Advertise on DCNN Advertise on DCNN Advertise on DCNN

Cyber Security


Acronis simplifies endpoint security with new EDR solution
Acronis has announced the general availability of Acronis Advanced Security + Endpoint Detection and Response (EDR) for Acronis Cyber Protect Cloud. With new capabilities such as AI-based attack analysis, Acronis EDR reduces complexity and simplifies workflows for a more streamlined operation, making it easier for MSPs and the businesses they serve to deploy comprehensive security and data protection. With more organisations turning to MSPs for their backup and security needs, and with a greater need for simplicity and efficiency, Acronis EDR aims to expand the adoption of advanced security capabilities, helping organisations of all sizes better protect themselves. “With the proliferation of endpoints and increasing frequency of cyber threats, EDR has become a mission-critical tool in incident response and the fight for data protection. But solutions that are difficult to deploy and maintain are an obstacle,” says Research Vice President of Security and Trust Michael Suby at IDC. “The best solutions deliver the advanced security of EDR and meet the needs of the IT professionals who use it. That means easy deployments and rapid detection, response, and recovery with AI and automation on board.” Acronis EDR offers a broad number of out-of-the-box recovery options that take advantage of integration with Acronis Cyber Protect’ backup and recovery, endpoint management, and endpoint security capabilities. Designed for managed service providers (MSPs), it allows them to quickly and easily analyse and prioritise security incidents, minimise downtime, and maintain business continuity while keeping their clients safe and protected. “Other EDR tools can be over-complicated and force MSPs into expensive, time-consuming processes to implement and understand. Acronis EDR delivers a robust EDR solution that is easy to deploy and use while following industry-established standards like the NIST cyber security framework and mapping to the MITRE ATT&CK framework,” says Candid Wüest, VP of Research at Acronis. “By rapidly understanding attack analysis and impact, Acronis EDR users can quickly evaluate a potential threat, gain insight into how an attacker gained access, what damage was caused, and how the attack might spread.” Acronis EDR delivers: • Optimised incident analysis to quickly and easily analyse and prioritise security incidents and potential attacks without relying on costly security expertise or time-consuming processes. • Integrated security with backup and recovery, for comprehensive protection critical to minimising downtime and maintaining business continuity in the event of an attack. • A complete cyber protection solution in a single agent - simple for MSPs to deploy, manage, and scale - that eliminates the cost, complexity, and security gaps inherent in multiple-point solutions.

Alibaba Cloud plans to strengthen global partnership ecosystem
Alibaba Cloud is set to further empower its ecosystem partners through a series of new initiatives, including the launch of an Independent Software Vendor (ISV) Acceleration Program, a training empowerment programme for partners, as well as new incentives to reward partner excellency. “We are committed to growing together with our global partners and providing them with even stronger support to expand their businesses into southeast Asia and beyond,” says Edward Cai, Chief Commercial Officer, Alibaba Cloud Intelligence at the company's Partner Summit 2023 in Singapore. “All new initiatives underscore how much value we place on our partners. Together with our partners’ industry know-how, technology capabilities and market insights, we can deliver significant benefits to our customers.”  New initiatives to support partners’ growth Alibaba Cloud’s ISV Acceleration Program was launched to provide global ISVs with new financial incentives and more robust technical support to expand their business opportunities in Southeast Asia. As part of the program, Alibaba Cloud will help its ISV partners to optimise the marketplace listing fee on Alibaba Cloud’s marketplace platform, and expand the product sales through Alibaba Cloud’s sales team and its vast network of channel partners. Alibaba Cloud also pledges to enhance technical support for global ISV partners, offering comprehensive technical enablement resources to help them build, publish and operate their solutions on the cloud platform. In addition, the company will invest to co-develop customised products and solutions with its ISV partners. ISV partners including Neo4J, 6Estates, One2Cloud and SCash Global have already joined the acceleration program to get the most benefits from their partnership with Alibaba Cloud. At the same summit, Alibaba Cloud also announced the launch of a new training empowerment portal for global partners. The Alibaba Cloud Partner Empowerment Portal provides product and service training and certifications, educational content on topical technology developments, as well as resources and tools to increase partners’ service capabilities. The portal aims to empower 500 global partners including channel partners, Managed Service Partners (MSPs) and ISVs in the current financial year, with training topics covering cloud, AI, Web3 and more. To bring more tangible benefits to Alibaba Cloud’s partners outside China, the company also announced a series of new financial incentives including discounts and rebates for rewarding resellers and distributors as well as some joint go-to-market initiatives. This is part of the $1 billion investment that Alibaba Cloud announced in 2022 in order to support its global partners’ technology innovation and its market expansion. “Our new initiatives showcase our unwavering commitment to helping our global partners thrive and innovate on Alibaba Cloud,” says Selina Yuan, President of International Business, Alibaba Cloud Intelligence. “Partners play an essential role in enhancing and delivering Alibaba Cloud’s services and offering to our global customers. Together with partners, we can bring world-class technologies, products and solutions to our customers for their greater business success.”  New partnership on security, blockchain and talent development During the summit, Alibaba Cloud also unveiled deeper collaboration with its ecosystem partners. It has announced its new collaboration with IBM to provide a security solution for businesses across APAC. The security solution integrates features of IBM’s security products - QRadar SIEM and QRadar SOAR - as well as Alibaba Cloud’s wide range of security capabilities. It provides services including real-time reporting and centralised visibility into the cloud environment to detect threats such as ransomware, insider threats and cloud attacks. The co-developed solution aims to mitigate mounting cyber security risks while creating a secure, stable and protected cloud environment for clients during their digital transformation journeys. Another collaboration unveiled is with Avalanche, providing a launchpad for businesses to rapidly deploy metaverses on the Avalanche public blockchain. Cloudverse is a one-stop solution for businesses to seamlessly customise, launch and maintain their own metaverse space, creating new dimensions for engaging with customers. Alibaba Cloud also announced collaboration with training partners to bolster talent development in Southeast Asia. With the target to train 100,000 general public talents in the region by the current financial year, the SEA Talent Empowerment Program aims to attract training partners to contribute to the talent development drive. The initial training partners include Rahi Systems (information technology services and solutions provider), Solutions for Asia (security service solution provider), Lightning Cloud (multi-cloud operation solution platform) and Edu360 Cloud (digital certification service platform).

Nebulon launches TripLine
Nebulon has announced TripLine, a new threat detection service designed to alert customers when a cryptographic ransomware attack has been detected, as well as the precise location and point-in-time the attack occurred. The company also announced smartDefense, a cyber security solution that narrows threat vectors, detects ransomware attacks, and accelerates recovery. Despite the growing awareness about the dangers of ransomware - nearly two-thirds (63%) of the codebases in production have unpatched vulnerabilities rated ‘High’ or ‘Critical’ according to the March 2023 Unit 42 Cloud Threat Report. The same report also cites an average response time of approximately six days to a security alert, whereas it only takes a few hours for threat actors to start exploiting a newly disclosed vulnerability. Nebulon TripLine is the first combined server-storage threat detection solution for cryptographic ransomware. The new smartInfrastructure service can identify attacks on application data as well as the operating system and application software. TripLine is enabled within two parts of the Nebulon solution: (1) the Nebulon Secure Enclave, an isolated infrastructure domain that includes all server lights-out management, data services, boot and data volumes, and attached SSDs, and (2) the Nebulon ON cloud control plane. Machine learning (ML) runs in the Secure Enclave and identifies encrypted versus unencrypted blocks in real time. Every 30 seconds, these results are sent to the Nebulon ON cloud, which uses a combination of ML and statistical models to compare that data to the historical average of encrypted blocks for a given volume. A spike in encrypted blocks will generate an alert within a few minutes of the first suspicious result. “As a provider of electronic medical records and practice management solutions, HIPAA compliance is a top priority for our organisation and our clients,” says Hamid Amjadi, CTO of Prime Clinical Systems. “Nebulon’s new ransomware detection service, combined with its existing recovery features, helps us better protect patient privacy and should be a checklist item for any healthcare provider looking to bolster HIPAA compliance.” Hyper-converged infrastructure (HCI), which provides no isolation between infrastructure services and application services, is particularly vulnerable to cyber attacks. When the HCI operating system (OS) becomes infected, data services become unavailable and the disks that store snapshots protecting application data become compromised, making fast recovery impossible. This leaves enterprises with no choice but to re-install and reconfigure operating systems and clustering software, then recover application data from backup servers which also likely have been compromised - a process that can take days or even weeks. Unlike HCI, Nebulon TripLine enables performant ransomware detection and recovery of the entire physical infrastructure without resorting to re-installation or backups. Combined with Nebulon ON, enterprises can benefit from push-button, API-accessible recovery of all affected volumes using TimeJump, Nebulon’s four-minute ransomware recovery service. Nebulon also announced smartDefense, a new smartInfrastructure solution for narrowing threat vectors, detecting ransomware breaches, and accelerating recovery. smartDefense is intended to complement what organisations have in place for their cyber security framework, adding a solution for the deep server-storage application infrastructure. smartDefense protection relies on Nebulon ImmutableBoot, which maintains a known good version of the operating system and application stack within the Secure Enclave of every server. With every reboot, the server reverts to this trusted software instance, eliminating errant firmware updates or dormant malware in the process. smartDefense detection and recovery capabilities leverage Nebulon TripLine and Nebulon TimeJump. TimeJump can rapidly recover operating systems, application configurations, and data, reducing recovery time from days to less than four minutes for multiple clusters simultaneously. With the addition of TripLine to the smartDefense solution, customers can precisely identify the point of attack within their infrastructure and revert to a secure state using TimeJump, resulting in a significant reduction in overall threat response and recovery time. “The focus is shifting from perimeter-level protection to comprehensive solutions that cover the entirety of an organisation's infrastructure, and there are woefully few options to protect the server-storage infrastructure,” says Siamak Nazari, Nebulon CEO. “Since powerful detection and recovery services are architecturally built-in, not bolt-on, CISOs and CIOs should demand such capabilities be an inherent part of any modern infrastructure deployment.”

Logpoint appoints new Regional Director for CEMA
Logpoint has announced Sven Bagemihl as Regional Director for the CEMEA region, including Germany, Switzerland, and Austria. Sven will be responsible for building growth across enterprise customers and alliances within a fast-growing and highly competitive marketplace, working out of the new Logpoint offices in Munich. Logpoint is the only major European provider of foundational SIEM, UEBA, SOAR, and SAP security technologies converged into a complete security operations platform. Logpoint secures digital transformation and helps organisations of all sizes combat cyber security threats, operate reliable IT infrastructures, and provide essential compliance with important regulations such as KRITIS, GDPR and NIS2. “We are at a historical tipping point where global digital transformation is threatened by increasingly aggressive adversaries: organised crime and state-sponsored actors. The war in Ukraine, the energy crisis, and the COVID-19 pandemic have accelerated this development. I’m excited to join Logpoint at a time when the need for efficient and scalable European cyber security technology is more apparent than ever,” says Sven. Scandinavian private equity fund Summa Capital recently announced the acquisition of a majority stake in Logpoint, investing in European cyber security resilience and building a European cyber security powerhouse as an alternative to the dominating US vendors. The Frankfurt-based investment firm Yttrium (formerly Digital+ Partners) remains a significant minority shareholder in Logpoint after the transaction. “Logpoint has a decade-long track record of technology excellence and thought leadership in the cyber security domain. Across Europe, it’s increasingly becoming a priority for customers to work with vendors that have European DNA and understand the importance of privacy, data residency, and strategic resiliency. I believe Logpoint is in a unique position as the only native European SIEM/SOAR vendor,” says Frank Brandenburg, new Logpoint board member. “With Sven and Frank, we are adding almost 60 years of technology and cyber security leadership experience to the Logpoint team. We are increasing Logpoint reach and capability, extending our ability to serve strategic partners and customers, and strengthening our position in the CEMEA market, particularly in Germany. They will be key assets on our way to creating the strongest European cyber security company with global reach,” says Logpoint CEO Jesper Zerlang.

Vultr expands global footprint with new data centre location
Vultr has announced the latest expansion of its global footprint in Tel Aviv, Israel, to provide democratised access to cloud infrastructure to the growing technology ecosystem in the country. With the addition of Tel Aviv and its new location in Manchester, England, Vultr is continuing its cadence of global expansion by moving closer to eclipsing the data centre availability offered by the big three hyperscale cloud providers. The Tel Aviv data centre location puts Vultr on the map in Israel, where AWS and Azure have yet to establish availability zones. Vultr offers full-stack infrastructure in both Tel Aviv and Manchester, including cloud and GPU compute, Kubernetes clusters, managed databases, storage-as-a-service, and more. Establishing access to infrastructure-as-a-service (IaaS) in Israel is the latest advance in Vultr’s quest to provide full-stack infrastructure services in geographic regions underserved by the hyperscale cloud providers and democratise access to affordable cloud services for all organisations. Vultr’s availability in Tel Aviv now means that organisations with operations in Israel can access cloud compute infrastructure and services domestically to work locally and collaborate globally while maintaining data compliance and minimising costly data transfer fees. The same applies to Vultr’s Manchester data centre location, which complements Vultr’s presence in London and fortifies Vultr’s already-solid position in the UK and beyond. Headquartered in Tel Aviv, BBT.live uses Vultr for compute instances with its secured network connectivity solution, BeBroadband, enabling service providers to offer uncomplicated connectivity to their startup and enterprise customers around the world. “Vultr's adaptable model and exceptional engagement allow us to set up our Points of Presence (PoPs) on demand and deliver our services within a matter of hours rather than weeks to expand our business to new geographies rapidly,” says Erez Zelikovitz, EVP, Chief Revenue Officer and Chief Product Officer at BBT.live. “We are delighted that Vultr is available at a Tel Aviv data centre, close to our headquarters, which complements our already extensive list of locations across North America, Europe, and Asia where BeBroadband-Cloud PoPs are hosted.” “By bringing affordable, enterprise-grade cloud services to organisations around the world, Vultr is levelling the playing field for businesses striving to introduce breakthrough innovation in startup nations like Israel,” says J.J. Kardwell, CEO of Vultr’s parent company, Constant. “Vultr is breaking the big three hyperscalers’ stranglehold on customers in need of cloud infrastructure, who must endure the lock-in and exorbitant pricing associated with these inflexible cloud behemoths in exchange for IaaS access that isn’t customised to each organisation’s unique profile of needs.” Technology, digital, and cyber security startups, alongside established enterprises in the country, now need high-performance cloud resources. Vultr is stepping into the market to provide access to flexible cloud resources - spanning from bare metal options to GPU compute available on demand. Vultr ensures that access to these valuable resources isn’t limited to just the tech giants. Businesses looking to power generative AI solutions like ChatGPT or run other compute-intensive applications can now leverage the flexibility and cost-saving advantages Vultr brings to an ever-growing number of data centre locations. Vultr will host two events in Tel Aviv for the launch of its availability in Israel. A media breakfast briefing at The Norman Hotel on 16 May, from 9:30-10:30 am IST, and The industry event, Cloud as You Are, at Pop & Pope on 16 May, from 6:00- 8:00 pm IST.

Collaboration delivers API security to cloud architectures
Noname Security has announced that it has been accepted by Accelerated by Intel. Noname Security software takes advantage of 4th Gen Intel Xeon Scalable processors and Intel's NetSec Accelerator Reference Design, incorporating an Intel Ethernet E810 network interface with an embedded system on a chip (SoC) to accelerate API response times for low latency use cases and the performance of near-real-time machine learning for runtime API security at the edge of the network. Noname Security's platform was optimised using 4th Gen Intel Xeon Scalable processors and Intel Advanced Matrix Extensions (AMX), a new built-in accelerator that improves deep-learning training and inference performance on the central processing unit (CPU).  Noname Security's Sensor with Intel NetSec Accelerator Reference Design will allow customers to offload network and security tasks processing to the accelerator, preserving server resources for more generic operations. This integration opens up a broad spectrum of new industry vertical solutions utilising edge processing, including addressing extremely low latency requirements. “Noname Security is committed to helping organisations secure all their APIs, and partnering with Intel is a significant step in achieving that goal," says Oz Golan, CEO of Noname Security. “Intel's technology expertise will enable us to provide the best-of-breed API security solution for more customers and help them secure their critical assets against advanced cyber threats.” Key benefits for Noname Security and Intel customers include:  • Improved performance using the same or lower power, up to three times for specific scenarios  • Up to 10 times faster machine learning (ML) inferencing, benefiting runtime API security capabilities  • Deployment options for hybrid, private, and public cloud architectures as well as on and off-premises  • API Security for extremely low latency use cases, including telecommunications and edge computing • Seamless offloading of API processing, and adjacent networking and security functions, on the accelerator card • Increased performance and response times, leading to better utilisation of resources and decreased total cost of ownership for customers • New use cases, including 5G, satellite communications, military, and intelligence community applications

Immutable storage is the one solution that will keep your data safe
By Florian Malecki, Executive Vice President of Marketing at Arcserve As businesses increasingly rely on the cloud to manage their data, they face more pressing concerns regarding data security and integrity. These concerns become even more complex in multi cloud and hybrid-cloud environments, where companies distribute data across multiple platforms. But there is a solution: immutable data storage. Immutable storage preserves data in its original state, thus preventing tampering. Immutable data storage ensures data security and integrity in multi cloud and hybrid-cloud environments in several ways. First, immutable storage guarantees that the data remains tamper-proof and unaltered. Second, immutable storage provides a transparent record of all data transactions. Each change to stored data is recorded and stored as a separate immutable object. It means that, in the event of an attack, it is much easier to trace the origins of the breach and identify which data has been affected. Finally, immutable storage provides an added layer of protection against accidental data loss or data corruption. Because data creators cannot alter the data once they have created it, it becomes much harder to overwrite important data. Implement immutable storage across platforms Some challenges come with implementing immutable data storage in multi-cloud and hybrid-cloud environments. One of the biggest is the complexity of managing the solution across multiple platforms. Each cloud platform may have its storage protocols, which makes it challenging to maintain a consistent immutable data storage strategy spanning all platforms. Your strategy might work well for one cloud, but another might not accommodate immutability. As your data travels to multiple destinations, the question is: are you getting the benefits of immutable storage everywhere your data ends up? Shadow IT within your company compounds this challenge. Your organisation might have multiple groups, from marketing to engineering to product management, all using different SaaS applications without the IT department even knowing. In that case, you don’t know if the data is being backed up or, ultimately, where it’s going. Is it going to a place with an immutable storage solution? You don’t know. That’s why shadow IT is an area of serious concern. It’s crucial to ensure that data stored in all shadow IT applications is on an immutable storage solution to maintain data integrity. To address these challenges, you should implement a unified data storage strategy that spans all cloud platforms. This strategy should involve standardising on a single immutable data storage protocol or investing in tools and technologies that can help manage data across multiple platforms. Solve compliance concerns with immutable storage Immutable data storage can also address challenges posed by data privacy and compliance requirements. Many industries, such as healthcare and finance, now mandate data preservation by law. Any business subject to such requirements must have mechanisms to prove that it maintains healthy copies of its data that cannot be altered or modified. Here, immutable data storage is often the answer because it helps ensure compliance with strict data retention and audit requirements. Immutable storage enables organisations to store data in a tamper-proof manner, which makes it easier for them to demonstrate compliance during audits. Immutable storage prevents alteration and provides an audit trail that lists the history of all data changes, demonstrating transparency and accountability. It is essential because regulators and auditors must verify that organisations follow specific rules and compliance requirements. Organisations with immutable storage as a resource for audit trails can show the outside world, including customers, partners, and investors, that they are compliant. It increases trust and confidence in the organisation and its capacity to handle sensitive data. Enforce strict access controls While a multi cloud approach to immutability is beneficial in many ways, it still can be vulnerable regarding privileges and administrator rights to data. Even though an immutable solution is very secure, a bad actor who gains access - whether a malicious employee or a third party with privileged account-management access - can delete data. It presents a real risk since data alteration or deletion can cause irreparable damage to an organisation’s operations. In other words, the danger of unauthorised access remains even if your data is stored on an immutable solution. If someone has privileged access to the data, they can delete it, regardless of the security measures in place. For this reason, it’s essential to couple immutable storage with strict access controls and monitoring mechanisms to prevent unauthorised access and ensure data integrity. Think about the keys to your home. If the bad guys get hold of them and gain access, they can take anything they want. Similarly, if someone gains privileged access to your data, they can delete it, causing significant harm to your organisation. Therefore, it’s critical to implement strict access controls and monitoring mechanisms. Recognise that immutability is now a necessity Immutable storage is no longer a fantasy; it’s reality. It’s no longer a luxury; it’s a 100% must-have. With the rise of multi-cloud providers - and the explosion of cyber threats - it’s now crucial to ensure that all providers have immutability. When it is, organisations can limit the risk of a breach and ensure their long-term survival. Cyber thieves are roaming the avenues of the digital world, rattling doors and looking for a way in. Immutable storage is the lock that will keep your data safe.

Macquarie changes its name to Macquarie Technology Group
Macquarie Telecom Group has announced that it intends to change its listed company name to Macquarie Technology Group, reflecting the company’s evolution to become a digital infrastructure business through its success in cloud infrastructure, cyber security, data centres, and telecom. Recognising that the successful execution of its strategy has fundamentally changed the company over the last decade to a core plus digital infrastructure business, Macquarie will be applying to move from the S&P index ‘Diversified Telecom Services’ to ‘Internet Services and Infrastructure’. Macquarie’s strategy has delivered seven consecutive years of EBITDA profit growth and its share price has increased by over 500% during this period with its market capitalisation now exceeding $1 billion.  “We are still Macquarie, a proudly Australian company, driven by our purpose to make a difference in markets that are underserved and overcharged. Macquarie‘s world class NPS score of +79 is a testament to the customer experience we deliver for businesses and government agencies,” says Chief Executive David Tudehope. “As our customers turn to cloud-based solutions, they value our single accountability for cyber security, cloud performance and secure world scale data centres,” David continues. “Our four businesses’ names are unchanged as they reflect what they do - Macquarie Cloud Services, Macquarie Government, Macquarie Data Centres and, where our story proudly started, Macquarie Telecom.”

Infinidat named on the 2023 CRN Storage 100 List
Infinidat has announced that CRN has named it in its annual Storage 100 list in the software-defined storage category. The Storage 100 recognises industry-leading storage vendors that provide transformative, channel-friendly solutions and services. Infinidat was selected for the 2023 Storage 100 list because of its powerful commitment to pushing the boundaries of innovation through cyber resilient, software-defined storage enterprise solutions, while building strategic relationships with IT solution providers in the channel. Infinidat supports its channel partners with one of the most robust partner programs in the industry, earning a five-star rating from CRN last month for the second year in a row. “Infinidat has set a new standard for enterprise storage, delivering an outstanding portfolio of award-winning storage solutions for enterprises and service providers seeking the best in primary storage, modern data protection, disaster recovery, business continuity, and cyber storage resilience,” says Eric Herzog, CMO at Infinidat. “We’re very honoured to be named on the 2023 CRN Storage 100 list. It affirms our continued momentum working with our channel partners to shape the future of enterprise storage.” Supporting growth, Infinidat recently rolled out a series of new initiatives, extensions, and updates to its channel partner program worldwide. Among the most popular additions is the introduction of its major new sales enablement and training program - the Infuziast Certified Partner Program. Channel partners, ranging from sales consultants to technical personnel, will be able to earn certification and rewards through this new program. Infinidat is also establishing partner advisory boards for the channel this year. Go-to resource for IT solution providers The Storage 100 list is a valuable resource for solution providers looking for vendors, including Infinidat, that can support them in a complex storage market with portfolios in areas such as data protection, management and resilience, software-defined storage, and storage components. This year’s list represents the industry leaders of storage technology that can be used for on-premises or cloud deployments. Infinidat is a leader in cyber resilient storage for hybrid cloud implementations. Infinidat is the winner of more than 30 storage industry awards and recognitions since January 2022.  “CRN’s 2023 Storage 100 list recognises the leading vendors that are delivering transformative advancements in storage technology and bringing modern solutions to customers and solution providers that are built for the future,” says Blaine Raddon, CEO of The Channel Company. “We are honoured to recognise their contributions as the leading players in storage technology for 2023.”

Industry leader continues to define the API security market
Noname Security has announced enhancements to its API security platform to help organisations protect their API ecosystem, secure their applications, and increase cyber resilience. Noname enables secure growth with API security innovation  Today, APIs drive businesses, delivering value to customers, clients, patients, users, shareholders, and more. However, securing APIs - and all of the critical assets they connect - has become more difficult than ever as APIs attacks have increased exponentially. IBM Security X-Force reported that two-thirds of its analysed incidents were due to unsecure APIs. “APIs are the connective tissue for the digital world, but the explosion in API use has created new and rapidly growing threats to organisations across the globe. We created the Noname API Security Platform to uniquely address the modern API ecosystem, with discovery, insight, protection, and testing capabilities,” says Shay Levi, co-founder and CTO at Noname Security. “Doing so means not only securing APIs and their use, but also improving the speed at which our customers can expand their businesses.” Discover more and strengthen security posture Noname Security’s discovery and posture management solutions locate and provide insight to every API in an organisation’s ecosystem, uncovering vulnerabilities (including the most recent OWASP API Top Ten), protecting sensitive data, and proactively monitoring for changes, including in OpenAPI and other specifications. New capabilities enable customers to: • Gain complete visibility and detailed insights to protect APIs with customisable discovery, flexible tagging, and datatype assignments - including PII, PCI, PHI, and custom categories - for grouping APIs by application, business unit, and more. • Understand APIs in rich context with visualisations of business logic, physical network infrastructure, and API traffic to understand specific interactions and behaviour patterns. • Secure containerised applications with enhanced discovery and detection for Kubernetes (k8s). • Prioritise resources and eliminate blind spots with extensive infrastructure inventories for AWS and Azure, enabling organisations to find unprotected APIs, map the connections between APIs and infrastructure resources, pinpoint resources that could increase the attack surface, and resolve potential issues with full context. Stop attacks with runtime protection  Noname Security Runtime Protection detects and blocks API attacks with real-time traffic analysis, out-of-band monitoring, inline remediation options, and workflow integrations to increase SOC effectiveness. New capabilities enable customers to:  • Identify business-logic-based attacks immediately with updates to the industry’s most advanced anomaly detection engine using artificial intelligence and machine learning (AI/ML), including unsupervised online learning. • Reduce Mean-Time-To-Resolution (MTTR) with more context on issue records, including detailed remediation guidance and tools for deeper investigation. • Fully align with security operations centre (SOC) processes with automation, custom workflows, and integrations with existing systems such as ITSM, SIEM, SOAR, and more. Deliver secure APIs faster with active testing  Noname Security Active Testing is a purpose-built API security testing solution that helps organisations add security into the CI/CD pipeline without sacrificing speed. The newest version of active testing enables customers to:  • Shift left with integrations into the entire software development lifecycle (SDLC). Teams get dynamic API visibility across multiple states and environments throughout the CI/CD process. • Leave no API untested with a unique ability to find and test every API based on an understanding of the application’s business logic. • Empower developers with best-in-class usability such as simple set up and automation, in-line test results, and contextual guidance for request failure mitigation. Continuously adapt to changing environments Noname Security offers the most flexible and comprehensive set of deployment and integration options available. New capabilities enable customers to:  • Rapidly realise value with simplified step-by-step onboarding and in-app guidance. • Meet any deployment requirement with both agentless and agent-based options, including eBPF, and both out-of-band and inline protection options. • Easily manage complex deployments with automatic updates across cloud-hosted, self-hosted, hybrid, and distributed deployments. • Maintain data residency and reduce overhead with remote engines to aggregate traffic into a centralised console, allowing you to keep data within your control and reducing traffic. • Meet strict public-sector compliance requirements with a new hardened virtual appliance. • See the entire attack surface with additional integrations and improvements to Akamai, AWS ECS, Cloudflare, Oracle Cloud Infrastructure, Citrix, and other connectors.  



Translate »