Tag Archives: HTS

Entrust Datacard Lauded by Frost & Sullivan for its End-to-End, Customized Certificate Solutions

Entrust Datacard has  led the market by adopting an integrated approach to the TLS and PKI business

LONDON, Aug. 11, 2020 — Based on its recent analysis of the global transport layer security certificate market, Frost & Sullivan recognizes Entrust Datacard with the 2020 Global Innovation Excellence Frost Radar Award. Its extensive product portfolio; customized, scalable solutions; and flexible business model have helped Entrust Datacard gain a global customer base. The company offers a robust portfolio of TLS/SSL and public key infrastructure (PKI) solutions, including hosted/on-premises/hybrid solutions for PKI, certificate management, and hardware security modules (HSMs).

Photo – https://mma.prnewswire.com/media/1224494/Entrust_Datacard__Radar__Award.jpg

"Entrust Datacard’s PKI use cases extend beyond web security to IoT, email, and cloud. It has positioned itself as a pioneer in the TLS space with initiatives around post-quantum cryptography (PQC), verified mark certificate (VMC), and cloud-based use cases," said Swetha R K, industry analyst. "The Entrust Certificate Services (ECS) portal brings together public and private use cases of PKI into a single interface. The gateways and endpoints layer on the ECS portal supports a wide range of protocols and enables API-based integration with endpoints and applications. Customers can deploy software agents within endpoints to perform various backend tasks."

Entrust Datacard has exhibited the strongest and most consistent organic growth rate in the industry since 2016, achieving double digit year-over-year growth in both Organization Validation (OV) certificates and in Extended Validation (EV) certificates. And, in 2019, it held the second largest share in the high assurance certificate segment.

The company has achieved considerable success with its focus on long-term innovation in line with evolving market needs and the ever-more sophisticated threat landscape. This commitment to innovation has helped it become the first commercial certifying authority (CA) to have DevOps integrations, such as with ServiceNow and Ansible. It is also the first commercial CA to release verified mark certificates (VMCs) that allow a customer’s official logo to appear in a secure position in an email.

"Another area where Entrust Datacard has taken a pioneering role is in preparing for post-quantum cryptography to help companies sustain their IT ecosystems through anticipated change. It is also collaborating with other organizations like the National Institute of Standards and Technology on new quantum-resistant IETF X.509 certificate formats," noted Swetha. "Entrust Datacard’s strong market performance and investment in R&D will enable it to expand its business through new solutions as well as continue to deliver exceptional customer experiences."

The Innovation Excellence best practice award is bestowed upon companies that are industry leaders reinventing themselves through R&D investments and innovation.

Frost & Sullivan Best Practices awards recognize companies in a variety of regional and global markets for demonstrating outstanding achievement and superior performance in areas such as leadership, technological innovation, customer service, and strategic product development. Industry analysts compare market participants and measure performance through in-depth interviews, analysis, and extensive secondary research to identify best practices in the industry.

About Frost & Sullivan

For over five decades, Frost & Sullivan has become world-renowned for its role in helping investors, corporate leaders and governments navigate economic changes and identify disruptive technologies, Mega Trends, new business models and companies to action, resulting in a continuous flow of growth opportunities to drive future success. Contact us: Start the discussion.

Contact:

Lindsey Whitaker
P: +1 (210) 477-8457
E: lindsey.whitaker@frost.com

About Entrust Datacard Corporation

Consumers, citizens, and employees increasingly expect anywhere-anytime experiences — whether they are making purchases, crossing borders, accessing e-gov services or logging onto corporate networks. Entrust Datacard offers the trusted identity and secure issuance technologies that make those experiences reliable and secure. Solutions range from the physical world of financial cards, passports and ID cards to the digital realm of authentication, certificates, hardware security modules and secure communications. With more than 2,500 Entrust Datacard colleagues around the world and a network of strong global partners, the company serves customers in 150 countries worldwide. For more information, visit www.entrustdatacard.com.

Entrust Datacard Contact:
Ken Kadet
+1 952.988.1154
Ken.Kadet@entrustdatacard.com

Related Links :

Frost New Home page v2

Customer personal information is the number one data protection priority in Taiwan reports nCipher

Organizations racing to protect sensitive data as it proliferates across cloud, IoT devices and 5G networks

TAIPEI, Aug. 11, 2020 — The adoption of digital initiatives such as cloud, IoT and 5G networks is growing rapidly as the world adjusts to a "new work-from-home normal" amid the COVID-19 pandemic — with Taiwan being no exception. This brings even more attention to data protection and encryption strategies, with the protection of customer information the number one priority according to the 2020 Taiwan Encryption Trends Study published today by nCipher Security, an Entrust Datacard company and world leader in hardware security modules (HSMs), based on research by the Ponemon Institute.

The customer is king, but so too is intellectual property

Organizations in Taiwan have adopted enterprise encryption at a similar rate to their global counterparts: 46% have consistently applied an encryption plan/strategy, only slightly below the global average of 48%.

Protecting customer personal information is the major driver behind encryption adoption for respondents in Taiwan (62%), 8% higher than the global average. Following a close second is the protection of intellectual property (57%), well above the global average (52%). This is not surprising given the emphasis on intellectual property across the Taiwan market.

Data discovery the number one challenge

With the proliferation of data from digital initiatives, cloud use, mobility, IoT devices and 5G networks, data discovery is the biggest challenge in planning and executing a data encryption strategy, with 58% of respondents citing this as their top concern, 9% below the global average. Organizations in Taiwan also rate the challenge of initially deploying encryption technology lower than any other region, 31% vs. 44% globally.

On the other hand, respondents report greater difficulties in data classification (43%) and user training (23%), which are 12% and 9% above global averages respectively.

Trust, integrity, control

The use of hardware security modules (HSMs) to provide higher levels of trust, integrity and control for both data and applications stands at 39% for respondents in Taiwan. Most respondents (61%) say that HSMs are important as part of their organization’s encryption or key management activities, with the most prevalent use cases being application level encryption (42%) and encrypting data in the cloud.

The race to the cloud

Cloud is extremely popular in the region, with 86% of respondents reporting that they transfer sensitive data to the cloud, or plan to do so within the next 12 to 24 months. Nearly every responding organization (99%) rates support for both cloud and on-premise deployment from their encryption solutions as being important, significantly higher than the global average of 67%.

Organizations in Taiwan are also deploying HSMs for cloud use cases at much higher rates than many other regions, including the ownership and operation of HSMs to generate and manage Bring Your Own Key (BYOK) and integration with a Cloud Access Security Broker (CASB) to manage keys and cryptographic operations. Taiwan also has the highest planned increase in the use of HSMs in conjunction with public cloud-based applications over the next 12 months.

Looking ahead — blockchain, quantum and adoption of new encryption technologies

While the surge in remote working has increased the risk of data exposure, how are organizations looking ahead? In the near term, 65% of responding organizations plan to use blockchain, with asset transaction, identity, supply chain and smart contracts cited as the top use cases.

Other much-hyped technologies are not on Taiwan IT organizations’ near-term radar. Most IT professionals see the mainstream adoption of multi-party computation at least six years away, with mainstream adoption of homomorphic encryption nearly seven years away, and quantum resistant algorithms eight years out, all of which are in line with global trends.

"Consumers expect brands to protect their data from breaches and always have their best interests at heart. Our survey found that IT leaders take this trust very seriously, and often place protection of consumer data as a top priority when pursuing encryption growth," says Dr Larry Ponemon, chairman and founder of Ponemon Institute. "Encryption use is at an all-time high right now, with 46% of respondents from Taiwan this year saying their organization has an encryption plan that is applied consistently across the entire enterprise, with a further 36% saying they have a basic plan or strategy applied to certain applications and data types."

"With ongoing digitalization, organizations are under relentless pressure to deliver high security, seamless access to protect customer data and business information, while ensuring reliable business continuity. The 2020 Taiwan Encryption Trends Study highlights how critical security and identity have become for organizations and individuals both in the workplace and at home," said Percy Tu, sales manager, Taiwan, nCipher Security. "nCipher empowers customers by providing a high assurance security foundation that ensures the integrity and trustworthiness of their data, applications and intellectual property."

Other key findings from the Taiwan Encryption Trends Study include:

  • Employee mistakes (58%) pose the greatest threat to data exposure, followed by temporary or contract workers (33%) and third-party service providers (27%). Conversely, hackers are seen as the lowest threat in Taiwan (17%, compared to 29% globally)
  • Encryption is deployed at higher rates than global averages for database use cases (69%), cloud gateways (49%) and private cloud infrastructure (46%)
  • Taiwan companies find encryption key management challenging to adopt (59%), with inadequate tools (54%), isolated and fragmented systems (49%) and lack of skilled personnel (49%) being the major reasons behind this

Download the 2020 Taiwan Encryption Trends Study

2020 Taiwan Encryption Trends Study methodology

The 2020 Taiwan Encryption Trends Study surveyed 302 IT professionals in Taiwan and is part of a larger global study, based on research by the Ponemon Institute. The report captures how organizations around the world are dealing with compliance, increased threats, and the implementation of encryption to protect their business-critical information and applications.

6,457 IT professionals were surveyed across multiple industry sectors in 17 countries/regions: Australia, Brazil, France, Germany, India, Japan, Hong Kong, Mexico, the Middle East (which is a combination of respondents located in Saudi Arabia and the United Arab Emirates), the Russian Federation, Southeast Asia (Indonesia, Malaysia, Philippines, Thailand, and Vietnam), South Korea, Taiwan, the United Kingdom, the United States and two new regions for the first time, Netherlands and Sweden.

Percy Tu, sales manager, Taiwan, nCipher Security
Percy Tu, sales manager, Taiwan, nCipher Security

Percy Tu, sales manager, Taiwan, nCipher Security (Click here to download high-resolution image)

About nCipher Security

nCipher Security, an Entrust Datacard company, is a leader in the general-purpose hardware security module (HSM) market, empowering world-leading organizations by delivering trust, integrity and control to their business-critical information and applications. Today’s fast-moving digital environment enhances customer satisfaction, gives competitive advantage and improves operational efficiency — it also multiplies the security risks. Our cryptographic solutions secure emerging technologies such as cloud, IoT, blockchain, and digital payments and help meet new compliance mandates. We do this using our same proven technology that global organizations depend on today to protect against threats to their sensitive data, network communications and enterprise infrastructure. We deliver trust for your business-critical applications, ensure the integrity of your data and put you in complete control — today, tomorrow, always. www.ncipher.com

Follow us on LinkedIn, Twitter, Facebook and Instagram — search nCipherSecurity.

Photo – https://photos.prnasia.com/prnh/20200810/2880970-1?lang=0
Logo – https://photos.prnasia.com/prnh/20200810/2880970-1logo?lang=0

Related Links :

http://www.ncipher.com

Donuts Domains releases TrueName(TM). New brand provides more memorable, secure and available names than legacy domains.

BELLEVUE, Wash., Aug. 4, 2020 — The statistics are startling: seventy-six percent of businesses reported being a victim of a phishing attack in the last year, according to leading cybersecurity firm Retruster. In response, Donuts, Inc. has announced it’s including proprietary anti-phishing technology in every one of their domains.

TrueName(TM) domains by Donuts Inc., the global leader in new top-level domains.
TrueName(TM) domains by Donuts Inc., the global leader in new top-level domains.

Phishing is among the most prevalent forms of online fraud. TrueName offers businesses and individuals the best and now most secure domain names for their websites and other digital destinations. Highly relevant and descriptive TrueName domains protect businesses from imposters using lookalike domains to deceive and defraud their customers.

TrueName parent company Donuts Inc. is the global leader in top-level domains, operating 242 extensions such as .live, .codes, .news and .guru. These top-level domains provide significantly more choice to those searching for their perfect domain name. Relevant domain names ending in .com, .net, and .org are largely unavailable and do not offer the same protection, making TrueName domains uniquely differentiated in the industry.

"If you’re doing business online, you want to focus on innovating and increasing traffic," said Donuts’ Chief Marketing Officer Mina Neuberg.  "TrueName domains are highly brandable and come with security included to prevent phishing attacks, so they offer the best of all worlds to anyone seeking an online edge."

Donuts is working closely with all registrar partners including Name.com, Domene.Shop and Sav.com to integrate branding and messaging so their customers can easily find and register TrueName domains.

To learn more about TrueName, visit www.truename.domains.

About Donuts Inc.
Donuts is the global leader in high-quality, top-level domains for unifying, managing, and amplifying digital identity. We manage the world’s largest portfolio of more than 240 new top-level domains, including: .email, .guru, .social, .restaurant, .live, and hundreds of others. In addition, we provide registrars and resellers with innovative services for the discovery, registration, use, and monetization of high-quality domain names. Learn more at www.donuts.domains.

Press Contact Info: Mina Neuberg, Donuts Inc. Chief Marketing Officer, media@donuts.email

Photo – https://techent.tv/wp-content/uploads/2020/08/donuts-domains-releases-truenametm-new-brand-provides-more-memorable-secure-and-available-names-than-legacy-domains.jpg

 

Related Links :

http://www.donuts.domains

Qualys Integrates Ivanti Patch Management into Qualys VMDR Platform to Self-Heal Endpoints with One Click

Qualys Vulnerability Management Detection Response (VMDR) Platform Streamlines the Detection and Patching of Vulnerabilities, from the Endpoint to the Datacenter

SINGAPORE, Aug. 3, 2020 — Ivanti, the company that automates IT and Security Operations to discover, manage, secure and service from cloud to edge, and Qualys, Inc. (NASDAQ: QLYS), a pioneer and leading provider of disruptive cloud-based IT, security and compliance solutions, today announced an expanded partnership. The partnership provides for the integration of Ivanti® Patch Management technology within the Qualys VMDR® (Vulnerability Management Detection Response) platform. The next phase of the integration will allow Qualys customers to patch MacOS systems, as well as over 70 third-party Mac applications, directly through Qualys VMDR.

The Ivanti and Qualys partnership provides for tight integration of Ivanti Patch Management into Qualys VMDR to automate and simplify the patch remediation process. As a result, customers will be able to quickly detect vulnerabilities, from endpoint to datacenter, and automatically deploy expertly pre-tested Mac patches across dozens of third-party applications. Current Microsoft patch coverage includes both security and non-security content for all supported products, operating systems, and applications, including Microsoft Office. The Ivanti patch catalog is one of the industry’s most comprehensive catalogs currently securing over 180 million endpoints globally.

"Ivanti’s expanded partnership with Qualys further underscores our mission to help deliver end-to-end security solutions," said Nayaki Nayyar, executive vice president and chief product officer, Ivanti. "Our recently announced Ivanti Neurons platform powers security teams with advanced automation capabilities to discover, prioritize, remediate vulnerabilities and self-heal endpoints and edge devices."

"The seamless integration of Ivanti and Qualys technologies in VMDR takes endpoint security to the next level," said Sumedh Thakar, president and chief product officer, Qualys. "By extending Ivanti’s leading patch management technology from Windows to Mac, Qualys VMDR now orchestrates the entire process of discovery, prioritization and patching of critical vulnerabilities in real time across hybrid IT environments including macOS devices. Furthermore, it allows us to bridge IT and SecOps workflows to more efficiently secure and manage today’s explosion of remote workers."

Qualys VMDR provides an all-in-one cloud-based app that automates the entire vulnerability management cycle across on-premises, endpoints, cloud, mobile, containers, OT and IoT environments – significantly accelerating the ability for organizations to respond to threats and prevent breaches. Deployment for the cloud-based app is easy, and pricing is asset based, which makes it simple to procure. Ivanti Patch Management technology is available today as an integrated component of Qualys VMDR.

To learn more, visit https://www.qualys.com/vmdr.

Ivanti Patch Management technology for OEM partners, marketed as Ivanti® Security Controls SDK, is provided to partners through a series of SDKs that allow rapid integration of a complete patch management solution into existing security solutions. These SDKs cover the patch management life cycle from endpoint assessment to patch packaging to patch deployment. This allows partners to deliver a full application security solution with patch content that covers Windows OS, MacOS and Linux variants as well as thousands of third-party applications. Whether a partner’s solution is supporting customers in the cloud, on-premise or in the datacenter, Ivanti Security Controls SDKs allow OEM partners to deliver world class agent-based and agentless patching across completely heterogenous environments.

To learn more visit: https://www.ivanti.com/partners/oem

About Qualys: One Cloud Platform – One Agent – One Global View

Qualys, Inc. (NASDAQ: QLYS) is a pioneer and leading provider of disruptive cloud-based IT, security and compliance solutions with over 15,700 active customers in more than 130 countries, including a majority of each of the Forbes Global 100 and Fortune 100. Qualys helps organizations streamline and consolidate their security and compliance solutions in a single platform and build security into digital transformation initiatives for greater agility, better business outcomes, and substantial cost savings. For more information, please visit www.qualys.com.  

About Ivanti: Better Experiences, Better Outcomes.

Ivanti automates IT and Security Operations to discover, manage, secure and service from cloud to edge. From PCs to mobile devices, VDI, and the data center, Ivanti discovers IT assets on-premises, in cloud, and at the edge, improves IT service delivery, and reduces risk with insights and automation. The company also helps organizations leverage modern technology in the warehouse and across the supply chain to improve delivery without modifying backend systems. Ivanti is headquartered in Salt Lake City, Utah and has offices all over the world. For more information, visit www.ivanti.com and follow @GoIvanti.

Copyright © 2020, Ivanti.  All rights reserved.

Press Contacts:

Spencer Parkinson
Ivanti
+1 801-694-0179
spencer.parkinson@ivanti.com 

Erin Jones           
Avista Public Relations for Ivanti
+704 664-2170
ivanti@avistapr.com 

Shuchi Joseph
Ying Communications
+65 98005037
Shuchi.joseph@finnpartners.com

Sparrow to Present its Cloud Application Security Solution at Virtual Black Hat USA 2020

LAS VEGAS, July 31, 2020 — Sparrow has announced on the 27th of July that it would be presenting its cloud application security solutions through the annual BlackHat USA 2020 conference for the third consecutive year.

BlackHat USA provides the world with leading information security industry knowledge, research and trends at an event that brings cybersecurity industry professionals to one place.  

This year, the event is held online due to COVID-19 but the conference dates are the same as planned from August 1st to 6th Pacific Daylight Time (UTC−07:00), with Sparrow hosting from 5th through 6th at its virtual booth.

Sparrow will present its Sparrow Cloud, a cloud based security testing tool. Since last year, Sparrow has been able to make great progress in merging previously distinct static analysis and dynamic analysis onto a single service.

Detailed information about Sparrow’s Black Hat showcase can be found on the Sparrow event page for Black Hat events. Any industry professionals and individuals are welcome to sign up before the deadline, through the BlackHat USA official site.

About Sparrow Co. Ltd.

Since 2007, Sparrow has been developing and researching in the field of application security. Over the past decade, the company has expanded use cases to customers across a large number of industries from financial services to government ministries.

Sparrow provides an intelligent and comprehensive solution package including SAST, DAST, IAST, RASP and other products which is able to cover the entire SDLC (Software Development Life Cycle) for perfect DevSecOps implementation.   

Sparrow has been recognized by many awards, reviews and certification including Gartner’ Magic quadrant for Application security, ISO 26262, and CC.

For more information, visit www.sparrowfasoo.com or follow us on Facebook page.

Related Links :

http://www.sparrowfasoo.com

Hikvision releases 2020 H1 financial results

HANGZHOU, China, July 30, 2020 — Hikvision, an IoT solution provider with video as its core competency, has released its financial results for the first half of 2020. During the period, Hikvision generated a revenue of RMB 24.27 billion with a year-over-year (YoY) increase of 1.45%, and net profits attributable to shareholders of the company was RMB 4.62 billion, reflecting a YoY growth of 9.66%.

Hikvision 2020 H1 Financial Results
Hikvision 2020 H1 Financial Results
Hikvision 2020 H1 Financial Results
Hikvision 2020 H1 Financial Results

Hikvision’s revenue in overseas markets achieved solid growth, amounting to RMB 7.54 billion, with a YoY growth of 8.63%.

Having encountered unusual global social and economic conditions in the first half of 2020, Hikvision adapted its operations and succeeded in making technological innovations meet customers’ needs, which helped to overcome challenges and keep development steady. Hikvision will continuously work closely with its partners to maintain stable operations, create value for customers, and build more safety, efficiency and sustainability for communities around the world. 

For the full 2020 H1 financial report, please visit here.

About Hikvision

Hikvision is an IoT solution provider with video as its core competency. Featuring an extensive and highly skilled R&D workforce, Hikvision manufactures a full suite of comprehensive products and solutions for a broad range of vertical markets. In addition to the security industry, Hikvision extends its reach to smart home tech, industrial automation, and automotive electronics industries to achieve its long-term vision. Hikvision products also provide powerful business intelligence for end users, which can enable more efficient operations and greater commercial success. Committed to the utmost quality and safety of its products, Hikvision encourages partners to take advantage of the many cybersecurity resources Hikvision offers, including the Hikvision Cybersecurity Centre. For more information, please visit us at www.hikvision.com.

Photo – https://photos.prnasia.com/prnh/20200730/2871957-1-a?lang=0
Photo – https://photos.prnasia.com/prnh/20200730/2871957-1-b?lang=0

Related Links :

http://www.hikvision.com

IBM Report: Compromised Employee Accounts Led to Most Expensive Data Breaches Over Past Year

Customer Personal Data Exposed in 80% of Breaches Analyzed; AI and Automation Significantly Reduce Costs

CAMBRIDGE, Mass., July 29, 2020 — IBM Security (NYSE: IBM) announced today the results of a global study examining the financial impact of data breaches, revealing that these incidents cost companies studied $3.86 million per breach on average, and that compromised employee accounts were the most expensive root cause. Based on in-depth analysis of data breaches experienced by over 500 organizations worldwide, 80% of these incidents resulted in the exposure of customers’ personally identifiable information (PII). Out of all types of data exposed in these breaches, customer PII was also the costliest to businesses studied.

Customer PII was the most commonly exposed type of data in a breach, according to IBM-Ponemon 2020 Cost of a Data Breach Report (PRNewsFoto/IBM)
Customer PII was the most commonly exposed type of data in a breach, according to IBM-Ponemon 2020 Cost of a Data Breach Report (PRNewsFoto/IBM)

As companies are increasingly accessing sensitive data via new remote work and cloud-based business operations, the report sheds light on the financial losses that organizations can suffer if this data is compromised. A separate IBM study found that over half of surveyed employees new to working from home due to the pandemic have not been provided with new guidelines on how to handle customer PII, despite the changing risk models associated with this shift.

Sponsored by IBM Security and conducted by the Ponemon Institute, the 2020 Cost of a Data Breach Report is based on in-depth interviews with more than 3,200 security professional in organizations that suffered a data breach over the past year.1 Some of the top findings from this year’s report include:

  • Smart Tech Slashes Breach Costs in Half: Companies studied who had fully deployed security automation technologies (which leverage AI, analytics and automated orchestration to identify and respond to security events) experienced less than half the data breach costs compared to those who didn’t have these tools deployed – $2.45 million vs. $6.03 million on average.
  • Paying a Premium for Compromised Credentials: In incidents where attackers accessed corporate networks through the use of stolen or compromised credentials, studied businesses saw nearly $1 million higher data breach costs compared to the global average – reaching $4.77 million per data breach. Exploiting third-party vulnerabilities was the second costliest root cause of malicious breaches ($4.5 million) for this group.   
  • Mega Breach2 Costs Soar by the Millions: Breaches wherein over 50 million records were compromised saw costs jump to $392 million from $388 million the previous year. Breaches where 40 to 50 million records were exposed cost studied companies $364 million on average, a cost increase of $19 million compared to the 2019 report.
  • Nation State Attacks – The Most Damaging Breaches: Data breaches believed to originate from nation state attacks were the costliest, compared to other threat actors examined in the report. State-sponsored attacks averaged $4.43 million in data breach costs, surpassing both financially motivated cybercriminals and hacktivists.

“When it comes to businesses’ ability to mitigate the impact of a data breach, we’re beginning to see a clear advantage held by companies that have invested in automated technologies,” said Wendi Whitmore, Vice President, IBM X-Force Threat Intelligence. “At a time when businesses are expanding their digital footprint at an accelerated pace and the security industry’s talent shortage persists, teams can be overwhelmed securing more devices, systems and data. Security automation can help resolve this burden, not only supporting a faster breach response but a more cost-efficient one as well.”

Employee Credentials and Misconfigured Clouds ­– Attackers’ Entry Point of Choice
Stolen or compromised credentials and cloud misconfigurations were the most common causes of a malicious breach for companies in the report, representing nearly 40% of malicious incidents. With over 8.5 billion records exposed in 2019, and attackers using previously exposed emails and passwords in one out of five breaches studied, businesses should rethink their security strategy via the adoption of a zero-trust approach – reexamining how they authenticate users and the extent of access users are granted.

Similarly, companies’ struggle with security complexity – a top breach cost factor – is likely contributing to cloud misconfigurations becoming a growing security challenge. The 2020 report revealed that attackers used cloud misconfigurations to breach networks nearly 20% of the time, increasing breach costs by more than half a million dollars to $4.41 million on average – making it the third most expensive initial infection vector examined in the report.

State Sponsored Attacks Strike Heaviest
Despite representing just 13% of malicious breaches studied, state-sponsored threat actors were the most damaging type of adversary according to the 2020 report, suggesting that financially motivated attacks (53%) don’t necessarily translate into higher financial losses for businesses. The highly tactical nature, longevity and stealth maneuvers of state-backed attacks, as well as the high value data targeted, often result in a more extensive compromise of victim environments, increasing breach costs to an average of $4.43 million.

In fact, the respondents in the Middle East, a region that historically experiences a higher proportion of state-sponsored attacks compared to other parts of the world3, saw over 9% yearly rise in their average breach cost, incurring the second highest average breach cost ($6.52 million) amongst the 17 regions studied. Similarly, businesses studied in the energy sector, one of the most frequently targeted industries by nation states, experienced a 14% increase in breach costs year over year, averaging $6.39 million.

Advanced Security Technologies Prove Smart for Business
The report highlights the growing divide in breach costs between businesses implementing advanced security technologies and those lagging behind, revealing a cost-saving difference of $3.58 million for studied companies with fully deployed security automation versus those that have yet to deploy this type of technology. The cost gap has grown by $2 million, from a difference of $1.55 million in 2018.

Companies in the study with fully deployed security automation also reported a significantly shorter response time to breaches, another key factor shown to reduce breach costs in the analysis. The report found that AI, machine learning, analytics and other forms of security automation enabled companies to respond to breaches over 27% faster on average, than companies that have yet to deploy security automation – the latter of which require on average 74 additional days to identify and contain a breach.

Incident response (IR) preparedness also continues to heavily influence the financial aftermath of a breach. According to the report, companies with neither an IR team nor testing of IR plans experience $5.29 million in average breach costs, whereas companies that have both an IR team and use tabletop exercises or simulations to test IR plans experience $2 million less in breach costs – reaffirming that preparedness and readiness yield a significant ROI in cybersecurity.

Some additional findings from this year’s report include:

  • Remote Work Risk Will Have a Cost: With hybrid work models creating less controlled environments, the report found that 70% of companies studied that adopted telework amid the pandemic expect it will exacerbate data breach costs.
  • CISOs Faulted for Breaches, Despite Limited Decision-Making Power: Forty-six percent of respondents said the CISO/CSO is ultimately held responsible for the breach, despite only 27% stating the CISO/CSO is the security policy and technology decision-maker. The report found that appointing a CISO was associated with $145,000 cost savings versus the average cost of a breach.
  • Majority of Cyber Insured Businesses Use Claims for Third Party Fees: The report found that breaches at studied organizations with cyber insurance cost on average nearly $200,000 less than the global average of $3.86 million. In fact, of these organizations that used their cyber insurance, 51% applied it to cover third-party consulting fees and legal services, while 36% of organizations used it for victim restitution costs. Only 10% used claims to cover the cost of ransomware or extortion.
  • Regional & Industry Insights: While studied companies in the U.S. continued to experience the highest data breach costs in the world, at $8.64 million on average, those studied in Scandinavia experienced the biggest year over year increase in breach costs, observing a nearly 13% rise. Responding healthcare companies continued to incur the highest average breach costs at $7.13 million — an over 10% increase compared to the 2019 study.

About the Study
The annual Cost of a Data Breach Report is based on in-depth analysis of real-world data breaches experienced by over 500 organizations worldwide taking place between August 2019 and April 2020, taking into account hundreds of cost factors including legal, regulatory and technical activities to loss of brand equity, customers, and employee productivity.

To download a copy of the 2020 Cost of a Data Breach Report, please visit: ibm.com/databreach

Sign up for the 2020 Cost of a Data Breach Report webinar on Wednesday, August 12, 2020 at 11:00 a.m. ET here: https://ibm.biz/BdqhMf

About IBM Security
IBM Security offers one of the most advanced and integrated portfolios of enterprise security products and services. The portfolio, supported by world-renowned IBM X-Force® research, enables organizations to effectively manage risk and defend against emerging threats. IBM operates one of the world’s broadest security research, development and delivery organizations, monitors 70 billion security events per day in more than 130 countries, and has been granted more than 10,000 security patents worldwide. For more information, please check www.ibm.com/security, follow @IBMSecurity on Twitter or visit the IBM Security Intelligence blog.

1 Report analyzes data breaches occurring between August 2019 and April 2020. Limitations of the report’s methodology can be found in the report.
2 The 2020 Cost of a Data Breach Report examines the cost of a mega breach, namely breaches involving the loss or theft of one million records or more, based on a separate analysis of a specific sample.
3 According to the IBM 2020 X-Force Threat Intelligence Index: https://ibm.biz/downloadxforcethreatindex

Press Contact:
IBM Security Media Relations
Georgia Prassinos
gprassinos@ibm.com 
(571) 365-6065

Related Links :

http://www.ibm.com

Veritas Technologies Named a Leader in the 2020 Gartner Magic Quadrant for Data Center Backup and Recovery Solutions 15x in a Row


SINGAPORE, July 24, 2020 — Veritas Technologies, a global leader in data protection and availability, today announced the company has been positioned as a Leader in Gartner’s 2020 Magic Quadrant for Data Center Backup and Recovery Solutions — now for the 15th consecutive time.[1] Gartner’s evaluation criteria for vendors includes completeness of vision and ability to execute. Veritas believes that this combination is critical as businesses seek to standardize on tools that give them a unified solution to manage data protection across a rapidly growing and increasingly diversified storage environment.

"2020 is a huge year of transformation for many of Veritas’ customers, as they respond to the challenges of a global pandemic. Every day, I speak to leaders that are prioritizing hybrid cloud adoption, operational resiliency, and cost management. However, these priorities put pressure on data management, data protection, and compliance models, especially in these uncertain times," said Greg Hughes, CEO, Veritas. "In order to respond, enterprises today need a modern, unified data protection platform that supports emerging technologies as well as traditional workloads at scale."

Veritas believes Gartner’s recognition further demonstrates how the company enables enterprises to gain control of their data, helping them manage growth, reduce the impact of ransomware, and prove compliance for on-premise and cloud environments.

By standardizing on a single data protection platform with the broadest workload support in the industry, customers are able to:

  • Strengthen resiliency against malicious threats, especially ransomware attacks, thanks to:
    • Veritas’ modern web-based user interface, which enables role-based access control to authorized users
    • Simplified disaster recovery for rapid restoration of data and applications following an attack
    • Consistent end-to-end long-term data retention and protection — complete with classification and global deduplication
  • Maximize operational simplicity with the industry’s most scalable platform, thanks to:
    • Veritas’ API-first approach that enables data protection automation and integration
    • Fully agentless architecture for VMware that can scale to hundreds of thousands of VMs
    • Backup, orchestration, cataloguing, and replication with native snapshot technologies
  • Provide seamless recovery across hybrid and multi-cloud environments, thanks to:
    • Cloud-native data protection with application consistency
    • Automation of disaster recovery to and in the cloud
    • Significant cost and resource savings with up to 90% reduction in network bandwidth utilization and cloud storage consumption

"NetBackup brings unparalleled breadth, depth and scale by supporting more than 800 data sources and over 1,400 storage targets, including 60 cloud providers," said Deepak Mohan, executive vice president, Products Organization, Veritas. "Because it can be deployed in any form factor, NetBackup is one of the most versatile and extensible solutions for data management available on the market today. To us, being recognized as a Leader for the 15th time in a row in this critical Magic Quadrant is testament to Veritas’ commitment to continuous innovation with solutions that meet the changing needs of our customers as ransomware threats rise and IT environments become more diverse."

Today’s announcement further builds on Veritas’ ongoing recognition from analysts and customers alike. Recently, the company was also recognized by customers as a 2020 Gartner Peer Insights Customers’ Choice for Data Center Backup and Recovery Solutions for the NetBackup product.

A full complimentary copy of the Magic Quadrant for Data Center Backup and Recovery Solutions report is available here.

Source: Gartner, Inc., Magic Quadrant for Data Center Backup and Recovery Solutions, Santhosh Rao, Nick Simpson, Michael Hoeck, July 20, 2020.

[1] Previous titles include Magic Quadrant for Data Center Backup and Recovery Solutions (2019, 2017), Magic Quadrant for Data Center Backup and Recovery Software (2016), Magic Quadrant for Enterprise Backup Software and Integrated Appliances (2014-2015), Magic Quadrant for Enterprise Backup/Recovery Software (2011-2013), Enterprise Backup and Restore Magic Quadrant (2001, 2003-2005), Enterprise Backup Vendor Magic Quadrant (1999-2000). From 2005-2015, Veritas Technologies was known as Symantec.

Gartner Disclaimer 

Gartner does not endorse any vendor, product or service depicted in our research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.

About Peer Insights

Peer Insights is an online platform of ratings and reviews of IT software and services that are written and read by IT professionals and technology decision-makers. The goal is to help IT leaders make more insightful purchase decisions and help technology providers improve their products by receiving objective, unbiased feedback from their customers. Gartner Peer Insights includes more than 215,000 verified reviews in more than 340 markets. For more information, please visit www.gartner.com/reviews/home.

Gartner Peer Insights Customers’ Choice constitute the subjective opinions of individual end-user reviews, ratings, and data applied against a documented methodology; they neither represent the views of, nor constitute an endorsement by, Gartner or its affiliates.

About Veritas

Veritas Technologies is a global leader in data protection and availability. Over 80,000 customers — including 87 percent of the Fortune Global 500 — rely on us to abstract IT complexity and simplify data management. The Veritas Enterprise Data Services Platform automates the protection and orchestrates the recovery of data everywhere it lives, ensures 24/7 availability of business-critical applications, and provides enterprises with the insights they need to comply with evolving data regulations. With a reputation for reliability at scale and a deployment model to fit any need, Veritas Enterprise Data Services Platform supports more than 800 different data sources, over 100 different operating systems, more than 1,400 storage targets, and more than 60 different cloud platforms. Learn more at www.veritas.com. Follow us on Twitter at @veritastechllc.

Veritas, the Veritas Logo, and NetBackup are trademarks or registered trademarks of Veritas Technologies LLC or its affiliates in the U.S. and other countries.

Logo – http://photos.prnasia.com/prnh/20150408/8521502200?lang=0

Related Links :

http://www.veritas.com

SmartSens Unveils SC500AI Next-Generation Image Sensor for Professional Security Market

SAN JOSE, Calif., July 23, 2020 — SmartSens Technology today announced the SC500AI widescreen smart image sensor, the latest product in the company’s AI Smart Sensor family.

SC500AI Wide Format 1620P Image Sensor
SC500AI Wide Format 1620P Image Sensor

 

The majority of 5MP security camera sensors offer a 4:3 aspect ratio that is not optimized for the widescreen format of modern LCD displays. The SmartSens SC500AI addresses this shortcoming with 1620P 16:9 5MP video output in the same form factor. This next-generation sensor presents a marked improvement over previous designs — narrowing the gap between image output and natural human vision.

SC500AI format comparison
SC500AI format comparison

 

SmartClarity Technology in the SC500AI increases the number of pixels by 20% compared to many 5MP products on the market—leveraging the full resolution of the sensor rather than cropping a 5MP 4:3 image down to 4MP to fit a 16:9 aspect ratio. This effectively reduces dark edges and distortion on both sides of the image due to uneven scaling while achieving a true 16:9 aspect ratio that includes an additional 10% of horizontal viewing area. The SC500AI achieves this crucial upgrade to match the majority of LCD displays on the market in applications such as security video and surveillance, which benefit from the sensor’s low dark current under high-temperature conditions, enhancing sensitivity and reducing read noise.

SC500AI specifications
SC500AI specifications

 

In a side-by-side comparison with SmartSens’ previous generation sensor, the new SC500AI reduces the dark current from 389 e- at 80˚C to 210 e-. The total RN, or Read Noise, is reduced from 0.75e- to 0.63e-. And the sensitivity level also shows a noticeable improvement, growing from 2800 mV/lux-sec to 3680 mV/lux-sec.

SC500AI specifications comparison
SC500AI specifications comparison

 

These improvements are made possible by SmartSens’ unique SFCPixel™ technology, which takes advantage of the close proximity between the source follower and the photodiodes to increase the sensitivity level, producing high-quality night-vision images. SmartSens’ proprietary PixGain® technology additionally enables the sensor to achieve excellent HDR performance even under glaring sunlight.

Existing customers of SmartSens’ previous-generation products of P2P will see a hassle-free system upgrade to the SC500AI, which is compatible with 1/3-inch 5MP lenses in a wide array for professional security products.

“SmartSens continues to build on its AI series of sensors, offering our customers a range of solutions utilizing the latest photosensor technologies to address the most challenging lighting conditions,” said Chris Yu, Chief Marketing Officer of SmartSens. “We continue to strengthen our portfolio to match new applications and our customers’ quickly-evolving needs.”

The SC500AI Image Sensor is available for testing immediately. For more information on the SC500AI or to request a sample, please contact SmartSens at cs@smartsenstech.com.

About SmartSens Technology Co. Ltd.

Founded in 2011, SmartSens Technology Co. Ltd. is a leading supplier of high-performance CMOS imaging systems worldwide and a forerunner in the video surveillance industry. Its products are widely used in the fields of vehicle-mounted imaging, machine vision and consumer electronics (sports cameras, drones, robot cleaners, smart home cameras, etc.). With research centers based in Shanghai and Beijing among others, the company focuses on providing future-oriented solutions and market-leading products. Coupled with cutting-edge technology and innovation, SmartSens is the industry’s first ever company to introduce the global shutter CIS sensors based on voltage domain architecture and stack BSI process. Since its founding, SmartSens has been committed to providing customers with high-quality smart sensors. Learn more at SmartSensTech.com.

 

Related Links :

http://www.smartsenstech.com

AUTOCRYPT Wins V2X SCMS Contract for Nationwide ITS Project

SEOUL, South Korea, July 23, 2020 — AUTOCRYPT Co., Ltd., a leading transportation security solutions provider, announced that it would be heading the Korean Expressway Corporation (KEC) V2X Security Credential Management System (SCMS) project. AUTOCRYPT is to deliver production-grade SCMS for KEC, which announced its plans for a national V2X security authentication system earlier this year. 

SCMS implementation is essential in a connected car environment as vehicles share information and data with all elements of the transportation environment including other vehicles, traffic infrastructure, mobile devices, and service providers through Vehicle-to-Everything (V2X) communication. AUTOCRYPT’s SCMS will ensure that only authenticated and enrolled devices can participate in communications to prevent attempts to infiltrate V2X communication messages, while protecting personal information in autonomous driving environments. 

AUTOCRYPT remains the first and only company in the APAC region to have not only developed a standards-compliant V2X SCMS, but to have also successfully tested and verified its interoperability with global device vendors. In addition to certification and verification activities via the Intelligent Transport Society of Korea (ITSK) as well as OmniAir PlugFest, AUTOCRYPT has already deployed its V2X security technology for KEC’s Intelligent Transport System (ITS) projects across the Sejong, Yeoju, and the Hwaseong K-city testbeds, securing communications since 2016. The larger Seoul Metropolitan area as well as Jeju Island are currently undergoing the final stages of construction in support of security system implementation, and Gwangju and Ulsan are set to begin construction in July 2020. 

Daniel ES Kim, CEO, said regarding the project, "Security is the cornerstone of smart mobility because no amount of risk should be permissible when it comes to driver, passenger, and pedestrian safety. Therefore, we are very honored to be heading this project for KEC, and do not take the responsibility lightly when it comes to securing V2X communications. We hope that other smart road projects worldwide will follow suit and implement comprehensive, end-to-end full stack security solutions as well." 

In June 2020 AUTOCRYPT announced headway in the Chinese market, and that it plans on further expanding its ITS efforts worldwide in Q4 2020 and into 2021. 

AUTOCRYPT is the leading player in mobility security technologies. Recognized by TU-Automotive as the Best Auto Cybersecurity Product/Solution of 2019, AUTOCRYPT continues to pave the way in transportation and mobility security through a multi-layered, holistic approach. Through security solutions for V2X/C-V2X, V2G (including Plug & Charge security), in-vehicle security, and Fleet Management, AUTOCRYPT ensures that security is prioritized before vehicles hit the road. 

Visit www.autocrypt.io for more information, and contact marketing@autocrypt.io for partnership inquiries.

Related Links :

Home