About Us

FileCloud launches first ever Zero Trust File Sharing

FileCloud announces Zero Trust File Sharing that will provide an extra degree of hyper-security to one of the most sophisticated content collaboration platform available.  

Users will be able to securely interact with external partners, clients, and vendors in addition to other employees by using FileCloud’s Zero Trust File Sharing feature. This feature displays more than just changing share permissions or establishing Data Loss Prevention (DLP) rules. Businesses and organisations that work with valuable or classified data, such as Personally Identifiable Information (PII) and Confidential Unclassified Information (CUI), will be more and more forced to use zero trust file sharing (PII).

A hyper-secure content collaboration platform (CCP), FileCloud is a major industry provider of data governance, compliance, data leak protection, data retention, and digital rights management features. The entire CCP stack is completely integrated with granular control of content sharing across the majority of enterprise platforms and workflow automation.

The platform provides strong file syncing, mobile access, and sharing features on private, public, and hybrid cloud. Millions of people utilise FileCloud, which has its headquarters in Austin, Texas, including top Global 1000 companies, educational institutions, governmental agencies, and managed service providers.

“With FileCloud’s Zero Trust File Sharing, an enterprise can implement secure file sharing throughout their network as part of a larger Zero Trust strategy,” stated Anis Abdul, CTO, at FileCloud. “Zero Trust File Sharing will also support compliance with federal and global information security regulations as well as organization-wide cybersecurity policies that mandate limited access to sensitive data.”

The emergence of remote access software, cloud service technologies and the disappearing network edge has revealed weaknesses in perimeter-based IT security architectures. Regardless of the source of request for access, identity authentication is enforced by the Zero Trust architecture, which is built on a concept of least privilege.

A Zero Trust Strategy and Roadmap was recently released by the US Department of Defense. It will eventually apply to all government departments of United States and is expected to be adopted by the commercial sector. To protect their data systems from increasingly complex cyberattacks launched by nation states, major infrastructure sectors are excellent candidates to adopt Zero Trust File Sharing. Businesses can add an additional layer of protection on top of FileCloud’s built-in access controls thanks to its support for Zero Trust. To safeguard data within the environment, Zip file structures and password protection are used to achieve Zero Trust. The user will have the ability to specify a Zero Trust password and create a sharing link to a file or folder.

The information cannot be accessed without this password, regardless of whether a direct link is supplied or a breach happens. Even if the Zero Trust protected file is accessed by social engineering techniques or another method, the data is still secured by password-based encryption.

Ray Downes, FileCloud’s CEO said,“FileCloud already works with several governments around the world to provide hyper-secure content collaboration, file sharing, and workflow automation. Many of the building blocks for a Zero Trust environment exist within FileCloud, including role-based access, audit logs, encryption, and granular permissions. Developing a Zero Trust File Sharing solution further augments the platform’s capabilities when it comes to securing data, both within and beyond an organization’s network perimeter.”

The ability of authorised users to alter or modify the data in the Zero Trust folders will likewise be restricted when they use the Zero Trust passcode to access the data. Recipients of the sharing link will have read-versus-write restrictions depending on the share permissions. As part of a full Zero Trust strategy, Zero Trust File Sharing develops a hyper-secure, user-driven, file-sharing container that expands cooperation outside an organization’s IT perimeter.

Appgate announces Cloud-Native, Cloud-Delivered Zero Trust Platform! 

Appgate a secure access company announces a Cloud-Native, Cloud-Delivered Zero Trust Platform with a Built-In Risk Engine that will help in advancing Enterprise Zero Trust Security Maturity.  

“It is exciting to reinforce our Zero Trust market leadership with innovations like our Zero Trust platform and risk engine that reduce administrative burdens for IT and security teams while continuously hardening overall security postures,” said Barry Field, CEO, Appgate. “Building on proven Zero Trust principles like dynamic least privilege access helps our customers reduce risk in the face of unrelenting threats with simple, secure connections for their scattered workforces and hybrid infrastructure.” 

Appgate’s Zero Trust platform and risk engine benefits are: 

Customer choice of implementation models 

Fast-tracked Appgate SDP delivery 

Smarter policy decisions 

Maximized security investments 

Simplified day-to-day operations 

“Zero Trust security hardens enterprise defenses, but it must also reduce complexity to accelerate secure digital transformation and improve operational efficiency. Our Zero Trust platform empowers security and IT teams with the flexibility and interoperability they need to readily deploy and maintain their Zero Trust architecture and ecosystem,” said Jason Garbis, Chief Product Officer, Appgate. “We are extremely proud of our global product and engineering teams who worked tirelessly to bring our Zero Trust platform and risk engine to life, and are grateful to the customers who previewed, relentlessly tested and provided unbiased input along the way.” 

Remediant launched Remediant PAM+

Remediant has launched Remediant PAM+, a strategy designed to safeguard access while speeding up enterprise zero trust initiatives. With its agentless SecureONE product, Remediant is at the forefront of the PAM+ movement. In the last twelve months, the company has doubled its ARR and deployments, and more than half of these deployments have fulfilled functionality commitments made by antiquated PAM vendors but never kept. 

Raj Dodhiawala, Remediant President & CEO stated, “Privilege sprawl and credential misuse is a factor in nearly every cyberattack, so much so that both are being specifically identified as reasons for rapidly increasing cyber insurance premiums. The innovative PAM+ strategy promises to disrupt the stagnant PAM solutions market and truly solve for the today’s operational and cybersecurity pains. Remediant is laser-focused on protecting access, thereby preventing lateral movement for every customer – regardless of size, architecture model or vendor ecosystem.” 

Customers have confirmed that SecureONE prevents lateral movement, frustrates red teams, and satisfies cyber insurance requirements for lower premiums. Legacy PAM falls short of this level of security, bolstering Remediant’s PAM+ strategy. For the second year in a row, Remediant was named as an Honorable Mention in the Gartner Magic Quadrant for Privileged Access Management in 2022. 

These days, password protection is insufficient. Because of privileged identity sprawl, a huge attack surface that attackers covet, cyberattacks continue to be successful despite significant investments in legacy PAM solutions. 

According to the MITRE ATT&CK framework, admin credentials are essential to every successful cyberattack because they allow attackers to take advantage of privilege sprawl and move laterally to access an organization’s most valuable data and intellectual property. 

PAM+ goes above and beyond traditional PAM methods to tackle these risks head-on. PAM+ adds value to the customer’s zero trust journey through six capabilities: 

  • Eliminates the pointless privilege access that is always on and available. 
  • Minimizes the effects of hacked admin credentials 
  • Makes malware that steals passwords ineffective 
  • Utilizes multi-factor authentication to route all administrative access 
  • Increased IAM/PAM program maturity through access protection 
  • Delivers value quickly and integrates seamlessly into IT and security workflows without using agents. 

Everything you need to know about Zero Trust Security in 2022!

Before being permitted or maintaining access to applications and data, all users, whether inside or outside the organization’s network, must be verified, authorised and continually checked for security configuration and posture. Zero Trust presupposes that there is no typical network edge; networks can be local, cloud-based, or a blend of the two, with resources and workers located anywhere.

For today’s modern digital transformation, Zero Trust is a framework for safeguarding infrastructure and data. It specifically addresses today’s business concerns, such as securing remote workers, hybrid cloud systems, and ransomware attacks. While several suppliers have attempted to define their own terms.

Why adopt a zero-trust security model?

Cybercriminals targeting business-critical and sensitive data, such as personally identifiable information (PII), intellectual property (IP), and financial information, may find cloud settings appealing targets.

Even though all data breaches will never be completely eradicated, and no security plan is perfect, zero trust remains one of the most effective security solutions today. Zero trust minimizes the attack surface and negates the effect and intensity of cyberattacks, saving time and money in the aftermath of a breach.

Benefits of zero trust

1. Minimize company and organizational risk

Zero trust solutions prevent all apps and services from communicating until their identity attributes—immutable qualities that comply with predefined trust rules like authentication and authorization—are confirmed.

As a result, zero trust decreases risk by revealing what’s on the network and how those assets communicate. After baselines are established, a zero-trust strategy reduces risk by eliminating overprovisioned software and services and reviewing the “credentials” of every communication asset on a regular basis.

2. Take command of cloud and container environments.

Security professionals’ biggest concerns about going to the cloud are access management and visibility loss. Despite improvements in CSP security, workload security is still a shared responsibility between your company and the CSP. However, you can only influence so much within the CSP’s cloud.

Security policies are imposed depending on the identity of communicating workloads and are related directly to the workloads themselves in a zero-trust security architecture. This keeps security as close to the assets that need to be protected as feasible, independent of network constructions like IP addresses, ports, and protocols. Protection follows the workload and remains consistent when the environment shifts. 

3. Reduce the possibility of a data breach

Every entity is assumed hostile based on the concept of least privilege. Before “trust” is provided, each request is examined, users and devices are authenticated, and permissions are evaluated. As the context changes, such as the user’s location or the data being accessed, this “trust” is regularly reviewed.

An attacker who gains access to your network or cloud instance via a compromised device or other vulnerability will be unable to access or steal your data if you lack trust. Furthermore, the attacker will have nowhere to go because the zero-trust architecture produces a “safe section of one” with no way to move laterally.

Banyan Security Released Team Edition a Zero trust Solution

A global provider of Zero Trust Network Access solutions, Banyan Security released Team Edition a Zero trust Solution. This solution is a costless version of the company’s robust Zero Trust Remote Access platform which is accessible and designed for around 20 users. Team Edition is meant to give teams zero-trust access to hosted applications and infrastructure services with a single click, eliminating the need for legacy VPNs, inbound firewall ports, or DNS management.  

CEO & co-founder at Banyan Security, Jayanth Gummaraju, stated, “Zero trust remote access is about making it easier for people to securely access the resources they need from wherever they are. Unlike most zero trust vendors, we are taking a comprehensive approach to improving security by leveraging principles like least privilege access, user trust, continuous authorization with device trust, and trust-based access control. Team Edition makes it so easy – in 15 minutes, one can set up and manage zero trust access for their team. There’s no integration, no complex enrollment, and no charge. It’s a solution designed to provide the best admin, management, and end user experiences.”  

For decades at least, IT, Security, and DevOps have had to put up with substandard application and resource access solutions. As a result, there has been inconsistency in performance and less-than-ideal user experiences, which has harmed company security and employee productivity. By integrating least privilege access and continuous authorization to validate access based on real-time user and device trust, Team Edition overcomes these fundamental difficulties in just no time. Also, device trust reduces the risks of credential theft or loss, allowing users to use their chosen devices without affecting security. The Banyan TrustScore feature provides additional protection by quantifying user and device trust with a device security posture.

Banyan Security released Team Edition an award-winning Zero Trust Remote Access platform. This solution. This solution enables IT, Security, and DevOps team leaders the power and security of zero-trust remote access, as well as the increased productivity of users who have access to all provisioned services. With trust-based policy control, least privilege access, and continuous authorization, new infrastructure services, and hosted apps may be made accessible in minutes rather than days or weeks, while ensuring admin visibility, control, and security.

Related News :

Zentera Helps Enterprises Protect Against Insider Threats And Ransomware

Keeper Secrets Manager, the First Zero-Trust, Zero-Knowledge and Cloud-Native Solution for Securing Infrastructure Secrets

Mission Secure and XONA partners to offer zero-trust OT cybersecurity solutions to industries relying on remote operations capacity

Mission Secure, the world’s leading Industrial control (ICS) cybersecurity tech firm, announced a strategic partnership with XONA, the developer of a zero-trust user access solution for remote industrial operations, to provide more comprehensive and integrated operational technology (OT) cybersecurity solutions across several industries.

Remote operations capability is becoming extremely important in a pandemic-affected operational landscape for sustaining resiliency, enhancing efficiency, and accomplishing corporate goals. However, as IT and OT systems converge, businesses are exposed to cybersecurity vulnerabilities that standard IT security solutions can’t address. In order to protect essential infrastructure and business data from malicious attackers, organizations need OT-specific cybersecurity features.

In the defence, critical infrastructure, and process industries, Mission Secure offers comprehensive OT security solutions. This partnership improves their security by bringing a zero-trust user access layer to their product offerings, which include integrated closed-loop multi-factor authentication (MFA), browser-based virtual desktop infrastructure (VDI), moderated secure file transfer, system connection segmentation and monitoring, protocol isolation, and deep user access forensics, all offered through a single platform.

“Mission Secure is proud to bring XONA’s ‘best-in-class’ solution to our customers Our OT/ICS customers often face challenges with remote access, but the XONA technology adds an important feature set to our Platform-as-a-Service that will bridge the gap between cyber protection and operational efficiency. That’s especially important now as threat actors increasingly turn their attention to vulnerabilities in OT/ICS to avoid the increased security in IT infrastructures,” said John K. Adams, Mission Secure’s CEO.

“Simple to deploy, zero-trust user access empowers companies to embrace OT remote operations capacity without compromising cybersecurity. As ransomware and other cybersecurity threats increase in scope, frequency and severity, it’s critical that companies fortify their remote operations to account for a shifting threat landscape. We’re excited to partner with Mission Secure to deliver just those necessary capabilities,” said XONA CEO, Bill Moore.

Together Mission Secure and XONA will offer a comprehensive cybersecurity solution that protects companies as they embrace remote operations.

ColorTokens and Finesse formed partnership to help Middle Eastern businesses combat Zero-Day Vulnerabilities with Zero Trust

ColorTokens, a global provider of Zero Trust cybersecurity solutions, has partnered with Finesse, a Dubai-based IT system integrator. This partnership is a strategic move to provide Middle Eastern organizations with a new method to deal with the growing number of cyberthreats.

ColorTokens’ Xtended ZeroTrustTM Platform, which includes Xshield, Xprotect and Xaccess, provides a comprehensive approach to analyzing and mitigating cyberthreats across endpoints, networks and applications. ColorTokens allows businesses to accurately assess and enhance their security postures, enabling cyber-resiliency in cloud and hybrid environments. ColorTokens’ Xaccess is the latest addition to the Xtended ZeroTrustTM Platform. It provides Zero Trust secure access for remote employees, third parties, or contractors from distant places as they link with their cloud- or datacenter-based apps or data.

Finesse will be able to rapidly visualise and segment their entire IT infrastructure, proactively protect endpoints, and contain and respond to zero-day cyberattacks as a result of this partnership. 

“With the exponential growth of cyberthreats in the Middle East, traditional security approaches that follow a ‘castle-and-moat’ principle are no longer sufficient to protect today’s enterprise networks. To prevail against an increasingly malevolent threat landscape, adopting micro-segmentation and a Zero Trust approach that extends to the endpoint has become mission-critical for modern enterprises. We believe that Finesse, with its strong presence in the Middle East and in-depth industry knowledge, is well-positioned to deliver ColorTokens’ ground-breaking, end-to-end Zero Trust platform to regional customers. In addition, this partnership complements our vision of building a robust channel ecosystem comprised of top-notch partners, together with our trusted regional value-added distributor, Credence Security,” said Lee Ealey-Newman, VP Channels for EMEA, ColorTokens.

“Partnering with a premier cybersecurity innovator such as ColorTokens allows us to offer our customers a cutting-edge and easy-to-deploy Zero Trust platform. To win against today’s increasingly sophisticated cyberadversaries, organizations need to adopt a proactive and holistic security strategy that transcends traditional methods. ColorTokens’ Xtended ZeroTrust Platform can address this industry demand, and we are excited to work with them in providing the strongest protection and greatest value to our customers,” said Adhish Pillai, Practice Lead Cybersecurity, Finesse.

“With enterprise boundaries expanding beyond corporate perimeters, securing the network has become more important than ever. Zero Trust plays a critical role in addressing this market need, and that’s why bringing this security approach to more and more customers across the region is a key priority for Credence Security. We are confident that Finesse is the right partner to take ColorTokens’ Zero Trust innovations to new heights,” said Philip Cherian, Regional Channel Director, Credence Security.

Cyolo Raises $21 Million in Series A funding to Grow Zero-Effort Zero-Trust Solutions

Cyolo, a developer of a Zero Trust Network Access (ZTNA) 2.0 solution for businesses, announced that it has raised $21 million in a Series A funding round led by Glilot Capital Partners, with investments from National Grid Partners and Merlin Ventures, as well as current investors Flint Capital, Global Founders Capital, and Differential Ventures.

Organizations are more vulnerable than ever before to breaches and vulnerabilities, which can result in long-term financial and reputational loss. Many governments around the world are now acting quickly to improve cybersecurity by hastening the adoption of new security best practices based on Zero Trust connectivity. Cyolo’s solution offers a new and innovative method to link users to their workplace environment by eliminating transitive trust and continuously verifying and authorising every endpoint, user and identity before and after granting them access to any organizational resource or app.

Cyolo is the first Zero Trust solution that spans both IT and Operational Technology (OT). It has zero access or insight into client data, leaving no vulnerability and assuring that enterprises do not compromise on data or company secrets. The company’s ZTNA 2.0 enables IT and security teams, SASE providers, and MSSPs to quickly deploy the most secure Zero Trust connection solution into any existing environment without requiring any infrastructure changes, lowering the risk to an organization’s digital assets and data.

“Cyolo is solving a critical problem by giving organizations an agile and easy-to-integrate solution that allows them to have full visibility and control. The timing is right to expand into new markets, and this investment enables us to further execute our vision of transforming secure connectivity from network-based to identity-based, in order to provide organizations with a solution for their current and future needs. This round will allow us to accelerate growth and R&D efforts, and help new customers easily navigate the transition to Zero Trust,” said Almog Apirion, CEO and co-founder of Cyolo.

Glilot Capital is one of Israel’s top performing VC funds with a focus on cybersecurity and enterprise software, and the investment in Cyolo was made by Glilot+, Glilot Capital’s recently raised $180M early-growth fund. “We are very excited to join the journey of Cyolo. We have been tracking Cyolo and other Zero Trust technologies for quite some time and Cyolo’s product execution is the best we’ve seen. Cyolo has grown exponentially and its roadmap and vision for the future of secure connectivity aligns with market needs. We are excited to support the company as it enters its next phase of growth,” said Kobi Samboursky, Glilot Capital Partners Co-founder and Managing Partner.

“By simplifying complex environments and enabling organizations to secure their digital assets in a distributed and multi-cloud environment, Cyolo’s flexible model integrates with existing technologies to ensure the safety of sensitive data and digital processes. This cutting-edge solution enables organizations to create their own distributed cloud based on identities,” said Sergey Gribov, Flint Capital Partner.

Over the past year, Cyolo has doubled its value quarter-by-quarter and has been rapidly Cyolo has been aggressively establishing collaborations with worldwide clients and service providers over the last year, doubling its value quarter after quarter.

PC Matic picked by NIST’s National Cybersecurity Center of Excellence to Demonstrate Zero Trust Architectures

PC Matic, an American cybersecurity firm, announced that it has been approved to participate in the National Institute of Standards and Technology’s (NIST) National Cybersecurity Center of Excellence’s (NCCoE) (USA) Implementing a Zero Trust Architecture Project.

PC Matic will join seventeen other firms to create practical approaches to developing and deploying zero-trust systems as part of a cooperation with various cybersecurity industry experts. The NCCoE will issue a cybersecurity practice guide for government and enterprise businesses seeking to build a zero-trust architecture based on the methodologies developed by these organizations.

“Since inception, PC Matic has utilized a zero-trust approach to stop malicious cyber threats such as ransomware. Understanding just how effective this framework has been for our own customers, we are very grateful to the NCCoE for the opportunity to contribute to this project. We look forward to working together with the NCCoE and our other project partners to showcase the capabilities of and implementation strategies for zero trust architectures,” said PC Matic CEO Rob Cheng.

PC Matic’s participation in the initiative will help the NCCoE meet the program’s goals:

Showcase an example implementation(s) of a Zero Trust Architecture (ZTA) utilizing commercially available technology components that are developed and implemented using the zero trust ideas and tenets outlined in NIST Special Publication (SP) 800-207, Zero Trust Architecture.

Show different types of user access to enterprise resources (e.g., data sources, computing services, and IoT devices) across boundaries, from on-premises to numerous cloud environments, all governed by policy-based security constraints managed by zero trust concepts and methodologies.

Publish a NIST Cybersecurity Practice Guide, which is a publicly accessible explanation of the practical actions required to develop a cybersecurity reference design that addresses this problem.

“Implementing a zero-trust architecture has become a federal cybersecurity mandate and a business imperative. We are excited to work with industry demonstrating various approaches to implementing a zero-trust architecture using a diverse mix of vendor products and capabilities, and share ‘how to’ guidance and lessons learned from the experience,” said Natalia Martin, Acting Director of the NCCoE.

In response to an open call in the Federal Register, PC Matic submitted its capabilities as it relates to the Implementing a Zero Trust Architecture Project. Following such submission, PC Matic was invited to sign a Cooperative Research and Development Agreement with the National Institute of Standards and Technology (NIST), allowing them to participate in this project.