Corsa Security Expands its Global Presence by Signing FVC

Corsa | August 20, 2020

Corsa Security, leaders in scaling network security, today announced it has signed FVC as a global distributor. By adding the turnkey Corsa Network Security Virtualization Platform to its offering, FVC can enable customers to scale traffic inspection to meet increasing bandwidth demand, making it possible to examine 100% of their traffic, even when encrypted. FVC is an award-winning value-added distributor of enterprise computing solutions, representing both well-established and emerging technology providers. With over 500 transacting partners and particular strength in the Middle East and Africa, FVC is well-positioned to expand the presence of Corsa Security globally.

Spotlight

IT organizations are undergoing a significant transformation as they move toward consolidating data center and migrate many workload and their to be cloud.Today,hybrid cloud is increasingly the norm and enterprises are challenged with way to have visibility.


Other News
VIRTUAL DESKTOP TOOLS

VMware and Award-Winning Cyber Security Leader guardDog.ai Announce Partnership for Virtual Implementations at 2022 VMware Explore

guardDog | August 10, 2022

Guard Dog Solutions, Inc., dba guardDog.ai, and VMware are now partnered. guardDog.ai is launching the VMware implementation of its Fido 3 technology at the 2022 VMware Explore event at the Moscone Center in San Francisco Aug. 29 – Sept. 1, in booth 1914. As the award-winning leader in real-time cyber security protection for business and consumers, guardDog.ai is using VMware’s Tanzu containerization technology to support hardware-free and entirely remote deployment and management of cyber security protection for any size MSSP or organization. guardDog’s subscription-based Fido technology uses patent-pending artificial intelligence from the company’s cloud-based Autonomous Incident Response (AiR) database to pre-emptively recognize all devices connected to a network (including most especially the IoT and smart device connections device management solutions can’t see). The solution exposes and shuts down most cybersecurity threats before exploits can happen, protecting users and organizations from threats such as ransomware, man-in-the-middle attacks, denial of service, and emerging novel threats, protecting networks and the devices attached to them. “Full virtualization has been on our product roadmap from the date of our inception, I have had the opportunity to partner with VMware through multiple organizations I have founded and led, and am particularly compelled by the power of the containerization architecture exemplified in VMware Tanzu. We are extremely pleased to provide what we believe is one of the most exemplary use cases for Tanzu implementation, and we look forward to using this technology to protect users and networks and to move the needle on the war against cybersecurity for many seasons to come.” Peter Bookman, CEO and founder of guardDog.ai “The implementation of guardDog.ai Fido 3 as a containerized appliance is a game changer, creating opportunities for anyone who wants to keep bad actors out of their systems,” says Industry veteran CIO Steve O'Donnell. “A wide variety of industry colleagues and I have had the opportunity to test Fido pre-launch and can report that it operates as advertised, it is fully automated, simple to implement and provides effective protection that can be deployed anywhere.” With the VMware implementation of guardDog.ai’s Fido technology, MSSPs and IT departments can now replace the Fido hardware plugins with entirely virtual and remotely manageable implementations. This provides exceptional economy and ability to deploy and manage guardDog’s protection remotely, from a single location, for any size of organization or IT customer base. guardDog.ai uses AI-driven overlay technology in Fido to find and protect users and networks from attempted cyberattacks in less than two milliseconds, by identifying the threats that device and network management solutions can’t see and proactively halting potential exploits before they begin. In both wired and Wi-Fi networks, Fido protects network and the device users from the threats across the entire Attack Surface, and most especially within the edge territory outside the perimeter of the network or on attached devices that other solutions cannot see. These include the myriad of IoT (Internet of Things) devices such as specialized health monitoring equipment, printers, doorbells, thermostats, smart refrigerators, smart pens, smart TVs, and game systems that are inherently vulnerable to the networks they join. Thanks to the VMware partnership and implimentation, the ability to obtain and deploy virtualized Fido technology also eliminates the supply chain issues of availability delays, while allowing for instant and continual updates to the AiR database of known threats and suspicious network behavior. For all implementations, the virtualized alternatives for guardDog’s Fido v3 technology is making it possible to cover all areas of the potential Attack Surface with far greater economy and ease than before. About guardDog.ai Guard Dog Solutions Inc., headquartered in Salt Lake City, Utah, guardDog.ai has developed a cloud-based Autonomous Incident Response (AiR) cyber security software service that works together with a companion Fido unit to simplify network security. The solution provides protection and visibility as it exposes invisible threats on networks and the devices attached to them, with patented technology to address and prevent cybersecurity threats before they compromise network environments. Every business, government, healthcare institution, home consumer, or other organization, is grappling to find security solutions that are adapting to this changing world. guardDog.ai is pioneering new innovations designed to meet these challenges.

Read More

VIRTUAL DESKTOP TOOLS

Former VMware Cybersecurity Leader Tom Kellermann Joins Contrast Security as Senior Vice President of Cyber Strategy

Contrast Security | August 26, 2022

Contrast Security (Contrast), the leader in code security that empowers developers to secure as they code, today announced the appointment of Tom Kellermann, who will serve as the company's Senior Vice President of Cyber Strategy. As a Contrast leader, Kellermann will be responsible for developing and overseeing the company's government and financial sector strategy, which will include advising government agencies, standard bodies, financial institutions, insurers and regulators. In addition, Kellermann will facilitate a new, industrywide approach to sharing strategic, software-layer cyberintelligence. "While there has been some progress to increase the information sharing of cyberintelligence between the private and public sectors, as an industry we are still missing a significant opportunity to really strengthen the collective position against software attacks, One of Tom's personal missions is to work towards the advancement and proactive defense of both the nation's critical infrastructure and financial sector. I believe his addition to the team will help us accelerate the impact of Contrast's offerings and increase our ability to be a great partner in those sectors." Alan Naumann, Chairman of the Board and Chief Executive Officer at Contrast Security Kellermann has more than 23 years of experience, which will be critical as Contrast expands its work with the government and financial sectors. Prior to joining Contrast, he held the positions of Head of Cybersecurity Strategy for VMware and Chief Cybersecurity Officer for Carbon Black Inc. In 2020, he was appointed to the Cyber Investigations Advisory Board for the United States Secret Service and was appointed a commissioner on the Commission on Cyber Security in 2008 for the 44th president of the United States. "In 2022, the digital transformation of organizations has been hijacked due to the surge in application attacks and attacks on APIs. In order to combat growing threats, we must not only shift left in cybersecurity but build security into the entire SDLC [Software Development Life Cycle] in order to defend from within," said Tom Kellermann, Senior Vice President of Cyber Strategy at Contrast Security. "I am proud to join Contrast Security, and Jeff Williams — who I believe is a pioneer in the industry — to lead cyber strategy and drive our mission of protecting code security and ultimately the software that we rely on daily." To find out more about Contrast and its Secure Code Platform, please visit https://www.contrastsecurity.com/platform. About Contrast Security: Contrast Security secures the code that global business relies on. It is the industry's most modern and comprehensive code security platform, removing security roadblock inefficiencies and empowering enterprise developers to write and release secure application code faster. Embedding code analysis and attack prevention directly into software with instrumentation, the Contrast platform automatically detects vulnerabilities while developers write code, eliminates false positives, and provides context-specific how-to-fix guidance for easy and fast vulnerability remediation. Doing so enables application and development teams to collaborate more effectively and to innovate faster while accelerating digital transformation initiatives. This is why a growing number of the world's largest private and public sector organizations rely on Contrast to secure their applications in development and extend protection to cloud and on-premise applications in production.

Read More

VIRTUAL DESKTOP TOOLS

Exoprise Customers Achieve Significant ROI With SaaS and Digital Experience Monitoring

Exoprise | September 12, 2022

Exoprise, a leader in Digital Experience Monitoring (DEM) solutions, announced that its customers continue to realize significant Return on Investment (ROI) with Exoprise solutions and achieve positive ROI within six months of implementation. Troubleshooting remote worker issues using traditional tools creates visibility challenges, severely impacting business continuity and productivity. According to the latest Forrester future of work survey, 20% of employees contact the service desk support team weekly, and 10% contact them daily – far too often to remain consistently productive. In current economic conditions, companies have the potential to save thousands to millions in IT costs using features and capabilities offered by Exoprise DEM solutions. As one of the Exoprise customers, a global CRM head at a financial services company, told us, "Upon returning from a weekend, our employees could not access their Salesforce app in the morning. As a result, IT and several other teams spent at least half a day trying to find the root cause, which cost the company about $500K. With Exoprise synthetics, we would have immediately narrowed the problem to a change made by the network team and saved a huge loss to the company." Exoprise customers achieve superior ROI with their DEM investment by: Recovering Service Level Agreement (SLA) credit – IT teams receive Service Level Agreement (SLA) violation credits when Microsoft 365 has downtime. For example, Microsoft services such as Azure, Teams, OneDrive, etc. may not be available due to an outage or technical issue. Service availability less than the SLA of 99.9% requires Microsoft to reward credits to the customer. Exoprise provides actionable availability reports that act as evidence of true downtime, outage length, events, errors, and corresponding service health. Customers quickly verify and claim their credits to recoup the cost of the Exoprise system. Saving Costs on Device Refresh and Upgrades – IT departments often need to upgrade their infrastructure with new hardware or software, so employees remain productive and job satisfaction remains high. However, with a shrinking economy and flat expense budget, businesses struggle to keep up with that mandate. Utilizing Exoprise Service Watch Real User Monitoring (RUM), operation teams are driving upgrade decisions based on hard network and device telemetry data, segmenting different user groups, and auditing remote endpoint devices. The result is an optimized device refresh schedule and cost-effective companywide upgrades. Another Exoprise user, a Microsoft Teams administrator at a manufacturing services company, "We had frequent complaints from users about poor Teams meetings/calls. Initially, we would upgrade the hardware to the latest to fix the problem and spend thousands doing that, but the problems persisted. So, when we started using Service Watch, we could see exactly where the problem was for each user - and avoid upgrading when the problems were due to corporate network or weak Wi-Fi access points." Preventing Network Upgrade Surprises and Downtime – Future proofing the business means frequent network optimization. Enterprises rely on mission-critical services such as Microsoft 365, Salesforce, AWS, and SAP. Delivering these services via ISPs, MPLS, SDWAN, and VPN providers becomes susceptible to performance fluctuations. Exoprise provides end-to-end baseline views of the network for mission-critical applications before, during, and after any network transformation takes place. As a result, network administrators can ensure that the end-user experience is improved and access is more reliable. Delivering Better Digital Experiences Anywhere and reducing MTTR – The Modern Workplace demands remote flexibility along with the freedom to work anywhere. ITOps teams require end-to-end visibility into apps, the network, and system performance for these Digital Nomads, and the Exoprise platform delivers. Once deployed, Exoprise helps customers safely transition to a hybrid work model. Proactive synthetics provide early outage detection while crowdsourced analytics reduce the troubleshooting time in half. Improving Productivity with Less Dropped Calls for Teams, Zoom, and Webex – Today, knowledge workers collaborate using Unified Communication (UC), VoIP, and streaming applications such as Microsoft Teams, Zoom, and WebEx. Customers use Exoprise to proactively test and tune their networks for the collaboration platforms and offer complete coverage with Service Watch RUM. As a result, there is a significant ROI in reduced dropped calls and smoother call quality. "Due to Covid, our IT model has shifted from primarily supporting call center operations to supporting a significantly larger virtual environment. That was when we became interested in better measuring digital experiences from the end user's perspective. Synthetic sensors in our central data centers collect performance data on Microsoft 365, but we wanted an even more complete picture. Together with a real user monitoring on-demand solution, we can better understand the issues of our users at any geographic location," said Kevin Santos, Senior Director of IT, Network Operation Center, BCD Travel. "Exoprise has always been at the forefront of supporting our customers with innovative digital solutions and addressing hybrid workforce challenges with a complete view into the end-user experience, Our Service Watch product rapidly isolates call quality problems with VoIP and streaming apps such as Microsoft Teams, WebEx, and Zoom in real-time and ensures smooth collaboration from anywhere. In addition, our technical ability to deliver synthetics and real-user behavior insights in one platform differentiates us in the market." Exoprise CEO Jason Lieblich Read more about the combination of RUM and synthetics in our latest whitepaper and ensure the best digital employee experience for streaming, collaboration, and VoIP apps such as Microsoft Teams, Zoom, WebEx, and GoToMeeting. Better Together: Combine Real User Monitoring with Synthetics About Exoprise Exoprise enables IT teams to effectively deploy and manage its monitoring solution and mission-critical, cloud-based applications and services. CloudReady provides real-time performance visibility from behind the firewall to the cloud and back with synthetic monitoring. Service Watch provides location-independent end-user experience insights for SaaS and third-party web applications with real user monitoring. By leveraging proactive network path diagnostics, real user experience metrics, actual app usage data, and crowd-sourcing data analytics, organizations now have visibility, speed, and agility to easily assure the best cloud service performance.

Read More

VIRTUAL DESKTOP TOOLS

DTEX Systems Unveils New Privacy-First ‘PULSE’ Workforce Cyber Intelligence Product to Enable the Workforce of the Future

DTEX | August 22, 2022

DTEX Systems, the leader in Workforce Cyber Intelligence & Security, has announced the general availability of PULSE Workforce Cyber Intelligence. The first-of-its-kind workforce engagement and intelligence solution, designed with privacy as a first priority, will support digital transformation initiatives and related human capital management programs by enabling IT, HR, and Finance teams to learn from employee engagement with organizational assets and identify opportunities for improved work-life balance and operational efficiency. The Working World Has Changed and So Must Technology Outdated Employee Monitoring solutions that rely on intrusive surveillance techniques breach employee privacy and erode trust. While the intent may be to track activity and productivity towards a goal of professional development and operational efficiency, the net result is often a culture of skepticism, caution, and distrust amongst the workforce. With the Work-from-Anywhere movement here to stay, how can management learn from the workforce in the same way they did when they were able to ‘manage by physical proximity' via meaningful, interpersonal, face-to-face communications? Employee Surveillance is the WRONG answer. “Employees are not meant to be spied on, watched, and monitored. They are meant to be trusted, relied upon, and to help inform us as leaders about what we can do better to improve personal, professional, and financial outcomes for them and the organization as a whole,” said Bahman Mahbod, President & CEO at DTEX Systems. “Invasive, intrusive, surveillance-motivated technologies that monitor keystrokes, scan email, and record screens are archaic and unnecessary. They accomplish nothing and instead breed a culture of mistrust and skepticism. It is time for a new approach that embraces employees as informed, intelligence-gathering business partners.” According to Gartner, “Employees who are kept informed about why and how their organizations gather data about them exhibit higher discretionary effort and higher levels of trust relative to peers. In turn, companies with high levels of trust between employees and managers beat average annualized returns for the S&P 500 by a factor of three.”1 Legacy technologies have failed to answer the most important questions raised by progressive CEOs, and their HR, IT, and Finance leadership, including: What applications do we have? Are they being utilized? By whom? How often? Are there cost savings and efficiencies to be found in our application stack and licensing agreements? How is a hybrid work model performing for our organization as a whole? Are we meeting key performance indicators? Are we meeting objectives from a time and deliverables perspective? Do our employees feel engaged, motivated, protected, and respected? What unsanctioned SaaS applications are being utilized by top performers? What opportunities are there to learn from BYOA and adopting new SaaS apps that could accelerate innovation and efficiency? DTEX PULSE enables organizations to learn from their workforce by anonymizing an employee’s physical interactions with organizational assets (data, machines, applications, and people), aggregating these interactions across the entire business, and then performing analysis to understand engagement levels without compromising privacy. DTEX PULSE is NOT an employee surveillance tool. DTEX PULSE’s patented pseudonymization technology and unique data minimization techniques ensure employee privacy is maintained, while innovative behavioral machine-learning models help HR, IT, Finance, and Cybersecurity teams deliver better day-to-day experiences and foster better outcomes for employees and the organization. “The future of work is defined by a digitally-enabled, highly intelligent, hybrid workforce who is motivated by respect, privacy, a passion to make meaningful contributions, and innovation, The post-COVID workforce is a factor driving the acceleration of digital transformation initiatives, yet corporate visibility is regressing as operations and employees become decentralized. The goal in developing PULSE was to properly align the digital enterprise with the requirement for employee privacy, while making the workforce a source of operational intelligence and not the subject of surveillance.” Mohan Koo, CTO and Co-founder of DTEX Systems The most common use cases for DTEX PULSE include: Remote Workforce Analytics to help quantify the impact of employees and teams working remotely by analyzing application usage and access to data, both on and off the corporate VPN. Software License Optimization to help answer why, how, when and for how long employees use enterprise assets by providing contextual intelligence related to actual software utilization. This helps IT and procurement teams analyze the human habits that drive and disrupt workflows, and helps them understand what’s working, what’s not, and how they can adapt their strategies to support a more efficient workforce. Bring Your Own Application Awareness analyzes SaaS application usage data by top performers to discover authorized and unauthorized SaaS applications which support technology, efficiency, and innovation goals, without compromising a strong security posture. About DTEX Systems DTEX Systems helps hundreds of organizations worldwide better understand their workforce, protect their data, and make human-centric operational investments. Its Workforce Cyber Intelligence & Security platform brings together next-generation DLP, UEBA, digital forensics, user activity monitoring and insider threat management in one scalable, cloud-native platform. Through its patented and privacy-compliant meta-data collection and analytics engine, the DTEX platform surfaces abnormal behavioral ‘indicators of intent’ to mitigate risk of data and IP loss, enabling SOC enrichment with human sensors and empowering enterprises to make smarter business decisions quickly.

Read More