Made with FlowPaper - Flipbook Maker
< Previousmake sure that all the stakeholders are involved in this journey towards resiliency,” Robin Berthier, Co-Founder, and CEO, Network Perception. What makes Network Perception a pioneer in the industry is its lightweight, robust, and safe network security solution. The company offers a completely frictionless deployment and instant value for its customers who are under stringent compliance and cybersecurity pressure. Moreover, its solutions are highly usable for both technical and non-technical users, thanks to the unique design. Moreover, the solution’s progressive data ingestion system provides values even if a subset of network devices is imported. “Our solutions are crafted to be as intuitive as possible, the user interface is elegant and simple so everyone can understand network risk exposure immediately, regardless of their technical background,” explains Berthier. Instantly Visualize the Network Map Network Perception’s instant network visualization platform is called NP-View. The platform solves compliance and security audit challenges by performing an automated and comprehensive analysis of a client’s network device configuration files. Packaged as a desktop application or server-based application, it uses the configuration files from firewalls, routers, and switches to instantly visualize the network topology. The network visualization enables anyone to understand compliance and security issues instantly. The results of the automated analysis can be seamlessly exported into actionable reports. In short, NP-View builds a model of a network that accurately represents how each network device allows and denies communication. This model computes the complete set of possible paths among network assets. “There's no other platform where you can visualize the network in a lightweight, fast way, like Network Perception’s” extols Berthier. In addition, the solution will automatically identify overly permissive rules or misconfigurations that could put your infrastructure at risk. It can also compute the connectivity in the network based on the configurations without touching the network. “First, we input the configuration file of the network devices and display a visual map of your network. Second, we do a risk assessment. And finally, we compute a path analysis to automatically verify your correct network segmentation,” explains Berthier. The Deep Modeling Technology The first step in defending a network is to know that network extremely well. The knowledge of a network configuration is the best pro-active line of defense to protect critical assets against attacks. At Network 11 Our lightweight independent verification and visualization platform provides complete network transparency and continuous mapping to better support cybersecurity compliance and operationalize cyber resiliency Perception, the team helps its clients elevate that understanding and align everyone with the same comprehension of how the network is configured. This way, Network Perception’s customers can monitor their network security control with ease. Network Perception’s innovative cyber resiliency solution comes with a deep network modeling technology to automatically verify network segmentation and provide instant firewall risk assessment. The added comprehensive REST API easily integrates within the larger cybersecurity ecosystem. The solutions’ read-only deployment feature independently verifies network configurations without increasing the attack surface. As a cybersecurity solution provider, Network Perception focuses on developing technology to support cyber resiliency, enhancing the customers' ability to verify faster and to visualize how their network architecture is efficiently protecting their critical assets or not. In most OT environments, a single person is usually able to intimately understand how the network is actually configured. The larger team relies on network diagrams that are outdated or incorrect. Moreover, most networks would accidentally connect non-critical to critical zones. NP-View is designed to automatically and effortlessly verify those issues while clarifying network architecture for all stakeholders. The Invention of Automated Security The story of the inception of Network Perception dates back to when CEO and Co-Founder Robin Berthier was working as a research scientist with funding from the Department of Energy and the Department of Homeland Security at the University of Illinois in Champaign, Urbana. The government was extremely concerned with the risk of cyber-attacks against the electrical grid and asked the researchers including Berthier to develop the next generation of network modeling solutions. This led to the development of an initial prototype to better understand networks, and better verify how access policies protect critical assets. Berthier adds, “We were very fortunate from day one of the research project to be able to work closely with industry partners. We partnered with electric utilities in the Midwest, including Ameren and ComEd, to understand their challenges and their pain points. We received continuous feedback as we developed the initial prototype.” This ultimately led to the founding of Network Perception and its evolution as a leading cybersecurity company. The team realized the complexity and monotony of having to manually go through thousands of policy rules to try to understand exactly how firewalls in the network are blocking unwanted access to critical assets and critical industrial equipment. Network Perception' solution automates the entire firewall audit process and enables compliance and security teams to shift from that tedious manual, lengthy review process into a much faster, automated and comprehensive workflow, while removing the risk of human errors. Embracing the Zero-Trust Culture Over time, Network Perception has evolved as one of the most innovative network security solution providers in the industry with over 100 customers, including half of the largest 30 utilities in the U.S. The company has also established a strong relationship with NERC and the electric utility industry. As part of its growth plan, Network Perception is launching a new set of licensing tiers for its NP-View product. The three tiers include NP-View Essential—the fastest solution to determine if network devices are in or out of compliance. NP-View Essential is the entry-level version to support the needs of organizations that don't yet have an independent verification process established. The second tier is NP-View Professional, a solution that continuously verifies if a network architecture is correctly configured to protect mission- critical assets. The Professional version is best suited for organizations with a consistent and documented independent verification process in place. It builds on the Essential version by enabling users to track changes and to augment their network verification and visibility capabilities with vulnerability information. Finally, the third tier is NP-View Enterprise, the most advanced and customizable platform to continuously check if critical assets are protected 24/7 by best-in-class defense-in-depth. The Enterprise version of NP-View is designed for organizations that have measurable security policies and procedures. It builds on the Professional version by adding dashboards, custom fields, advanced workflow automation, and full API integration. “As part of the growing zero- trust culture, it is vital to invest in a read- only and continuous verification solution that can give you a clear picture of your risk exposure without adding any new risk to your infrastructure. ” concludes Berthier. GLOBAL TEL AVIV 2022 E: cyber@cybertechconference.com | W: www.cybertechconference.com | T: +972-74-7031211 18,000 Attendees 180 Speakers 200 Companies 90 Startups 160 Delegations The Cyber Industry’s most Prominent Event is Back Cybertech Global Tel Aviv Conference and Exhibition March 1-3, 202213 Advanced IP design intelligent, high performance and resilient networks that deliver real world benefits to household names in the UK. Advanced IP are a small but highly mobile and experienced team that can react quickly to change with the ability to onboard onto projects at relatively short notice. J ust like other industries are getting better every day, cyber security is a fast-moving sector. Both hackers and security providers vie to outsmart each other. New threats – and innovative ways to combat them – emerge all the time. It is clear that most of the worst and latest network security breaches have happened because of user errors related to a lack of cybersecurity knowledge and best practices. More companies have realized this fact and the importance of providing resources to users at all levels, so they’ll have the knowledge to ward off phishing and other cyber-attack attempts. As the volume of cyber security threats and network breaches are rising at an unprecedented level for humans to handle alone, organizations are increasingly turning to AI and machine learning to hone their security infrastructure. The role of AI has been paramount in building automated security systems, face detection, network security, and automatic threat detection. AI also makes it possible to analyze massive quantities of risk data at a much faster pace. However, as AI presents a significant opportunity for more robust threat detection among businesses, criminals are also taking advantage of the technology to automate their attacks. At this juncture, CTOs and network admins need the right network security solution that could deal with their exact security requirements. That’s why GRC Outlook Magazine has made this special edition on Top Network Security Solution Providers 2022. This special edition features some of the most innovative and cutting-edge network security solution providers who are creating a difference in the industry. Cisco enables people to make powerful connections- whether in business, education, philanthropy, or creativity. Cisco hardware, software, and service offerings are used to create the Internet solutions that make networks possible- -providing easy access to information anywhere, at any time. Cisco sells its products and services, both directly through its own sales force as well as through its channel partners, to large enterprises, commercial businesses, service providers, and consumers. Shakeel Rashid Director Management Location Website advanced-ip.co.uk Birmingham, West Midlands Chuck Robbins Chair and CEO Management Location Website cisco.com San Jose, CA SOLUTION PROVIDERS 2022 TOP NETWORK SECURITYCloudflare is on a mission to help build a better Internet. Cloudflare protects and accelerates any Internet application online without adding hardware, installing software, or changing a line of code. Internet properties powered by Cloudflare have all traffic routed through its intelligent global network, which gets smarter with each new site added. From the Acropolis to the edge of space, defenders have sought the high ground in order to see farther and turn back attacks. Corelight delivers a commanding view of your network so you can outsmart and outlast adversaries. They capture, interpret, and connect the data that means everything to defenders. Their network detection and response (NDR) technology helps defend some of the world's most sensitive, mission-critical organizations. Deepwatch is securing the digital economy by tenaciously protecting enterprise networks - everywhere, everyday. Their team, many of the most technically astute minds in cybersecurity, serves an impressive list of Fortune 500/Global 2000 companies. Deepwatch’s cloud security platform backed by exceptional engineers, developers and security experts is changing the modern SOC. Hillstone Networks' proven Infrastructure Protection solutions provide enterprises and service providers with the visibility and intelligence to comprehensively see, thoroughly understand, and rapidly act against multilayer, multistage cyberthreats. Favorably rated by leading analysts and trusted by over 20,000 global companies, Hillstone protects all organizations from the edge to cloud with improved total-cost-of-ownership. Matthew Prince Co-Founder & CEO Management Location Website cloudflare.com San Francisco, CA Brian Dye, CEO Management Location Website corelight.com San Francisco, CA Charlie Thomas CEO Management Location Website deepwatch.com Denver, CO DongPing Luo Co-Founder & CEO Management Location Website hillstonenet.com Santa Clara, CA SOLUTION PROVIDERS 2022 TOP NETWORK SECURITYJuniper Networks is leading the revolution in networking, making it one of the most exciting technology companies in Silicon Valley today. Since being founded by Pradeep Sindhu, Dennis Ferguson, and Bjorn Liencres nearly 20 years ago, Juniper’s sole mission has been to create innovative products and solutions that meet the growing demands of the connected world. Nozomi Networks accelerates digital transformation by protecting the world’s critical infrastructure, industrial and government organizations from cyber threats. Their solution delivers exceptional network and asset visibility, threat detection, and insights for OT and IoT environments. Customers rely on them to minimize risk and complexity while maximizing operational resilience. Secureworks a global cybersecurity leader, enables customers and partners to outpace and outmanoeuvre adversaries with more precision, so they can rapidly adapt and respond to market forces to meet their business needs. With a unique combination of cloud-native, SaaS security platform and intelligence-driven security solutions, informed by 20+ years of threat intelligence and research, no other security platform is grounded and informed with this much real-world experience. Network Perception verifies utility protection by ensuring network access security as the first line of defense. Its monitoring software provides complete network transparency and continuous mapping to better support NERC CIP compliance and enable greater cyber resiliency. Pradeep Sindhu Founder and Chief Scientist Management Location Website juniper.net Sunnyvale, CA Robin Berthier Co-Founder & CEO Management Location Website network-perception.com Chicago, Illinois Edgard Capdevielle President and CEO Management Location Website nozominetworks.com San Francisco, CA Wendy Thomas President & CEO Management Location Website secureworks.com Atlanta, GA SOLUTION PROVIDERS 2022 TOP NETWORK SECURITYHILLSTONE NETWORK Tackle the Cyberthreats of the Future A s technology evolves ubiquitously through human minds, the need to prevent malicious attacks on precious data is growing every second. The threat landscape is continuously expanding. Cybercriminals are as entrepreneurial as ever and use increasingly sophisticated tools and technologies. Cybersecurity is not a different technology but rather a foundational set of systems spanning technology, people, and processes for the Fourth Industrial Revolution. At the onset of such paradigm shifts, Hillstone Network has taken the necessary action and has developed network security for the future. Hillstone Networks’ proven Infrastructure Protection solutions offer service providers and businesses the clarity and intellect to broadly see, thoroughly grasp, and swiftly act against multilayer, multistage cyberthreats. Positively rated by leading analysts and trusted by global companies, Hillstone safeguards from the edge to the Cloud with improved total-cost-of-ownership. Today, the greatest challenge is strengthening the network and quickly mitigating any damage from a breach regarding network security. Hillstone’s holistic products include NGFW, breach detection, SD-WAN, and VM and cloud security. The advanced solutions leverage AI/ML and integrate seamlessly into SecOps frameworks, assuring CISOs that their enterprises are well- protected. Hillstone’s product suite includes Edge Protection, Cloud Protection, Server Protection, Application Protection, and Security Management. The Edge protection solutions provide state-of-the- art protection against multistage, multilayer cyber- attacks and help mitigate infrastructure breaches that expose the sensitive user and corporate data and the threat to operations from ransomware. Hillstone is dedicated to providing proven Infrastructure Protection solutions enabling enterprises and service providers with the visibility and intelligence to comprehensively see, thoroughly understand, and rapidly act against multilayer, multistage cyberthreats. For complete Cloud Protection, Hillstone offers a progressive micro-segmentation solution that is equally at-home in VMware and OpenStack environments, enabling comprehensive coverage of cloud workloads. The Server Breach Detection System detects and helps mitigate advanced multistage, multilayer threats that target critical servers and hosts. Application Protection products include an advanced application delivery controller that allows performance enhancement of applications while protecting them. Hillstone’s security management solution provides end-to-end coverage for an enterprise, from branch to cloud. This integrated security architecture works closely with the Security Management Suite, which offers management, centralized analytics, and automation to help enhance global visibility and minimize operational expenses. DongPing Luo, CEO and Co-Founder SOLUTION PROVIDERS 2022 TOP NETWORK SECURITY17 Recently, Hillstone Network opened the Technical Assistance Center Americas (TAC) in Mexico to better serve their growing LATAM customers. The center is designed to provide 24/7/365 support. This center is in addition to the three existing centers in North America, APAC, and the EU. “This year has been especially favorable for the growth of our business in the LATAM region. From projects that we are working hand-in-hand with clients and prospects, all things point to an optimistic 2022. This is why we are paying special attention to the region. As for the language, the Hispanic cultural proximity was one of the factors that made us decide to get much closer to our customers through the TAC LATAM and provide the necessary technical support to efficiently and effectively serve our customers.” Hillstone Network was founded in 2006 by security industry veterans and has received favorable reviews of its cutting-edge security products that provide comprehensive risk mitigation and infrastructure protection across multiple enterprise locations. Their mantra is “Security that Works!” derived from customers frustrated with hyperbolic competitor claims who then experienced Hillstone’s family of security and risk management solutions. Hillstone now provides security solutions to over 20,000 enterprise customers worldwide, including Fortune 500 enterprises, service providers, financial, government, and educational institutions. Hillstone has been recognized by Gartner for seven years in a row in its Magic Quadrant for Network Firewalls and is included as a representative vendor in Market Guide for Network Detection and Response, Market Guide for Intrusion Detection and Prevention Systems, and Gartner Market Guide for Cloud Workload Protection Platforms. For complete Cloud Protection, Hillstone offers a progressive micro-segmentation solution that is equally at-home in VMware and OpenStack environments, enabling comprehensive coverage of cloud workloadsInsights WINNING WITH A STRONG CYBER SECURITY CULTURE W hile business processes and technology are important to cybersecurity risk management, Cybint Solutions reports that “95% of cybersecurity breaches are caused by human error.” Once data is lost in a breach or ransomware attack, it may be difficult to recover if an organization is not prepared. This is why a strong cybersecurity culture is important: so organizations can protect their viability, assets and data. Most importantly, only senior leadership within an organization can drive the cybersecurity culture. They provide the strategic planning and funding to ensure a proactive compliance and risk management program. Leaders also ensure that all business personnel (employees and contractors) are responsible for protecting assets and data, or reporting potential events and incidents. In a joint report by the Center for Medicare and Medicaid Innovation and ISACA, “In organizations that have yet to establish an effective cyberculture, 58% cite a corresponding lack of a clear management plan or key performance indicators.” Most surveyed in the report believe that their organization’s weak cybersecurity culture made them more vulnerable to cyber breaches, data loss, regulatory penalties, missed business opportunities and poor customer retention. Prior to creating a cybersecurity strategic plan, organizations typically perform internal or third-party risk assessments, vulnerability testing, penetration tests and code reviews. All of these activities occur regularly, such as monthly scans and annual testing. A senior leader can define and establish the cybersecurity goals and objectives within an information security strategic plan based on these regular tests and assessments. The primary objectives of the plan are to protect: • Data confidentiality • System and data integrity • Availability • Nonrepudiation These are the pillars of strong cybersecurity. Make sure that only authorized personnel have access to data when needed, and that system and data integrity are structured and compliant with security requirements and controls. Use encryption and digital signatures to prove authorized access and receipt of information. By Glori Euwer, CISSP, IAM CISO TMF Health Quality InstituteNext >