Radware, a leading provider of cyber security and application delivery solutions, announced it has enhanced its API Protection solution with a new AI-driven, auto-learning protection engine designed to immediately detect and mitigate business logic attacks. Working in real-time, the engine exposes bad actors’ identities and automatically detects and blocks malicious API calls by continuously learning the application’s business logic. The solution offers organizations comprehensive coverage for the OWASP API 2023.

AiThority.com Latest News: World’s First Video-to-Music AI Tool ‘TemPolor’ Launches, Aims to Revolutionize Video Editing Workflow

API attacks that leverage business logic vulnerabilities are becoming more sophisticated and harder to detect, often mimicking legitimate API usage. According to Radware’s latest Global Threat Intelligence Analysis Report, malicious web application and API transactions increased by 171% in 2023 compared to 2022. Retail (37%) and transportation (19%) were the most attacked industries, followed by software as a service (8%) and carriers (8%).

“Radware is helping organizations take the guesswork out of API protection,” said Gabi Malka, Radware’s chief operation officer. “Unlike competitive solutions that rely on past attack log analysis for detection and remediation recommendations rather than immediately blocking the attacks, Radware’s AI-powered protection works automatically, continuously, and in real-time. It not only learns the business logic, but also accurately reveals bad actors’ identities and blocks their attacks as they occur, resulting in frictionless, optimized protection and reduced risk.

AiThority.com Latest News: Volkswagen and Cerence Commence Roll-Out of New Generative AI Solutions to Drivers

Radware’s enhanced API Protection solution takes a multi-layer approach to real-time detection and mitigation of business logic attacks. It leverages:

  • Continuous auto-learning of the application business logic to deliver real-time insights into the legitimate or malicious intent of API calls.
  • Real-time AI-driven context analysis of security policies to enhance the reliability of API attack detection and mitigation.
  • Precise identification of bad actors that surpasses simple IP blocking to accurately block malicious users and clients.

Radware’s API Protection is part of the company’s comprehensive Cloud Application Security Protection Service. The service also includes the company’s industry-leading web application firewall (WAF), bot detection and management, and client-side and application-level (Layer 7) web DDoS protection. Combining end-to-end automation, behavioral-based detection, and 24/7 managed services, the solution is designed to offer organizations the highest level of application protection with the lowest level of false positives.

Radware has received numerous awards for its application and network security solutions. Industry analysts such as Aite-Novarica Group, Forrester Research, Gartner, GigaOm, KuppingerCole, and Quadrant Knowledge Solutions continue to recognize Radware as a market leader in cyber security.

AiThority.com Latest News: RELEX Introduces AI-Driven CO2 Analytics to Help Companies Understand and Reduce their Environmental Impact

[To share your insights with us as part of editorial or sponsored content, please write to psen@itechseries.com]

The post Radware Introduces a Real-Time, AI-Powered API Protection Engine to Combat Business Logic Attacks appeared first on AiThority.

]]>
CyCognito Partners With Eviden to Bolster Exposure Management in the Enterprise https://aithority.com/machine-learning/cycognito-partners-with-eviden-to-bolster-exposure-management-in-the-enterprise/ Thu, 07 Mar 2024 12:06:16 +0000 https://aithority.com/?p=567123 CyCognito Partners With Eviden to Bolster Exposure Management in the Enterprise

CyCognito’s comprehensive EASM platform now enables Eviden customers to efficiently identify, prioritize, and remediate vulnerabilities CyCognito announced a strategic partnership with Eviden, the Atos Group business leading in digital, cloud, big data and security. The partnership aims to offer its leading External Attack Surface Management platform (EASM) to Eviden’s extensive customer roster worldwide as a foundation to their […]

The post CyCognito Partners With Eviden to Bolster Exposure Management in the Enterprise appeared first on AiThority.

]]>
CyCognito Partners With Eviden to Bolster Exposure Management in the Enterprise

CyCognito’s comprehensive EASM platform now enables Eviden customers to efficiently identify, prioritize, and remediate vulnerabilities

CyCognito announced a strategic partnership with Eviden, the Atos Group business leading in digital, cloud, big data and security. The partnership aims to offer its leading External Attack Surface Management platform (EASM) to Eviden’s extensive customer roster worldwide as a foundation to their broader Exposure Management solutions.

Latest Articles : Celebrating IWD 2024: Top AiThority.com Interviews Featuring Female Executives

Organization’s external attack surface is vast and ever-growing, containing large volumes of unknown and exposed internet-facing assets—from servers and applications to cloud resources and domains. Each of these assets could be vulnerable, leaving a back door open for bad actors. Current risk assessment and monitoring solutions simply aren’t up to the challenge. This partnership between CyCognito, the leading EASM provider, and Eviden will create a category-defining managed offering.

Through this partnership, customers will benefit from an end-to-end vulnerability and threat management service which includes the following values:

  • Full inventory of assets: This includes servers, applications, cloud resources, domains, and more. Uncover shadow IT, such as user-provisioned assets that were never reported yet still connected to a network, and create hidden security and operational risks.
  • Alerts on exposures: Define the current state of every asset in an organization’s network and provide prioritized lists of vulnerabilities and how to close them. Leverage dynamic threat intelligence to find new exposures in any asset and alert the organization on the most critical ones.
  • Curated Risk Reduction with Strategic Focus: Identify the critical 2%-5% of issues that comprise over 95% of breach risks, optimizing Mean Time to Detect (MTTD) and Mean Time to Respond (MTTR). This approach prioritizes closing key risk gaps swiftly, ensuring resources are allocated to high-impact areas rather than low-value tasks, enhancing overall risk management efficiency.
  • Scale protection: Automatically fold new assets into an organization’s security posture to maintain airtight defenses even as an environment grows and evolves, and provide guidance on adjusting the EASM strategy and scope as the business needs change.

“Our strategic partnership with Eviden is a giant leap in helping more and more businesses worldwide protect their continuously changing attack surfaces and threat landscape,” said Randy Streu, SVP Channels & Alliances, CyCognito. “By partnering with Eviden, our joint customers get the combined power of the CyCognito platform with the expert services delivered by Eviden’s cyber security solutions, such as the Eviden AIsaac Cyber Mesh platform. This in turn helps them identify, prioritize, and remediate threat exposures end to end, preemptively addressing potential threats and strengthening their security posture.”

Recommended : The Top 10 Female CEOs in the AI Industry for 2024

CyCognito is a member of “Scaler”, the Eviden Accelerator for Startups, which drives high-velocity, customer-centric, open innovation within Eviden’s core areas: AI, Security, Quantum, & NZT. This unique ecosystem engages technology start-ups/scale-ups, specialist industry players, and strategic partners to help accelerate customers’ value creation, optimizing go-to-market, and speeding up business execution.

Recommended : The Top 10 Female AI Influencers for 2024

[To share your insights with us as part of editorial or sponsored content, please write to sghosh@martechseries.com]

The post CyCognito Partners With Eviden to Bolster Exposure Management in the Enterprise appeared first on AiThority.

]]>
Liquid C2, Google Cloud, Anthropic Bring Advanced Cloud, Cybersecurity, and AI to Africa https://aithority.com/machine-learning/liquid-c2-google-cloud-anthropic-bring-advanced-cloud-cybersecurity-and-ai-to-africa/ Wed, 06 Mar 2024 12:48:13 +0000 https://aithority.com/?p=566907 Liquid C2, Google Cloud, Anthropic Bring Advanced Cloud, Cybersecurity, and AI to Africa

Customers of Liquid C2 can expect heightened security measures, access to advanced cloud technologies, and a commitment to securing their digital assets Access Multimedia Content Liquid C2, a business of Cassava Technologies, a pan-African technology group,announced collaborations with global technology leader Google Cloud and artificial intelligence (AI) company Anthropic to deliver advanced cloud, cyber security […]

The post Liquid C2, Google Cloud, Anthropic Bring Advanced Cloud, Cybersecurity, and AI to Africa appeared first on AiThority.

]]>
Liquid C2, Google Cloud, Anthropic Bring Advanced Cloud, Cybersecurity, and AI to Africa

Customers of Liquid C2 can expect heightened security measures, access to advanced cloud technologies, and a commitment to securing their digital assets Access Multimedia Content

Liquid C2, a business of Cassava Technologies, a pan-African technology group,announced collaborations with global technology leader Google Cloud and artificial intelligence (AI) company Anthropic to deliver advanced cloud, cyber security solutions, and generative AI (gen AI) capabilities to African businesses across the continent.

Recommended AI News: IBM Expands Technology Expert Labs in India to Drive Adoption of Gen AI, Key Technologies

Building on the November 2023 signature of a Memorandum of Understanding (MOU) for a collaboration with Google Cloud in Africa, Liquid C2 is set to improve cyber security and cloud offerings across the continent while introducing them to Google Cloud’s latest AI, data, collaboration, and security solutions. Customers of Liquid C2 can expect heightened security measures, access to advanced cloud technologies, and a commitment to securing their digital assets.

Liquid C2 is set to be one of Google Cloud’s largest Managed Security Service Providers (MSSPs) in Africa, combining Google Cloud’s leading security solutions with Liquid C2’s expertise and vision in offering comprehensive security consulting. In addition, the collaboration enables Liquid C2 to bring the capabilities of both Google Cloud and Anthropic’s AI models to its customers via Google Cloud’s Vertex AI platform1, helping businesses develop and deploy solutions quickly within their cloud environments.

As a strategic partner of Google Cloud’s innovative solutions in Africa, Liquid C2 will also deliver Google Workspace to customers across the continent. Designed to facilitate team connections in a cloud-native environment, Google Workspace also features embedded generative AI tools to help employees create content and achieve greater productivity and collaboration in the workplace.

By fortifying cyber security measures and infusing gen AI capabilities, Liquid C2 envisions a future where security, collaboration, and innovation go hand-in-hand, creating a safer, more productive digital experience for all. As Africa continues to emerge as a hub for technological advancements, collaboration between leading companies like Liquid C2, Google Cloud, and Anthropic play a crucial role in driving progress, fostering innovation, and attracting global investment.

In a separate but related development, Liquid C2 is also working directly with Anthropic, one of the largest and fastest-growing AI companies globally, to develop AI solutions for large enterprises that want to use it to improve productivity and revenue growth. Anthropic has a strategic partnership with Google Cloud, and Claude – Anthropic’s family of foundational AI models that excel at thoughtful dialogue, content creation, complex reasoning, creativity, and coding – is available in Google Cloud’s Vertex AI.

Liquid C2’s partnership with Anthropic signifies a shared commitment to empowering businesses in Africa with state-of-the-art AI solutions. By integrating AI models and services across various industries, Liquid C2 and Anthropic aim to accelerate growth for clients, further positioning Africa as a global player in the digital landscape. The collaboration presents opportunities to apply gen AI to African businesses irrespective of the industry or organisation size.

Recommended : Celebrating IWD 2024: Top AiThority.com Interviews Featuring Female Executives

Thomas Kurian, CEO of Google Cloud said, “Businesses are increasingly turning to generative AI to drive operational efficiencies, improve the customer experience, and empower their employees like never before. Building on Google’s commitment to investing $1 billion to boost Africa’s digital transformation, our collaborations with market leaders like Liquid C2 and Anthropic will help bring gen AI, security, and other cloud technologies to businesses across the continent. This partnership has the opportunity to transform how African businesses serve and engage their customers as we provide them a foundation for innovation.”

Currently, more than 80% of the largest businesses and organisations operating in more than 31 African countries use a broad spectrum of advanced digital technologies from Liquid supplied by global vendors. Many are keenly interested in moving AI readiness. Liquid C2 will remain a multi-vendor provider, offering its customers best-in-class solutions.

Commenting on the collaboration, Strive Masiyiwa, Co-Founder and Executive Chairman of Cassava Technologies, said, “Our collaborations with Google Cloud and Anthropic signify a significant step change in our journey as Africa’s leading cloud and cyber security provider. We recognise the importance of responsible AI in enabling access to economic opportunities and empowering individuals and businesses across the continent. Our partnerships with these two leading technology firms will help us deliver AI-powered solutions that address the unique challenges and opportunities in Africa’s digital transformation journey. Together, we are setting new benchmarks for these solutions that cater to the complex needs of a diverse clientele.”

Daniela Amodei, President of Anthropic, said: “We’re excited to partner with Liquid C2 and Google Cloud, bringing frontier AI to businesses across Africa. Combining Anthropic’s safe, steerable AI with Google Cloud’s secure, scalable infrastructure means this partnership has huge potential to enable African companies to grow.”

Recommended AI News: ServiceNow & Deloitte Outlook: Key Actions for Business Leaders as Gen AI Shapes Strategy

[To share your insights with us as part of editorial or sponsored content, please write to sghosh@martechseries.com]

The post Liquid C2, Google Cloud, Anthropic Bring Advanced Cloud, Cybersecurity, and AI to Africa appeared first on AiThority.

]]>
Iridium to Expand Global Reach with Acquisition of Market Leader Satelles https://aithority.com/technology/iridium-to-expand-global-reach-with-acquisition-of-market-leader-satelles/ Mon, 04 Mar 2024 13:44:42 +0000 https://aithority.com/?p=566512 Iridium to Expand Global Reach with Acquisition of Market Leader Satelles

Iridium’s advanced portfolio of easily integrated assured PNT solutions will protect global industries and digital critical infrastructure Iridium Communications a leading provider of global voice and data satellite communications, announced that it had entered into an agreement to acquire Satelles, Inc., the leader in highly secure satellite-based time and location services that complement and protect GPS […]

The post Iridium to Expand Global Reach with Acquisition of Market Leader Satelles appeared first on AiThority.

]]>
Iridium to Expand Global Reach with Acquisition of Market Leader Satelles

Iridium’s advanced portfolio of easily integrated assured PNT solutions will protect global industries and digital critical infrastructure

Iridium Communications a leading provider of global voice and data satellite communications, announced that it had entered into an agreement to acquire Satelles, Inc., the leader in highly secure satellite-based time and location services that complement and protect GPS and other GNSS-reliant systems.

Recommended AI News: Vectara Introduces GenAI Chat Module, Turbocharging Conversational AI Development

The service, named Satellite Time and Location (STL), is an easy-to-adopt, highly secure solution that increases the efficiency and reliability of timing systems for digital infrastructure like 5G base stations, data centers, and other critical infrastructure and protects against GNSS vulnerabilities using low-cost hardware that doesn’t require outdoor antennas. This acquisition continues Iridium’s philosophy of investing in differentiating technologies uniquely suited to its network that significantly outperform competing solutions.

The market for assured Positioning Navigation and Timing (PNT) services, estimated to reach $3.5 billion in 2032, is evolving to require integrated small-form-factor devices instead of the server rack-size solutions connected to outdoor GPS antennas that are available today. Time synchronization and location data play an important role in the global economy, particularly in the commercial sector for major industries supported by critical infrastructure, such as financial services, telecommunications, cyber security, and transportation.

These industries and others rely on an estimated 10,000 data centers globally and their hundreds of millions of data processing and storage servers. Each of these servers requires time synchronization and can benefit from the in-server room efficiency and resilience delivered by Iridium STL.

Iridium will now work to reduce the size and cost barriers to adoption, enabling deployment of a more accessible solution for integration with autonomous systems, consumer devices, vehicles and traditional markets like aviation, maritime and land mobile. It also provides an opportunity for Iridium’s existing partner eco-system to add to their portfolio of solutions and harden their GNSS-reliant products and infrastructure.

Recommended AI News: Grammarly Saves Businesses Time and Money Lost to App Overload With the App Actions

“This market is growing; it’s a perfect application of our network, and this solution solves a problem for critical industries better than anything else,” said Iridium CEO, Matt Desch.  “Acquiring Satelles makes perfect sense for Iridium and is consistent with what our strategy has always been, which is to take advantage of our unique network to do what others can’t or do it better than anyone else can.  STL is the superior solution available today, and we have been following and investing in Satelles’s technology roadmap to allow us to create even more opportunity. We’re excited to formally bring the Satelles team “in-house,” to the Iridium family.”

The STL service utilizes the stronger broadcast paging channels of the Iridium satellite constellation to deliver precise timing information, which provides truly global, secure time and location signals that are 1,000 times more powerful than GNSS constellations. The service is resilient to regional GNSS outages, works inside buildings and is being used today to secure digital infrastructure for financial markets, governments, and major corporations.

STL will become a new business line of Iridium, led by Satelles CEO, Dr. Michael O’Connor who will report to Iridium CEO, Matt Desch.  “Bringing STL into the Iridium family is going to be a supercharger for this capability that will benefit our customers and our society. I look forward to a bright future together,” said O’Connor.
Iridium is assuming all rights to the Satelles patent portfolio and anticipates the Iridium STL line of business will generate over $100 million in service revenue per year, by 2030, and additional revenue from equipment and engineering.

A long-standing investor in Satelles, Iridium had an ownership stake of around 20 percent from three previous investments in the company. For the remaining approximately 80 percent, Iridium will pay about $115 million, net of cash remaining in the Company, which will be financed through a tack-on to its term loan. Iridium expects to complete the acquisition in the next few weeks.

As previously announced, Iridium will be speaking at today’s Raymond James Annual Institutional Investors Conference at 4:00 p.m. ET, where additional details regarding this transaction will be shared.  The presentation from the conference can be viewed via webcast through the events page of Iridium’s Investor Relations website. Commentary will also be included during our first quarter 2024 earnings call in April.  This transaction is the first acquisition of another company in Iridium’s history.

Recommended AI News: Simplici Defense: 99.9 Percent Effective Peer-to-Peer Payment Fraud Solution

[To share your insights with us as part of editorial or sponsored content, please write to sghosh@martechseries.com]

The post Iridium to Expand Global Reach with Acquisition of Market Leader Satelles appeared first on AiThority.

]]>
Radware Drives New Revenue Streams for Managed Security Service Providers https://aithority.com/technology/radware-drives-new-revenue-streams-for-managed-security-service-providers/ Mon, 26 Feb 2024 18:26:19 +0000 https://aithority.com/?p=565665 Radware Drives New Revenue Streams for Managed Security Service Providers

Enables MSSPs to provide industry-leading security services, while reducing total cost of ownership Radware, a leading provider of cyber security and application delivery solutions, announced a new flexible business model for managed security service providers (MSSPs). The offering enables service providers to enjoy new revenue streams and grow their businesses by extending an innovative line of managed […]

The post Radware Drives New Revenue Streams for Managed Security Service Providers appeared first on AiThority.

]]>
Radware Drives New Revenue Streams for Managed Security Service Providers

Enables MSSPs to provide industry-leading security services, while reducing total cost of ownership

Radware, a leading provider of cyber security and application delivery solutions, announced a new flexible business model for managed security service providers (MSSPs). The offering enables service providers to enjoy new revenue streams and grow their businesses by extending an innovative line of managed network and application security services to their customers.

“MSSPs are under constant pressure to evolve their services and deliver an exceptional user experience without eroding their margins,” said Haim Zelikovsky, vice president of Radware’s cloud business. “Our security experts work alongside service providers to not only defend their customers against cyber threats, but also offer them a unique opportunity to create an industry-leading portfolio of security services that can drive new revenue streams.”

Recommended AI News: Mavenir Advances Open RAN Deployment for Vodafone Idea in India

Catering to their business needs, Radware’s new offering enables MSSPs to customize, rebrand, and resell the company’s Cloud DDoS Protection and Cloud Application Protection Services. The services are built to defend MSSPs’ customers against advanced cyber threats, including DDoS, DNS, application, and layer 7 Web DDoS attacks.

Leading service providers like US Signal are working with Radware to expand their cyber defense portfolios and strengthen their customers’ experiences.

Recommended AI News: Napier AI Secures £45 Million Investment from Crestline Investors

“Radware understands the unique needs and challenges that service providers face. In addition, to meeting important scale and technology requirements, what sets Radware’s MSSP program apart is the built-in support it offers in standing up a comprehensive security service practice,” said David Humes, vice president of product development for US Signal, a leading provider of cloud solutions, network connectivity, and data center services. “We selected Radware for their advanced technology, expertise in surgically combating volumetric attacks, and ability to help us fast track a new value-added security offering for our customers.”

Radware’s network and application security solutions are built on AI-powered algorithms to protect legitimate user experiences while minimizing false positives and the need for human intervention. The company has received numerous awards for its security solutions. Industry analysts such as Aite-Novarica Group, Forrester Research, Gartner, GigaOm, KuppingerCole, and Quadrant Knowledge Solutions continue to recognize Radware as a market leader in cyber security.

Recommended AI News: LeapXpert and ASC Partner to Provide Communication Compliance Recording in Microsoft Teams

[To share your insights with us as part of editorial or sponsored content, please write to sghosh@martechseries.com]

The post Radware Drives New Revenue Streams for Managed Security Service Providers appeared first on AiThority.

]]>
UST Acquires Leading Australian Process Transformation Company, Leonardo https://aithority.com/technology/ust-acquires-leading-australian-process-transformation-company-leonardo/ Wed, 21 Feb 2024 12:04:56 +0000 https://aithority.com/?p=564824 UST Acquires Leading Australian Process Transformation Company, Leonardo

Strategic acquisition further strengthens UST’s position in the dynamic ANZ market UST, a leading digital transformation solutions company, has announced the strategic acquisition of Leonardo, a leading provider of business process improvement, automation, and integration services, in the Australia and New Zealand (ANZ) region. The acquisition by UST will empower Leonardo to expand its market reach and enhance its service […]

The post UST Acquires Leading Australian Process Transformation Company, Leonardo appeared first on AiThority.

]]>
UST Acquires Leading Australian Process Transformation Company, Leonardo

Strategic acquisition further strengthens UST’s position in the dynamic ANZ market

UST, a leading digital transformation solutions company, has announced the strategic acquisition of Leonardo, a leading provider of business process improvement, automation, and integration services, in the Australia and New Zealand (ANZ) region. The acquisition by UST will empower Leonardo to expand its market reach and enhance its service offerings for clients, combining Leonardo’s in-depth process expertise with UST’s technology leadership, digital transformation capabilities, and global credentials, and strengthening UST’s position in the Australian market.

UST has been supporting clients across industries in the Australian market for the last 8 years, providing digital transformation solutions focused on customer experience and operating model design, product engineering, organizational efficiencies through process transformation, Gen AI and data services, SaaS, cloud, intelligent automation, and cyber security solutions. Leonardo strengthens UST’s organizational efficiency offering, by bringing in its expertise, client references, and local partnerships.

Recommended AI News: GMS Shifts to the AI-driven Future of Customer Experience

Headquartered in Melbourne, Leonardo’s 70+ team, with an established presence across key Australian cities, will join UST to strengthen their combined capability of delivering comprehensive digital solutions, at scale, throughout the ANZ region. This acquisition amplifies Leonardo’s existing expertise in business process improvement, automation, and integration and bolsters UST’s strategic alliances with key regional technology partners, further enriching their service offerings to clients across diverse industries.

Leonardo, a trusted partner of Red Hat, Software AG, Automation Anywhere, Workato, and UiPath, excels at driving comprehensive intelligent process improvements using cutting-edge technology. Leonardo has flourished over the past two decades since its inception in a humble Brisbane home in 1999, extending its presence across MelbourneSydney, and Perth.

“We are thrilled to join forces with UST, a significant milestone for Leonardo. Our partnership with UST opens a realm of new possibilities. We are excited about the expanded digital services we can offer our clients. This collaboration signifies our commitment to growing alongside our customers, providing them with unparalleled digital solutions, and harnessing the power of AI to unlock new levels of productivity and insight into their business,” said Stephen Chetcuti, Chief Executive Officer, Leonardo.

Recommended AI News: Anyline Unveils Autonomous Drone Scanning Technology for Enhanced Warehouse Inventory Management

“We are delighted to announce the integration of Leonardo into UST’s Australian team. For over 25 years, Leonardo has been a reliable partner to its clients in the ANZ community, especially in the process transformation area. Their deep-rooted understanding and experience in these areas is invaluable. For UST, improving organisational efficiencies and thereby uplifting productivity for our clients is a key pillar within our transformation agenda. I am excited that Leonardo will lead this offering and enable us to support our clients in their growth agenda. Leonardo will strengthen our global intelligent automation consulting capabilities further and help grow the UST SmartOps platform business in the ANZ region. The acquisition is an important step in our efforts to continue growth in the Australian market, as we work to meet rapidly emerging demand and build upon UST’s position as a market leader,” said Kumaran CR, Managing Director of Australia, UST.

The union of UST’s comprehensive digital capabilities with Leonardo’s specialised process expertise is expected to create a powerful synergy, driving innovation, and offering improved services to clients across ANZ.

Recommended AI News: iCleanse Appoints DoohClick as Their Ad Management Platform Partner

[To share your insights with us as part of editorial or sponsored content, please write to sghosh@martechseries.com]

The post UST Acquires Leading Australian Process Transformation Company, Leonardo appeared first on AiThority.

]]>
Check Point Software Unveils New Partner Program to Maximize Partners’ Potential and Drive Growth https://aithority.com/technology/check-point-software-unveils-new-partner-program-to-maximize-partners-potential-and-drive-growth/ Tue, 30 Jan 2024 07:56:56 +0000 https://aithority.com/?p=560475 Check Point Software Unveils New Partner Program to Maximize Partners’ Potential and Drive Growth

Check Point Software Technologies Ltd. a leading AI-powered, cloud-delivered cyber security platform provider, announced the launch of its innovative new Partner Program. Amidst an ever-evolving cyber security landscape, this program aims to strengthen partner capabilities and fuel growth. The cyber security sector is experiencing rapid growth and transformation. According to Canalys, cyber security spending hit $19 […]

The post Check Point Software Unveils New Partner Program to Maximize Partners’ Potential and Drive Growth appeared first on AiThority.

]]>
Check Point Software Unveils New Partner Program to Maximize Partners’ Potential and Drive Growth

Check Point Software Technologies Ltd. a leading AI-powered, cloud-delivered cyber security platform provider, announced the launch of its innovative new Partner Program. Amidst an ever-evolving cyber security landscape, this program aims to strengthen partner capabilities and fuel growth.

The cyber security sector is experiencing rapid growth and transformation. According to Canalys, cyber security spending hit $19 billion recently, reflecting the increasing need for collaborative security solutions. As technology evolves, so too do cyber threats, prompting an increased need for a unified cyber security platform that provides protection from edge to network to cloud and beyond. Organizations worldwide are increasingly turning to the channel for guidance not only on their cyber security solutions, but also for regulations and building cyber resilience. Channel partners are well positioned to effectively communicate the value of cyber security solutions, while addressing specific needs and concerns regarding existing and future threats.

Recommended AI News: Riding on the Generative AI Hype, CDP Needs a New Definition in 2024

With a partner dedicated business model, Check Point’s new Partner Program strengthens the company’s commitment to partners while maximizing opportunities for joint growth. It is tailored to enhance partner performance and satisfaction. It focuses on boosting deal closure rates, which drives business growth, and streamlines quoting processes for quicker customer response. The program strengthens Check Point’s partnership engagement and encourages partners to develop specialized expertise, adding more value to their services. It also provides easier access to essential tools and resources, improving operational efficiency for partners.

“For over 30 years, Check Point has blazed the path for innovation in cyber security. In light of the current climate and increasing rate of cyber threats, we are launching a new, partner program to help our partners accelerate their efforts in providing the best cyber security,” said Francisco Criado, Check Point’s VP of Global Partner Ecosystem Organization. “We are excited to continue this journey with our partners, providing them with the best tools, resources, and support they need to thrive in our dynamic industry.”

Recommended AI News: NTT DATA and CYFIRMA Announce Global Strategic Partnership

The enhanced Partner Program is strategically aligned with Check Point’s comprehensive platform, focusing on its end-to-end AI-powered, cloud-delivered security. This program enables partners to effectively cross-sell and up-sell advanced security solutions from Check Point’s comprehensive portfolio, covering a broad spectrum of attack surfaces, addressing needs in SASE, email security, cloud environments, SD-WAN, and mobile security. The program’s upgrades are geared toward leveraging these cutting-edge technologies, ensuring partners are equipped to meet diverse cyber security challenges. It features a range of enhancements including:

  • Simplification and tier progression: new, consolidated tiering model to help increase participation across all levels. Partners are now given an Advanced, Professional, Premier and Elite status depending on size of business opportunity.
  • New pricing Model: customer-focused pricing framework that is not only predictable and market-aligned, but also features the most significant d******* structure ever offered by Check Point. Deal registrations have been increased by 100%, with a new incumbent partner program that delivers deal protection on renewals
  • Free Certification: free certifications to meet partner-level compliance. Introducing customized tracks based on how the partner goes to market
  • Specialization: additional training & certification to unlock additional benefits associated with specialization that can lead to additional 20% d*******
  • App relaunch: new and improved app, which has increased usage fivefold. New use cases provide access to training and enablement, subject matter experts and instantaneous deal registrations

Here’s what our valued partners say about our newly launched Program:

“Check Point has completely transformed its Partner Program, signaling a significant shift in approach. It offers transparent pricing and lucrative incentives, which provide our business with a clear roadmap to increased profitability. The structure of the program enables us to develop stronger competencies and deliver more value to our customers,” said Kin Mitra, President and CEO at Mission Critical Systems.

Molly Rouch, President and Co-Founder of Six Degrees Consulting said, “With Check Point’s Partner Program, we are empowered to deliver highly competitive solutions to our clients while expanding our reach nationally. The program’s focus on specialization and certification aligns with our commitment to provide top-tier security services, ensuring that our clients receive the best possible protection against potential threats.”

Recommended AI News: API3 Announces OEV Network: The ZK-Rollup to Capture All Oracle Extractable Value

“We are thrilled with Check Point’s new Partner Program, which significantly accelerates our ability to offer competitive cybersecurity solutions. The streamlined process and transparent decision-making shorten our sales cycle, empowering quick client decisions,” says Dr. Jörg Posewang, CEO at NetUSE. “The program’s enhanced discounts and rewards for specialization directly support our business growth. Additionally, as an Elite Partner, the free certifications and specializations are not just beneficial, they are a testament to our commitment to excellence in cybersecurity alongside Check Point.”

Ms. Han Juat Hoon, Chief Operating Officer at M.TECH Products Pte Ltd, one of Check Point’s premier APAC partners, said, “This updated partner program introduces innovative aspects, notably the Private Early Availability Program, which affords our esteemed business partners and internal teams early access to forthcoming releases, on-site support and the opportunity to influence cybersecurity products, helping us to stay ahead in the dynamic cybersecurity landscape. We expect the improvements to the Deal Registration process, including higher discounts, stacking of special discounts, and the introduction of an incumbent partner d******* to potentially accelerate our business growth by rendering deal registrations more appealing and competitive.”

She continued, “Overall, the recalibrated d******* model will ensure that partners across all tiers benefit from improved pricing advantages, fostering a highly motivating environment for our business. The introduction of additional incentives for partners specializing in specific product domains or technologies serves as a catalyst for focused excellence, encouraging partners to invest in honing their expertise and offering specialized services, thereby benefitting both our customers and the overall success of our enterprise.”

[To share your insights with us as part of editorial or sponsored content, please write to sghosh@martechseries.com]

The post Check Point Software Unveils New Partner Program to Maximize Partners’ Potential and Drive Growth appeared first on AiThority.

]]>
Understanding the Complex Implications of AI for Cyber Security https://aithority.com/technology/understanding-the-complex-implications-of-ai-for-cyber-security/ Mon, 29 Jan 2024 15:30:16 +0000 https://aithority.com/?p=560324 Understanding the Complex Implications of AI for Cyber Security

NYC area cyber security expert explores the benefits and risks of AI for cyber security and offers tips for using AI safely in today’s cyber landscape—in a new article from eMazzanti Technologies A timely article by NYC area cyber security expert eMazzanti Technologies describes how AI significantly enhances cyber security capabilities by augmenting and accelerating various aspects of cyber […]

The post Understanding the Complex Implications of AI for Cyber Security appeared first on AiThority.

]]>
Understanding the Complex Implications of AI for Cyber Security

NYC area cyber security expert explores the benefits and risks of AI for cyber security and offers tips for using AI safely in today’s cyber landscape—in a new article from eMazzanti Technologies

A timely article by NYC area cyber security expert eMazzanti Technologies describes how AI significantly enhances cyber security capabilities by augmenting and accelerating various aspects of cyber defense.

However, the author cautions that AI also poses new risks that complicate the cyber security landscape. Organizations must take a holistic approach that leverages the advantages of AI but ensures proper oversight.

“AI-enhanced cyber security tools deliver exciting capabilities to counter today’s emerging cyber threats, but organizations must utilize them carefully to balance benefit with risk,” warned Jennifer Mazzanti, CEO, eMazzanti Technologies.

Recommended AI Interviews: AiThority Interview with Manish Sood, CEO at Reltio

Below are a few excerpts from the article, “Understanding the Complex Implications of AI for Cyber Security.”

Timely Threat Detection

“Automated monitoring systems collect and analyze data from endpoints, sensors, logs, and other sources. They then alert security personnel to any anomalies that could indicate an attack or compromise.”

Enhanced Incident Response

“Once it detects a possible cyber security event, AI strengthens incident response in several ways, including enabling dynamic incident response that adapts to feedback. AI systems can learn from previous incidents to improve future performance.”

Proactive Threat Prevention

“Ideally, security solutions will prevent threats in the first place. While traditional cyber security measures take a reactive approach, detecting and responding to incidents after they occur, AI-enabled solutions make it possible to predict and prevent potential vulnerabilities.”

Recommended AI Interviews: AiThority Interview with Shagun Malhotra, Founder, SkyStem

However…AI Also Presents New Risks

“Organizations should not view AI as a silver bullet, however. Security teams that rely too much on AI can fall into a false sense of security and reduce human vigilance. But AI systems do make mistakes and sometimes fail in unexpected ways.”

Holistic Approach to AI for Cyber Security Necessary

To harness the benefits of AI while mitigating the risks it poses, business leaders must adopt a balanced, responsible approach that includes clear objectives and governance around AI use. Partnering with cyber security professionals like eMazzanti Technologies allows organizations to benefit from deep expertise and cutting-edge tools and services.

Recommended AI Interviews: AiThority Interview with Dr. Karin Kimbrough, Chief Economist at LinkedIn

[To share your insights with us as part of editorial or sponsored content, please write to sghosh@martechseries.com]

The post Understanding the Complex Implications of AI for Cyber Security appeared first on AiThority.

]]>
Darktrace and Garland Technology Collaborate to Help Businesses Secure OT Environments https://aithority.com/technology/darktrace-and-garland-technology-collaborate-to-help-businesses-secure-ot-environments/ Thu, 25 Jan 2024 09:26:52 +0000 https://aithority.com/?p=559710 Darktrace and Garland Technology Collaborate to Help Businesses Secure OT Environments

Combination of Darktrace’s cyber AI and Garland’s network solutions provide seamless deployments and more complete network visibility for complex industrial environments and critical infrastructure systems Darktrace, a global leader in cyber security AI, and Garland Technology, a leading manufacturer of network TAP (test access point), aggregator, packet broker, data diode and inline bypass solutions, announced a […]

The post Darktrace and Garland Technology Collaborate to Help Businesses Secure OT Environments appeared first on AiThority.

]]>
Darktrace and Garland Technology Collaborate to Help Businesses Secure OT Environments

Combination of Darktrace’s cyber AI and Garland’s network solutions provide seamless deployments and more complete network visibility for complex industrial environments and critical infrastructure systems

Darktrace, a global leader in cyber security AI, and Garland Technology, a leading manufacturer of network TAP (test access point), aggregator, packet broker, data diode and inline bypass solutions, announced a new collaboration to help businesses protect complex industrial environments. This collaboration brings Darktrace/OT and Garland Technology’s network visibility solutions together, offering fast, seamless deployments and more complete network visibility in operational technology (OT) environments.

Security risks in industrial environments and critical infrastructure continue to rise. The increasing monetization of OT attacks, exposure of Industrial Control Systems (ICS) to open networks, and convergence with IT is heightening opportunities for threat actors. The number of industrial IoT (IIoT) devices is increasing rapidly, with the global number of industrial IoT connections forecasted to reach 37 billion in 2025 according to Juniper Research, creating entry points for adversaries and leaving major visibility gaps for security teams who are already faced with tight budgets and personnel shortages.

Recommended AI News: Hewlett Packard Enterprise Announces Neil MacDonald as Leader of HPC & AI Business Segment

Together, Garland’s Network TAPs and Aggregators and Darktrace/OT are designed to quickly enable visibility and security across OT, IT, and IIoT networks to Purdue level 1. Purdue level 1 includes devices, such as programmable logic controllers (PLCs) and remote terminal units (RTUs) that sit closest to the physical industrial processes. Using Garland’s network TAP solutions with Darktrace minimizes deployment challenges with little to no additional configuration required in complex industrial environments, quickly illuminates points of IT and OT convergence, provides unidirectional traffic flow, and detects potential threats to keep data and environments secure.

Darktrace/OT uses Self-Learning AI to learn every detail of an organization’s bespoke OT systems, delivering increased visibility and detecting subtle deviations to stop threats at their earliest stages. Darktrace can also provide a unified view of both IT and OT environments, helping organizations as they navigate the convergence of IT and OT systems. As no connection to the Internet is required, Darktrace/OT functions within air-gapped or highly segmented networks without jeopardizing their integrity.

“Darktrace has applied its Self-Learning AI to protect complex OT environments since 2014, helping our customers bridge the gap between IT and OT security and enabling them to detect and respond to threats that others fail to see,” said Denise Walter, Chief Revenue Officer, Darktrace. “Over the years, we have continued to expand the areas of the digital world that Darktrace can learn from and protect. Together with Garland Technology we can protect an even wider and more complex set of industrial environments, helping security teams to enhance the end user cyber resilience of critical industrial environments such as pharmaceutical manufacturing, water treatment facilities, electric utilities, food processing and more.”

Recommended AI News: Announcing the New MLPerf Client Working Group

Garland Technology’s network TAP solutions create a foundation of visibility for network management, allowing secure access and monitoring of network traffic. Garland’s solutions are uniquely designed for industrial networks. When deployed, a Garland Technology network TAP will pass all network traffic from the tapped network link to the Darktrace appliance for analysis, without interrupting business operations. Many of Garland’s TAP and Aggregator solutions include built-in data diode technology, which enforces one-way data flow from a network segment to a monitoring destination to reduce the risk of remote attacks, DDoS attacks, malware, and ransomware from external networks. When used with Darktrace/OT, this makes it easier to deploy, provides increased network visibility and confidence that network traffic is unidirectional and secured.

“Garland Technology has been involved in critical infrastructure projects since 2011 when we designed our first Data Diode TAP for a customer,” said Chris Bihary, CEO & Co-Founder. “Since then we’ve been building network visibility products to help provide technology like Darktrace/OT the packet level visibility needed to protect the world’s most critical assets. We’re excited about this new partnership with Darktrace to work hand in-hand in protecting complex industrial environments around the world.”

Recommended AI News:  Versa Networks Launches Industry’s First Unified SASE Gateway that Scales Beyond 100 Gbps

[To share your insights with us as part of editorial or sponsored content, please write to sghosh@martechseries.com]

The post Darktrace and Garland Technology Collaborate to Help Businesses Secure OT Environments appeared first on AiThority.

]]>