Tag Archives: HTS

Skybox Security expands market leadership with over 4x growth in subscription business from new customers in 2021


Demand for Skybox vulnerability management and security automation capabilities drove 30% new business growth

News summary

  • New 2021 customers include Fortune 500, Global 500, major government agencies, and companies in critical infrastructure sectors
  • The industry’s most advanced exposure analysis, risk scoring, security automation, and vulnerability management innovations help advance strategic cybersecurity initiatives and optimize security posture
  • Skybox Security continues significant market share gains in the rapidly growing Vulnerability Management category

SAN JOSE, Calif., Jan. 26, 2022Skybox Security today announced that soaring global customer demand for its Security Posture Management Platform drove a 4x increase in subscription business from new customers year-over-year. Customer expansion and new logos also resulted in over 30% growth year-over-year, driven by global customer demand for Skybox vulnerability management and security automation capabilities. Further, Skybox Security reported the strongest quarter in the company’s 19-year history to include significant expansion within the critical infrastructure sectors.

"Increasing cybersecurity regulations, digital transformation initiatives, and cloud migration continue to fuel demand for our preventative Security Posture Management Platform," said Skybox Security CEO and Founder Gidi Cohen. "Other cybersecurity companies say they do exposure analysis. Skybox Security delivers the only solution that can do it with the precision you need to prevent a cyberattack, with the full context of the network, cloud, and OT infrastructure of the organization."

New 2021 customers include Fortune 500, Global 500, major government agencies, and companies operating critical infrastructure in the energy, utilities, manufacturing, defense, and telecommunications sectors. Increasingly dangerous vulnerabilities, including but not limited to Log4j, require a new focus on preventing breaches by eliminating cyber exposure ahead of an attack.

A new path forward for breach prevention
The company’s tremendous growth is fueled by capturing the ever-increasing market need for preventative cybersecurity management while strategically expanding into new verticals and regions. Hundreds of customers trust the industry-leading Skybox Security Posture Management Platform to prevent breaches before incidents happen.

Skybox Security is the only cybersecurity company to provide complete visibility and understanding of the attack surface. No other solution can visualize and analyze hybrid, multi-cloud, and OT networks across all industries and verticals.

2021 financial highlights: year-over-year growth

  • 4x increase in new recurring subscription business
  • 30% new business growth year-over-year, driven by global demand for Skybox vulnerability management and automation capabilities
  • Added ten new logos in the critical infrastructure sector, including major international manufacturers, energy and utility providers, telecommunications leaders, and one of the largest U.S. oil & gas companies
  • Won major government contracts across federal, state, and local agencies
  • Continued expansion into the highly regulated financial services sector, with 18 new logos
  • Reported the strongest quarter in the company’s 19-year history

2021 new and expanded customers

  • One of the largest U.S. energy & utility companies expanded its Skybox deployment to protect over 200,000 assets with Skybox Vulnerability Control. The company needed to ramp up its vulnerability management program and report to senior management teams. It was equally important for the company to get a centralized view for all departments to have an objective way to measure and manage risk, allowing admins to mitigate risk exposures on various assets.
  • A major multinational oil & gas company purchased Skybox Vulnerability Control to reduce risk and increase the resiliency of OT assets. Then, the company decided to deploy Skybox Firewall and Network Assurance during the pilot phase to ensure compliance and segregation in OT and corporate environments continuously. Lastly, the customer selected Skybox Change Manager to reduce the risk and effort of making network changes throughout the organization, replacing an aging home-grown application.
  • A multinational manufacturer purchased the Skybox Security Policy Management solution to collect, normalize, and optimize their network and security data. After a security assessment showed significant risks linked to network misconfigurations, the customer evaluated different security policy management solutions. Skybox Security was selected because it is the only solution to deliver comprehensive security policy management capabilities that enable the customer to automate firewall rules and see across their attack surface with the Skybox network model.

2021 product innovation highlights

  • Delivered the most effective and efficient vulnerability remediation options available in the industry – beyond patching
  • Released additional OT vulnerability management capabilities, allowing customers to eliminate cyber exposure across the entire enterprise environment, including IT, hybrid, multi-cloud, as well as OT assets
  • Unveiled new OT security integrations with Claroty, Nozomi Networks, and Siemens’ RUGGEDCOM products that expand Skybox Security’s ability to identify exploitable vulnerabilities across IT/OT environments
  • Enriched its multidimensional network model with new and enhanced integrations across leading hardware and software partners, including Zscaler, Palo Alto Networks, VMware, F5, and others

"Managing security posture has become a critical business imperative for reducing the risk of cyberattacks. Our global customer base relies on Skybox exposure analysis to understand exposed, exploitable vulnerabilities and reduce mean time to remediation (MTTR)," said Haggai Polak, Chief Product Officer, Skybox Security. "Our upcoming product innovations will continue to extend our industry-leading network model to ingest data from transformative technologies and model entire networks across IT, OT, and hybrid cloud."

Additional resources

About Skybox Security    

Over 500 of the world’s largest and most security-conscious enterprises rely on Skybox for the insights and assurance required to stay ahead of dynamically changing attack surfaces. At Skybox, we don’t just serve up data and information. We provide the intelligence and context to make informed decisions, taking the guesswork out of securely enabling enterprises at scale and speed. Our unified security posture management platform delivers complete visibility, analytics, and automation to quickly map, prioritize, and remediate vulnerabilities across your organization. The vendor-agnostic platform intelligently optimizes security policies, actions, and change processes across all corporate and cloud environments. With Skybox, security teams can focus on the most strategic business initiatives while ensuring that enterprises remain protected. 

https://www.skyboxsecurity.com/

Media & analyst contact

Ashley Nakano
Corporate Communications Director
ashley.nakano@skyboxsecurity.com

© 2022 Skybox Security, Inc. All rights reserved. Skybox Security and the Skybox Security logo are either registered trademarks or trademarks of Skybox Security, Inc., in the United States and/or other countries. All other trademarks are the property of their respective owners. Product specifications subject to change at any time without prior notice. 

Logo – https://techent.tv/wp-content/uploads/2022/01/skybox-security-expands-market-leadership-with-over-4x-growth-in-subscription-business-from-new-customers-in-2021.jpg

Information Services Group Report Recognizes Armis as a Leader in OT Security


Armis included in leading research firm report: ‘2021 ISG Provider Lens™ Manufacturing Industry Services’

PALO ALTO, Calif., Jan. 13, 2022Armis, the leading unified asset visibility and security platform provider, today announced Information Services Group (ISG) has named Armis a Leader in the ‘2021 ISG Provider Lens™ Manufacturing Industry Services’ report, specifically for its OT security solution. Download the full research report here.

The report, which examines the role of service and solution providers across the entire value chain of manufacturing engineering, includes an independent evaluation of the Armis platform. According to the report, "Installing Armis’ solution across the enterprise infrastructure provides unified visibility for all assets in its ecosystem. Thus, customers benefit with a single-pane-of glass viewpoint for all IT and OT devices."

Armis has been named a Leader in OT security following in-depth research consisting of interviews with advisors, briefings with analysts, and analysis of market information. ISG deep dives into the Armis platform and looks closely into its capabilities to provide: asset visibility of all managed and unmanaged OT and IT devices, risks and vulnerability assessment, and the intelligence needed to orchestrate remediation.

"We are proud to be recognized for the second year in a row by ISG as a Leader in OT Security", said Nadir Izrael, Co-founder and CTO at Armis. "While OT environments are large and complex, they remain surprisingly vulnerable and extremely difficult to manage. With the ever-increasing IT/OT convergence, and the emergence of next-generation industrial environments converging to Industry 4.0, the need for a new and comprehensive approach to cybersecurity has never been greater. At Armis, we recognize the industry maturity and adapt the innovation of our technology to allow industrial organizations across multiple verticals to understand and resolve threats without impacting critical operations."

This is the second consecutive year that Armis has been classified as a Leader in OT security by this renowned technology research and advisory firm. If you would like to learn more about Armis’ leading solution or schedule a demo, please visit www.armis.com.

About ISG
ISG (Information Services Group) is a leading global technology research and advisory firm. A trusted business partner to more than 700 clients, including more than 75 of the world’s top 100 enterprises, ISG is committed to helping corporations, public sector organizations, and service and technology providers achieve operational excellence and faster growth. The firm specializes in digital transformation services, including automation, cloud and data analytics; sourcing advisory; managed governance and risk services; network carrier services; strategy and operations design; change management; market intelligence and technology research and analysis. Founded in 2006, and based in Stamford, Conn., ISG employs more than 1,300 digital-ready professionals operating in more than 20 countries—a global team known for its innovative thinking, market influence, deep industry and technology expertise, and world-class research and analytical capabilities based on the industry’s most comprehensive marketplace data. For more information, visit www.isg-one.com.

About Armis
Armis is the leading unified asset visibility and security platform designed to address the new threat landscape that connected devices create. Fortune 1000 companies trust our real-time and continuous protection to see with full context all managed, unmanaged, and IoT devices, including medical devices (IoMT), operational technology (OT), and industrial control systems (ICS). Armis provides passive and unparalleled cybersecurity asset management, risk management, and automated enforcement. Armis is a privately held company and headquartered in Palo Alto, California.

Media Contact
Kari Schatz
Highwire PR for Armis
armis@highwirepr.com

Tuya Smart at CES 2022: IoT Security Products in Spotlight as COVID-19 Spurs Global Demand for IoT

LAS VEGAS, Jan. 7, 2022As a leader in the IoT sector, global IoT development platform service provider Tuya Smart (NYSE: TUYA) is also showcasing a number of brand-new security-related products and solutions at CES 2022. These offerings aim not only help developers launch products with high efficiency, but also reduce their worries about product safety.

Two years on from the beginning of the COVID-19 pandemic, CES 2022 is coming back to Las Vegas in person, enabled by heightened safety measures adopted by the event organizers. In the face of the continued pandemic, technology firms, industry experts and journalists are all coming together both online and offline to a different tech landscape, forever changed by COVID-19.

One of the major impacts of the pandemic on IoT and smart devices has been the rise of global network security issues, that have been further amplified by consumer needs and behaviors during the pandemic. According to a 2021 report from IoT Analytics, the number of connected IoT devices are expected to hit 12.3 billion active endpoints globally by the end of 2021 and grow to over 27 billion IoT connections by 2025. Coupled with increased remote work after the onset of the COVID-19 pandemic, consumers are more exposed than ever to online attacks. According to Akamai’s annual state of the internet security report, remote work and increased connectivity contributed to a spike in cyber-attacks, while web application attacks tripled in 2021, from what was already a record year in 2020.

At this year’s CES, network security has become a topic of concern for all major players in the industry. Among the issues, IoT security has risen a key focus for many manufacturers, developers and suppliers to exhibit their forward-looking vision and R&D capabilities, as there are particular challenges for IoT that differ from those of traditional network security. Throughout CES, posters and videos promoting network security solutions can abound and security-related hardware products are in pride of place at many booths.


At Tuya Smart’s CES booth, the company’s new IoT security module WBR3N, exhibited in physical form and available for virtual tour online, has drawn the attention of many journalists and industry professionals. This industry-leading security module is the first IoT module of its kind with a built-in secure element (SE) to hold a Common Criteria (CC) EAL6+ certificate.

Commanding comprehensively robust security guarantee, the module realizes mutual certificate authentication and device activation authentication between the device and the cloud, in addition to the Elliptical Curve Cryptography (ECC) security certificate and device certification information that is built into the Squeeze-and-Excitation (SE) block during the production process. In terms of communication, WBR3N uses TLS1.2 two-way strong verified communication based on security authentication, which represents the highest level of communication security in the industry.

In terms of security protection of device data, WBR3N uses built-in independent SE to execute the data encryption and decryption process, therefore fully safeguarding data security. At the same time, the module provides SE-based independent physical security storage, and has a built-in root of trust (RoT), through which storage is performed. The core codes also enjoy protection by the built-in SE, while OTA ensures process safety through a secure communication process and firmware verification.

Overall, WBR3N comes with multiple logical and physical protection layers such as metal shielding, end-to-end encryption, memory encryption, and tampering detection, able to effectively fend off various advanced attack methods such as power analysis and fault attack.

Aside from enhanced hardware security capabilities, Tuya Smart has also announced the release of Tuya Sage, an IoT security operation platform, at CES 2022. The solution is designed to help developers identify and eliminate potential security risks of the IoT system, and ensure security and compliance during system operations.

jwplayer.key=”3Fznr2BGJZtpwZmA+81lm048ks6+0NjLXyDdsO2YkfE=”
 

jwplayer(‘myplayer1’).setup({file: ‘https://mma.prnasia.com/media2/1721942/VIDEO.mp4’, image: ‘http://www.prnasia.com/video_capture/3624498_CN24498_1.jpg’, autostart:’false’, aspectratio: ’16:9′, stretching : ‘fill’, width: ‘600’, height: ‘338’});

Shared security responsibility is the fundamental principle of IoT security. Shared security means that cloud providers are responsible for protecting cloud security, while developers are responsible for the security of the applications, data, and resources that use and access the cloud. In practice, many developers lack a holistic sense of the security and compliance status of global smart terminals, a challenge that industry experts are looking for solutions to address.

With Tuya Sage, developers have an oversight of all protected devices, including their basic security information and risk status. Once a device encounters an attack, the developer can complete the risk interception in just one click. Through real-time threat intelligence, Tuya Sage is able to identify local vulnerabilities in smart terminals in a timely and effective manner, allowing developers to fully understand the security and privacy compliance status of the terminal, as well as whether there is any non-compliant user data flow so that it can be rapidly addressed.

In recent years, Tuya Smart has spared no effort in advancing platform and technology-related security and compliance, and proactively conducting third-party data security certifications to meet the varying security needs of customers around the globe. This unique ability to meet the varying security needs of customers around the world puts Tuya Smart in a unique position as a leading global IoT development platform service provider.


According to the public information, Tuya Smart has obtained a number of third-party data security certifications, including BSI’s ISO27001 standard for information security system, ISO27017 standard for cloud security management system, ISO27701 standard for cloud platform privacy and security, and the CSA STAR cloud security certification. In terms of regional compliance, Tuya Smart has passed Ernst & Young’s SOC 2 Audit as well as TrustArc’s GDPR and CCPA’s regional compliance validation. The company is also a recipient and member of TrustArc’s Enterprise Privacy Certificate (EPC).

When it comes to product safety standards, Tuya Smart has passed TÜV SÜD’s EU ETSI standard for cybersecurity in IoT, as well as the ioXt Alliance’s hardware safety certification in 2021. The company has also been partnering with Rapid7, wizlynx group, ScienceSoft, UnderDefense and Kaspersky to vigorously carrying out tests of platform service security.

In the long list, names like TrustArc and Ernst & Young are regarded as the most credible third-party organizations in validating or auditing security and compliance. With the proactive approach to certification and security cooperation, it is safe to say that Tuya Smart is a firm that attaches the greatest importance to safety and compliance.

At this year’s CES, manufacturers, developers and suppliers are all eager to present fresh electronics. But as consumers look to new electronics to bring into their homes, one of the features they will increasingly look for is trust and security assurance. It cannot be ignored that security is the guardian and foundation for all software and hardware products. This year the new offerings from Tuya Smart are a solid contribution to security for the IoT industry.

About Tuya Smart

Tuya Smart (NYSE: TUYA) is a leading technology company focused on making our lives smarter. Tuya does this through offering a cloud platform that connects a range of devices via the IoT. By building interconnectivity standards, Tuya bridges the intelligent needs of brands, OEMs, developers, and retail chains across a broad range of smart devices and industries. Tuya solutions empower partners and customers by improving the value of their products while making consumers’ lives more convenient through the application of technology. Through its growing commercial SaaS business, Tuya offers intelligent business solutions for a wide range of verticals. The Company’s platform is backed by industry-leading technology complete with rigorous data protection and security. Tuya partners with leading Fortune 500 companies from around the world to make things smarter, including Philips, Schneider Electric, Lenovo and many others.

Kiwontech’s targeted email attack protection technology standard selected as national government

SEOUL, South Korea, Dec. 23, 2021Kiwontech‘s newly-developed targeted email attack protection technology has been selected as the leading ICT standard of Korea.

Kiwontech CI
Kiwontech CI

One of Korea’s most prominent IT security companies and a JV member of Born2Global Centre, Kiwontech is pursuing the commercialization of its global email security standards-compliant IT security technologies in Southeast Asian countries, including Vietnam. In November, Kiwontech and Vnetwork, a Vietnamese content delivery network (CDN) operator, formed the joint venture VnetKiwon Security.

The Telecommunications Technology Association (TTA), the authority on the setting and implementation of ICT standards in Korea, has adopted Kiwontech’s technology, called "Security functional requirements for the prevention of targeted email attacks" (TTAK.KO-12.0379), as a Telecommunications Technology Association Standard (TTAS).

This new TTAS will serve as an email security benchmark for companies in international business and retail that use email to send and receive financial and other sensitive information as well as general businesses that use email across their operations. Kiwontech’s development of this technology began in December 2020.

The company’s goal from the beginning of the development process was to have the technology chosen as a national email security standard, and the resulting solution is capable of diagnosing email security risks associated with fraud against users and businesses, information leaks, and ransomware. More than 50 government agencies, SMBs, and other entities have already completed trials of Kiwontech’s new email security solution, which replaces flesh-and-blood IT security consultants with AI in the detection, analysis, and reporting of email security threats, a breakthrough that will enable a rapid market launch of the company’s technology.

Kiwontech’s TTAS will serve as a valuable reference for corporate IT security teams in auditing email security and purchasing-related solutions and enable email security solution developers to supplement and optimize security functions to ensure the reliability of the email security products their customers use.

Kiwontech CEO Kim Dong-cheol said, "Selected standards for targeted email attack protection were something needed not just in Korea but all over the world. The governments of many developed countries have been involved in the acquisition and supply of such standardized email security technology for some time."

For more detailed information on Kiwontech, visit https://www.kiwontech.com.

Media contact
Kiwontech: KevinKim@kiwontech.com
Born2Global Centre: jlee@born2global.com

S2W noted Log4j-related vulnerability attacks are already underway on the dark web in recently released report.


SEOUL, South Korea, Dec. 18, 2021 — Data intelligence company S2W (https://s2w.inc/) recently released an analysis report on Logs of Log4shell (CVE-2021-44228) and introduced countermeasures. Malwares that have already exploited vulnerabilities are actively distributed in the Dark Web from December 10.

Kyoung-ju Kwak, Director of CTI at S2W said, "According to our CTI group analysis, malware distribution such as cryptominer, botnet, and ransomware using Log4j-related vulnerabilities is actively taking place, and indiscriminate attacks on unpatched systems have already begun." And he also expressed concern as "The CVE-2021-44228 affects not only the Apache server, but also all servers and services using log4j regardless of the type of server."

S2W pointed out that it is necessary to understand the current usage of in-house open-source, including Log4j, to cope with overall security vulnerabilities. Thereafter, when a vulnerability related to an open source used internally is disclosed, a system capable of providing an automated notification is also needed. If simultaneous measures for the entire system are difficult due to security threats, sequential measures are required, which must precede classification of internal assets such as customer systems and externally accessible employee work sites and identification of services in use. S2W also stressed that domestic and foreign conferences and security vendors should continue to check and internalize reports and intelligence related to malware periodically.

S2W’s ‘Logs of Log4shell (CVE-2021–44228) Report’ carefully selects and introduces a variety of log4j-related vulnerability detection and tools at home and abroad, including tools to check vulnerabilities in multiple sites remotely.

S2W emphasized that more than 150 services, including Tomcat, Minecraft, Redis, Apache Struts, Apache Solr, Apache Druid, Apache Flink, Apache Dubbo, ElasticSearch, Flume, Logstash, Kafka, and Spring-Boot-starter-log4j2, are affected by CVE-2021-44228 vulnerabilities, and that special attention is needed.

S2W has been quickly sharing related information since it was recognized as a vulnerability on S2Gether, a separate information delivery channel for its customers. In addition, S2W’s CTI solution "Xarvis" is updating information related to this vulnerability collected from various channels, and related IoC (Indicator of Compromise) are also continuously posted.

Lee Dae-jin, a researcher at S2W Offensive Research, said, "Some of the stories that it is safe to use the old version (1.x) of log4j are wrong, and there was an official announcement that a similar type of vulnerability to this log4shell should be found and taken action should be taken. In addition, the log4j1.x version is a version that has ended support, and even if several vulnerabilities are found, patches will no longer appear, so we recommend updating to the latest version.

** S2W’s Report on Logs of Log4shell (CVE-2021–44228) : Logs of Log4shell (CVE-2021–44228): log4j is ubiquitous

Australia first to adopt new ecommerce security requirement to combat cybercrime, says Visa

SYDNEY, Dec. 14, 2021 — Visa, the world’s leader in digital payments, has today announced a new ecommerce security requirement to help Australian businesses combat a growing form of cybercrime and gain over 13,000 hours a year in otherwise lost time trading.[1]

As commerce rapidly moves online, more businesses are being targeted with enumeration attacks, the criminal practice where fraudsters use automation to test and guess payment credentials such as Primary Account Number (PAN), card verification value (CVV2), expiration date and post code, which can then be used in fraudulent transactions. It is the rising use of botnets – which are networks of hijacked computer devices – that are being used to carry out and scale these attacks.

In response to the size of the threat, and as part of its new Australian Security Roadmap 2021-2023 launched today, Visa has introduced a new requirement for ecommerce payment providers in Australia to ensure they invest in botnet detection capabilities to identify and prevent enumeration attacks, by October 2022.

"Australia is the first country in which we are making botnet detection capabilities a requirement, owing to the growth in attacks we’ve seen in the past 12-18 months," said Joe Cunningham, Visa’s Head of Risk for Asia Pacific.

"Botnet detection is now critical in protecting sellers from malicious cyber-attacks and we will work together with a seller’s acquiring bank or payments gateway to ensure that whichever entity is closest to their online checkout page has the right controls in place. It’s a whole-of-ecosystem effort," he said.

Controls for botnet detection include restricting the number of transactions that can be processed by the merchant from a single card per minute, scanning for anomalies in shopping cart data, blocking accounts after a certain number of login attempts and CAPTCHAs[2] , which are tasks that are designed to be easy for humans and difficult for bots.

According to new research commissioned by Visa and conducted by YouGov, while nearly half (45%) of Australian consumers find CAPTCHA-style tools annoying when they shop online, over three quarters (76%) are supportive of merchants using the technology if it means keeping their online payments secure. In fact, more than half (53%) of Australian consumers have abandoned their shopping cart due to concerns their payments were not secure.

"The way Australians choose to shop is changing, and so is the nature of fraud, which means it’s vital sellers are ready. Investing in online security capabilities is the best way for businesses to protect against attacks that could damage their brand and customer experience, or even take them offline," added Julian Potter, Visa’s Group Country Manager, Australia, New Zealand and South Pacific.

With a team of over 850 cybersecurity specialists, Visa provides 24/7, real-time fraud detection and mitigation, analysing millions of transactions everyday for known and emerging threats. Visa’s artificial Intelligence (AI) powered technology is able to spot patterns in data otherwise undetectable by humans to identify enumeration patterns and alert affected financial institutions and merchants before fraudulent transactions begin.

Visa’s new Security Roadmap highlights the steps Visa will be taking across six key areas to continue to secure digital payments in Australia, including:

  • Preventing enumeration attacks through new ecommerce requirements
  • Driving adoption of secure technologies
  • Securing digital first payment experiences, including contactless ATM access
  • Enhancing the cybersecurity posture of ecosystem participants
  • Preventing Australian consumers and businesses from becoming victims of scams
  • Ensuring ecosystem resilience through real-time artificial intelligence solutions

Visa continues to publish up to date best practices for merchants on what they can do to guard against cybercrime, as well as some guidance on what issuers of Visa credentials can do to reduce the impact of enumeration.

About Visa Inc.

Visa Inc. (NYSE: V) is the world’s leader in digital payments. Our mission is to connect the world through the most innovative, reliable and secure payment network – enabling individuals, businesses and economies to thrive. Our advanced global processing network, VisaNet, provides secure and reliable payments around the world, and is capable of handling more than 65,000 transaction messages a second. The company’s relentless focus on innovation is a catalyst for the rapid growth of digital commerce on any device for everyone, everywhere. As the world moves from analog to digital, Visa is applying our brand, products, people, network and scale to reshape the future of commerce. For more information, visit About Visavisa.com/blog and @VisaNews

[1] The number of hours online sellers in Australia could have lost based on total merchants impacted by enumeration attacks in twelve months from July 2020 to June 2021, Visa Risk Operations Centre

[2] CAPTCHA (Completely Automated Public Turing test to tell Computers and Humans Apart)

Nintex Brings Native eSignatures to Nintex Workflow Cloud and Nintex Drawloop®


Organisations in nearly every industry are accelerating their digital transformations with the end-to-end automation capabilities provided by Nintex

MELBOURNE, Australia, Dec. 2, 2021 — Nintex, the global standard for process management and automation, today announced the integration of its native eSignature capability, Nintex AssureSign, within its next generation cloud automation platform, Nintex Workflow Cloud, as well as within its industry-leading document automation app, Nintex Drawloop® DocGen for Salesforce which is available in the AppExchange.

"We are excited to present our global Nintex community of customers and partners with a complete end-to-end automation platform that includes digital forms, workflow, robotic process automation, document generation and now native eSignatures," said Nintex Chief Product Officer Neal Gottsacker. "With the power and ease of Nintex automation software, public and private sector organisations around the world are quickly optimising paper-based processes and automating repetitive tasks to maintain a strategic competitive advantage in our digital-first world."

Nintex AssureSign simplifies the process of securing signatures needed for business-critical agreements with powerful, accessible and secure digital signature capabilities. With Nintex AssureSign’s intuitive drag-and-drop interface, customers rapidly generate ready-to-sign documents, and digitally store their most commonly used signing templates for forms like NDAs, sales agreements and client contracts to expedite the completion of transactions.

Some of Nintex AssureSign’s benefits include:

  • eSign Anywhere: Close deals faster by reaching signers online, via text and across mobile devices or in-person.
  • Security and compliance standards: Execute digital transactions with confidence thanks to Nintex AssureSign’s 256-bit encryption, digital audit trails and ISO 27001 certified data centers.
  • Flexible integrations and custom APIs: Easily integrate Nintex AssureSign with existing business systems and leverage connectors for Salesforce and Microsoft Dynamics CRM.
  • Customisable experiences: Manage, configure and execute a personalised signing process to match the desired customer experience and reflect organisational branding with ease and speed.
  • Transparent pricing: Save money with flexible eSign pricing packages with no hidden fees or overage penalties.

Nintex AssureSign increases organisational efficiencies and lowers operating costs while providing a modern signing experience for every organisation’s most critical stakeholders from customers to employees.

To experience Nintex AssureSign for digital transaction management (DTM), request a demo at https://www.nintex.com/request-demo/

Media Contact 
Laetitia Smith
Nintex
laetitia.smith@nintex.com
cell: +64 21 154 7114

About Nintex
Nintex is the global standard for process management and automation. Today more than 10,000 public and private sector organisations across 90 countries turn to the Nintex Platform to accelerate progress on their digital transformation journeys by quickly and easily managing, automating and optimising business processes. Learn more by visiting www.nintex.com and experience how Nintex and its global partner network are shaping the future of Intelligent Process Automation (IPA).

Product or service names mentioned herein may be the trademarks of their respective owners.

Logo – https://techent.tv/wp-content/uploads/2021/12/nintex-brings-native-esignatures-to-nintex-workflow-cloud-and-nintex-drawloop.jpg

 

Related Links :

http://www.nintex.com

NPCore forms global partnership with Viet Cyber Security towards expansion into SE Asian IT security market

SEOUL, South Korea, Nov. 26, 2021 — NPCore, a joint venture member of Born2Global Centre, has its sights set on a greater share of the IT security market in Southeast Asia, recently joining forces with Vietnamese IT security service provider Viet Cyber Security. Together, the two companies set up NPCore Vietnam Joint Stock Company, a joint venture which will see them coordinate efforts in the IT security industry. NPCore is an AI-based new variant malware (APT) response solution provider offering optimal security solutions.

NPCore has provided cyber security solutions and since 2021, it has participated in a project for supporting overseas expansion of D.N.A (Data, Network, AI) convergence products led by Born2Global Centre.

NPCore and Viet Cyber Security set up NPCore Vietnam Joint Stock Company, a joint venture for efforts in the IT security industry.
NPCore and Viet Cyber Security set up NPCore Vietnam Joint Stock Company, a joint venture for efforts in the IT security industry.

The joint enterprise will see the two partners collaborate in technology and, more importantly, concerted sales and marketing activities in the Southeast Asian IT security market. The goal is to lay the foundation for a stable supply of IT security services in local markets to obtain market trust and continue expanding the business at an increasing pace. NPCore has confirmed that it is ready to aggressively engage Viet Cyber Security’s local networks and customers towards expanding its market presence. NPCore’s solution (Zombie Zero) can defend against any path through which malicious code can flow from the network to the endpoint.

It currently holds 12 patents as well as the International Common Criteria (CC) certification for its proprietary security technologies and has more than 100 global references.

NPCore CEO Han Seung-cheol stated, "The local joint enterprise was established in Vietnam as it is a market with active investment taking place in national security, corporate IT security, and other fields. It will be a local platform for entry into the Southeast Asian markets—Vietnam included—and will put us on the map as an IT security service provider in the region."

Furthermore, the joint venture between NPCore and Viet Cyber Security was established as part of the Born2Global Centre’s partnership program. Through its support of DNA-convergence products and services, Born2Global Centre serves as a launchpad for innovative startups to enter global markets. Born2Global Centre provides startups with different levels of consulting services, from partnership exploration & creation to business establishment, operations, joint R&D projects, and market expansion.

For more detailed information on NPCore, visit https://www.npcore.com/eng/.

Media contact
NPCore: esshim@npcore.com  
Born2Global Centre: jlee@born2global.com

ArmourZero’s Launch Revolutionize Cybersecurity Landscape with Groundbreaking Security as a Service Platform

SINGAPORE, Nov. 24, 2021 — With an increasingly digitalised world and proportionally increasing cyber threats, cybersecurity protection is becoming critical as businesses and corporations integrate digital processes into their workflow. ArmourZero provides a comprehensive one-of-a-kind Security-as-a-Service (SECaaS) solution to counter rising concerns of businesses with a one-stop Cloud IT Security Operation to plan, manage, track and orchestrate.

The cavalry behind ArmourZero. (From left) Vivian Wong, Michael Ong, Tho Kit Hoong, Bushra Iskandar, Jamrah Othman and Nadia Ishak
The cavalry behind ArmourZero. (From left) Vivian Wong, Michael Ong, Tho Kit Hoong, Bushra Iskandar, Jamrah Othman and Nadia Ishak

With a robust cloud infrastructure in place for global access, ArmourZero, built in partnership with premier security technology providers Automox, Avanan, CrowdStrike, DNS Filter and F-Secure, provides IT security protection that is seamless, easy, and cost-effective. An emphasis on Technology, People, and Processes allows the SECaaS to reinvent cybersecurity and close gaps in traditional solutions.

"Similar to human vaccination, it will be an overstatement if we claim that we offer 100% protection. To fight against continuous cyber attacks and cyber threats, relying on technology alone is not sufficient; we are connecting Technology, People, and Processes to close all the gaps and automate administrative security work for our customers without hassle in one single service platform, like nobody else done before," founder and CEO Tho Kit Hoong explained.

From flexible pricing, provisioning automation, user on/off-boarding, 24/7 round-the-clock security alerts and events monitoring, to support from certified security experts and more, ArmourZero eschews cumbersome and time-consuming methods housed entirely under just one subscription.

SECaaS : Breaking the Mould

Similar to SaaS evolution, SECaaS has grown in popularity over recent years and serves to ease the burden on in-house security teams, allow for scalability with growth, and reduce the costs of on-demand services.

ArmourZero eliminates high deployment costs of on-premise physical hardware and on-site service through its cloud setup and flexible subscription model. This model is designed to suit changing needs such as competitive pricing to outweigh high server costs as compared to computers and devices, and the deduction of unused users as credit for future add-ons or new subscriptions in various security categories. 

Organisations can save time and cost with the service’s self-provisioning automation tool, alongside swift threat response and 24/7 round-the-clock security alerts and events monitoring via a security operations center (SOC). This is all operated by highly skilled and certified security experts working with the latest and most advanced technology.

As the first mover of a multi-security services orchestration platform, ArmourZero is ready to evolve today’s cybersecurity industry with 7 services:

  • Endpoint Antivirus as-a-services
  • Endpoint Next-Gen Antivirus as-a-services
  • Endpoint Detection and Response as-a-services
  • Endpoint Detection and Response with Threat Intelligent as-a-services
  • Patch Management as-a-services
  • Email Protection as-a-services
  • Web Protection as-a-services

The range of security services can be further customised and adjusted according to business needs and requirements as part of the subscription.

ArmourZero Affiliate Program

ArmourZero also introduced a new business platform for individuals and referrals, to encourage individual partnership to ramp up cyber security measures through unique affiliate links to businesses looking, upgrade and streamline cyber protection.

About ArmourZero

ArmourZero believes IT security protection should be easy and cost-effective. Our mission is to safeguard your company and employees from cyberattacks and cyber threats by reinventing protection and closing the legacy solutions’ gap.

ArmourZero’s Security-as-a-Service (SECaaS) provides highly competent and certified professionals, supported by the latest technologies and processes, all on a subscription model. By seamlessly connecting Technologies, People and Processes, ArmourZero automates administrative security work without hassle. Find out more about the company at www.armourzero.com

Related Links :

http://www.armourzero.com

AlikeAudience Supports Unified ID 2.0, Ushering in a New Era of Identity

SUNNYVALE, Calif., Nov. 22, 2021 AlikeAudience is pleased to announce official integration with Unified ID 2.0, the trusted ID solution to deliver relevant advertising while protecting consumer privacy in environments without third-party cookies.

Unified ID 2.0

Unified ID 2.0 is a new digital identity framework that serves as a connective fabric across the open internet. Initially developed by The Trade Desk, Unified ID 2.0 has received support across the entire advertising industry, including agencies, publishers, TV networks, adtech companies and more. Unified ID 2.0 is open sourced for use by all companies aligned with the corporate governance structure. Other powerful features include:

  • Secure: Hashed and encrypted emails that cannot be converted back to email addresses
  • Trusted: All participants agree to a Code of Conduct to establish consumer trust
  • Transparent: Simple and granular consumer controls to understand data use

Learn how UID can help your campaigns through our Data Strategists.

As an early adopter of Unified ID 2.0, AlikeAudience continues to commit to our vision of a world where marketers connect with the right customers through ethical, forward-thinking data solutions. Our support of Unified ID 2.0 will further enable media traders, agency planners, and advertisers to precisely connect with audiences across all digital channels beyond cookies, while providing the consumer with greater control.

"Integrating Unified ID 2.0 allows planners and traders to leverage AlikeAudience’s demographic, Interests, and transactional audience segments at scale across digital channels, including web, mobile, and OTT," says Bosco Lam, CEO of AlikeAudience.

"We are absolutely committed to putting consumers in control of their data. By integrating with the open-sourced and privacy-conscious Unified ID 2.0, AlikeAudience continues to deliver the best future-proof solutions in audience data for agency planners and traders," comments Bosco.

Watch our CEO Bosco Lam discuss Unified ID 2.0 and its implications for the advertising industry at large at a panel organized by the IAB Tech Lab with other leading AdTech vendors.

To learn more about how Unified ID 2.0 can help companies reach their audiencesclick here.

About AlikeAudience

AlikeAudience provides high-performing, privacy compliant, and global audience segments from mobile and transaction data, available on major DSPs and marketplaces. We help global 4As and marketers achieve massive returns on their ad-spend through mobile-first segments, data onboarding, and an ever-evolving next-gen audience data solution.

Contacts

Bosco Lam (CEO)
www.AlikeAudience.com
advertise@alikeaudience.com

Yuko Shirataki (Marketing/PR)
yukoshirataki@alikeaudience.com

Related Links :

https://alikeaudience.com