About Us

Google Cloud and Boeing Collaborate to Enhance Aerospace Industry

Google Cloud and Boeing have collaborated to support Boeing’s cloud transformation by transferring tons of applications over several market segments and aerospace technologies to Google Cloud. Boeing will be able to overcome issues related to traditional on-premises IT deployments by leveraging the cloud’s versatility, as well as Google Cloud’s data analytics and artificial intelligence/machine learning (AI/ML) technologies’ simplicity of use and innovation.

CEO of Google Cloud, Thomas Kurian stated, “Boeing is a global aerospace icon, and we’re proud to partner and apply the best of Google Cloud’s capabilities, including AI, data analytics, and clean infrastructure. We look forward to working together to transform Boeing’s business and help them continue to build innovative aerospace services that help airlines run efficiently and in an environmentally friendly way.”

Boeing’s aerospace product software and internal developers will be able to design and deploy apps and solutions across the organization to solve problems, create new digital products, and support its business partners because of the partnership. Boeing application owners will be able to use Google Cloud’s automation to speed up the provisioning of services for projects. Developers will also be able to use new data analytics and AI/ML capabilities for greater business effect, such as providing insights that can help Boeing enhance its airplane manufacturing efficiency.

Boeing’s chief information officer and senior vice president of Information, Technology & Data Analytics, Susan Doniz commented, “Today’s announcement represents a significant investment in Boeing’s digital future. Google Cloud will help us modernize our applications; empower our people with the latest technology, tools, and expertise; and continuously innovate with rapid software changes. With Google Cloud’s years of cloud leadership, data analytics, and AI/ML experience, we are looking forward to driving advanced digital aerospace solutions together.”

Boeing will deploy apps and workloads in Google Cloud areas with the lowest carbon footprint, in keeping with the company’s objective to achieve net-zero emissions. Google Cloud uses renewable energy to power all cloud workloads, making it the cleanest cloud in the business. When customers such as Boeing migrate an application from a self-managed data center or collocation facility to Google Cloud, the net operating expenditures are zero.

Vidizmo Partners with Hexagon to Improve Digital and Content Management

Vidizmo announced a strategic partnership with Hexagon to improve digital evidence and video content management for public safety organizations throughout the world. Agencies will be able to better gather, handle, and evaluate digital evidence as of the new capabilities, which will improve the investigative process and increase case clearance.

Senior vice president, Global Public Safety, Hexagon’s Safety, Infrastructure & Geospatial division, Bill Campbell, said, “In an age of exploding data, public safety agencies are modernizing their tools to keep up with changing demands. With an increase in videos, pictures, and other assets collected by agencies, digital evidence management is vital to the success of investigations. We are excited to partner with VIDIZMO to bring our customers state-of-the-art solutions to their needs.”

The strategic partnership helps Hexagon’s public safety customers to manage the whole lifespan of digital evidence, from collection to analysis and storage. Users may easily look through massive volumes of evidence and use digital data to discover potential concerns and solve crimes more efficiently.

Hexagon’s industry-leading public safety platform, HxGN OnCall, provides superior incident management capabilities to police, fire, ambulance, and other agencies, including call-taking and dispatch, records administration, sophisticated analytics, including Artificial intelligence/machine learning, and big event management. The VIDIZMO Digital Evidence Management System (DEMS) streamlines and simplifies the ever-increasing amount of digital evidence by providing a robust platform for ingesting, storing, managing, and sharing evidence in a centralized repository while maintaining the highest levels of security and compliance. To increase efficiency, the DEMS system offers AI-powered indexing and redaction capabilities.

Vidizmo and Hexagon products are now accessible for on-premises and cloud deployment around the world. Hexagon is a major digital reality solution supplier that combines software, sensor, and autonomous technologies.

Vidizmo’s CEO, Nadeem Khan, said, “Both Vidizmo and Hexagon are committed to creating safer communities. Together, with our combined expertise, we’re empowering public safety professionals with the tools they need to ensure the security of the public.”

What is UEBA ?

Advanced cyberattacks and persistent vulnerabilities to your business frequently rely on compromised credentials or coercion of people to do actions that vandalize enterprise security. To detect these types of threats, you’ll need a robust solution that allows analysts to swiftly distinguish between regular and unusual network behavior. The UEBA module has the fastest time-to-value in the industry, allowing for same-day deployment and quick insights.

User and Entity Behavior Analytics (UEBA) is the application of machine learning and security research to discover when users or entities are engaging in unusual and unsafe ways. It tracks users’ interactions with data, systems, and apps to identify and attribute threats so that security analysts can respond swiftly. UEBA uses comprehensive context information to enrich security data. Context data improves event detection accuracy, decreases false positives, and allows for context-based searching and threat hunting. Machine learning, behavioral analytics, and threat modeling are all used by UEBA’s analytics engine to detect your top threats. As a result, analysts are continually on the lookout for your most critical security incidents.

According to Infosecurity Outlook, people have specified patterns of behavior, and behavioral analytics is about how we take those patterns and start to extract usable information from them.

UEBA is being adopted by businesses to bring advanced analytics and machine learning capabilities to their IT security arsenal. UEBA solutions recognize patterns in regular user behavior and identify anomalous behaviors that do not match those patterns and may be linked to security events.

Organizations utilize UEBA technologies to increase efficiency and risk management while minimizing financial and reputational loss. They bring value by allowing firms to prevent attacks, particularly those that originate from within the network, detect breaches more quickly to decrease exposure, and mitigate the damage caused by cyber threats. Organizations would be able to detect and respond to threats more quickly and easily if they used such technologies. Customers and business partners will trust organizations that use effective security and risk management strategies and processes. As a result, they can serve as a business enabler, assisting firms in meeting their data privacy and security obligations, as well as compliance goals.

Some of the Essential Features of UEBA that you should know are;

  • Connects security information to identity and entity context.
  • UEBA uses machine learning to provide powerful behavior analytics.
  • Reduces false positives by analyzing the context of user, object activities and security events.
  • Threat chains automate machine learning and analytics processes, reducing the time to detect and respond to threats.
  • UEBA covers a variety of use cases for detecting cyber threats, fraud, non-compliance, and attacks from both inside and outside the company.

Security solutions like UEBA, which were once viewed solely as a means of lowering possible financial losses and increasing productivity, are now seen as a means of enabling a business. Organizations may better prioritize their investments to improve their overall security posture and enable them to satisfy privacy and compliance objectives by understanding what people are doing and how they interact with applications and data. Customers and business partners trust organizations that use effective security and risk management strategies and processes. Thus, they can serve as a business enabler, supporting firms in meeting their data privacy and security obligations, as well as compliance goals.

Nokia Launches New SaaS applications

SIM Secure Connect and AVA Network Data Analytics Function are two new software solutions (SaaS) launched by Nokia for mobile carriers and companies.

The new services, which are focused on security, data, and monetization, build on Nokia’s current SaaS business to enable telecoms service providers (CSPs) and enterprises to increase their value by transitioning to a subscription-based, old-school, cost-effective model.

Nokia’s new SaaS solution, ISIM Secure Connect, allows CSPs and companies to manage eSIM and iSIM-enabled device registrations in a secure and medium-term manner. It also integrates all components of the eSIM / iSIM management process seamlessly, allowing services linked to a reliable digital identification system to be monetized.

The company’s second product combines AI and analytics which is a virtualization and automation (AVA) solution. Nokia AVA Network Data Analytics Function (NWDAF) offers analytics on the network edge, leverages 3GPP compliant analytics services, and promotes software development interactions because of its distributed architecture and open APIs.

To generate greater returns automation of artificial intelligence (AI) and machine learning (ML) helps improve network performance and customer experience.

Regarding commercial releases, Nokia said their AVA NWDAF service would be available later this quarter with a SaaS delivery model. ISIM Secure Connect is scheduled to launch as SaaS later this year. However, other shipping options will continue to be available to customers.

Prosimo and AWS Bring New Advanced Services to Simplify Cloud Networking

Prosimo, an Application Experience Infrastructure firm, announced new cloud networking features developed on Amazon Web Services (AWS) innovations to ease hybrid and multi-cloud networking. Clients who want to develop an elastic and scalable transit with AWS Cloud WAN for cross-region connectivity can use the Prosimo Application eXperience Infrastructure (AXI) platform, which includes cloud-native integrations. Furthermore, the availability of Containers Everywhere in the AWS Marketplace allows businesses to deploy Prosimo AXI edges across their hybrid architecture using a single AWS portal. Businesses prefer a secure and optimised network transit that utilises cloud-native constructs, auto-scales as the footprint tends to grow as business requirements change, and continues to work consistently across multiple cloud regions, edge locations, and co-locations.

“AWS is delighted to work closely with Prosimo as we share a common vision in helping customers simplify and automate cloud networking to support distributed workforces and digital transformation strategies. This work delivers tightly integrated services that leverage Prosimo AXI for comprehensive hybrid and multi-cloud networking with industry-leading cloud services from AWS to simplify the onramp, migration and management of the enterprise journey in the cloud of our customers,” said Chris Grusz, Director of Business Development, AWS Marketplace.

Hybrid architectures and multi-cloud networks have become progressively complex and dynamic as a result of the heterogeneous nature of enterprise cloud adoption. For enterprises to support distributed workplaces and deliver excellent customer experience, enterprises must provide a consistent, reliable, and secure experience throughout all business-critical and latency-sensitive applications for clients in any location. Moreover, as more organisations use cloud-native architectures to revamp application frameworks and deliver applications faster, ‘application to application’ networking offers a simplified, elastic, and scalable solution.

Prosimo AXI is a self-contained multi-cloud networking solution built on cloud-native frameworks that provide complete and accurate observability as well as ML-insight-driven recommendations and orchestration. Prosimo AXI provides enterprises with fine-grained command over routing for optimised application performance, as well as the capacity to create security policies based on a Zero Trust framework.

“Our work with AWS makes it easy and seamless for any enterprise to simplify and realize autonomous cloud networking at any stage of the multi-cloud journey from hybrid cloud, multi-cloud and to the edge. We are ecstatic to be working closely with AWS on go-to-market, collaborating on product integrations and delivering compelling new services to customers,” said Ramesh Prabagaran, CEO and co-founder of Prosimo.

“With these new features and functionality on the AXI Platform, Prosimo will be ideally suited to meet our goals:  enable modern infrastructure capabilities using newer AWS networking constructs such as CloudWAN, built-in observability for applications, and remove as much complexity as possible,” said Kevin Paige , CISO, Flexport.

 Clients can now orchestrate Transit Gateway, Virtual Private Cloud peering and PrivateLink, as well as AWS CloudWAN, using the Prosimo AXI platform, which utilises cloud-native connectivity frameworks. Clients can also easily migrate to the favoured cloud-native networking option, such as AWS CloudWAN, and create detailed, accurate and contextual policies while offering a fast, secure, and smooth on-demand application experience for users worldwide with no disruption to end-users using Prosimo AXI.

Palo Alto Network CASB Helps Organizations Enable Safe Adoption Of Saas

The Next-Generation CASB (Cloud Access Security Broker) from Palo Alto Networks raises the bar in SaaS security to support today’s hybrid work solutions.

Security teams are striving to keep firm’s network secure as cloud apps, particularly modern collaboration technologies, fuel a fast expanding hybrid workforce. Many of today’s go-to technologies lack effective protections since legacy SaaS security solutions emphasize on compliance rather than security and were created when the universe of apps was considerably smaller and more predictable.

The Next-Generation CASB from Palo Alto Networks enables enterprises to safely deploy SaaS by automatically securing new apps, properly protecting critical data in real time, and blocking known and unknown attacks with best-in-class threat detection and prevention.

“SaaS applications have become far too important and popular for a superficial approach to security. In addition, while collaboration apps are now the lifeblood of hybrid and remote workforces’ productivity, traditional SaaS security has not focused on these apps or kept up with this change. Palo Alto Networks new Next-Generation CASB solves this using the latest technologies such as machine learning and natural language processing to find new apps and watch for potential security issues — giving organizations a modern, spectacular CASB designed for today’s SaaS environment,” said Anand Oswal, senior vice president of Network Security for Palo Alto Networks.

The Next-Generation CASB has been completely integrated with Prisma SASE, the industry’s most comprehensive SASE solution, as well as all form factors of Palo Alto Networks’ leading Next-Generation Firewalls, to deliver the following benefits:

Thousands of SaaS apps are automatically detected and secured, including the sector’s large number of unsanctioned, tolerated, and sanctioned apps, such as collaboration apps.

Protect sensitive data properly and in real time with the industry’s most comprehensive cloud-delivered business DLP, which now includes machine learning (ML), superior optical character recognition (OCR), and natural language processing (NLP).

Stop known, unknown, and zero-day threats with the industry’s most comprehensive cloud-based security technology, built on 15 years of malware analysis and prevention innovation.

“Palo Alto Networks Next-Generation CASB represents an updated approach to cloud access security brokers (CASB), designed to align with changing enterprise needs. “Through integrations with Palo Alto Networks Prisma SASE and Next-Generation Firewalls, Palo Alto Networks Next-Generation CASB provides a simpler and more cost- effective approach to CASB, while maintaining the broad application visibility and accurate threat and content inspection organizations require to secure the usage of cloud applications,” said ESG Senior Analyst John Grady.

Points to consider before buying Deception Technology Solution

The COVID-19 pandemic has caused several cyberattacks in new and unexpected ways and on a massive scale. Especially, the sudden change of many industries to remote work or work from home provided an instantaneous advantage and opportunity to cybercriminals. In ransomware attacks on workforce connected to corporate resources from unsecured home networks and devices. Throughout 2020, these malicious actors tried to identify and exploit employees and they will continue it in 2021. Social engineering has been the starting point of the majority of ransomware attacks. Social engineering strategies, such as phishing can fool users into disclosing sensitive information. 

Deception technology helps companies to quickly create a fictitious IT network that deploys alluring decoys that prevent cybercriminals from identifying the traffic and resources used within the real network. This deceptive network is then effectively integrated into the current IT infrastructure in order to reveal itself to attackers. Deception technology takes into account the attacker’s view and strategy which is used to abuse and explore networks of information recognition and exfiltration.

Following points should be considered before buying Deception Technology-

  • Vendors must understand client’s goals and objectives when it comes to deception
  • Vendors should study and understand client’s current technological infrastructure
  • Deception solution be built to understand attacker techniques, tactics and methods
  • Deception solution should be designed by incorporating the identified goals, technology and attacker tactics
  • Deception solution implemented should be reviewed and updated regularly to address new technology changes and objectives

Companies need to check that the deception solution covers all from endpoint to complex cloud environment for maximum protection. In addition, what kind of disappointment lures vendor provides. An ideal solution provides IT network, server, database, endpoint, applications, cloud and OT decoys, some vendors offer only a number of them. Companies need to check how these deceptions systems are used and whether they are manually or automatically updated. The level of customization also plays a crucial role.

The Level of Interaction to Deceive Attackers

The deception solution only works if it is able to mislead attackers. Real-time operating systems and networks can be custom-made. Consider asking solution providers whether their systems create or use emulated decoys for the actual operating system. The capacity to play and understand an attacker increases as the level of interaction of deception resources used increases. Greater interaction gives the cyber criminals more real experience and offers security teams a better and detailed approach to analyse attacker activity. It also increases their ability to develop enhanced deception environments. Various technical parameters like ensuring that active decoy directory entries are consistent with the real Active Directory should be checked. Cyber deception is a detection method. It is less to useful detect attacks without the ability to respond effectively. This makes it compulsory to create robust, documented incident response processes in deception solutions.

Cyber Criminal Use Cases

If an intrusion is identified, the attackers can be enclosed and observed successfully with minimum or no danger to the true system. However, Deception technology allows security experts to gain insights from the behaviour of an attacker and denies them the opportunity to apply crime data to strengthen security systems. Based on cyber criminals’ activities vendors have created cybercriminal use cases. These use cases are used to improve deception solution.

Scalability and Automation

The technology of deception adds decoys and controls so that the problems can be detected. Scalability is the design and implementation of an authentic set of decoys in an extensive infrastructure. Once these Deceptive resources are installed, companies can manage and update them regularly to maintain realisticness. The processes of generating, deploying, and running deceptive solutions have been significantly simplified by machine learning. Thus vendors with scalable and automated deception solutions should be considered.

If there is a ransomware attack deceptive resources are attacked thus saving real resources from attack. This is a huge advantage over other security solutions. Sectors such as education, health care and government need assistance in their fight against ransomware. Deception technology is useful in the detection of movement and minimizes damage. 

ActZero Cybersecurity Startup and Tech Data formed Strategic Partnership

ActZero, a cybersecurity startup whose AI-powered managed detection and response (MDR) solution helps to secure organizations of all sizes, announced a strategic partnership with Tech Data, one of the world’s top technology distributors and solutions aggregators. ActZero and Tech Data intend to work together to help businesses correctly detect, learn from, and prevent emerging security threats.

The ActZero platform brings together next-generation antivirus protection, endpoint detection and response (EDR), and 24/7 automated and managed threat hunting capabilities, all powered by a purpose-built AI engine and provided as a single, cost-effective solution. As a result, ActZero detects and blocks all forms of threats in sub-second response times, from commodity malware to cyberattacks.

Through the IT distributor and solutions aggregator’s global network, the agreement will boost the adoption of ActZero’s unique security platform as part of Tech Data’s edge-to-cloud offering and widen access to superior security for small and mid-size enterprises. Furthermore, this scale enables ActZero’s machine learning engines to benefit from tremendous network effects, which enhance the company’s capacity to detect and contain threats.

“We’re excited to roll out this partnership. Our goal is to democratize cybersecurity for small and mid-size businesses, and Tech Data’s well known distribution platform and industry-leading security expertise unlocks the ability to get ActZero’s superior approach in the hands of more companies,” said John Nurczynski, co-founder and Head of the Summit partnership program at ActZero.

“With year-over-year cybercrime statistics increasing exponentially, making smart investments in security solutions is a no-brainer for businesses grappling with how to handle malware, ransomware and proliferating cyber threats. Adding cybersecurity innovators like ActZero to our portfolio of solutions arms Tech Data customers with critical online security tools so the businesses they serve – especially small and mid-sized companies – are equipped to protect from edge to cloud,” said Tracy Holtz, vice president of security solutions at Tech Data.

Upstream Security Raised $62m In Series C Funding Round

Upstream Security, the specialist in automotive cybersecurity and data analytics for connected vehicles, announced that it has closed a $62 million round C investment, bringing its total funding to $105 million since its inception. Mitsui Sumitomo Insurance (MSI), a subsidiary of MS&AD Insurance Group Holdings, Inc., led the latest investment, which was joined by new investors I.D.I. Insurance, 57 Stars’ NextGen Mobility Fund, and La Maison Partners. Glilot Capital, Salesforce Ventures, Volvo Group Venture Capital, Nationwide, Delek US, and others are among Upstream’s existing investors.

Upstream is a cloud-based cybersecurity and data analytics platform that taps into the massive amounts of data stored in connected vehicles and incorporates it with purpose-built artificial intelligence and machine learning technologies to empower its clients to improve business results by providing advanced security capabilities and data analytics actionable insights.

Some of the world’s largest automotive OEMs, as well as tier 1 and tier 2 suppliers, mobility service providers, and others, use Upstream’s solutions to secure millions of vehicles on the road today from cyber attacks.

 The new investment will help Upstream expand its services to current and future customers in the areas of data analytics, insurance telematics, predictive analytics, and business intelligence, while also strengthening its position in the connected car cybersecurity sector. Furthermore, the organization will continue to put resources into finding, attracting, acquiring, and retaining elite people.

 Yoav Levy, CEO and Co-founder of Upstream Security said, “We are excited to reach this important milestone and welcome new investors, who believe in our mission to unlock the value of mobility data. With today’s revolution in automotive connectivity and exponential growth in the number of connected vehicles on the road, the demand for automotive cybersecurity and data analytics solutions has increased significantly, and Upstream is well poised to tap this growth and capitalize on the business opportunities shared by our customers and partners.”  

ColorTokens Launches Xaccess, Enhancing its Xtended ZeroTrust™ SaaS Platform for Zero Trust Access

ColorTokens, a Zero Trust cybersecurity platform company, introduced a new product Xaccess, a SaaS module within its Xtended ZeroTrustTM Platform that enables clients to provide secure Zero Trust access for remote staff members, third parties, or contractors connecting to cloud or data center-based applications or data. Xaccess also offers clients a single integrated solution across numerous user access requirements and across cloud or hybrid apps and data repositories when combined with broader capabilities in the Xtended ZeroTrustTM Platform.

“Providing the right level of access is a common problem that many enterprises face, irrespective of whether they are dealing with different users accessing cloud workloads or providing controlled access to a legacy application in their data center or setting up access policies for their data fabric architecture. Xaccess not only allows our customers to define intelligent, user identity-based access, but also handle more common and complex use cases such as enabling remote IT admins with deeper access specifications or session-based access needed for multi-user terminals. Customers can also avail themselves of our broader platform capabilities to define restricted levels of access for specific crown jewel applications or sensitive company data stores or enforce process-level controls at less-trusted accessing devices, making Xaccess one of the most advanced access products available to customers in the market today,” said Vats Srivatsan, President and Chief Operating Officer at ColorTokens.

Satyam Tyagi, Senior Director of Product Management at ColorTokens said, “Xaccess is a true Zero Trust-based solution that brings a rich context of threats, reputation feeds, and vulnerabilities into the access decision. Its ML-based access engine dynamically autogenerates access policies based on risk, usage, and disruption metrics. We further have the capability to isolate breaches at workloads or endpoints/users and thus limit the blast radius in our extended platform.”

“We chose ColorTokens over other offerings in the market to benefit from their single-platform approach to implementing Zero Trust workload segmentation and Zero Trust access. ColorTokens secured our full computing infrastructure, spanning our users, devices, apps, and workloads. With one console, we gained broad and deep visibility of our access, full context awareness, and the ability to tie user access to specific application segments. This would have been nearly impossible to achieve with a VPN or single tool for each environment approach,” said Martin Cherry, Managing Director at Banntech, a U.K.-based managed services provider.

“As companies re-evaluate security, in light of digital transformation and recent attacks, the appeal of Zero Trust has grown tremendously. At the same time, the practical considerations and challenges of operationalizing Zero Trust have become increasingly apparent. IDC believes that a cloud-delivered, infrastructure-agnostic platform design used by ColorTokens provides a worthy blueprint for accelerated implementation for organizations in their Zero Trust journey,” added Michael Suby, Research Vice President of Security and Trust at IDC.