Rad

Radware 2016 Executive Application & Network Security Survey Also Finds Telecommuting, Internet of Things, and Wearables Are Among Rising Security Concerns.

How many businesses will pay a ransom if attacked? It might depend on if they have already been a victim of ransomware. Some 84 percent of U.S. and U.K. information technology executives at firms that had not faced ransom attacks said they would never pay a ransom. But among firms that had been attacked, 43 percent paid, according to Radware’s 2016 Executive Application & Network Security Survey.

Radware, a leading provider of cybersecurity and application delivery solutions ensuring optimal service level for applications in virtual, cloud, and software-defined data centers, polled more than 200 IT executives across the U.S. and U.K. The study found that U.S. companies were far more willing to admit that they would pay a ransom. Among U.S. firms who had not been attacked, 23 percent indicated they were prepared to pay a ransom, in contrast to the 9 percent in the U.K.

Companies that paid ransoms reported an average of $7,500 in the U.S. and £22,000 in the U.K.

“This is a harbinger of the challenging decisions IT executives will face in the security arena,” said Carl Herberger, Radware’s Vice President of Security Solutions. “It’s easy to say you won’t pay a ransom until your system is actually locked down and inaccessible. Organizations that take proactive security measures, however, reduce the chance that they’ll have to make that choice.”

In addition to the responses to ransom attacks, Radware’s 2016 Executive Application & Network Security Survey found which security threats most weigh on the minds of the C-suite and senior executives.

Former hackers are seen as reliable watchdogs: Senior executives see former bad guys as the best way to test their systems. Some 59 percent of respondents said they either had hired ex-hackers to help with security or were willing to do so, with one respondent saying, “Nothing beats a poacher turned gamekeeper.”

Firms see telecommuting as security risk: Work-from-home arrangements are seen as an increasing risk. The survey found a big jump in changes to telecommuting policies, with 41 percent of respondents saying they have tightened work-from-home security policies in the last two years.

Wearables require more than a dress code: While about one in three companies implemented security policies around wearables in the last two years, 41 percent said they still have no rules in place, leaving a growing number of end points potentially vulnerable. Perhaps this is because wearables aren’t seen as a major target—only 18 percent pointed to wearables when asked what hackers would most likely go after in the next three to five years.

New connected devices will be the next security frontier: While wearables were less of a concern, many executives surveyed think the Internet of Things (IoT) could become a bona fide security problem. Some 29 percent said IoT devices were extremely likely to be top avenues for attacks, similar to the percentage of nods received for network infrastructure, which received 31 percent.

Cleaning up after a cyberattack can be expensive: More than a third of respondents in the U.S. said an attack had cost them more than $1 million, and 5 percent said they spent more than $10 million. Costs in the U.K. were generally lower, with 63 percent saying an attack had cost less than £351,245 or about $500,000, though 6 percent claimed costs above £7 million.

Security risk is business risk: Whether motivated by ransomware or another factor, attacks impose significant reputational and operational costs on victims. When executives named the top two risks they face from cyberattacks, brand reputation loss led the pack, with 34 percent of respondents choosing that as a big fear. Operational loss (31 percent), revenue loss (30 percent), productivity loss (24 percent), and share price value (18 percent) were also included in the top concerns.

Methodology:

On behalf of Radware, Merrill Research surveyed 205 IT executives (104 in the U.S. and 101 in the U.K.) in April and May 2016. To participate in the 2016 Executive Application & Network Security respondents were required to be at a company with at least $50 million (or equivalent) in revenue and hold a title of senior vice president level or higher. By design, the survey’s respondents were equally split between C-level executives and senior vice presidents. About half of the companies in the survey have 1,000 to 9,999 employees, averaging about 3,800.

THIS PRESS RELEASE AND THE SURVEY ARE PROVIDED FOR INFORMATIONAL PURPOSES ONLY. THESE MATERIALS ARE NOT INTENDED TO BE AN INDICATOR OF RADWARE’S BUSINESS PERFORMANCE OR OPERATING RESULTS FOR ANY PRIOR, CURRENT OR FUTURE PERIOD.

Posted by: RAH Infotech | June 28, 2016

Next-Gen NAC: A Game Changer in Network Security Solutions

Authored By Ashok Kumar, MD & CEO, RAH Infotech Pvt. Ltd.
NAC’s incarnation, next-gen NAC, offers tremendous value and advantages that can be applied across a variety of security requirements, policies, and controls

Not a day passes without the news of a major data breach. Although enterprises are spending billions on network defences, they are constantly being subjected to attacks that seem to confound all. According to the 2015 Cyber Threat Defense Report, more than 71% of respondents’ networks were breached and nearly 60% have reported an increase in mobile threats.

Cyber threats are constantly evolving and becoming more sophisticated than ever. The attackers are organized, skilled, and highly motivated. They know that it’s easier to compromise vulnerable endpoints than to directly target servers and databases. On their part, companies too make their vulnerabilities evident when they fall behind in undertaking patching efforts, have inactive host defences, and lack BYOD controls. They find it difficult to secure their weakest links: mobile phones, social media, and laptops and tablets. With most of the users having active social accounts on their mobiles and tablets, attackers indulge in tactics such as spear phishing and waterholing to trick unsuspecting users into sharing access credentials or downloading malware-infected files. Once the users have fallen to the ruse, it takes only a moment for hackers to breach the security and exploit other less secure systems.

The Second Coming of a New, Powerful NAC

Capture1

Network access control (NAC) has always been the talk of IT security professionals for well over a decade since it first made its appearance. NAC is a network security solution designed to grant, limit, or deny access to network resources through policies defining acceptable or unacceptable users, devices, and application properties. It provided them with a means to limit access to healthy devices. But device authentication came at a cost: it was cumbersome, costly to implement, and often disrupting users. As organizations begin to tolerate wireless, mobile devices and institute bring-your-own-device (BYOD) polices, the chorus grew for a new, powerful network defense system: the next-gen NAC. The need was very specific: a real-time network visibility, a flexible architecture, limitless policy options, and automated endpoint remediation. Organizations were no longer taking lightly for defense solutions that were limited to managed devices and ‘grant or entry’ network access policies.

There are three primary reasons why many companies are adopting NAC at a furious pace: a complex network infrastructure with inherent control and endpoint visibility gaps; the unfettered practice of BYOD polices; and the need to mitigate advanced threat.

Mitigating Threats with Next-Gen NAC

As attackers are easily able to spot and compromise vulnerable endpoints, it is necessary to prepare the defenses using next generation network access control (NAC) implementations. NAC is particularly effective at addressing security gaps introduced by transient network devices. When a threat is evident, it performs the following functions:

  • Alerting you to compliance violations
  • Keeping noncompliant, vulnerable endpoints off the network
  • Remediating vulnerabilities and security misconfigurations directly or via third-party systems
  • Ensuring that host defenses are installed, up-to-date, properly configured, and enabled

Capture2

When configured optimally, the next-gen NAC will provide you with more endpoint intelligence than you ever dreamt possible. It will give you a bird’s eye-view of the entire network ecosystem in real-time: devices and their types, operating systems, applications, virtual machines, security risks, network locations and a lot more.

Leveraging Next-Gen NAC

Research studies indicate that companies know approximately 80 percent of what is on their network, and at any given time, as many as 50 percent of those devices have a security or configuration issue. A full-fledged next-gen NAC can see and control—in real time—including visible and nonvisible endpoints, network devices, applications, and users. Well-equipped with passive and active network discovery techniques, today’s next-gen NAC solutions provide unprecedented, real-time network visibility to security professionals. However, a lot of misconceptions about NAC continue to dominate industry professionals, and this is fueled by the restrictions of legacy NAC offerings. At any rate, the next-gen NAC is widely gaining recognition as a core security platform and is poised to help organizations address challenging IT security issues.

Posted by: RAH Infotech | June 21, 2016

RAH Infotech Appointed National VAD by ContentKeeper

The tie-up will further strengthen RAH Infotech’s network security portfolio with proven web security solutions to secure today’s Web 2.0 and mobile centric business environments.

RAH Infotech appointed as the National Value Added Distributor (VAD) by Contentkeeper. The offerings will include providing solutions that enable organizations to protect and control gateway Internet access and to embrace mobile technology, social media and cloud-based services without compromising security.

Ashok Kumar, chief executive officer at RAH Infotech said, “ContentKeeper’s advanced, multi-layered behavioral analysis technology with high speed SSL (decrypted) packet inspection ensures mission critical Internet resources and services are protected – regardless of the device being used or where employees are. We are happy to bring their state of the art solutions to customers in India.”

“RAH Infotech has always served their customers with the best-of-breed solutions from top technology players and they continuously make efforts to enrich their portfolio and align with the customer’s evolving requirements”, further added Kumar.

“RAH is a fast growing value added distributor in India and this partnership is surely a win win for both. We look forward to working with RAH Infotech and am sure this association would lead to greater growth and a strong foundation that would help expand our business in the country,” said Pankaj Saroha, Country Manager, ContentKeeper Technologies.

Learn what they are and what is the easiest way to use them

Join Radware for an informative seminar in Mumbai and Bangalore!

Businesses need their applications to be available.  IT networks are designed to deliver applications and data reliably and securely.  It is important to understand how application visibility and performance impact business goals.  Gain insight into the nature of application networking and how application delivery controllers (ADC) can be a key component to reliable and secure applications.

Learn more from the seminar:

  • Application Service Level Assurance – The End Goal of Virtualization
  • Virtualizing Appiication Delivery – Cloud, SDN, NFV – What Does It All Mean?

If you are looking for application networking best practices, then look no further.  Radware is a global leader in application security and delivery solutions for virtual, cloud, and software defined data centers.

Time: 7:00 pm onwards

Date & Location:
Wed, June 15, 2016
The Lalit Mumbai, Sahar Airport Road, Mumbai
Register now!

Thu, June 16, 2016
Chancery Pavillion, #135 Residency Road, Bangalore
Register now!

Speaker:
Yaron Azerual
Product Marketing ManagerRadware

Space is limited and advance registration is required!

F-Secure Rapid Detection Service combines decoy sensors, threat intelligence, and 24/7 monitoring by a team of cyber security experts to help companies fight cyber attacks.

If you aren’t seeing security incidents, you’re probably missing something. That’s the message from F-Secure as it launches a unique new intrusion detection and incident response service to uncover threats in the corporate network. The managed service combines the best of human and machine intelligence with a promise to notify companies within just 30 minutes of a breach detection.

The average data breach can take weeks, months or even years to detect. According to Gartner, the greatest area of unmet need is effective targeted attack and breach detection. Organizations are failing at early breach detection, with more than 92% of breaches undetected by the breached organization.* Many companies rely solely on a defensive perimeter to protect them, which is crucial but only one part of a holistic cyber security strategy. With advanced threat actors who perform highly targeted attacks on organizations, an attack attempt will eventually bypass security controls and succeed in penetrating the network. The ability to quickly detect intrusions and immediately respond to them is critical – but that’s not easy to come by.

Man & machine: The best of both

F-Secure Rapid Detection Service leverages the strengths of both human and machine intelligence to provide an all-in-one intrusion detection and response service that’s ready to go immediately. The service consists of three major components: Endpoint and Network Decoy sensors that collect data about events and activities; F-Secure’s threat intelligence and behavioral analytics, which analyze the data to identify anomalies; and the Rapid Detection Center, which is staffed 24/7 by a team of cyber security experts who identify and handle incidents. When a breach is detected, an expert will contact the customer within just 30 minutes with incident response and to offer optional onsite investigative services if needed.

Respond with actionable intelligence

Once a breach has been detected, Rapid Detection Service also provides actionable intelligence for the response phase. The customer’s security team will learn exactly how the breach happened, how to isolate it, and get advice on remediation. With quick detection, an accurate diagnosis and expert advice on remediation, companies can limit damage and get back to business as quickly as possible. Additionally, F-Secure provides optional onsite services for incident management and forensic investigations.

With the introduction of Rapid Detection Service, F-Secure further strengthens its status as the leading European cyber security company. Rapid Detection Service easily integrates with any existing ecosystem and provides an additional layer of security to enhance the organizational cyber security strategy.

*Source: Gartner Magic Quadrant for Security Information & Event Management, Kelly M. Kavanagh, Oliver Rochford, published 20 July 2015

Check Point Software Technologies announced it has once again been positioned as a Leader in the 2016 Gartner Magic Quadrant for Enterprise Network Firewalls. The new report evaluated the company’s ‘completeness of vision’ and ability to execute in areas such as security management and threat prevention. Check Point has been positioned as a Leader in Enterprise Network Firewalls since 1997.

“The Leaders quadrant contains vendors that build products that fulfill enterprise requirements. These requirements include a wide range of models, support for virtualization and virtual LANs, and a management and reporting capability that is designed for complex and high-volume environments, such as a multitier administration and rule/policy minimization. A solid NGFW capability is an important element, as enterprises continue to move away from having dedicated IPS appliances at their perimeter and remote locations. Vendors in this quadrant lead the market in offering new features that protect customers from emerging threat, provide expert capability rather than treat the firewall as a commodity, and have a good track record of avoiding vulnerabilities in their security products. Common characteristics include handling the highest throughput with minimal performance loss, offering options for hardware acceleration and offering form factors that protect enterprises as they move to a new infrastructure form factors,” states Gartner.i

With a focus on helping business of all sizes stay one step ahead of cybercriminals, Check Point’s comprehensive approach to security includes industry-recognized technology such as Next-Generation Firewalls, Next-Generation Threat Prevention, mobile security, cloud security solutions and security management.

Over the last year, Check Point’s road map has been defined by a number of new technology solutions designed to better enable customers and ultimately transform the security industry:

  • Check Point expanded its Threat Prevention portfolio with SandBlast, SandBlast Agent and SandBlast Cloud, bringing to market the first CPU-level threat prevention and threat extraction technologies.
  • A host of new appliances gives organizations of any size, from small businesses to large-scale deployments, the power to run advanced threat prevention capabilities such full inspection of encrypted data, without compromising performance.
  • The new R80 security management platform addresses the sprawling complexity of securing today’s modern enterprise, delivering the ability to consolidate all aspects of a security environment into one single place, further paving the way for new-levels of automation capabilities for time-consuming security tasks.
  • Check Point offers its firewall over Amazon Web Services and Microsoft Azure for public cloud support and integrates with VMware NSX for software-defined networking use cases.
  • Mobile Threat Prevention stops threats on iOS and Android platforms, delivering real-time threat intelligence and visibility for existing security and mobility infrastructures.

To access the 2016 Gartner Magic Quadrant for Enterprise Firewall Market Report: /resources/gartner-leader-enterprise-network-firewall/index.html.

Comprehensive, Automated Cloud Protection Service Continuously Adapts to Offer Fastest Threat Detection and Mitigation

Change has always been a threat to businesses, but the rate at which cybersecurity threats and applications evolve adds new urgency for organizations to adapt. Radware, a leading provider of cyber security and application delivery solutions ensuring optimal service level for applications in virtual, cloud and software defined data centers, is helping them do so with an expanded portfolio of Cloud Security Services that continuously adapts in step with evolving threats and ongoing development of applications.

Radware now offers a full suite of cloud protection services that can give organizations the optimal protection they need and fit within their unique network and application environments.

This new Cloud Security Service offering is the only adaptive solution that combines cloud DDoS, volumetric, and application firewall attack protection into a configuration that is unique to the client’s needs, whether that is an always-on, on-demand, or hybrid solution. Once installed, Radware’s Cloud Security Services will automatically adapt to evolving threats and protected assets.

Cyberattacks evolve at a blinding pace. To protect themselves, organizations must regularly adjust to the changing environment and minimize human intervention. For businesses with cloud-based network infrastructure, or that don’t have the bandwidth to support comprehensive in-house security resources, this new offering can provide much-needed protection.

Radware’s new suite of Always-On Cloud Security Services will automatically detect and mitigate a wide range of attack vectors, including DDoS, burst attacks, complex volumetric attacks, SSL-based attacks, zero-day attacks, SQL injections, and more. In fact, it is the only cloud-based solution available today that can mitigate SSL-based attacks while maintaining user data confidentiality. This means that the organization can remain focused on business operations, while Radware addresses the attack.

The evolution of the cyberattack landscape is not the only risk to an organization’s network security. Whether in a cloud, hybrid cloud, or data center environment, the fluidity of application development and modification can also create a bevy of unintended security risks. Radware’s new suite of cloud security service is the first continuously adaptive service that automatically generates protections for 0-day attacks within seconds and continuously adjusts to new applications and updates required protections.

Radware’s Cloud Security Services address these issues with cloud WAF and DDoS protection technologies that provide the widest security coverage. The services offer:

  • The first continuously adaptive web security service that automatically adapts to evolving threats and protected assets by:
    • Automatically generating protections for zero-day attacks within seconds through behavioral-based detection coupled with real-time signature creation.
    • Automatically identifying, blacklisting and blocking machines that are used for attacks regardless of IP they hide behind through IP-agnostic fingerprinting technology.
    • Automatically detecting and protecting new applications as they’re added to the network through automatic policy generation technology.
  • The only SSL-attack mitigation in the cloud that maintains user data confidentiality and removes operational dependencies between a service provider and the organization when keys are changed. The solution also allows for use of wildcard certificates to reduce operational complexity when needing to protect a large number of subdomains.
  • Fully managed 24/7 service for both on-premise and cloud-based deployments, covering both WAF and DDoS protection. Delivered by battle-proven security experts, this service provides full visibility for security status and attack to your mobile device.
  • Over 2TB of mitigation capacity and dedicated scrubbing centers that segregate clean and DDoS attack traffic as part of a robust global cloud security network.

Businesses of all sizes are attacked on a daily basis. This cloud-only offering presents a viable enterprise-grade option for a wide range of organizations to defend themselves from growing cybersecurity threats.

For more information on Radware Cloud Security Services, visit https://www.radware.com/products/cloud-services/

New SandBlast Cloud proactively prevents the latest known and unknown malware from reaching Microsoft Office 365™ email customers

As enterprises undergo a rapid migration towards the use of cloud infrastructure for email, Check Point® Software Technologies Ltd. announced SandBlast Cloud to protect organizations from the ongoing trend of cyber criminals using email as a primary entry point for attacks. As the newest member of its industry-leading SandBlast family of solutions, SandBlast Cloud is designed to safeguard Microsoft Office 365 email customers from modern, sophisticated threats such as ransomware and APTs, allowing organizations to move to cloud infrastructure with confidence. SandBlast Cloud also includes Check Point’s unique CPU-level detection and Threat Extraction capabilities, proactively preventing attacks from reaching users.

While email has enabled communication and information to be distributed more efficiently than ever before, it also is a leading vehicle for the delivery of malware, including ransomware. According to the 2016 Verizon Data Breach Investigations Report, email attachments are the most common avenue for crimeware delivery, noting users opened and clicked on about 12 percent of malicious attachments they received. Combined with the fact that the median time to first click these attachments was only 3 minutes and 45 seconds from initial receipt, it becomes clear that preventing these malicious files from reaching users in the first place is critical to avoiding infection.

Enterprises are increasingly at risk of falling victim to a targeted email attack, and hackers’ methods are constantly evolving, requiring enterprises to use proactive, sophisticated security measures in order to stay one step ahead of the latest threats. SandBlast Cloud brings one of the highest levels of protection in the industry to Office 365 email customers in a pure cloud solution that delivers safe content quickly, with full visibility and management through its cloud-based portal.

In the constant battle to protect themselves from malicious email that can cause data breaches, financial loss and reductions in productivity, businesses need a sophisticated cloud email security solution that not only prevents infection from existing malware, but proactively identifies and stops unknown threats the first time. SandBlast Cloud provides Office 365 users with multi-layered defenses to protect from both known and unknown threats. Also, Antivirus and URL Reputation protection secure users from known threats, while advanced capabilities including Threat Emulation and Threat Extraction prevent unknown malware and zero-day threats from reaching end-users.

Key features of SandBlast Cloud include:

  • Seamless integration with Microsoft Office 365, managed as simple cloud solution that is easy to implement.
  • Highest malware catch rate in the industry, utilizing patented CPU-level inspection technology.
  • The delivery of safe, reconstructed versions of common document formats in seconds, and full access to original files in minutes once full analysis is complete.

Availability

SandBlast Cloud will be available summer 2016. To learn more about SandBlast Cloud, visit www.checkpoint.com/products/sandblast-office365-security.

KEMP Technologies has announced the release of KEMP360, designed to help customers simplify and streamline application delivery management across all hosting platforms from the data center and private cloud to IaaS, PaaS, hybrid and public clouds, including Microsoft Azure, AWS and VMware. This supports the optimisation of application delivery across the traditional enterprise, while also supporting organisations migrating to virtualised and cloud environments.

The new KEMP360 application delivery framework – comprising KEMP360 Central™ and KEMP360 Vision™ – offers a single point for application infrastructure control, monitoring and diagnosis, while also driving operational efficiencies through increased visibility and reduced management overheads. And by detecting issues before they impact on performance, resolution times are cut and end user quality of experience is improved.

KEMP360 Central™ simplifies day-to-day application delivery across multiple load balancers and hosting platforms from different vendors, through centralized service management, log collection and administration, which reduces operational costs and improves application uptime. KEMP360 Vision™ is a proactive 24×7 monitoring and alert service that mitigates the impact of application delivery performance issues by providing real-time visibility of events and workload availability, along with rapid remediation and consolidated reporting across all application workloads. By using real-time visualization of the application delivery environment to diagnose issues, IT organizations can quickly fix problems and automate routine administration tasks.

KEMP360 gives network and application administrators a single point of management, which reduces the administration workloads and greatly improves application availability through better visibility of of key metrics related to capacity utilization, uptime and performance. It also integrates with an SDN (Software Defined Network) environment to identify congested paths between the load balancing devices and the application servers, leading to quicker issue diagnosis and resolution. By providing vital real-time visibility, KEMP360 allows customers to pre-empt problems and allow KEMP experts to help fix and improve application performance.

For more information about KEMP360, please visit the KEMP360 product page.

The tie-up will further strengthen RAH Infotech’s network security portfolio with NETSCOUTS’ network management, pervasive visibility and security solutions

RAH Infotech, one of India’s fastest growing value-added distributors, today announced its appointment as the National Value Added Distributor (VAD) for VSS Monitoring, a NETSCOUT Packet Flow Switch business unit, a market leader in service assurance and cybersecurity solutions. With this partnership, RAH Infotech will be able to further strengthen its network security portfolio by adding the complete suite of solutions from VSS Monitoring.

The offerings will include NETSCOUT’s VSS Monitoring solutions for network monitoring, real-time network visibility, network access control, network forensics and analysis tools that enable organizations to maximize the efficiency of their network and security infrastructure. The solutions will further help in increasing tool performance that will in turn reduce response time and risk.

With full visibility from NETSCOUT’s VSS Monitoring solutions, the network management and security infrastructure can adapt to new network architectures, including shifts toward virtualization and software-defined networking (SDN). Also, organizations can leverage their most critical asset, the network, to gather the business intelligence they need to excel in today’s competitive market.

Older Posts »

Categories

Follow

Get every new post delivered to your Inbox.