Cybersecurity Roundup: Risk Based Security, Palo Alto Networks, Zix-AppRiver and More
…of Office 365, VMware and Active Directory. Auditor is a visibility platform for user behavior analysis and risk mitigation that enables control over changes, configurations and access in hybrid IT environments to protect data regardless of its location.
New features available in Auditor 9.9 allow organizations to: secure data stored in Office 365; detect unauthorized attempts to log on to VMware; and protect cloud applications against unauthorized access attempts
Ken Tripp, Netwrix’s director of channel accounts, tells us Auditor 9.9 will benefit his company’s partners, both in direct resell and the managed services market.
“Many of the updates and new features/functionality introduced in 9.9 are requests that have come straight from our partner community,” he said. “The 9.9 release will provide our partners with the ability to create cross-sell opportunities or lead with the increased functionality and feature sets in the Office 365 and VMware applications. This will enable our partners to provide enhanced solutions for their end clients, provide further visibility into anomalous behaviors, gain even more control of permissions and spread security best practices across the client’s hybrid infrastructure.”
Auditor 9.9 also includes an add-on integration with CyberArk, Tripp said.
“A high percentage of our partner base includes the CyberArk technology in their security portfolio,” he said. “Our partners understand that a cybersecurity solution for their end clients requires multiple technologies — that there is no one technology that is a sliver bullet in securing an organization. By integrating with a market leader such as CyberArk, our partners now have a more complete solution when looking to strengthen the security posture of their client’s organization.”
And Finally, a Not-So-Happy Anniversary
“The creators of ransomware have a pretty good grasp of how security software works and adapt their attacks accordingly,” said Mark Loman, director of engineering for threat mitigation technology at Sophos. “Everything is designed to avoid detection while the malware encrypts as many documents as possible as quickly as possible and makes it hard, if not impossible, to recover the data. In some cases, the main body of the attack takes place at night when the IT team is at home asleep. By the time the victim spots what’s going on, it is too late. It is vital to have robust security controls, monitoring and response in place covering all endpoints, networks and systems, and to install software updates whenever they are issued.”
Sophos has released a new report detailing everything you need to know about the threat.
New ransomware variants are created and released every day and the job of security software is to detect and block them before they do any harm, according to Sophos. The result…