About Us

Nebulon TimeJump Features Lenovo ThinkSystem

Nebulon TimeJump offers complete ransomware recovery in less than four minutes. Nebulon TimeJump will feature on the Lenovo rack servers to provide all-around ransomware protection. Lenovo ThinkSystem will have instant recovery capabilities for their edge data centres with this integration, it will also provide Lenovo-based 2-server cluster alternative.

Nebulon TimeJump is the only Lenovo storage and server solution that offers all-around ransomware recovery in less than 4- minutes. TimeJump is available for small 2-servers clusters and ensures significant savings and availability against the 3-node HCI solutions. It is built on Nebulon’s smartInfrastructure cloud control plane, Nebulon ON. Nebulon ON utilizes multi-factor authentication to restrict unauthorized login, a feature offered to all users.

Lenovo ThinkSystem offers efficiency, flexibility, and value to ensure the essential requirements at the enterprise edge. With the integration of TimeJump with ThinkSystems, rapid cyber recovery can be easily ensured with a smaller footprint at the edge.

Siamak Nazari, CEO of Nebulon commented, “Data at the edge faces higher security risks and cost pressures than core data centre deployments. With Nebulon, enterprises can reduce costs while improving cyber resilience at the edge—and if attacked by ransomware, they can recover in under four minutes.”

Ransomware, malware, and wiper attacks are on the rise, they can infect the servers, and the need for ransomware protection is imminent. Cyber resilience for infrastructure at the edge is a solution that administrators are desperate to have. To survive the worse, companies need to have an effective ransomware recovery solution in place.

Nebulon ON also offers integrated role-based access control (RBAC) to let organizations handle who has remote or local access to the data and operating environment. Nebulon’s smartInfrastructure enhances the data security with always active encryption for data at-rest and in-flight. It helps in minimizing the risk of human error with its hardware-generated encryption key.

TimeJump is cost-effective and occupies less space than the traditional 3-node-minimum hyper-converged infrastructure (HCI) solutions. It offers ransomware recovery in less than four minutes.

Read more articles:

cyber threat intelligence!

Red Hat introduced Application Foundations

Red Hat Application Foundations will help facilitate the acceleration of containerized application development and delivery in hybrid and multi-cloud environments. Red Hat Application Foundations will be a toolkit for organizations seeking to rapidly build and integrate application and data services as part of their application and infrastructure modernization strategy. It is a collection of interconnected application services that work in tandem with Red Hat OpenShift.

Ken Johnson, vice president and general manager of Application Services at Red Hat commented, “Application development is undergoing significant change and developers need tools to support this transformation. We designed Red Hat Application Foundations with a developer-centric mindset, created to work seamlessly with Red Hat OpenShift to easily employ and deliver cloud-native applications, resulting in a simplified process to deliver a greater business value.”

OpenShift is a unified, security-focused hybrid cloud application platform that enables innovation. It provides a foundation for modernizing existing applications, developing cloud-native applications, streamlining development, adding intelligence to applications, and integrating third-party services, powered by containers and Kubernetes. Developers with a wide range of technical skills can feel empowered to create sophisticated applications using the OpenShift. It not only modernizes existing applications and supports new cloud-native development, but it also provides intelligence and data services for cloud-native apps.

Red Hat Application Foundations provides a toolset of major application services to developers, including high-performance data streaming platforms, frameworks, API management, service connectivity, and lightweight runtimes. As a result, development teams can modernize their applications with scalability, agility, and extensibility.

These components strike a balance between flexibility and compliance, allowing developers to choose from various self-service tools and services. Red Hat Application Foundations along with the OpenShift can be used with software from technology ecosystem partners and in-house developed capabilities to assist organizations in developing the right applications to meet their business objectives.

Read more articles:

What is Cloud Security?

Cyxtera Cloud Connect Expands

Alert Logic Reveals the MDR Incident Response Capability

Alert Logic Intelligent Response is developed to minimize the impact of a security breach through SOAR capabilities with workflows to enable response actions across networks, endpoints, and cloud environments. Alert Logic by HelpSystems has made its new intelligent response capabilities generally available. The innovations, which include a simple model and a mobile application, relieve IT and security departments of repetitive response tasks and the need for constant administration through human-guided and fully automated workflows. Seedrs, Europe’s leading online private investment platform, is among the first to use the new capabilities, which are now available to Alert Logic MDR® customers at no additional cost.

Jonas Pereira, Senior DevOps Engineer at Seedrs stated, “The wizard-based user interface of Alert Logic’s simple mode made the whole intelligent response configuration possible in just minutes. I also have full visibility of our infrastructure, and our safety, literally in my pocket with the Alert Logic mobile application, ensuring we can effectively respond to any potential threat instantly.”

The Intelligent Response acts as a safety net if attacks manage to evade prevention tools, improving an organization’s security posture while allowing it to adopt automation at its own pace. The solution addresses detection, notification, and containment with multiple actions and use cases in a streamlined user experience, allowing any organization to easily create automated response actions as part of a comprehensive response strategy.

Onkar Birk, Managing Director of Alert Logic by HelpSystems said, “The beta customers who helped guide the development of Alert Logic Intelligent Response told us they needed a flexible solution that allowed them to adopt automation at their own pace to increase their security posture. We’re putting response in front of people in an intuitive way, getting them involved in the process, taking security actions to contain problems, and enabling resource-stretched teams to deploy best practice security.”

Intelligent response Simple mode focuses primarily on necessary actions, for Alert Logic and AWS WAFs, eliminating an attacker on the network’s edge. Disable potentially compromised user credentials using AWS IAM or Azure Active Directory (including Office 365). Organizations can introduce the human touch at any point in the process while increasing the level of automation to meet their needs. Customizable response playbooks also help security professionals save time by integrating automated response actions into their business processes.

Read more articles:

BreachBits Launches BreachRisk, a New Cyber Risk Scoring Standard

Vicarius Launched Nmap Scan Analysis to Identify High-risk Assets

Trend Micro and Sherweb Collaborate To Minimise Threat Activities!

Trend Micro, a global provider of cloud and enterprise cyber security, has announced a new partnership with Sherweb.

Jason Brown, Vice President, Channel Marketplace at Sherweb said, “Preventing cybercrime is a major focus for Sherweb, especially in the MSP space. It’s incredibly important that MSPs and their clients feel that their confidential information is safe and secure. Our new relationship with Trend Micro illustrates Sherweb’s commitment to providing world-class security tools for MSPs.”

Trend Micro’s Worry-Free Services are now available to Sherweb’s Managed Service Providers (MSPs) – an easily operatable security suite that involves threat defense practices that are designed to remove security gaps across endpoints and beyond. With the help of this latest addition to Sherweb’s security offerings, it will become convenient for MSPs to find the best cybersecurity as per the client’s requirements.

MSPs can use Trend Micro’s Worry-Free XDR platform to take steps to protect their clients by lowering operating costs and expanding their business. MSPs can certainly increase their existing staff, bring in security expertise, and deliver high-value services by leveraging SOC-as-a-Service solutions all without incurring the costs associated with building the SOC.

Louise McEvoy, Vice President US channel at Trend Micro said, “This strategic partnership with Sherweb allows partners to grow, lessen their workload and give them and their customer’s in-depth visibility and control across their entire organization.”

Zentera Helps Enterprises Protect Against Insider Threats And Ransomware

Zentera System has announced a major update to its Zentera Air Zero Trust Services platform, which now offers a variety of choices for SMEs to manage common cybersecurity concerns using next-generation Zero Trust Security technology. 

Many of the same cybersecurity challenges affect SMEs and large corporations: ransomware affects business continuity, external compromise generates compliance and data security issues, and theft by malicious insiders jeopardizes a company’s long-term competitiveness.

Both have a spread workforce and a reliance on third-party contractors, and both are moving to cloud computing. SMEs, unlike large corporations, often have limited IT and Infosec resources and do not have the financial resources to invest in substantial infrastructure updates to stay up with the shifting threat landscape.

Zentera Air’s newer technologies are based on the CoIP Access platform’s proven security, which has been used at scale by major businesses, and has been tuned to enable Zero Trust Security controls easy to deploy in minutes.

After signing up for Zentera Air services from one of Zentera’s worldwide ports of presence, administrators may easily onboard essential application servers and begin limiting user and application access to enforce Zero Trust principles.

Zentera’s CEO, Jaushin Lee said, “Zero Trust is one of the hottest topics in cybersecurity, but real adoption has been limited to the largest enterprises due to infrastructure and operational concerns. Zentera Air brings the game-changing benefits of Zero Trust Security to SMEs with a non-disruptive, overlay-based solution that is easy to adopt. Our simple flows and ML-assisted configuration makes it possible for SMEs to embrace Zero Trust Security, even if they are short of cybersecurity expertise.”

Resilience Raised $80 Million In Series C Round

Resilience, a leading cyber insurance and security solutions firm, announced the completion of  $80 million Series C funding round led by General Catalyst and Corey Thomas of Rapid7, with participation from Founders Fund, Charles River Ventures, Lightspeed Venture Partners, Shield Capital, and Intact Ventures.

The investment comes as Resilience moves forward with plans for mid market expansion and international expansion. Middle-market businesses – manufacturing, universities, agriculture, hospitals, and construction – are the backbone of the American economy. As ransomware attacks are rising, the hardened cyber insurance market has allowed newcomers with a fresh perspective to make it to the top.

“We took a deliberate approach entering the middle market. Our clients are discerning buyers with sophisticated infrastructure. We proactively connect their security posture with their insurance policy, not as vendors, but as partners. That personal, integrated approach of transparency and action is what makes us so. This funding round signals that the market is ready for our insure + secure model different,” said Vishaal “V8” Hariprasad, CEO of Resilience.

Resilience has created an Insure + Secure business model that offers its clients with both tailored insurance and security solutions. From risk assessment to post-bind vulnerability monitoring, a team of in-house security engineers works with clients.

“Resilience is building the leading cyber risk and response platform for the insurance industry, helping mid-market enterprises identify and integrate the best insurance and security solutions for their business needs. It’s more than risk mitigation – it’s bespoke security solutions combined with an insurance policy that provides clarity and certainty. General Catalyst is proud to co-lead this funding round with Corey Thomas as we believe Resilience’s integrated model is the future of cyber risk,” said David Fialkow, Managing Partner and Founder at General Catalyst.  

“Resilience’s expertise, combined with an innovative approach to cyber risk, deliver unparalleled value for clients. The team has seen tremendous progress in the past year, setting the course for responsible and profitable growth. Intact Insurance Specialty Solutions is pleased to be a carrier partner,” said Michael Miller, CEO, Global Specialty Lines, Intact.

“At Intact Ventures, we are thrilled to increase the size of our commitment and to invest in a world-class team building a category-defining business,” said Justin Smith-Lorenzetti, Intact Ventures.

This financing enables Resilience to accelerate delivery of Insure + Secure solutions more broadly in North America and now globally.

Enterprise Fraud Management – An Overview

Enterprise Fraud Management (EFM) is a centralized framework for risk management, providing comprehensive risk analysis and application of controls for identifying internal and external frauds across all users, accounts, and channels in the organizations by transaction monitoring and customer profiling. Furthermore, it helps in identifying malicious behaviour and corruption in real-time thereby combating risks, minimizing losses, ensuring regulatory compliance, and optimizing operational efficiencies across the organization and entities.
EFM platform gives higher visibility in identifying threats and mitigating these threats. EFM solutions also offer a unified dashboard, enabling real-time monitoring of transactions and raising alerts for anomalies if required.

Some Noteworthy Features of EFMs are –

  • Centralized Data Repository – Businesses are developing centralized data repositories for clients’ accounts and transactions data for various products and services across multiple channels. EFM solutions process large quantities of data in real-time to create detailed profiles of clients and employees using high-performance computing technology based on machine learning, which can be used to detect and investigate money laundering and fraud.
  • Fraud Risk Assessment – A fraud risk assessment is a vigorous and continuously improving process. Organizations do thorough fraud risk assessments to identify individual fraud schemes and risks, assess their probability and magnitude, check existing fraud control actions. They introduce new rules and regulations to improve fraud detection. EFM solutions use risk scores to assess fraud based on guidelines provided by enterprise firm and analysed historical information. The new cloud-based EFM solutions are flexible enough to adapt these new rules and risk assessment tasks.
  • Real-Time Detection using Analytics – Since fraudsters are becoming more advanced, EFMs must evolve at a faster rate. EFM solutions allow for in-depth analysis of internal and external data collected from all resources for real-time fraud detection. In addition to rule-based fraud detection, sophisticated predictive fraud models fuelled by analytics on massive quantities of data are being developed. Risk is assessed in real-time for each transaction using a combination of parameters, algorithms, and cumulative statistics by comparing the characteristics of each customer’s or employee’s conduct with the fraud models and recorded patterns of behaviour. Techniques like graph visualization are used to identify underlying patterns and irregularities in data. EFM’s have forensic tools for e-fraud investigation. The aim is to use all available data to detect illegal activity before it happens and to avoid it before a customer’s account is compromised.
  • Scalability and Performance – EFM solutions are cloud-based, so there are no data storage and processing limitations. Financial institutions like banks with millions of customers and billions of transactions can be monitored with EFMs while retaining the fast detection needed in real-time environments. These organizations can leverage EFM’s cross-channel fraud management, user-centric fraud detection based on advanced AI. EFM solutions can easily correlate fraud events across the organization.
  • Enterprise Case Management – Enterprise Case Management uncovers hidden relationships in financial transactions. It is created primarily for financial fraud detection and investigations in the EFM solutions, it is built on previous fraud cases. These prebuilt and streamlined cases include key areas of fraud, which ease the process of fraud detection.

In the digital era, with evolving technologies, fraud attacks are also increasing at an alarming rate, indicating organizations to include Enterprise Fraud Management solutions to mitigate threats and frauds in the risk landscape.

Identity and Access Management – All You Need to Know

Identity and access management (IAM) is a set of rules implemented using technical solution so that validated users in an organization are granted appropriate level of access to the required resources. IAM is a framework, which manages access to enterprise resources.

Identity – An identity is label or token which is used to recognize user. It is creation, modification and deletion of identities.
Authentication – It is process of verifying whether the user is who he/she claims to be.
Authorization (user access) – It is a process to determine whether an authenticated user is permitted to access a specific resource.
In today’s changing world, IAM is critical. The ongoing process of controlling who has access to what information plays vital role. IAM is responsible for the management of users’ (employee or client) identities. In sharing of data and information, secure user access is critical. Furthermore, electronic data is becoming increasingly important to most businesses. As a result, access control must meet increasingly stringent criteria – a problem that is often addressed by implementing strong authentication. Identity and access are two crucial concepts in IAM that must be handled by an organization. Companies are increasingly dependent on digital tools to do these tasks.

Some Noteworthy Features of IAM are –

  • Centralized Directory service – It is one of the fundamental building blocks of IAM solution. A directory service is a centralized database of information that is structured and defined by a unique identifier. It makes the identity storage and verification process seamless across multiple platforms.
  • User Life cycle – IAM creates life cycles of employees and clients of an organization based on their behaviour patterns and access rules defined. It helps to detect threats.
  • Single Sign-On – IAM solutions support SSO. Single Sign-On (SSO) with a single set of credentials allows employees or clients of an organization to access multiple applications quickly. It eliminates the need to remember several sets of passwords making it more user friendly.
  • Scalable and Flexible – IAM solutions are able to scale up and down efficiently as per the requirement of an enterprise firm. They are scalable enough to manage the need of small firms with less than 100 user or large organizations with millions of users. IAM solutions give companies choice of deployment either on-premise servers or cloud with configuration changes.
  • Multi-Factor Authentication – Multi-Factor Authentication systems use two or more methods to verify the user’s identity. It uses information like biometrics, location, OTP to confirm the user’s identity. Organizations use advanced MFA to protect their employee or client’s connections to corporate networks or cloud applications. MFA greatly reduces the risk of a security breach, and confidential data is kept secure.
  • IAM control – Administrators can authorize who can work on specific resources using Identity and Access Management (IAM), giving them complete control and visibility of the company’s cloud resources. IAM offers a cohesive vision of security policies across the entire company, with built-in auditing to simplify compliance procedures for businesses with diverse corporate networks. IAM gives administrators the ability to grant fine-grained access to cloud services.
  • Government Law – State and Central government laws in various countries require companies who work with Personal or Identity-related information like financial information to use secure and robust Identity and access management solutions. In crucial sectors like banks, it is mandated by law to meet certain compliance guidelines.
  • Security – The beauty of the IAM system is its ability to show you what threats your company is facing. It detects and raises alert if the user’s behaviour deviates from usual activity. e.g. an attempt to access unauthorized resource or login from a different location. IAM takes action like account locking for failed login attempts. To make this possible IAM tools use big data analytics based on key metrics to manage.

Identity and Access Management solutions are used by all organizations. It is difficult to imagine an organization without an IAM Solution. With increasing number of devices, applications and users IAM software have great future with growing a market.