Made with FlowPaper - Flipbook Maker
PAGE NO 1 iconoutlook.com Security Special Edition MAR-APRIL 2021 CRAFTING MODERN PASSWORD SECURITY Darren Guccione, Co-Founder & CEO Craig Lurey Co-Founder & CTO SECURITY SOLUTION PROVIDERS 2021 T O PQUARANTINE UNINSTALL One Platform. One Agent. One View. The Qualys Cloud Platform and its powerful Cloud Agent provide organizations with a single IT, security and compliance solution – from prevention to detection to response! © 2021 Qualys, Inc. All rights reserved. Try it today for free qualys.com/free-trialRANTINE KILL PROCESS PATCH INVESTIGATE ALL REMEDIATE One Platform. One Agent. One View. The Qualys Cloud Platform and its powerful Cloud Agent provide organizations with a single IT, security and compliance solution – from prevention to detection to response! © 2021 Qualys, Inc. All rights reserved. Try it today for free qualys.com/free-trialVisualizers Nicholas Wilson Monica PhilipLeona George Printing and Circulation Sandy Philip Christopher MarkusAlex George Graphic Designers James WilliamsAndrew Sebastian editor@iconoutlook.com Michael Robert Edward JohnDave Walker Editorial staffs Sarah James Alex Joseph Editorial Coordinators Sujay Kodoor Scott Morson Creative Team Natasha Jacob Managing Editor Published by Icon Media Inc. ICON Outlook Magazine connects thousands of businesses across the globe who are using technology to transform the world we live in. ICON Outlook is a nexus of seasoned researchers, analysts, and telltale writers, which spots global trends and the latest tech marvels with the poise for disruption. As a result, we foresee possibilities of thwarting the chronic difficulties that have kept businesses from experiencing modernization and growth for years. Letters and Insights At ICON Outlook, we always look forward for your valuable feedbacks, comments and insights that could help us build better stories and enhance our reader’s experience. Please send your insights and comments to the editor to our office address or email. Advertising As a publisher, ads are the fuel that drive our customer’s growth. Let the world know your brand better with our customized advertising plans. Take advantage of our huge readership that includes CEOs, CTOs, and top-level business executives. For more information, drop an email to sales@iconoutlook.com. Publishing and Reprints We provide customized reprints and copies of articles as per your requirements. Get in touch with our team for a copy of the magazine or your article separately. Copy rights and Purchase All rights reserved. No portion of this magazine may be reproduced in any form, physically or electronically, without prior permission from the publisher, except as permitted by U.S. copyright law. For permissions contact: ICON Media Inc. 30 N Gould St Ste R Sheridan, WY 82801 (646) 396 6545 Richard Taylor Jennifer LetaLowrence Tse Benny DavisSam Morris Sales sales@iconoutlook.com Copyright © Icon Media Inc. 2021 Subscribe @From phishing schemes to innovations in ransomware, the goal of each attacker is to find gaps in a company’s cyber security armor. However, this fact is still not clearly understood by a large number of businesses. As the pandemic is forcing a remote work culture, the attack surface for cybercriminals has also doubled. Cybercriminals are also adopting a wide array of attack techniques, from spear phishing to crypto-jacking and advanced ransomware. While traditional phishing schemes were designed to trap any user in a specific network, spear phishing targets specific individuals, typically those who have high-level access to sensitive data at an organization. At this point, leading cybersecurity providers are also working to help businesses align with the growing threat management trends and secure the operations from security threats. Modern technology uses AI and machine learning to validate and enhance data through analysis based on their knowledge of attack trends, cyber events, and the TTP of today’s attackers. This way, businesses can be well aware of the threat landscape and prepare for any new attacks. Through attack simulation and exposure analysis, cybersecurity teams can identify and proactively remediate attack vectors ahead of incidents. We’ve developed this special edition on Cybersecurity solution providers to make your security posture even more powerful. This edition includes some of the top innovators and valuable cybersecurity insights from the leading security experts and veterans. Voice of the Editor DOUBLE YOUR DEFENSE! Natasha Jacob Managing Editor18 32 24 34 28 38 End-point Security Redefined Analyze and Identify Emerging Threats Breakthrough Innovations in Antimalware Superior IT Solutions Removing the Complexity of End-Point Security Powerful Cyberresellience ATTIVO NETWORKS INTRUSION BITDEFENDER PRESIDIO FIREEYE TRUSTWAVE Tushar Kothari, CEO Joe Head, CTO Ciprian Istrate, Vice President, Consumer Solutions Bob Cagnazzi, President, and CEO Bryan Palma, CEO Eric Harmon, CEO CRAFTING MODERN PASSWORD SECURITY Page No 08 SECURITY SOLUTION PROVIDERS 2021 T O P26 20 36 THE REGULATORY TSUNAMI ABOUT TO ENGULF IOT RE-ASSESSING SECURITY RISK DURING THE RETURN TO WORK WILL QUANTUM COMPUTING REALLY AFFECT A COMPANY’S SECURITY POSTURE? WHY IS PHISHING AWARENESS TRAINING IMPORTANT? CYBER CULTURE EATS CYBER STRATEGY FOR BREAKFAST Contents Kristin Manogue, Cloud Security Strategist, Check Point Software. Drew Neckar as Security Management Executive & Consultant at Security Advisors Consulting Group Brad Beutlich, Vice President Sales Western Region and LATA at Entrust Theo Zafirakos, CISO Terranova Security Jacqueline Jayne Security Awareness Advocate at KnowBe4 40 31COVER STORY Darren Guccione, Co-Founder & CEO Craig Lurey Co-Founder & CTO CRAFTING MODERN PASSWORD SECURITY Keeper takes only minutes to deploy, requires minimal ongoing management, and scales to meet the cybsersecurity needs of any size organizationP reventing unauthorized access is a major challenge for many companies looking to protect their valuable data. In most cases, passwords play a critical role in maintaining system security and data protection. However, many companies consider it as their biggest struggle to secure their employees’ passwords. Over 80% of data breaches, and about 75% of ransomware attacks, involve compromised login credentials. Keeper Security— creators of the leading cybersecurity platform for preventing password-related data breaches and cyberthreats—solves this problem by giving IT administrators complete visibility into employee password practices. As a result, administrators can monitor the adoption of password requirements and enforce password security policies organization- wide, including strong, unique passwords and multi-factor authentication (2FA). The solution’s fine-grained access controls allow administrators to set employee permissions based on their roles and responsibilities, as well as set up shared folders for individual groups, such as job classifications or project teams. SECURITY SOLUTION PROVIDERS 2021 T O PNext >