Made with FlowPaper - Flipbook Maker
< PreviousPAGE NO 10 With Keeper, each employee receives a private, encrypted digital vault that they can access from any device using one master password—the only password the employee will ever have to remember. Keeper generates strong, unique passwords for every account and automatically fills in login fields on websites and apps. “With Keeper, employees no longer have any reason to reuse passwords or use weak passwords, and IT administrators have the visibility they need to ensure compliance with the rules,” begins Darren Guccione, CEO & Co-Founder, Keeper Security. In a nutshell, Keeper provides security solutions for consumers, businesses of all sizes, managed service providers (MSPs), government agencies, and nonprofit organizations. Additionally, Keeper is currently listed on the FedRAMP Marketplace and is SOC-2 (Type 1 and 2) and ISO 27001 Certified, and listed for use by the federal government through the System for Award Management (SAM). Safety at its Peak For enhanced protection, organizations can deploy valuable add-ons such as Keeper Secure File Storage, which enables employees to securely store and share documents, images, videos, and even digital certificates and SSH keys, and BreachWatch, which scans Dark Web forums and notifies IT administrators if any employee passwords have been compromised in a public data breach. Organizations that use single sign-on (SSO) solutions can use Keeper SSO Connect to bridge SSO security gaps and extend their SSO deployment with Keeper’s end-to-end password management and security. Keeper SSO Connect is a fully managed, SAML 2.0 SaaS solution that can be deployed on any instance or in any Windows, Mac OS, or Linux environment, in the cloud or on-prem. It easily and seamlessly integrates with all popular SSO IdP platforms, including Microsoft 365, Azure, ADFS, Okta, Ping, JumpCloud, Centrify, OneLogin, and F5 BIG-IP APM. “Keeper is a modern zero-trust platform that provisions within a few hours, is easy to manage and scales to meet the cybersecurity needs of any organization - regardless of its size or industry,” says Guccione. What makes the company stand out is its zero-knowledge architecture—a security model that utilizes a unique encryption and data segregation framework that protects against remote data breaches. IT service providers that use a zero-knowledge framework are prevented from having any knowledge as to what is stored on their servers. As Guccione puts it in Keeper’s case, “We embed zero-trust as the foundation with a zero- knowledge security architecture. This prevents knowledge of or access to a user’s master passwords, secrets and encryption keys by us or a third-party. All encryption and decryption of data is performed at the client level.” The Modern Cybersecurity Strategy To protect passwords and files, Keeper uses PBKDF2 to derive authentication keys based on the user’s Master Password, then generates individual record-level AES-256 encryption keys locally on the device to encrypt each stored record. PAGE NO 11 Keeper’s cloud only holds the encrypted ciphertext of each file. Sharing between users is performed using PKI to ensure that only the recipient of a shared file can decrypt it. Keeper also securely manages the lifecycle of privileged account credentials with role-based access control (RBAC) and controlled credential sharing. Further, businesses can choose to add single sign-on (SAML 2.0) authentication, automated team management, advanced two-factor authentication, (DUO & RSA), Active Directory and LDAP sync, SCIM and Azure AD provisioning, email auto- provisioning, command line provisioning, and developer APIs for password rotation and backend integration. While explaining the value proposition of Keeper’s cutting-edge solutions, Guccione recalls an instance when they assisted DefenTec to defend its clients’ systems from cyberattacks. As a managed security services provider (MSSP), password management is DefenTec’s top security priority, both internally and when securing clients’ systems. Because MSPs/MSSPs manage other companies’ IT systems, they have unique password management needs themselves. In addition to all of DefenTec’s internal passwords, they needed to keep track of and secure all of their clients’ passwords as well. DefenTec’s team struggled to find a platform that could house all of their data, and sometimes, it was spread across three different platforms. They needed the ability to manage all of the client information from one dashboard. DefenTec was able to solve this issue with Keeper. In addition to using Keeper internally, DefenTec offers it as a managed service to their clients. Keeper’s security audit score provides clients with a visualization that helps them understand the importance of password hygiene to their overall cybersecurity. In addition to helping DefenTec improve internal efficiency and keep its clients secure, KeeperMSP provides an additional revenue stream, with the company able to mark up each subscription it sells to its clients. The Ransomware Impact Report With a vision to create a clear picture of ransomware and how it is impacting businesses and individuals, the company released ‘The 2021 Keeper Ransomware Impact Report,’ which surveyed 2,000 employees across the U.S. whose employers had suffered a ransomware attack in the previous 12 months. According to the research report, 29% of employees didn’t know what ransomware was before their organizations were attacked. Phishing emails caused 42% of ransomware attacks, malicious websites accounted for another 23% and compromised passwords caused 21%. A whopping 49 percent of respondents told Keeper that their employers paid the ransom, but 93 percent also reported that their employers tightened budgets in other areas following the ransom payment. Meanwhile, 77percent of respondents were temporarily unable to access systems or networks post-attack. 83percent said that their organizations installed new software or made other major updates post-attack, such as migrating some assets to the cloud. 71 percent of respondents said that these updates were inconvenient or disrupted productivity. This report signifies only the tip of an iceberg. With its advanced technology, Keeper protects thousands of businesses across the globe from such critical security threats. Building the Futuristic Cybersecurity Founded in 2011 by Darren Guccione and Craig Lurey, CTO & Co- founder, Keeper is the market-leading, top-rated cybersecurity platform for preventing password-related data breaches and cyberthreats. Millions of people and thousands of businesses across the globe trust Keeper to mitigate the risk of cyberattacks, boost employee productivity and meet compliance standards. Under the leadership of Guccione and Lurey, Keeper is launching new, modern applications to further enhance Keeper’s ubiquitous cybersecurity platform against the most common attack vectors. “We’re also making significant investments to protect the U.S. Public Sector in support of the recent White House Executive Order mandating greater cybersecurity protection in the sector,” concludes Guccione. With Keeper, employees no longer have any reason to reuse passwords or use weak passwords, and IT administrators have the visibility they need to ensure compliance with the rulesPAGE NO 12 T oday, the number of cybersecurity challenges that modern workplaces face is increasing in an unprecedented way. Each of a company’s endpoints is a doorway through which your employees access your corporate data. A recent report by Ponemon Institute points that in the previous 12 months, 68% of organizations experienced one or more endpoint attacks that successfully compromised data or the IT infrastructure. It is clear that endpoint attacks are on the rise, and the chances of an organization falling victim to one are also doubling every day. Unfortunately, as the number of attacks increases, so does their sophistication. The security industry has turned to more comprehensive endpoint protection platforms to address the evolving threat landscape, especially for endpoints. Such innovative solutions built on traditional platforms combine the next-gen antivirus with the addition of more advanced security controls for the most cutting- edge security. This often includes various detection technologies like machine learning, behavioral analytics, and anomaly detection. Some of the more advanced endpoint security solutions also involve intelligence integrations, continuous monitoring, and response capabilities. It uses the public cloud to access the latest threat definitions and intelligence, delivering faster and more effective responses. However, it can be challenging for businesses to find the right security solution from an industry that’s already crowded with noise. This is where Icon Outlook Magazine comes in with the Cybersecurity Special edition. We’ve compiled a list of some of the most innovative and creative security solution providers that will defend you and help perform your business operations without worrying about the ever-evolving threats. SECURITY SOLUTION PROVIDERS 2021 T O Pattivonetworks.com Website Fremont, CA Headquarters Attivo Networks Company Tushar Kothari CEO Management Attivo provides innovative defenses for protection against identity compromise, privilege escalation, and lateral movement attacks. The Attivo ThreatStrike solution is an agentless system that protects against credential theft by residing on the endpoint. Description bitdefender.com cylera.com Website Website Bucharest, Romania New York, NY Headquarters Headquarters Bitdefender Company Cylera Company Ciprian Istrate Vice President, Consumer Solutions Timur Ozekcin Co-Founder & CEO Management Management Bitdefender is a cybersecurity leader delivering best-in-class threat prevention, detection, and response solutions worldwide. With its adaptive, layered architecture, Bitdefender GravityZone Security for Endpoints offers the best protection against sophisticated threats without compromising performance. Cylera is the leading edge in IoT and medical device security, with enhanced intelligence. They deliver richer data, stronger security and faster reaction times in order to safeguard what matters most: people, data and privacy. Unlike others who use “first-generation” approaches that fall short, Cylera’s Platform is next- generation, patented technology, with a unique digital twin method. Description Description digitaledge.net Website Staten Island, NY Headquarters Digital Edge Company Michael Petrov CEO Management Digital Edge provides the most advanced, stable, secure, efficient and compliant services to clients operating Enterprise Class IT systems. Description TOP 20 SECURITY SOLUTION PROVIDERS 2021 SECURITY SOLUTION PROVIDERS 2021 T O Pfireeye.com Website Milpitas, CA Headquarters FireEye Company Bryan Palma CEO Management FireEye is the intelligence-led security company. Working as a seamless, scalable extension of customer security operations, FireEye offers a single platform that blends innovative security technologies, nation- state grade threat intelligence, and world-renowned Mandiant consulting. Description intrusion.com Website Plano, TX Headquarters Intrusion Company Joe Head CTO Management Intrusion is a company that specializes in network security. It specializes in entity identification, high- speed data mining, cybercrime, sophisticated, persistent threat detection solutions, and development and commercialization. Description fusionauth.io Website Denver, CO Headquarters FusionAuth Company Brian Pontarelli CEO Management FusionAuth is a single-tenant CIAM solution that deploys on-premises, in your private cloud, or on our fully-managed FusionAuth Cloud. Their JSON REST API provides advanced identity management that is easy for developers to deploy and implement on any platform or framework. Description keepersecurity.com Website Chicago, IL Headquarters Keeper Security Company Darren Guccione, CEO & Co-Founder Craig Lurey, CTO & Co-Founder Management Keeper is the top-rated personal and business password manager for protection from password-related data breaches and cyberthreats Description SECURITY SOLUTION PROVIDERS 2021 T O P TOP 20 SECURITY SOLUTION PROVIDERS 2021nozominetworks.com Website San Francisco, CA Headquarters Nozomi Networks Company Edgard Capdevielle President & CEO Management Nozomi Networks is the leader in OT and IoT security and visibility.They accelerate digital transformation by unifying cybersecurity visibility for the largest critical infrastructure, energy, manufacturing, mining, transportation, building automation and other OT sites around the world. Description optiv.com Website Denver, CO Headquarters Optiv Company John Ayers VP MXDR Management Optiv is an information security company and security solutions integrator that delivers end-to-end cybersecurity services globally. The company help clients plan, build and run successful cyber security programs across the globe. Description opswat.com Website Tampa, FL Headquarters Opswat Company Benny Czarny CEO, Founder and Chairman Management OPSWAT protects critical infrastructure. Their goal is to eliminate malware and zero-day attacks. They believe that every file and every device pose a threat. Threats must be addressed at all locations at all times—at entry, at exit, and at rest. Description oveo.io Website København V, Denmark Headquarters Oveo Company Michael Fornander CEO Management At Oveo, they embrase SaaS apps in all the ways they help boost productivity, streamline processes and empower the workforce. However, accompanying the great benefits that SaaS has, are the operational challenges of maintaining full visibility into SaaS utilization, cost and security risks. Description SECURITY SOLUTION PROVIDERS 2021 T O P SOLUTION PROVIDERS 2021presidio.com Website New York, NY Headquarters Presidio Company Bob Cagnazzi Chairman & CEO Management Presidio is a global digital services and solutions provider accelerating business transformation through secured technology modernization. Extensive teams of engineers and solutions architects with deep expertise across cloud, security, networking and modern data center infrastructure help customers acquire, deploy and operate technology that delivers impactful business outcomes. Description revbits.com Website New York, NY Headquarters Revbits Company David Schiffer CEO Management RevBits Cyber Security is focused on developing cutting edge security software and unrivaled cyber incident services. RevBit’s innovative software and cyber services are designed to address the most advanced threats across the entire enterprise landscape. Description quolab.com Website Columbia, MD Headquarters Quolab Company Dan Young CEO Management QuoLab Technologies is comprised of a diverse group of cyber operators, software engineers, data scientists and analysts devoted to creating innovative solutions to big/ complex data management, visualization, analysis and sharing challenges. Description securonix.com Website Addison, TX Headquarters Securonix Company Sachin Nayyar CEO Management The Securonix platform delivers positive security outcomes with zero infrastructure to manage. It provides analytics-driven next-generation SIEM, UEBA, and security data lake capabilities as a pure cloud solution, without compromise. Description TOP 20 SECURITY SOLUTION PROVIDERS 2021 SECURITY SOLUTION PROVIDERS 2021 T O Psixgen.io Website Annapolis, MD Headquarters Sixgen Company Ethan Dietrich CEO Management SIXGEN cracked the code on meaningful and innovative ways to support the cyber mission. their workforce provides incident response, operational and penetration testing, red teaming, tool development, cyber training development and continuous monitoring. Description trustwave.com Website Chicago, IL Headquarters Trustwave Company Eric Harmon, CEO Management Trustwave is a leading cybersecurity and managed security services provider focused on threat detection and response. Offering a comprehensive portfolio of managed security services, consulting and professional services, and data protection technology, Trustwave helps businesses embrace digital transformation securely. Description steelcloud.com Website Ashburn, VA Headquarters Steel Cloud Company Tony Caputo CEO Management SteelCloud is a small business based in northern Virginia. They develop STIG and policy remediation solutions for DoD/government customers and the systems integrators, consultants, and software companies that support them. ConfigOS is a patented STIG/ policy remediation tool for managing secure baselines and implementing/maintaining STIG-compliant environments. Unlike simple scanning and reporting tools, ConfigOS actually fixes/remediates STIG controls. Description xybion.com Website Princeton, NJ Headquarters Xybion Corporation Company Pradip K. Banerjee Chairman of the Board & CEO Management Xybion is a Digital Acceleration cloud platform company with end-to-end all-inclusive Solutions for business processes for highly regulated industries with embedded Quality and Predictive Compliance with Real-Time Monitoring unified on a Single Platform to Help You Manage Your Entire Business Process Seamlessly. Description SOLUTION PROVIDERS 2021 SECURITY SOLUTION PROVIDERS 2021 T O PPAGE NO 18 END-POINT SECURITY REDEFINED ATTIVO NETWORKS : O n the network and in the cloud, organizations provide human and non- human identities (applications, virtual machines, serverless operations, and so on), which attackers target early in the attack cycle to advance their attacks. These identities may be used to impersonate authorized users, access resources, travel across the network and cloud, perform surveillance, escalate privileges, identify targets, and compromise data. With the transition to remote work, attack surfaces have exploded, putting identification at the forefront of security, significantly departing from previous perimeter-based solutions. Identity-based, least-privilege access programs and defenses capable of detecting attack escalation and lateral movement on-premises and in the cloud are now required to protect identities throughout the whole company. ThreatStrike, ThreatPath, ADSecure, ADAssessor, and IDEntitleX are Attivo Networks' identity-first security products. These technologies give visibility into exposure, decrease the addressable attack surface, and prevent and detect assaults at Active Directory and cloud endpoints. The Attivo ThreatStrike solution is an agentless system that protects against credential theft by residing on the endpoint. Deception credentials entice attackers into engaging and disclosing themselves, while credentials are disguised and connected to apps. Organizations get the advantage of recognizing, assessing, and preventing an attacker by misdirecting the assault. The Attivo ThreatPath technology finds hidden aspects in the network that allow for lateral movement, which can help attackers advance the assaults. Security teams will Tushar Kothari, CEO SECURITY SOLUTION PROVIDERS 2021 T O PPAGE NO 19 At Attivo, we are changing the landscape for cybersecurity defense. Cyber attackers are creative, fast, and increasingly more malicious receive access to at-risk credentials and other sensitive data pieces throughout the enterprise, allowing them to identify them instantly. These threats and other policy infractions are rapidly exposed, providing security professionals with the information they need to proactively shut off access to essential assets or add deception to the defenses. Preventing ransomware and disruption of service attacks remain a top priority for organizations of all sizes and while EPP and EDR stop most commodity infections, today’s human-controlled ransomware can evade traditional endpoint defenses. To defend against these advanced attacks, organizations are turning to the Attivo ThreatDefend platform’s ransomware mitigation functions which can derail even the most sophisticated ransomware attacks. The platform uses cloaking technology to hide and deny access to local credentials and Active Directory objects, preventing an attacker from gaining access and the authority to change policies or do mass distribution of ransomware. Additionally, it can cloak local files, folders, removable devices, and mapped network or cloud shares, preventing the attacker from encrypting or modifying them. With widespread access and a plethora of objects with varying permission and domain control levels, protecting Active Directory has become increasingly difficult. Monitoring and maintaining security in this environment has become a serious issue, with grave ramifications if control is lost to an attacker. ADSecure differs from other security solutions in that it provides early warning when an attacker performs a query and prevents them from correctly enumerating the network by delivering bogus information. “Identity security has become a top priority as businesses look to bolster their defenses against cyberattackers. We are honored that Cyber Defense Magazine has recognized the innovation and positive impact of the Attivo ThreatDefend Platform,” says Tushar Kothari, CEO of Attivo Networks. “This recognition is also a testament to the hard work of our employees and leaders and the power of diversity.” Attivo Networks offers advanced security against identity theft, privilege escalation, and lateral movement assaults. Across endpoints, Active Directory, and cloud environments, the company's products provide unmatched visibility, prevention, and derailment for security exposures, attack vectors, and attack escalation actions. Kothari says, “At Attivo, we are changing the landscape for cybersecurity defense. Cyber attackers are creative, fast, and increasingly more malicious. In the age of the perimeter-less network, there are no longer rigid walls to keep the attackers out. Built on this premise, Attivo takes a different and innovative approach. Instead of focusing on preventing attackers from getting in, Attivo uses dynamic deception to detect the attackers that have made their way inside the network, identifies them, and empowers organizations to shut down the cyber-attack promptly.” In a conventional business network, Active Directory user accounts are the primary identification and security emphasis. Organizations must offer identities and entitlements for users and "non-human" identities such as apps, virtual machines, containers, serverless processes, and other things when they migrate to the cloud. The attack surface, and hence the hazards to the company, are increased by these identities and entitlements. Attivo Networks' IDEntitleX technology effectively addresses these issues. Kothari concludes, “I am passionate about creating cultures of innovation. I believe that when a group of people is empowered to think without boundaries, they can change the world.” Next >