Tag Archives: HTS

Dynamic Threat Landscape Urges European Organizations to Turn to Managed & Professional Security Services

Financial services will remain the largest contributor to the European MSS/PSS market until 2024, finds Frost & Sullivan

SANTA CLARA, Calif., July 30, 2021 — Increasing cyber-threats coupled with a shortage of cybersecurity professionals in Europe is compelling organizations to turn toward managed and professional security services (MSS/PSS) companies. Frost & Sullivan’s recent analysis, European Managed & Professional Security Services Market, reveals that the dynamic threat landscape requires security vendors to look for efficiencies and invest in new technologies incorporating automation such as breach and attack simulation (BAS) platforms. Despite being fragmented, the European MSS/PSS market is estimated to reach $10.92 billion by 2024 from $8.50 billion in 2021. This study includes revenue forecast by region, vertical, and enterprise size, growth drivers, key trends, and insights for chief information security officers (CISOs).

managed security
managed security

For further information on this analysis, please visit: http://frost.ly/631

"Financial services is the largest contributor to the European MSS/PSS market, accounting for 26.4% of total market revenue in 2020, and will remain the largest revenue contributor till 2024," said Piotr Kopczynski, Security Research Analyst at Frost & Sullivan. "The manufacturing sector, the second-largest contributor to the market, has witnessed a significant increase in the MSS/PSS penetration rates over the past three years as a result of increasingly high-profile attacks that halted production and negatively impacted revenues for affected organizations."

Kopczynski added: "Additionally, increasing security incidents and the continuing shortage of cybersecurity professionals will drive demand for better artificial intelligence (AI)-enabled security technologies that can improve communication between customers and MSS security operations centers (SOCs). Further, vendors that do not adapt their portfolios to incorporate automation in the SOC or fail to address competition from cloud solutions vendors baking security into their offerings will have difficulty growing."

Organizations’ move to mitigate the dynamically changing threat landscape presents lucrative growth prospects for market participants, such as:

  • Expansion into the Operational Technology (OT) Market: Managed security service provider (MSSP) vendors should expand their service portfolio through partnerships with OT security vendors that are helping secure OT networks.
  • Breach and Attack Simulation Technology: MSSPs need to invest in market education initiatives to increase awareness about BAS technology and its advantages over traditional cyber risk assessment solutions, such as human-based penetration testing, red team exercises, and vulnerability management tools.
  • Well-designed Zero-trust Environments: Security initiatives are increasingly focused on zero-trust framework environments; thus, PSS firms need to strengthen their offerings to put zero-trust experts at the forefront of every engagement.

European Managed & Professional Security Services Market is the latest addition to Frost & Sullivan’s Security research and analyses available through the Frost & Sullivan Leadership Council, which helps organizations identify a continuous flow of growth opportunities to succeed in an unpredictable future.

About Frost & Sullivan

For six decades, Frost & Sullivan has been world-renowned for its role in helping investors, corporate leaders, and governments navigate economic changes and identify disruptive technologies, Mega Trends, new business models, and companies to action, resulting in a continuous flow of growth opportunities to drive future success.  Contact us: Start the discussion

European Managed & Professional Security Services Market

MG0A-74

Contact:

Srihari Daivanayagam,
Corporate Communications
P: +91 44 6681 4412
E: srihari.daivanayagam@frost.com

http://ww2.frost.com

Related Links :

Frost New Home page v2

Decoding Taiwan’s Information Security Industry’s Dilemma

TAIPEI, July 29, 2021 — Brain Shen, Chairman of Information Service Industry Association (CISA), has recently published an article titled "Decoding Taiwan’s Information Security Industry’s Dilemma", sharing the views of the Information Security development in Taiwan. The full text is as follows:

Brain Shen, Chairman of Information Service Industry Association (CISA)
Brain Shen, Chairman of Information Service Industry Association (CISA)

In November of 2017, Taiwan held the Information Security Industry Strategy Conference, and in 2018 Taiwan’s public sectors and private enterprises visited Israel to observe their Information Security (InfoSec) industry. These two events led to the formulation of the 2018-2025 Taiwan Information Security Industry Development Plan. Many parts of this plan refer to Israel’s InfoSec industry; however, it fails to take the differing industrial strengths and public roles of Taiwan and Israel into account. The result is that now, three years later, the Taiwan InfoSec industry has only seen severely limited growth marked by the complete absence of any sizeable InfoSec businesses.

Though the Taiwan InfoSec market is limited, many small-scale businesses do exist, an indication that there is still plenty of potential for innovation in the industry. Yet even though the industry is full of opportunities to capitalize on, in scale it remains stagnant. How the authority should develop an environment in which the InfoSec industry can flourish is a question of the utmost importance. I recommend that the authority should work to build an InfoSec ecosystem by integrating resources in the industry and assisting businesses with outsourcing; after all, in order for this industry to grow, it cannot rely solely on the Taiwan market.

How, then, should an environment for the InfoSec industry be constructed? First, public policies should be developed to guide large Taiwanese companies to invest in the industry, so that these enterprises become the focal and dominant firms in the InfoSec ecosystem. The fields in which they invest should enable them to integrate different kinds of InfoSec solutions, including providing InfoSec cloud services and developing products which combine software with hardware. Only when these focal firms come together to continually invest in the industry will it further drive the development of startups, as this would provide momentum to attract talent and spur innovation. Furthermore, as there is a severe lack of InfoSec talent in Taiwan, unless large-scale ICT companies are guided to invest in the InfoSec industry, the result will be a lack of industry-academia cooperation and the industry finding it hard to resolve the dearth of talent and major companies.

Current public policy favors expanding Taiwan InfoSec market, but doing so neglects the characteristics of Taiwanese enterprises: large international groups and financial holding companies in Taiwan will not risk utilizing the security solutions of small-scale InfoSec companies (these companies might not even have products suitable for large companies), and small and medium-sized enterprises favor products from foreign InfoSec companies, thus failing to benefit local small-scale InfoSec manufacturers.

I suggest the authority prioritize the efficiency of capital output and input. In order to do so, it must: 1) use tax policy to incentivize large-scale ICT manufacturers to invest in InfoSec development; 2) use the Taiwan Development Fund to set up an InfoSec investment fund in collaboration with large-scale ICT manufacturers, with a professional investment team handling the fund to invest in Taiwan InfoSec manufacturers; 3) establish Public Information Security Policies as important fields for Taiwan security solutions to develop in; 4) reward large-scale ICT manufacturers for global acquisitions of InfoSec startups; and 5) encourage large international InfoSec companies to set up research and development centers in Taiwan. Currently, there is sufficient funding in the InfoSec market; only by utilizing big data analysis combined with researchers in the field and policies dedicated to developing an industry ecosystem can we resolve the dilemma of stagnant growth in the InfoSec industry.

Sangfor Security Researchers Invited to Present Findings at DEFCON 2021

HONG KONG, July 26, 2021Sangfor Technologies is proud to announce their presentation – Don’t Dare to Exploit – An Attack Surface Tour of SharePoint Server – at DEFCON 29 in Las Vegas on August 7, 2021, outlining several previously unknown SharePoint attack surfaces, mitigations to these attack surfaces, and how these mitigations can be bypassed. The exploits will be demonstrated during the 45-minute presentation.

The presentation, by Sangfor BlueOps members Yuhao Weng and Zhiniang Peng, with security researcher Steven Seeley, selected from thousands submitted to DEFCON, will explain the security architecture of Microsoft SharePoint’s server and how it differs from other popular Content Management System (CMS) products. From an offensive perspective, it will reveal several attack surfaces, mitigations implemented against them, and how those mitigations can be bypassed. Several high impact vulnerabilities (including CVE-2021-24072, CVE-2020-17120, and CVE-2020-17017) will be discussed detailing their discovery and exploitation.

SharePoint is the most well-known CMS used to share and manage content within organizations simplifying team collaboration. Zero-day vulnerabilities are exploited by cyber attackers to gain administrative access to networks for data theft or further infiltration and infection of the network.

DEFCON is the largest gathering of hackers from around the world, held annually in Las Vegas, Nevada, and is attended by the world’s top security professionals, journalists, researchers, students, law enforcement – and yes, hackers.

Sangfor BlueOps Team 

Sangfor BlueOps, Sangfor’s highly skilled defensive security testing or blue team, works to improve attack detection and defense strategies for all Sangfor’s security solutions. Experienced security teams are the rock-stars of the cyber security world, keeping up with a constant flow of new cyber threats and vulnerabilities. Sangfor’s BlueOps team is responsible for ensuring enterprises have the tools they need to respond effectively, identify threats quickly, and keep their software and users safe and productive.

About Sangfor Technologies

Sangfor is a leading global vendor of IT infrastructure and security solutions specializing in Cyber Security and Cloud Computing.

For more information on Sangfor’s presentation, or on Sangfor’s suite of security solutions such as NGFW & NDR, visit our website or social media pages.

Enjoy FREE use of the VMware ESXi version of Sangfor’s Next Generation Application Firewall with free Virtual Public Network and Endpoint Secure endpoint protection, the total solution for a secure network with remote workers. Apply now.

Media Contact
Sunny Sun
marketing@sangfor.com
+86 755-8656 0605

Related Links :

http://www.sangfor.com

Opsera Achieves SOC 2 Type II Compliance

Company ensures strict compliance, security and privacy for no-code DevOps orchestration platform customers

SAN FRANCISCO, July 21, 2021 — Opsera, the Continuous Orchestration platform for DevOps, announces the successful completion of the System and Organization Controls (SOC) 2 Type II Audit.

Learn how Opsera completed the SOC 2 Type II compliance audit in record time and how to ace your own audit at: http://www.opsera.io/blog/opsera-soc2-compliance.

Created by the American Institute of Certified Public Accountants (AICPA), SOC2 is a reporting framework that sets benchmarks for managing customer and user data. These benchmarks are based on five Trust Services Criteria – privacy, confidentiality, security, availability, and processing integrity. SOC 2 Type II is mandatory for any SaaS provider. Being SOC 2 Type II compliant ensures current and future customers that Opsera has the proper security, privacy and compliance controls in place to manage its no-code DevOps orchestration platform. 

Opsera passed the audit in less than 60 days and the preparation for the audit took less than 45 days, solidifying Opsera’s commitment to its customers’ data security.

"We are incredibly proud of achieving SOC 2 Type II compliance, and the record time in which we completed the audit process," said Kumar Chivukula, CTO and co-founder of Opsera. "The certification process is not easy, but it was made possible by the Opsera team’s focus and diligence in completing the audit process successfully. We can assure our customers that the Opsera platform meets some of the highest security and privacy standards in the industry."

Opsera partnered with one of the industry’s leading firms that handles penetration testing for SaaS platforms and completed the testing along with SOC 2 Type II certification. The assessment was performed using OWASP and other popular security testing methodologies to ensure that the company’s SaaS platform is evaluated as per the industry standards and best practices guidelines.

Opsera’s SOC 2 compliance ensures its customers’ data and the information of their DevOps ecosystems are protected at all times with all compliance requirements. Opsera is obsessed about the security and privacy of its customers, and has plans for other certifications and measures in the near future.

About Opsera
Opsera is the first Continuous Orchestration platform for next-gen DevOps that enables choice, automation, and intelligence across the entire software life cycle. It offers simple, self-service toolchain integrations, drag-and-drop pipelines, and unified insights. With Continuous Orchestration, development teams can use the tools they want, operations teams gain improved efficiency, and business leaders have unparalleled visibility. Opsera believes DevOps has transformed from an aspiration to a practical science, and Continuous Orchestration is the future to help organizations accelerate DevOps adoption and reach peak innovation velocity.

Contact:
Olivia Heel
Catapult PR
oheel@catapultpr-ir.com
303-521-5049

Logo – https://techent.tv/wp-content/uploads/2021/07/opsera-achieves-soc-2-type-ii-compliance.jpg

HUMAN Expands Enterprise Protection from Sophisticated Bots and Automated Attacks With Newly Named BotGuard Solution

Global Enterprises Choose HUMAN for Superior Protection of Digital Customer Experiences

SINGAPORE, July 16, 2021 — HUMAN Security, Inc. (formerly White Ops), a cybersecurity company that protects enterprises from bot attacks to keep digital experiences human, today announced its newly-named BotGuard and a range of new features to further help enterprise customers defend their website and mobile applications from sophisticated bot attacks and fraud.

BotGuard is powered by the Human Verification Engine, which combines technical evidence, machine learning, and continuous adaptation to deliver "human or not" bot detection decisions with industry-leading accuracy. The Human Verification Engine uniquely verifies the humanity of 10 trillion interactions per week while also harnessing internet scale visibility and a decade of data to deliver continuously adaptive and mutually reinforcing protection to customers, including the largest internet platforms. In its report, The Forrester New Wave™: Bot Management, Q1 2020, Forrester recognized that HUMAN "leads the pack with robust threat intelligence, attack detection and vision."

"Enterprises find it increasingly difficult to defend websites and applications from sophisticated bots that can easily evade bot detection features in conventional security solutions that rely on behavioral monitoring or static lists, leaving your site and apps open to abuse," said Mike Aiello, Chief Product Officer at HUMAN. "The features we’re launching today as part of the newly named BotGuard further enhance our solution’s best-in-class accuracy and manageability to help organizations protect their web and mobile experiences."

"We’re hyper-focused on ensuring rich digital interactions with customers regardless of how often they’re traveling. Sophisticated bad bots get in the way, wasting resources meant for engaging our customers," said Neil Haskins, Head of Group IT Security, Seera. "With HUMAN, we were able to identify the sophisticated bot traffic threatening multiple brands’ account log-in and registration experiences and get deeper insights to stay ahead of threats. We like diverting investments from bad bot traffic and the bad actors behind it to our real human customers."

"Protecting our customers from automated fraud and abuse is key to ensuring a safe and trusted digital customer experience, which is key to our core business and growth strategy," said the Chief Product Officer at a global eCommerce company.  "HUMAN was able to detect and enable the blocking of bots that were not being caught by other bot mitigation solution vendors. In addition, HUMAN’s threat intelligence experts and customer support teams offer deep insights and continuous learning, ensuring we can stay ahead of emerging threats and bad actors."

The newly named BotGuard protects web and mobile applications from malicious scraping, account takeover, account creation fraud, and in-app content and experience abuse. The BotGuard solution adds new features to further strengthen bot detection accuracy and mitigation options, new integrations with leading edge and web server solutions to speed deployment and reduce implementation efforts, and new dashboarding features to enhance visualization and enable granular policy customization.

BotGuard enhancements include:

Detection – BotGuard continues to detect bots missed by leading CDN bot management features. In one case, up to 14% of a customer’s invalid traffic was sophisticated bot activity that passed through a CDN bot management product completely undetected. Enhancements include detection innovations to protect websites from automated content scraping and simplified deployment on single page apps.

Attack response – BotGuard integrates with industry-leading platforms to defend digital businesses using their existing best-of-breed solutions. Our enhanced integrations—including NGINX, Cloudflare, Fastly, AWS Cloudfront and Google Cloud Platform—speed deployment and reduce implementation efforts. BotGuard’s powerful custom response rules engine enables any customer defined response including CAPTCHA, step-up authentication, deception and the new HUMAN challenge checkbox.

Management and Reporting – BotGuard management enhancements include SAML support for single-sign-on and multi-user granular permissions to the API. Dashboard improvements include advanced visualizations, custom alerting configuration and custom data exports to create a HUMAN to customer feedback loop by integrating with SOC, SIEM and fraud team workflows.

Threat Research – HUMAN’s Satori Threat Intelligence and Research Team continues to take down multiple large-scale attack networks, proactively identifying and reverse engineering new threats to inform our detection techniques with new indicators against emerging attacks. Recent successes include Pareto where a 1 million node CTV botnet was taken down and the 3ve Methbot case that led to the successful prosecution of the criminal gang behind the operation.

HUMAN’s BotGuard is available now.

Learn more about BotGuard for Applications here.

Learn more about BotGuard for Growth Marketing here.

Join top security executives as they discuss why protection from bots attacks are a top priority. Register now for the July 20th live discussion.

About HUMAN

HUMAN is a cybersecurity company that protects enterprises from bot attacks to keep digital experiences human. We have the most advanced Human Verification Engine that protects applications, APIs and digital media from bot attacks, preventing losses and improving the digital experience for real humans. Today we verify the humanity of more than 10 trillion interactions per week for some of the largest companies and internet platforms. Protect your digital business with HUMAN. To Know Who’s Real, visit www.humansecurity.com.

Related Links :

https://www.humansecurity.com/

Hisense Becomes the World’s 1st TV Brand Acquiring TÜV Rheinland Privacy by Design Certification Based on ETSI EN 303 645

QINGDAO, China, July 2, 2021 — TÜV Rheinland Greater China (TÜV Rheinland) granted the ETSI EN 303 645 (IoT) product cybersecurity and privacy protection standard certification to VIDAA 72671 platform smart TV of Hisense Visual Technology Co., Ltd on June 25th, 2021. Hisense became the world’s first TV brand to receive the certificate. Dr Chen Weikang, Vice President of Business Stream Industrial Services & Cybersecurity at TÜV Rheinland Greater China and Senior Engineer; Zhao Bin, General Manager of TÜV Rheinland Greater China Industrial Services & Cybersecurity; Yu Zhitao, Hisense Group Holdings Co., Ltd. Vice President and Liu Yong, Assistant Vice President of Hisense International and other members attended the Strategy Cooperation Agreement Signing Ceremony.

TÜV Rheinland Issues Privacy by Design Certificate to Hisense
TÜV Rheinland Issues Privacy by Design Certificate to Hisense

"TÜV Rheinland and Hisense have always been tacit partners in the field of cybersecurity and privacy protection. By granting TÜV Rheinland’s worlds’ first ETSI EN 303 645 certificate demonstrates both parties’ unremitting pursuit for technology breakthrough and higher quality standards," said Dr Chen.

In June 2020, The European Telecommunication Standards Institute (ETSI) with relevant product manufacturers, academia and governments, officially released the new standard ETSI EN 303 645, which regulates the cybersecurity baseline requirements for consumer IoT products such as user privacy protection, primary network attacks prevention and so on. ETSI EN 202 645 Standard provides a practical evaluation method to limit cybercriminals from controlling global devices, launching DDoS attacks, mining cryptocurrency, or peeping at users. It also reduces the risk of personal data leakage. The standard evaluates products from two aspects: cybersecurity provisions and data privacy protection provisions, focusing on technical control measures and organizational measures to combat cybersecurity defects and solve primary network attacks against cybersecurity vulnerabilities.

Hisense and TÜV Rheinland signed a strategic cooperation agreement
Hisense and TÜV Rheinland signed a strategic cooperation agreement

In this certification, TÜV Rheinland evaluated Hisense’s product performance according to the cybersecurity regulations and privacy protection requirements of ETSI EN 303 645 standards. In addition, TÜV Rheinland has carried out a comprehensive evaluation of the product utilizing a comprehensive design evaluation audit and security-related verification. The European market has always been an essential part of Hisense’s globalization strategy. As the official sponsor of EURO 2016 and EURO 2020, Hisense understands the needs of the European market and consumers and always committed to improving product privacy protection and data security in the European market through technology research and development, implementation of localization strategies and sponsoring the top sporting event. As the world’s leading TV brand, Hisense will focus on research and development investment and pay attention to data protection and finally become the most reliable brand in the world!

Media Contact:
Lori Luo (Ogilvy PR Team)
Tel: +86-135-1278-4739
Email: lori.luo@ogilvy.com / HisenseGlobal@ogilvy.com

ThroughTek Collaborated with CISA for Optimizing Cybersecurity

TAIPEI, June 25, 2021 — ThroughTek Co., Ltd.h, a solution provider of IoT cloud service platform, has been informed by U.S. Cybersecurity and Infrastructure Security Agency (CISA) of a vulnerability of old versions of P2P software development kit (SDK), which are integrated into IoT devices and may be exploited by unauthorized third parties to gain access to the server. ThroughTek has been working closely with CISA for mitigations and proactively assisting customers to update the firmware of the devices at risk with a patch fix released in late 2018 or up-to-date SDK. Additional information can be found in the CISA advisory.

ThroughTek collaborated with CISA for optimizing cybersecurity
ThroughTek collaborated with CISA for optimizing cybersecurity

ThroughTek has been committed to security from day one and continuously improved security measures to protect IoT devices integrated with our products from malicious cyberattacks. "We take the information from CISA very seriously. In fact, we encourage everyone to report vulnerabilities of our products. To react to reported security issues efficiently, we have built a Product Security Incident Response Team," says Patrick Kuo, CEO of ThroughTek. "We consider this advisory, like all the other vulnerability reports from different sources, as an opportunity to make our products better and safer."

Ensuring cybersecurity of the products and services is particularly challenging nowadays because the technologies are evolving faster and the attackers are becoming more innovative. ThroughTek will keep optimizing our product security and always welcome security advisories from CERTs, researchers, partners and any other source for a coordinated vulnerability disclosure.

Media Contact:

Yi-Ching, Chen
Tel: +886-2-26535111
E-mail: marketing.en@tutk.com

Increased and Evolving Threats Heighten the Demand for Port Security Solutions and Enhanced Safety Technology

New port developments in the APAC, Africa, and the Middle East will push security spending, reveals Frost & Sullivan

SANTA CLARA, Calif., June 21, 2021 — The shipping industry is responsible for about 90% of global trade by volume. Frost & Sullivan’s recent analysis on the global maritime port security market finds that governments are prioritizing the safe and secure transportation of goods to ensure economic stability and growth. The sector is being driven by increased threats to port operations, terminal expansions and new ports, soaring traffic, and the acceleration of digital transformation. In addition, a rise in surveillance spending with a large number of new port developments, especially in the Asia-Pacific (APAC), Africa, and the Middle East regions, and technology upgrades in large and established ports internationally are propelling the demand for maritime port security solutions. As a result, the industry is estimated to hit $9.10 billion by 2030 from $6.74 billion in 2020, a 3% upsurge in the compound annual growth rate (CAGR). Among key technologies, cybersecurity is expected to generate the highest revenue—$4.08 billion, followed by screening and detection at $1.69 billion, by 2030.

Port and maritime security
Port and maritime security

For further information on "A Dynamic Threat Landscape Propels the Global Maritime Port Security Market" analysis, please visit: http://frost.ly/5r8.

"Ports remain a major safety concern as a critical component of global supply chains and commerce. Any disruption at ports would affect the interconnected transportation, energy production, and manufacturing industries and have far-reaching economic consequences across a country or even a larger region," said Aravind Srimoolanathan, Industry Analyst, Aerospace, Defense & Security Practice, Frost & Sullivan. "As ports recover from the impact of the pandemic, vessel traffic is anticipated to recover within two to three years to cater to the global demand, thus encouraging ports to invest more in solutions for infrastructure safety and to handle congestion. Demand for additional software for screening equipment and its integration into the overall port security will intensify."

Srimoolanathan added: "Port digitalization for tracking and coordination of vessels and cargo has the dual goals of lowering operational expenditure and improving efficiency, thereby unlocking opportunities for safety upgrades. Hence, security providers must consider the best ways to optimize cargo screening and detection, surveillance, and perimeter security by deploying data analytics and artificial intelligence (AI) as they enhance existing security systems’ accuracy in identifying and thwarting threats."

Companies need to pursue groundbreaking ideas and develop novel cyber-resilient technologies to proactively counter the ever-evolving cyber threats. To achieve this, market participants should focus on:

  • Integrated systems for effective security operations: As new technologies and applications emerge, there can be uncertainty among end users. New technologies that integrate easily, with a clear and straightforward interface that requires minimal training for security employees, will appeal to the end users.
  • Managed services business model: Partnerships with governments and port operators in the nascent stages of port development projects to provide turnkey solutions and operational support services that bridge security capability gaps may prove beneficial.
  • Cybersecurity of physical security systems: Vendors should combine Physical Security Information Management (PSIM) and Security Information and Event Management (SIEM) applications so physical security staff can detect secret threats, and the cybersecurity team can comprehend risks associated with the physical security system.

A Dynamic Threat Landscape Propels the Global Maritime Port Security Market is the latest addition to Frost & Sullivan’s Aerospace & Defense research and analyses available through the Frost & Sullivan Leadership Council, which helps organizations identify a continuous flow of growth opportunities to succeed in an unpredictable future.

About Frost & Sullivan
For six decades, Frost & Sullivan has been world-renowned for its role in helping investors, corporate leaders and governments navigate economic changes and identify disruptive technologies, Mega Trends, new business models, and companies to action, resulting in a continuous flow of growth opportunities to drive future success. Contact us: Start the discussion.

A Dynamic Threat Landscape Propels the Global Maritime Port Security Market
MFF6-23

Media Contact:
Priya George,
Corporate Communications
P: +91 44 6681 4414
E: priyag@frost.com 

http://ww2.frost.com 

Related Links :

Frost New Home page v2

China Industrial Bank and 4Paradigm start AI platform acceleration mode Millisecond credit card transaction anti-fraud system is online

BEIJING, June 21, 2021 — Recently, based on the low-threshold, automated AI platform created by 4Paradigm specialized for Industrial Bank, the Industrial Bank Credit Card Center launched a millisecond-level intelligent transaction anti-fraud system, has realized the automatic, intelligent and precise identification and control of credit card fraud risks, and provided credit card users with the most secure and reliable intelligent payment experience and protection.

In recent years, under the guidance of the "Science and Technology Revitalize" strategy, Industrial Bank has continued to increase investment in science and technology, combined emerging technologies such as AI with business development, promoted the transformation of business models, and continuously adopted risk management and control, precision marketing, and investment and financial management. Explore and practice business scenarios such as compliance and internal control, and comprehensively improve the level of intelligence and service quality of the banking business.

This time, the intelligent transaction anti-fraud system completed by 4Paradigm in the cooperation with Industrial Bank mainly relies on the full life cycle capabilities of 4Paradigm "Sage" platform, which can achieve milliseconds of security for credit cards of customers in a severe fraud risk environment. Level evaluation, thereby avoiding potential fraud risks, greatly improving the accuracy and processing efficiency of credit card center risk prediction, and realizing high-performance real-time fraudulent transaction detection.

At present, based on the combination of the machine learning model of the AI platform and the risk control rule engine, the Industrial Bank Credit Card Center takes only 20ms to process a single transaction, and 99.9% of the transactions can be completed within 50ms, which is accurate under the same recall rate. The rate can be increased by more than 5 times. In addition, 4Paradigm AI platform self-learning system can automatically perform model tuning, automatically optimize the results of the production system model on a monthly basis, and continue to improve the timeliness and effectiveness of the model.

In the future, the two parties will continue to use the AI platform advantages of 4Paradigm "Prophet Sage" platform, such as low threshold, full process, automation, and low TCO, to help the Industrial Bank credit card center to complete all aspects of risk, compliance, operation, and marketing. Intelligent upgrading, the layout of AI applications covering multiple core business scenarios, improving bank customer satisfaction and accelerating the growth of operating efficiency.

Website: www.4paradigm.com 
Contacts: April Zhao
pr_co@4paradigm.com 
+86-13021289422

Blackpoint Cyber Launches Blackpoint LogIC

Simple, hyper-efficient compliance solution by Blackpoint adds to cybersecurity ecosystem

ELLICOTT CITY, Md., June 16, 2021 — Blackpoint Cyber, a leading technology-focused cybersecurity company, has announced the launch of their newest MDR add-on solution, Blackpoint LogIC (Logging with Integrated Compliance).

Blackpoint Cyber launches Blackpoint LogIC, a simple and hyper-efficient compliance solution
Blackpoint Cyber launches Blackpoint LogIC, a simple and hyper-efficient compliance solution

LogIC Development

Examining the increasing demand for cybersecurity compliance, Jon Murchison, CEO of Blackpoint Cyber, stated "We developed LogIC to offer MSPs and their partners a streamlined solution that eliminated the complexities of compliance without compromising security posture". For context, regulatory compliance is usually expensive and challenging to manage in the long-term even for larger, mature businesses. Due to the effort and cost of building compliance programs and teams, many are faced with the difficult decision to either put resources towards meeting compliance requirements or investing in real cybersecurity. Murchison explains, "The team here at Blackpoint spent over nine months developing a new and affordable compliance solution. We leveraged our existing nation state-grade 24/7 MDR technology to ensure that businesses can satisfy both needs with one powerful solution."

LogIC Highlights

Many requirements in security compliance frameworks require the collection of data, events, and logs. Blackpoint LogIC’s hyper-efficient logging architecture supports the real-time collection of Windows Event Logs, Windows File Integrity Monitoring (FIM), and applications supporting general system logging protocol (syslog). Collected data is tamperproof, resilient, encrypted (AES-256), and stored read-only in three different zones that meet SEC Rule 17a-4, PCI-DSS, HIPAA/HITECH, FedRAMP, EU GDPR, and FISMA specifications. Currently, LogIC supports CMMC, HIPAA, PCI-DSS, and CMMC (up to Level 3) security compliance frameworks. The company noted that more frameworks are planned for future iterations of LogIC to be expected throughout 2021 and 2022.

Blackpoint’s goal is to bring simplicity to the everyday management of logging and compliance. LogIC uses a simple, push-button setup to replace typical hardware, appliances, installs, and agent rollouts needed to implement compliance programs. Further, the launch features a new, intelligent web application allowing MSPs and their clients to configure log settings and generate compliance reporting to reduce the cumbersome reporting and assessment efforts usually involved with regulatory compliance. Based on the products and services partners have with Blackpoint, LogIC’s auto-answer capability automatically maps against hundreds of compliance requirements all at once. Finally, partners signing up for LogIC will receive 365 days of complimentary data log retention with options to request more storage by GB as needed.

Interested in streamlining your compliance and cybersecurity? Visit the Blackpoint LogIC website or sign up to see a demo of the solution here.

About Blackpoint

Blackpoint Cyber offers the only world-class, nation state-grade cybersecurity ecosystem serving the MSP community. Using its own software and SOC, Blackpoint’s True 24/7 Managed Detection and Response (MDR) service not only detects breaches earlier than any other solution on the market, but also provides an actual response rather than just an alert to keep your and your clients’ networks safe from widespread damage.

For more information, please contact:
Nicole LaDue
240.538.7598
info@blackpointcyber.com   
https://blackpointcyber.com/ 

Photo – https://techent.tv/wp-content/uploads/2021/06/blackpoint-cyber-launches-blackpoint-logic.jpg
 

Related Links :

Home