Tag Archives: HTS

ANNKE Introduces New NightChroma™ NC800 PoE IP Camera Featuring Breakthrough 4K Ultra HD Color Night Vision, f/1.0 Super Aperture, and AI Processing Power

HONG KONG, June 8, 2021 — ANNKE, created for security, today launched NightChromaTM NC800, the world’s most powerful & advanced IP camera ever, pushing the limits of what’s possible in video surveillance. The ANNKE-designed 1/1.2” sensor, f/1.0 super aperture, and other high-end technologies deliver a massive leap in night vision clarity – the incredible and futuristic 4K Ultra HD acme full color night vision.

Learn more about the breathtaking innovation in 2021 here:
https://www.annke.com/products/nc800

"We understand how important the night vision surveillance is for our customers. In the past, security cameras only provide black & white or starlight color night vision, which cannot tell the exact details", said Jerry, ANNKE product manager, "Today, the old B&W night vision has been ended with the revolutionary NC800 that offers a colorful visual experience with more true-to-life details even in 0 illumination darkness – there is nothing else like NC800 in the market."

ANNKE NightChroma NC800 4K PoE IP Camera
ANNKE NightChroma NC800 4K PoE IP Camera

f/1.0 Super Aperture & 1/1.2” 4K Sensor Come to NC800

Only f/1.0 super aperture, not f/1.2 or f/2.0, provides the acme color night vision. NC800 PoE camera, equipped with the breakthrough f/1.0 aperture, collects 4X amount of lighting to produce brighter images in darkness, taking the industry-leading video surveillance performance to an entirely new level. 1/1.2” image sensor, the largest sensor adopted in the video surveillance field, demonstrates an extraordinary photovoltaic conversion efficiency, increasing 2X amount of light sensing areas for clearer 4K footages (3840 X 2160 pixels) at smooth 20 fps. The high-performance image signal processor (ISP) renders high-fidelity colors and ensures the clearest streaming even in extremely hot or cold climates. 4X lighting amount & 2X light sensing areas, plus top-level ISP, all enable the camera to capture the most stunning & clearest 4K color night vision in 0 illumination darkness, a completely new upgrade from IR B&W or starlight night vision.

The lens of NC800 IP camera features the latest broad-band anti-reflection coating and extra-low dispersion optical glass, to remove the light flare and enhance the image’s sharpness & color saturation.

ANNKE-Only 130 dB True WDR & 3D DNR

130 dB true WDR, 10X efficiency than 120 dB true WDR, and a revolutionary upgrade on digital WDR, balances every lighting area of a picture to ensure crystal images without overexposed or underexposed issues. True WDR adopts the image sensor and a digital signal processor (DSP) to provide even lighting in all areas in every frame, while digital WDR only uses algorithms to digitally brighten too-dark or dim too-bright areas. ANNKE-designed 3D DNR removes the grainy fuzzy appearances of low-light images and is able to handle moving objects without leaving even a single detail behind, much sharper than security cameras with 2D DNR or without noise reduction technology. ANNKE NightChromaTM NC800, with the unrivaled 130 dB true WDR and 3D DNR, shoots the unparalleled 4K Ultra HD videos even in 0.0005 illumination without supplement light or ambient light.

130 ft Soft Warm Supplement Light Comes to NC800

Simply adding a supplement light to a security camera cannot be called color night vision. NC800 PoE IP camera’s built-in supplement light is extremely soft without glare & no reflection, and turns on automatically in a 0-illumination night to ensure thrilling 4K color night vision. Other security cameras with so-called supplement lights only produce blurry color night vision images that are often overexposed or underexposed, which cannot tell the details at night.

Unique Active Alignment Technology

Acme color night vision can only be realized with top-level R&D abilities, top-notch materials, and top-grade manufacturing techniques. ANNKE’s unique micro-size active alignment technology provides the most accurate focusing and brings the adjustment accuracy to within 4 pixels, smaller than 1/30 hair diameter. The whole alignment project is conducted by the world’s most advanced and high-end machines instead of manual adjustment, ensuring the most accurate focusing for sharper & clearer videos.

The AI Magic Makes a Big Difference in Motion Detection

The superior AI algorithm enables the camera to sense humans and vehicles only, reducing up to 95% of false alarms triggered by animals or random inanimate objects, like raindrops, or changing lighting. AI human and vehicle detection is currently the most advanced and accurate motion detection way in video surveillance. Unlike PIR that detects the object’s temperature or the frame comparison detection that senses the difference between the previous & the current frames, which would lead to a great number of false or unwanted alarms, ANNKE AI human & vehicle detection, adjusted and tested by hundreds of engineers, sends customers instant app pushes and email alerts with snapshots only when a human or vehicle enters the detecting areas. Consumers will be alerted only when it matters without being bothered by any irrelevant alert when they are working, shopping sleeping, or traveling.

The smartest behavior analysis is able to analyze an object’s behaviors for accurate motion alerts too. Users can set up the motion-triggered behaviors, including line crossing, intrusion, region entrance and exit, to detect an object’s behavior and receive real-time alerts when an object crosses the preset virtual line or region, or enters/exits the virtual zones.

Additional Outstanding Features of NightChromaTM NC800

  • The built-in microphone offers the incredible sound quality and delivers the ultimate personal listening experience. The high-fidelity audio with the active noise cancellation enables users to hear the visitors’ voice and the ambient voice from up to 20 ft away.
  • The latest H.265+ video format records longer videos & consumes less bandwidth without losing true 4K Ultra HD quality. Quadruple H.265+/H.265/H.264+/H.264 coding allows for maximum encryptions and flexible compatibility with all new & legacy platforms.
  • NC800, with IP67 weatherproof rating and heavy-duty all-metal housing, can be installed outdoors or indoors. The rugged housing is resistant to vandal impacts and corrosion, ensuring years of operation without fading. The 2.8 mm ultra-wide lens delivers 124° FoV, ideal to cover large areas, such as foyers, warehouses, front or back doors & yards, parking lots, etc.
  • With the built-in microSD card slot, customers are able to record the videos locally by inserting an up to 256 GB microSD card without paying monthly cloud storage fees.
  • The ONVIF & RTSP protocols are designed to integrate with all ONVIF 4K NVRs and third-party software, such as Blue Iris, Synology, Milestone, etc. no walls and no limits between NC800 and popular hardware & software.

One smart security solution for every security need – that’s NC800, a 100% compatible, flexible & powerful camera tailored for every customer.

"It’s time for our ANNKE family to upgrade to color night vision security cameras from B&W – just what we did from B&W TVs to color TVs," said Jet, ANNKE’s CEO.

Pricing and Availability

The new ANNKE NC800 4K Ultra HD IP camera is available to order on annke.com globally and is now only at $279.99 after 20% off. Customers can enjoy free shipping for most countries worldwide and free 2-year warranty & lifetime tech support.

About ANNKE

ANNKE, created for security, aims to provide the finest and best smart security cameras and systems for home and business owners worldwide. ANNKE’s deep expertise in product design, smart home connectivity, cutting-edge capabilities and world-leading NightChromaTM color night vision tech enables it to deliver the most seamless security solutions for users. ANNKE is always striving to develop innovative technology to provide customers with the easiest and the most straightforward security products.

For more details about ANNKE and its products, please visit: https://www.annke.com.

Media Contact
Alice Wei/PR Manager
Email: pr@annke.com

 

Related Links :

https://www.annke.com/

QueryPie, the data governance platform, becomes Okta Integration Network partner in Korea

SEOUL, South Korea, June 4, 2021 — QueryPie, the data governance platform, now has verified integration with Okta and is available through the Okta Integration Network (OIN), for the first time in Korea. By enabling technical partnerships in addition to its affiliation with Okta’s OIN Network, QueryPie intends to highlight more successful customer use cases in the future. QueryPie is a member of Born2Global Centre.

QueryPie and Okta CI
QueryPie and Okta CI

"As Okta increases momentum with its partner network across Asia, we are thrilled to partner with QueryPie and extend our reach locally. Together with QueryPie as part of Okta Integration Network, businesses will be able to seamlessly tap into Okta’s tools for simplifying the digital workflow," said Matthew Paull, Okta’s Director of Regional Alliances for Asia Pacific.

The Okta Integration Network is a part of Okta’s partner ecosystem, enabling secure access to third-party services with SaaS applications integrations. QueryPie supports SAML-based authentication through Okta’s partner ecosystem. Okta’s account management service makes it simple for organizations to access QueryPie’s services.

Developed by a team of database experts at CHEQUER, QueryPie is an advanced data governance solution that makes it simple to manage scattered data sources and security policies in a single place. QueryPie provides data governance within the organization by delivering user-specific data access management and auditing through a web-based solution. In response to the increasing regulations and compliance on data, companies such as Kakao and Yanolja adopted QueryPie to enhance security policy and comply with laws such as PCI-DSS.

"We’re thrilled to become a part of the Okta Integration Network," said Brant Hwang, CEO of CHEQUER. "Today, a lot of data teams struggle to manage data since data sources are scattered everywhere, which makes it hard to follow up on who owns and uses them, where data goes, and how they’re being used. We offer streamlined access control and privacy solutions that seamlessly integrate with existing data environments, including Okta’s identity provider system. We are currently working to leverage this opportunity to broaden QueryPie’s user base in Korea to include both startups and enterprises and produce tangible results for both platforms by connecting Okta to clients interested in simplifying their digital transformation workflow – Identity provider service or data governance."

Okta is the leading independent identity provider. The Okta Identity Cloud enables organizations to securely connect the right people to the right technologies at the right time. With more than 7,000 pre-built integrations to applications and infrastructure providers, Okta provides simple and secure access to people and organizations everywhere, giving them the confidence to reach their full potential.

For more detailed information on QueryPie, visit https://www.querypie.com.

About QueryPie

QueryPie (www.querypie.com) is a centralized platform to manage scattered data sources and security policies all in one place. With the all-in-one solution, data teams can now simplify data privacy regulations while streamlining access management and increasing security. QueryPie enables organizations to prepare for compliance frameworks such as GDPR, CCPA, and HIPAA by enforcing policies from one place.

About Okta

Okta (www.okta.com) is the leading independent provider of identity for the enterprise. The Okta Identity Cloud enables organizations to securely connect the right people to the right technologies at the right time. With over 7,000 pre-built integrations to applications and infrastructure providers, Okta customers can easily and securely use the best technologies for their business. More than 10,650 organizations, including JetBlue, Nordstrom, Slack, T-Mobile, Takeda, Teach for America and Twilio, trust Okta to help protect the identities of their workforces and customers.

About Born2Global Centre

Born2Global Centre (www.born2global.com) is a full-cycle service platform for global expansion. Since its inception in 2013, Born2Global has been setting the standard for a successful startup ecosystem as the main Korean government agency under the Ministry of Science and ICT. Born2Global has expanded and transformed startups to be engaged, equipped and connected with the global market.

Media Contact

CHEQUER
Celine Lee, Marketing Manager
celine@chequer.io

Okta Asia Pacific
Jennifer Alejandro, Director of APJ Communications & Content
jennifer.alejandro@okta.com

Born2Global Centre
Jina Lee, PR Manager
jlee@born2global.com

Contrast Security’s State of Application Security in Financial Services Report Finds 75% of Application Security Budgets Are Rising in 2021 Due to Frequent Application Attacks

98% of financial services respondents admit they have experienced at least three successful application exploits in the last 12 months that have caused an operational disruption and/or a data breach leading to the increase in application security budgets

LOS ALTOS, Calif., May 27, 2021 — Contrast Security, a leader in modernizing application security, today announced the findings of its 2021 State of Application Security in Financial Services Report based on a comprehensive survey of development, operations, and security professionals and executives at enterprise-level financial services institutions. The report explores the state of application security at these organizations, and the findings indicate that the security of these applications — that have access and control over consumers’ finances — is not a priority or major concern for most of them. 

With most attacks on financial services institutions executed at the application layer at a time when customers demand more digital services and customer-facing applications are developed in-house, application security is mission-critical. Methodologies like Agile and DevOps — and a growing use of open-source code and application programming interfaces (APIs) — have accelerated the development process, enabling financial institutions to speed up digital transformation initiatives that had been planned for months or years in the future. However, the financial services industry, including banking, insurance, and investment firms, has long been a target of cyber criminals, and this has only accelerated due to the COVID-19 pandemic. 

When multiple serious vulnerabilities are present in an application, cyber criminals have many opportunities to mount a successful attack. Almost all respondents (98%) admit that they have experienced at least three successful application exploits in the past year that have caused an operational disruption and/or a data breach. Astoundingly, more than half of organizations (52%) saw 10 or more successful attacks over 12 months. As a result, 99% of respondents in organizations with more than 15,000 employees peg the cost of each attack at $1 million or above. 

The high rate of false positives combined with the lack of actionable information in scan reports creates a major time sink for both development and security teams. More than eight in 10 respondents (81%) say that their application security teams spend three or more hours per false positive to identify it as such. So, when a legitimate vulnerability is identified, 72% of respondents said their organization’s application security team spends six or more hours to triage, diagnose, and prioritize remediation for the development team. The baton then is passed to developers, who spend 10 or more hours per vulnerability to perform remediation and verification, according to 69% of respondents. With a scan report potentially containing hundreds of alerts, with a majority being false positives, these staff hours add up quickly for both the development and the security teams.

Given application security is an increasing concern for enterprises, 75% of respondents report that their application security budget is increasing in 2021, and 24% say that increase is more than 15%. Despite this emphasis on application security, only 40% of organizations place direct responsibility for application security under the CISO. So, while budgets are increasing at many organizations, some may not have a solid strategy in place to use those funds wisely. A crucial starting point will be to ensure security keeps up with the pace of development. 

"It is clear that application security strategies have not matured at most of the financial services organizations represented in this survey," said Jeff Williams, CTO and co-founder at Contrast Security. "The good news for institutions looking to build out their strategy is that implementing a modern application security platform can dramatically accelerate their program and produce real improvement quickly. Instrumentation-powered application security can provide continuous security testing at massive scale, providing highly accurate feedback to developers in real time, empowering them to find and fix their own vulnerabilities without direct help from application security specialists."

The Contrast Application Security Platform uses instrumentation to observe, analyze, and protect software from within the application. In doing so, Contrast makes security continuous and integrates seamlessly with modern software — from development into production. In addition, this approach offers an unprecedented application security orchestration layer for financial services institutions to improve enterprisewide risk reporting and policy enforcement. Contrast Security has worked with financial services institutions of all types around the world. Customers include leading global Fortune 500 and financial industry regulatory enterprises. 

REPORT: 2021 State of Application Security in Financial Services

BLOG POST: Contrast Study Finds Significant Application Security Risk at Financial Services Enterprises 

PODCAST: Digital Transformation in Financial Services Accelerates, Application Security Struggles to Keep Up 

WEBINAR: New Report Highlights Digital Acceleration in Financial Services Is Creating Application Cyber Risks 

Methodology:
This report is based on a comprehensive survey of business leaders, developers, and security professionals at financial services enterprises in North America. Conducted in April and May 2021, the survey sought to gauge the maturity of both the software development operations and application security programs, how organizations are using application security tools, and what outcomes they are seeing. The results of each question were analyzed for the whole cohort, and many answers were also grouped by background data like job title, company size, and application security methodology. From this analysis, we identified several insights about application development and security specific to the financial services vertical.

About Contrast Security:
Contrast Security is the leader in modernizing application security, embedding code analysis and attack prevention directly into software. Contrast’s patented deep security instrumentation completely disrupts traditional application security approaches with integrated, comprehensive security observability that delivers highly accurate assessment and continuous protection of an entire application portfolio. This eliminates the need for disruptive scanning, expensive infrastructure workloads, and specialized security experts. The Contrast Application Security Platform accelerates development cycles, improves efficiencies and cost, and enables rapid scale while protecting applications from known and unknown threats.

Contact:
Contrast Security
Jacklyn Kellick
jacklyn.kellick@contrastsecurity.com

Related Images
2021-state-of-application-security.jpg
2021 State of Application Security in Financial Services Report

Airports to be Fastest-growing Critical Infrastructure Sector to Invest in Cybersecurity by 2030

The global critical infrastructure cybersecurity market is estimated to reach $24.22 billion by 2030, finds Frost & Sullivan

SANTA CLARA, Calif., May 24, 2021 — Frost & Sullivan’s recent analysis finds that while corporate and consumer businesses remain popular marks for cyberattacks, critical infrastructure facilities have become increasingly viable threat targets. They are highly vulnerable to major operational disruptions and cyber incidents that can lead to real-world peril. Despite the ever-increasing threat landscape and their incredibly high-risk profile, critical infrastructure organizations remain far behind where they should be in their cyber maturity and digital resilience strategies, necessitating a rapid push to fortify cyber defenses and manage their cyber-risk profiles. The global critical infrastructure cybersecurity market—which is segmented into oil and gas facilities, utilities (electric and water), maritime (ports and entry points), and airports—is estimated to reach $24.22 billion by 2030 from $21.68 billion in 2020. The study includes growth drivers, customer priorities, and spending forecasts across verticals and regions.

cybersecurity
cybersecurity

For further information on this analysis, Digitalization and Real-time Visibility Transforming the Global Critical Infrastructure Cybersecurity Market, please visit: http://frost.ly/5qb

"While oil and gas facilities will continue to remain the largest segment investing in cybersecurity solutions, airports will prove to be the fastest-growing one, with a CAGR of 10.1%. Spending is expected to reach $1.87 billion by 2030," said Danielle VanZandt, Industry Analyst for Security at Frost & Sullivan. "This is driven by the ongoing construction of new facilities, significant digitalization upgrades within existing airports, and the incremental updates being made to cybersecurity systems to keep up with the changing cyber-threat landscape and improve detection capabilities. "

VanZandt added: "Africa is expected to be the fastest-growing region, followed closely by Asia-Pacific. Much of the investment in both regions is from new facilities being built, renovated, or expanded that require new cybersecurity systems installed, as well as changing consumer awareness of their cybersecurity risks. The Middle East will remain the largest market and will continue to fortify its cyber defenses and protect against prevalent cyber-threats."

Market participants should focus on the following to tap into lucrative growth prospects:

  • Data traffic monitoring for operational technology systems: Vendors must ensure that their monitoring solutions can detect the actions of active and passive assets and all data traffic types, then decide how best to analyze the data.
  • Network topology solutions for vulnerability and risk assessment: Market participants seeking to provide network topology capabilities need to ensure that they can identify and discover the variety of information technology (IT), Internet of Things (IoT), and operational technology (OT) devices within an organization’s network architecture to begin building the topological model.
  • Continuous discovery for organizational assets: For security vendors, emphasizing continuous monitoring and automatic discovery tasks will help attract new customers and improve their market share.
  • Predictive analytics and threat intelligence for incident detection: Cybersecurity solutions providers must emphasize automatic and predictive capabilities in their system tests and proofs of concept with customers to show how these systems will not overwhelm their existing security functions.
  • Secure-by-design initiatives for operational technology assets and systems: Security operators that want to update older OT assets and devices should look at any components that are not engineered via secure-by-design manufacturing.

Digitalization and Real-time Visibility Transforming the Global Critical Infrastructure Cybersecurity Market is the latest addition to Frost & Sullivan’s Security research and analyses available through the Frost & Sullivan Leadership Council, which helps organizations identify a continuous flow of growth opportunities to succeed in an unpredictable future.

About Frost & Sullivan

For six decades, Frost & Sullivan has been world-renowned for its role in helping investors, corporate leaders and governments navigate economic changes and identify disruptive technologies, Mega Trends, new business models, and companies to action, resulting in a continuous flow of growth opportunities to drive future success. Contact us: Start the discussion

Digitalization and Real-time Visibility Transforming the Global Critical Infrastructure Cybersecurity Market

MF2D-23

Contact:

Srihari Daivanayagam,
Corporate Communications
P: +91 44 6681 4412
E: srihari.daivanayagam@frost.com

http://ww2.frost.com

Related Links :

Frost New Home page v2

CyberPurify makes the world’s first online content filtering in realtime

SAN JOSE, Calif., May 22, 2021 — CyberPurify, a startup specializing in using Machine Learning to identify harmful content, has just launched a free solution called CyberPurify Kids to help parents around the globe create a safe online environment for their kids in just a few clicks.

Binh Nguyen_CyberPurify
Binh Nguyen_CyberPurify

Demands for such content filtering for kids continue to rise as with the growth of 5G, smartphones and social networks, there are 4.66 billion Internet users in the world, on average, each person generates 1.7 GB of data per day, equivalent to 2,000 photos or 150 videos, and it will continue to increase in the future, leading to massive content needs to be moderated before it reaches large children.

Among them, harmful content is so pervasive that 11 is the average age that kids have come across pornography, some are as young as 7 or 8. More than 60% of 11 to 13-year-olds are unintentionally exposed to pornography online, most of which describe the feeling as "awful" and "confused", causing the most negative feelings, especially for children under 10.*

The period under 10 is when children interact and explore with the outside world, so they are easy to imitate and be influenced by negative factors. Harmful content such as accident images, gore, animal abuse, violence, and especially pornography can make children uncomfortable, confused, and obsessive in the future.

In terms of pornography alone, they are not only in the form of websites but also images/videos/advertisements appearing on online gaming sites, social networks, forums, group chats, etc.

That’s why CyberPurify comes into play. The product runs a deep learning model on the browser to identify and blur 15 types of harmful content, including pornographic, horrifying, drugs and alcohol, hate speech content.

Parents shouldn’t and don’t need to over-monitor what kids do online

"Invading children’s privacy by monitoring what they do, what they see will negatively affect their personalities and family relationship. In the past, parents faced a dilemma of letting their kids be harmed by cyber dangers, or seriously invading their private spaces with traditional nanny software," said Binh Nguyen, founder & CEO, also a dad with two children.

"We focus on building an AI model that enhances the identification and classification of harmful content, redefining the concept of child safety by using AI in real-time recognition even when the content is not displayed. It is as if you have given your child a loyal guardian who does not judge or scrutinize the private life, it will be a true companion to each child in the journey of discovering the Internet," he added.

Using the product is simple. Parents just install CyberPurify Kids in the store containing the browser extension/add-on. Every time their child accesses the Internet, CyberPurify will automatically analyze the displayed content, blur it if it is harmful, or send a report to parents when detecting that a child learns about drugs or substances. When the child tries to remove this filter, the parents will also be notified.

CyberPurify is like a child

"The special thing about CyberPurify Kids is that it is like a child, constantly learning more harmful content it discovers every day to become smarter, preventing content in the future. This is the world’s first product running on a browser that can recognize almost all kinds of harmful content that exist on the Internet," Mr. Binh added.

Along with running CyberPurify, Mr. Binh was the founder and CEO of Applancer TopDev invested by SaraminHR, a company listed on KOSDAQ in Korea.

"At the beginning of 2021, I left Applancer TopDev to focus all my time on developing CyberPurify Kids because the right time has come, most browsers support running AI and this is the perfect time for us to bring a strong identity on the server to the browser, serve more people," Mr. Binh said.

Mr. Binh is also widely known as a pioneer in the application of AI to identify pornography called KillPorn, which has been widely used in net rooms and homes since 2007. After achieving an award from the "Vietnamese Talent Award", he gave a license as a gift to VNPT so VNPT can provide the service to the Internet subscribers of this network operator under the name MegaKillPorn.

In the past, CyberPurify provided B2B services to digital content providers/ platforms as a human replacement tool for automatic content censorship for user-generated content. It is currently processing over 10 million images and video content per day, equivalent to 20,000 workers.

According to the representative, besides 15 types of content (pornography, horrifying, drugs/alcohol and hate speech), CyberPurify Kids also prevents malware, scamming sites and viruses.

CyberPurify is one of 5 winning startups at AI Accelerator Challenge 2021 (AAC 2021) powered by the Vietnam Ministry of Science & Technology and Australian’s Government.

CyberPurify Kids is provided for free to schools, labs, internet cafes or places with public computers. It is available as an extension/ add-on on browsers such as Google Chrome, Microsoft Edge, Firefox and Safari. Advanced features include sending statistical reports to parents for $9/ month, and $99/ year.

(*) BBFC, n.d. New research commissioned by the BBFC into the impact of pornography on children demonstrates significant support for age-verification [pdf]. Available at <https://darkroom.bbfc.co.uk/original/afbb24f1c54ba176b01a6eeba58b5b8c:4fcba53db7eeba09f2973e6e88289601/bbfc-research-into-children-and-pornography-2019.pdf>

Contrast Security Joins Cloud Native Computing Foundation and Linux Foundation to Drive Security Best Practices Around Cloud Native Architectures and Open Source Software

Contrast furthers commitment to empower organizations to rapidly build and run scalable applications in modern, dynamic environments with security integrity

LOS ALTOS, Calif., May 19, 2021 — Contrast Security, a leader in modernizing application security, today announced that it has joined the Cloud Native Computing Foundation (CNCF) and Linux Foundation as a silver member, which brings together the world’s top developers, end-users, and vendors to enable cloud native architectures and open source technologies. CNCF serves as the vendor-neutral home for many of the fastest-growing open source projects, including Kubernetes, Prometheus, and Envoy. In becoming a member, Contrast aims to support and educate the industry on the increasing risks and benefits of cloud native architectures and open source software through active participation in the foundation’s events, projects, and community. 

Adoption of third-party open source software (OSS) has increased significantly over the past several years. OSS refers to application components (e.g., frameworks and libraries) within the public domain that developers can use, modify, and share to help augment proprietary code developed in-house and to accelerate time to market. As a result, OSS has gained wide adoption and is used by the vast number of enterprises — embraced by major corporations, including Walmart, JPMorgan Chase, and even Microsoft. At the same time, Contrast continues to empower organizations to leverage OSS safely without the risks they bring: vulnerabilities inherited to enterprises’ software, targeted attacks against open source code, and intellectual property licensing risks. 

Cloud native applications also offer various benefits to organizations over traditional applications running in the cloud. The value of cloud native approaches typically falls into two different areas: greater business agility and faster development cycles. As organizations seek to tap the advantages of cloud native, the adoption of cloud native components is rapidly growing. Forrester, for example, predicts that just a year from now, 30% of developers will regularly use cloud containers and 25% will use serverless computing. These numbers will likely only increase as the marketplace continues to rapidly evolve and enterprises frequently need to make high-impact changes to applications on a very short timeline. However, in order to realize the full benefits of cloud native applications, organizations must ensure they have the right security technology and processes in place.

"We are proud to announce that Contrast has joined as a member of the CNCF and Linux Foundation to help drive industry change," said Surag Patel, Chief Strategy Officer at Contrast Security. "Many of the core foundations of this community to accelerate digital transformation, such as APIs, Kubernetes, serverless functions, Cloud Native architecture, and open source code, bring along with them exponentially increasing risk. Contrast was founded to enable enterprises to leverage all of these modern approaches while eliminating the risk they bring without slowing down digital transformation. We will bring a unique understanding of the market along with a differentiated capability around security observability that we believe will benefit the community." 

Contrast’s CNCF membership follows the recent publication of its 2021 State of Open-source Security Report that revealed that 38% of third-party libraries found in applications are active and only 31% of classes in active libraries are invoked. Traditional software composition analysis (SCA) approaches attempt to analyze all of the open source code contained in applications — which translates into a huge time and resource expenditure chasing vulnerabilities that pose no risk at all. Yet, for third-party code that is invoked, risk is inherent: The average age of a library is 2.6 years old, and applications contain an average of 34 CVEs. 

The report also discovered that many applications contain high-risk licensing issues that may require the applications in question to be released as open source (e.g., 35% contain at least one copyleft license). CNCF members will benefit from these and other types of data insights that are possible as a result of the inside-out application security approach of the Contrast Application Security Platform.

"It is a pleasure to welcome Contrast as a CNCF member," said Priyanka Sharma, General Manager at CNCF. "Cloud native patterns require integrated security practices and a paradigm shift to protect applications closer to dynamic workloads from the traditional perimeter-based security approach. We look forward to Contrast’s contributions and run-time security expertise to help shape the future of cloud native security and secure open source software."

Contrast already supports a variety of CNCF projects including Buildpacks with automated configuration of Contrast’s security instrumentation technology into every workload image. Every workload is paired with application security insights, instilling security confidence at scale in highly distributed environments. As a CNCF member, Contrast will continue to collaborate with peers on best practices, work directly with project maintainers, and provide feedback to CNCF.  

About Contrast Security:

Contrast Security is the leader in modernizing application security, embedding code analysis and attack prevention directly into software. Contrast’s patented deep security instrumentation completely disrupts traditional application security approaches with integrated, comprehensive security observability that delivers highly accurate assessment and continuous protection of an entire application portfolio. This eliminates the need for disruptive scanning, expensive infrastructure workloads, and specialized security experts. The Contrast Application Security Platform accelerates development cycles, improves efficiencies and cost, and enables rapid scale while protecting applications from known and unknown threats.

Contact:
Contrast Security
Jacklyn Kellick
jacklyn.kellick@contrastsecurity.com

TXOne Networks Named Winner of the Coveted Global InfoSec Awards during RSA Conference 2021

TXOne Networks wins categories “Most Innovative in Critical Infrastructure Protection” and “Editor’s Choice in ICS/SCADA Security” in 9th Annual Global InfoSec Awards at #RSAC 2021

SAN FRANCISCO and TAIPEI, May 18, 2021 — TXOne Networks, a leading provider in OT Security solutions, is proud to announce that they have won the following awards from Cyber Defense Magazine (CDM), the industry’s leading electronic information security magazine:

  • Most Innovative in Critical Infrastructure Protection
  • Editor’s Choice in ICS/SCADA Security

"TXOne Networks is thrilled to receive one of the most prestigious and coveted cybersecurity awards in the world from Cyber Defense Magazine. We knew the competition would be tough and overseen by top judges who are leading infosec experts from around the globe – we couldn’t be more pleased," said Dr. Terence Liu, CEO of TXOne Networks.

– Cross reference: Picture is available at AP Images (http://www.apimages.com) –

ICS cybersecurity is all about "protecting little things from big problems." Deploying inherently insecure Operational Technology (OT) devices and onboarding proper security solutions are a constant source of potential risk to asset owners. Common IT cybersecurity practices like clearly defined ownership, regular updates, and patches are often extremely challenging in the modern industrial environment. TXOne Networks streamlines and resolves these issues by deploying a first-of-its-kind technology, which has now been acknowledged by the professional judges of the Global InfoSec Awards 2021.

"TXOne Networks embodies three major features we judges look for to become winners: understanding tomorrow’s threats, today, providing a cost-effective solution, and innovating in unexpected ways that can help stop the next breach," said Gary S. Miliefsky, Publisher of Cyber Defense Magazine.

TXOne Networks is thrilled to be a member on this coveted group of winners, located here: http://www.cyberdefenseawards.com.

Please find more information at: https://www.gcpr.de/presse-meldungen/txone-networks-winner-of-the-global-infosec-awards-2021.

Press Contact
GlobalCom PR-Network GmbH
Martin Uffmann / Caroline Hannig-Sachon
martin@gcpr.net / caroline@gcpr.net 
Tel.: +49 (0)89 360 363-41 / -42

RevBits® Named Winner of the Coveted Global InfoSec Awards during RSA Conference 2021

Cybersecurity Solutions provider RevBits Wins Multiple Awards in the 9th Annual Global InfoSec Awards at #RSAC 2021

MINEOLA, N.Y., May 17, 2021 — RevBits is proud to announce that it was the winner of the following award(s) from Cyber Defense Magazine (CDM), the industry’s leading electronic information security magazine:

RevBits recognized for innovation across three of its cybersecurity solution products by Cyber Defense Magazine.
RevBits recognized for innovation across three of its cybersecurity solution products by Cyber Defense Magazine.

 

  • Most Innovative in Email Security
  • Most Innovative in Endpoint Detection and Response (EDR)
  • Editor’s Choice in Endpoint Security
  • Best Product in Privileged Access Management (PAM)

"It is extremely gratifying to see that in a very competitive environment, we are recognized for the innovation we bring," said David Schiffer, CEO. "Nearly every product we offer has won an award in its category, thanks to the great talent of our co-founder and CTO Mucteba Celik. With over two decades of experience in cybersecurity and having registered multiple US patents, he is the architect of everything we create. With the continuous rise of cybersecurity incidents, we will continue our efforts to bring even more innovations and therefore increasingly effective cybersecurity software to better protect our customers."

"We’re thrilled to receive this prestigious and coveted cybersecurity award from Cyber Defense Magazine.  We knew the competition would be tough, and with top judges who are leading infosec experts from around the globe, we couldn’t be more pleased," said CTO Mucteba Celik of RevBits. "We’re honored to be included, as a winner, among such top cybersecurity companies."

About RevBits
Established in 2018, RevBits is a comprehensive cybersecurity company dedicated to providing its customers with superior protection and service. By offering four advanced security tools, composed of twelve different modules, RevBits delivers protection against the most sophisticated cyber threats companies face. Technological developments continue at RevBits with the recent offering of an integrated platform to manage and control all four solutions in one single sign-on dashboard – RevBits Cyber Intelligence Platform. RevBits headquartered in Mineola, NY, with offices in Princeton, NJ, Boston, MA, London, England and Antwerp (Belgium). For more information on RevBits please visit www.revbits.com/aboutrevbits.

About CDM InfoSec Awards
This is Cyber Defense Magazine’s ninth year of honoring global InfoSec innovators. Our submission requirements are for any startup, early-stage, later-stage, or public companies in the INFORMATION SECURITY (INFOSEC) space who believe they have a unique and compelling value proposition for their product or service. Learn more at www.cyberdefenseawards.com  

About the Judging
The judges are CISSP, FMDHS, CEH, certified security professionals who voted based on their independent review of the company submitted materials on the website of each submission, including but not limited to data sheets, white papers, product literature, and other market variables. CDM has a flexible philosophy to find more innovative players with new and unique technologies than the one with the most customers or money in the bank. CDM is always asking, "What’s Next?" so we are looking for Next Generation InfoSec Solutions.

For More Information, Contact:
Neal Hesterberg
Vice President of Business Development
RevBits
Neal.hesterberg@revbits.com

revbits_logo__002
revbits_logo__002

 

Related Links :

https://www.revbits.com/

Skybox Security Wins Best Vulnerability Management Solution


SC Awards honor the best in U.S. cybersecurity

SAN JOSE, Calif., May 6, 2021 — Skybox Security, a global leader in security posture management, today announced it won Best Vulnerability Management Solution at the 2021 SC Awards. Honoring the best in U.S. cybersecurity, the annual SC Media Awards recognize the products and companies that are forging the industry’s future and enabling organizations to protect their most critical assets.

Skybox Security wins Best Vulnerability Management Solution.
Skybox Security wins Best Vulnerability Management Solution.

"This award recognizes that Skybox stands alone as the only vulnerability and threat management solution that prioritizes vulnerabilities based on a combination of asset importance, CVSS score, exploitability, and advanced exposure analysis. We uniquely calculate exposure by conducting attack simulation across hybrid networks," said Gidi Cohen, CEO and founder, Skybox Security. "Fortune 1000 customers choose Skybox because we increase the accuracy of their vulnerability assessments, reduce mean time to remediation, and measure cyber exposure on a continuous basis."

Pioneering a new approach to vulnerability management

A new threat landscape requires a new approach to security posture management. Skybox Security evolved its platform to secure customers’ accelerated digital transformation initiatives such as cloud migration and IT/OT convergence. This year, Skybox delivered the world’s most advanced exposure analysis, which was made possible through its unique ability to model hybrid networks.

"Skybox offers a comprehensive three-dimensional digital model of the enterprise which simulates real-world attacks," said Steve Zurier, security journalist at SC Media. "With data collected from dozens of sources and its robust threat intelligence feed, Skybox runs as a true risk platform that automates workflow from discovery to targeted action, delivering accurate and customizable risk scores to focus teams on critical vulnerabilities, exploitable assets and the most effective remediation options."

Integrating with over 150 networking, security, cloud, and IT management solutions, the Vulnerability and Threat Management Solution automatically maps and visualizes the attack surface to reduce cybersecurity exposure continuously. Customers also receive a verified and up-to-the-minute contextualized threat intelligence in one consolidated source from the Skybox Research Lab.

"The product normalizes data from different vendors for easy analysis, examining it in the context of the attack surface, and automates assessment, prioritization, remediation planning and monitoring," added Zurier. "It matches vulnerabilities to network exposures, threats and potential business impacts of an exploit, while focusing resources on imminent threats. And it measures, tracks and demonstrates risk levels over time, while delivering visual, abstracted views of the attack surface to easily convey security status across teams and up the management chain."

Recognized as the gold standard of cybersecurity excellence

Now in its 25th year, 2021’s SC Awards were the most competitive yet. Winners of the Trust Award were chosen by a distinguished group of leading IT security professionals. Entrants were narrowed down to a select group of finalists before undergoing a rigorous final judging process to determine the winner of each category.

"Distinct challenges that emerged during the last year resulted in a diverse range of demands from the customer community. A pandemic drove employees home en masse; supply chain attacks left government agencies and businesses reeling; cybercriminals and enemy nation states banked on security gaps during unprecedented times, targeting home networks, healthcare organizations, and retailers, among many other organizations," said Jill Aitoro, editor in chief of SC Media. "Winners of our Trust Awards demonstrated remarkable resiliency, adapting to meet evolving requirements of customers."

The SC Awards are recognized throughout the security industry as the gold standard of excellence in cybersecurity. For more information and a detailed list of categories, finalists and winners, please visit https://scawardsus.com/.

Additional resources

About SC Media
SC Media is the essential resource for cybersecurity professionals, keeping them up to date on vital developments and focusing on their most important concerns. Whether practitioners or leaders, technologists or executives, people who care about cybersecurity turn to SC Media, every day and throughout the day, to stay informed and gain insight into the complex issues that matter in their strategic and technology decision-making. As CyberRisk Alliance’s gateway resource, SC Media taps into an authoritative community of thinkers and innovators to provide a full range of relevant and useful content, including exclusive market research and data, opinion and perspective, independent product reviews, compelling in-person and virtual learning, and much more.

About CyberRisk Alliance
CyberRisk Alliance (CRA) was formed to help cybersecurity professionals face the challenges that threaten the success and prosperity of their organizations. We provide business intelligence and information services to help our growing community build effective strategies and make smart decisions, and innovative marketing solutions to galvanize an efficient marketplace. Most of all, we work to engage the entire cyber community and lift the success of all industry professionals.

About Skybox Security
Over 500 of the largest and most security-conscious enterprises in the world rely on Skybox for the insights and assurance required to stay ahead of dynamically changing attack surfaces. At Skybox, we don’t just serve up data and information. We provide the intelligence and context to make informed decisions, taking the guesswork out of securely enabling enterprises at scale and speed. Our unified security posture management platform delivers complete visibility, analytics and automation to quickly map, prioritize and remediate vulnerabilities across your organization. The vendor-agnostic platform intelligently optimizes security policies, actions and change process across all corporate networks and cloud environments. With Skybox, security teams can now focus on the most strategic business initiatives while ensuring enterprises remain protected.  

We are Skybox. Secure more, limit less. skyboxsecurity.com

Awards information
Wendy Loew, SVP, Events
Wendy.Loew@cyberriskalliance.com

Media contact
Ashley Nakano, Corporate Communications
ashley.nakano@skyboxsecurity.com 

© 2021 SC Media. CyberRisk Alliance, LLC. All rights reserved. Used under license.

© 2021 Skybox Security, Inc. All rights reserved. Skybox Security and the Skybox Security logo are either registered trademarks or trademarks of Skybox Security, Inc., in the United States and/or other countries. All other trademarks are the property of their respective owners. Product specifications subject to change at any time without prior notice.

Photo – https://techent.tv/wp-content/uploads/2021/05/skybox-security-wins-best-vulnerability-management-solution.jpg 
Logo – https://techent.tv/wp-content/uploads/2021/05/skybox-security-wins-best-vulnerability-management-solution-2.jpg

 

Related Links :

http://www.skyboxsecurity.com

Essence Group Launches New WeR@Home+ Smart Home Security Solution

Leading Security Companies Begin Piloting New LTE-enabled Smart Home Solution in Europe

HERZLIYA, Israel, May 6, 2021Essence Group, a leading provider of IoT solutions for the global security and care markets, today announced the launch of WeR@Home+, a next generation security and home management platform. Essence is partnering with European security services providers, including Securitas Direct Switzerland, to pilot the new offering. 

Essence Group Launches New WeR@Home+ Smart Home Security Solution
Essence Group Launches New WeR@Home+ Smart Home Security Solution

WeR@Home+ leverages state-of-the-art IoT technology to expand Essence Group’s existing WeR@Home smart home management offering, including connectivity to LTE networks, a new family of connected security devices, and a rich set of reporting and analytics tools for service providers.

"WeR@Home+ represents our commitment to the mass deployment of smart living solutions that provide peace-of-mind to consumers, enabling them to simply and affordably manage their connected homes remotely, from anywhere and at any time," said Hagai Enoch, COO and head of Essence Group’s security division. "Providing a comprehensive smart home management system that is fully expandable and modular for any home environment, with self-installation and remote maintenance and configuration, we enable service providers across a range of industries – including telecommunications, insurance and real estate – to offer an array of value-added services to meet their customers’ specific needs while benefitting from increased ROI and more flexible business models."

WeR@Home+ boasts a range of new capabilities, including an updated central hub with multiple connectivity options. The new hub includes 4G LTE, in addition to Wi-Fi connectivity, and an extended battery backup to ensure the system is always connected. The high definition, battery-operated video camera is the first in the industry to provide HD video over secure radio frequency, connected locally to the hub. This offers highly secure enhanced video verification and unlimited video storage with an extended battery life of up to five years.

The highlight of the platform comprises the S5 Family of multi-functional detectors, featuring a magnetic door/window sensor, a motion sensor with multi-zone spherical lenses for enhanced coverage, a curtain sensor, and a multi-function button that can be programmed to perform a variety of security and smart home actions. Upgraded cloud capabilities provide unprecedented stability and flexibility for providers, including an interactive and fully customizable smartphone app and administration center, with enhanced reporting and analytics capabilities, enabling them to customize and deploy solutions tailored to customer needs.

"Securitas Direct Switzerland has enjoyed a long and fruitful relationship with Essence Group, our valued partner that has played an integral role in us becoming Switzerland’s leading security solutions provider," said Christian Chenaux, CEO Securitas Direct Switzerland. "We are very pleased to begin this pilot with the WeR@Home+ that provides innovation and the most flexible solution through which we can protect our customers from constantly evolving security threats by enabling them to seamlessly manage their home management and security protocols."

WeR@Home+ is an integral aspect of the realization of the Peace of Mind concept, recently introduced by Essence Group and intended to provide users with a better life experience and  close the gap between their limited resources and the increasing need for safety.

About Essence Group

Essence Group is a global technology leader with a mission to develop and deploy innovative, cloud-based, end-to-end security and healthcare solutions, underpinned by supporting services, that provide peace of mind to users. For over a quarter of a century, Essence has challenged convention by making care and safety both accessible and affordable. With over 70 million connected devices deployed worldwide, Essence helps people to live safer and more independent lives.

For more information: https://www.essence-grp.com/

Follow Essence Group on LinkedInTwitter and Facebook

Media Contact:

Finn Partners for Essence Group
Danny Sudwarts
Danny.sudwarts@finnpartners.com 
(+1) 469-297-2515

Photo: https://techent.tv/wp-content/uploads/2021/05/essence-group-launches-new-werhome-smart-home-security-solution.jpg