Netwrix Auditor for Office 365 provides visibility and user behavior analytics to enable protection of cloud-based email services against cyber threats
IRVINE, Calif. – Netwrix Corporation, a provider of IT auditing software that delivers complete visibility into IT infrastructure changes and data access, has released Netwrix Auditor for Office 365. The application delivers complete visibility into Exchange Online by detecting and reporting on changes made to Exchange objects, configurations and permissions, as well as non-owner mailbox access to Exchange Online user mailboxes.
According to the Netwrix 2015 Cloud Security Survey, almost 50% of companies start their cloud-based operations with migrating their email systems to the cloud. However, companies are not confident about cloud security: 69% acknowledge the risks of unauthorized access and 43% recognize the risk of account hijacking. In order to mitigate security risks, ensure uninterrupted email service and speed up the troubleshooting of disruptive changes, companies need to gain rigorous control over sensitive email systems. Netwrix Auditor for Office 365, a part of the recently announced Netwrix Auditor 8.0 platform, is designed to overcome the limitations of Exchange Online’s native auditing tools, such as lack of reporting capabilities and consolidation of all necessary details into a single view.
Key features of Netwrix Auditor for Office 365 include:
Maximized visibility on the full spectrum of changes: Informs users about Exchange Online configuration changes with all necessary details, such as what was changed, who made a change and where a change occurred, as well as the before and after values and IP addresses, improving Office 365 email security.
Scheduled and on-demand reports and dashboards: Enables easy Office 365 security analytics by delivering timely and complete audit information in scheduled and on-demand reports and dashboards that offer multiple usability options, including filtering, sorting and exporting in various formats.
Continuous regulatory compliance: Helps establish a secure and compliant Exchange Online organization by offering the broadest range of scheduled and on-demand reports, dashboards and data search to address specific requirements of PCI DSS 3.0, HIPAA, SOX, FISMA/NIST800-53, ISO/IEC 27001 and other compliance regulations.
Non-owner mailbox access auditing: Detects Exchange Online mailbox access by someone other than the owner and notifies mailbox owners about all such activity to prevent privilege escalation issues. Reports specify exactly what actions were performed on specific mailbox items, the client used and the computer’s IP address.
“The largest to-date Panama Papers data breach teaches us that today we all live in the reality of the ever-growing security risks,” said Alex Vovk, CEO and co-founder of Netwrix. “Since it is almost impossible to predict where a cyberattack would come from, any company should enable complete visibility into most critical systems to spot anomalies that might result in a data breach. Deep understanding of who touches sensitive mailbox data will detect insider threat and data exfiltration to strengthen security of cloud environment and ensure companies that any unstructured data is under control.”
To learn more about how to enable hybrid cloud visibility and strengthen your email security, please visit http://www.netwrix.com/office_365_auditing.html.
About Netwrix Corporation
Netwrix Corporation provides IT auditing software that delivers complete visibility into IT infrastructure changes and data access, including who changed what, when and where each change was made, and who has access to what. Over 150,000 IT departments worldwide rely on Netwrix to audit IT infrastructure changes and data access, prepare reports required for passing compliance audits, and increase the efficiency of IT operations. Founded in 2006, Netwrix has earned more than 70 industry awards and was named to both the Inc. 5000 and Deloitte Technology Fast 500 lists of the fastest growing companies in the U.S. For more information, visit www.netwrix.com
Regroup Mass Notification, the award-winning provider of emergency and day-to-day notification solutions, today announced the launch of their AlertManager Mobile Appfor IOS and Android to empower mobile users to quickly launch critical alerts directly from their smartphones.
AlertManager allows users to easily initiate a notification on the go from any location without having to log into the system. Advance features like pre-written Quick Posts facilitate one-click alerting from an user-friendly interface to guarantee important alerts are sent out on time.
This new application empowers both admins and recipients to send and receive multimodal alerts via text/SMS, text-to-speech, voice, email and push notifications.
Key features and benefits of AlertManager include:
Real-time, two-way communication between admins and recipients
Push notifications that ensure critical alerts are always delivered
Two-step Quick Post feature facilitates one-click alerting
Customizable Quick Post templates that can include event-specific text, multimedia, attachments, images and recorded messages
Populated recipient lists empower admins to easily reach specific people or groups
HTML, rich-text editor
NWS/NOAA weather alerts as they are issued
“We at Regroup are very excited about this new application that will allow our clients to leverage the power of mobile technologies to improve communications and reach recipients wherever they are at any moment. This developments comes after months of hard work and intense testing that we believe will simplify communications for many organizations,” said Joe DiPasquale, CEO of Regroup.
Regroup, the leading provider of Emergency and Mass Notification solutions offers easy one-click messaging to mobile phones (text/voice), landlines, email, social media, websites and more. Regroup stands apart from other mass communication systems with its ease of use, automated messaging capabilities, seamless integration with client databases and other third-party systems, unparalleled 24/7 customer support and unlimited text/voice/email messaging. Regroup’s powerful, yet easy-to-use mass communications platform is leveraged by universities, state/local governments, corporations and nonprofits across North America to streamline emergency and day-to-day communications.
New Joint Offering Enables Seamless SharePoint Migration to the Cloud and SharePoint Server 2016
* "Maximize The Business Value Of New ECM Deployments With A Clear Migration Strategy" By Cheryl McKinnon with Leslie Owens and Emily Jedinak, Forrester, June 3, 2014
Former NSC Director of Cybersecurity Policy Leads Company's Assessment Program Designed to Identify Attack Surface and Secure High-Value Assets
SUNNYVALE, Calif. – Illumio, the Adaptive Security Company, today announced the launch of its Attack Surface Assessment Program (ASAP). Illumio ASAP gives enterprises MRI-like visibility inside the data center and cloud by providing a map of high-value assets and open communications pathways between applications. It then enables organizations to understand -- and radically reduce -- the attack surface of their high-value assets.
In a computing era where an average of 96 percent of systems have been breached (FireEye, Maginot Revisited, 2015), Illumio ASAP addresses the security gap inside the data center and cloud created by network segmentation technologies. It is designed for organizations who want to proactively identify and eliminate existing risks inside their data center and cloud associated with the lateral spread of attacks. ASAP's network- and application-level visibility enables IT Security teams to identify unknown traffic between development and production environments, as well as communication pathways that make high-value applications vulnerable to attackers.
"Once an attacker is inside a data center or cloud, their 'dwell time' -- the period they can scan a compromised network for high-value data before being detected -- can be upwards of 100-200 days," said Doug Cahill, ESG. "Technologies like the Illumio Attack Surface Assessment Program can give organizations additional visibility that can help them restrict attackers' ability to conduct network reconnaissance or eliminate infrastructure vulnerabilities before they can ever be exploited."
The development of Illumio ASAP was led by Nathaniel Gleicher, Head of Cybersecurity Strategy for Illumio and former Director for Cybersecurity Policy for the National Security Council at the White House.
"Because network segmentation tools tend to be coarse grained and incredibly complex to deploy at scale, the interior geography of most data centers is still fairly open," said Gleicher. "This large attack surface favors attackers, because once they get in they can quickly move to high-value targets, and be extremely difficult to identify and contain. Illumio ASAP is designed to rebalance the playing field between defenders and attackers."
Illumio ASAP Benefits
Illumio ASAP highlights the servers and communications flows that attackers are most likely to target in their search for high-value assets. The custom Illumio assessment report gives organizations a draft plan for eliminating the attack surface inside their data centers and clouds by using adaptive segmentation to harden their security posture.
- VIDEO: Why You Need Illumio ASAP: https://youtu.be/-ovOPspQRwY
- VIDEO: What You Get with Illumio ASAP: https://youtu.be/d6K2XWq46vM
Illumio delivers adaptive security for every computing environment, protecting the 80 percent of data center and cloud traffic missed by the perimeter. The company's Adaptive Security Platform™ visualizes application traffic and delivers continuous, scalable, and dynamic policy and enforcement to every bare-metal server, VM, container, and VDI within data centers and public clouds. Using Illumio, enterprises such as Morgan Stanley, Plantronics, NTT, Salesforce, King Entertainment, NetSuite, and Creative Artists Agency have achieved secure application and cloud migration, environmental segmentation, compliance, and high-value application protection from breaches and threats with no changes to applications or infrastructure. For more information, visit www.illumio.com or follow @Illumio.
(TNS) - As they so often do, 911 calls came fast and furious on a recent weekday afternoon. A residential burglary. A business burglary. A person with a gun. They all happened at once, in different Evansville neighborhoods.
Amy Worthington was on top of it. Seated in the City-County Dispatch Center, with four computer screens in front of her and her headset in place, Worthington navigated Evansville Police Department officers to each event.
Officers were stretched so thin at the time that Worthington had to send two patrol units that normally work the South Sector out of their jurisdiction to one of the burglaries. It was such a busy few minutes that at one point, only three EPD cars were freely patrolling the city.
Until recently, I knew nothing about enterprise security beyond some of the more widely publicized breaches in the United States.
That said, after spending most of 2016 immersed in the space, I’ve come to appreciate just how challenging and broad an issue security has become to enterprises.
I’ve also come to believe that our best hope for solving security is by understanding humans — the perpetrators and victims of cyberattacks — and, as a result, I’m convinced that security is fundamentally a human identity problem.
(TNS) - Japan was intensifying search and rescue operations on the southern island of Kyushu Friday amid a series of aftershocks, after a 6.5-magnitude earthquake killed at least 9 people and injured about 1,100, the government said.
The government deployed more than 3,000 people to Kumamoto prefecture, the hardest-hit region in Thursday's quake, as Prime Minister Shinzo Abe vowed to make its utmost efforts in the operations.
"We will do our best to ensure the safety of residents," Abe told reporters.
Walls and houses collapsed in Mashiki, a rural town of 33,000 residents, 900 kilometres south-west of Tokyo, when the quake struck at 9:26 pm Thursday (1226 GMT) at a depth of 11 kilometres, local officials said.
(TNS) - Boyd County 911 will begin a transition from Nixle alerts to more specific updates through AlertSense.
Boyd 911 Director Sandy Ott said the new system will feature geo-locating capabilities and voice dialing to landlines so alerts can not only be more specific, but also reach those who do not have access to text messaging or computers.
Administrative training will begin this summer and Ott hopes the new system can launch as soon as June 1.
Ott explained that AlertSense will allow government agencies to post from the same source so that users will not have to sign up for individual alerts.
There is a lot to be said for the hybrid cloud. It blends local control and security with scale-out resources and operational flexibility, all of which are emerging as crucial factors as organizations make the transition to digital business models.
Indeed, if the hybrid cloud were not so effective, no one would give it a second thought. But this does not mean it is trouble-free. And the further along the enterprise goes in the transition to cloud-based infrastructure, the more glaring the deficiencies become.
At the moment, of course, the benefits outweigh the risks in the eyes of most enterprise managers. According to a global survey of 500 IT decision makers, the vast majority say the hybrid cloud is crucial in maintaining a competitive advantage and lowering the cost of data infrastructure. This is manifesting itself in a number of ways, including improved collaboration between IT and line-of-business managers and increased self-service resource provisioning so knowledge workers don’t succumb to the lure of shadow IT. The challenge, however, is to ensure that resources and data sets can be integrated across local and distributed infrastructure, while at the same time building up internal skillsets to oversee this new form of infrastructure and to ensure it does not get bogged down with overly complex management and security systems.
Unisys Stealth(cloud)™ to deliver added security at a lower cost to users of Microsoft Azure, a platform used by 85 percent of Fortune 500 companies in 140 countries
LONDON, UK – Unisys Corporation (NYSE: UIS) today announced the availability of Unisys Stealth(cloud)™ for Microsoft Azure to seamlessly deliver award-winning Stealth micro-segmentation security from clients’ enterprises to Azure.
Expanding upon Microsoft’s security built into Azure, Stealth layers on additional security countermeasures, unifies security management for enterprises using the cloud, and creates a highly efficient link to transfer workloads to Azure in a safe, efficient and cost-effective manner.
“As enterprises shift from data centers to the cloud, security and efficiency are the keys to success,” said Tom Patterson, Chief Trust Officer at Unisys. “Unisys is pleased to add interoperability with Azure to our Stealth offerings, giving enterprises unparalleled security, greater controls, and lower costs with increased operational efficiency when working with Azure.”
“We are committed to supporting a comprehensive, cross-company approach to security in everything we do,” said Ann Johnson, Vice President of Worldwide Enterprise Security Group at Microsoft. “Adding Stealth on top of the strong security already built into Azure helps give enterprises the flexibility and assurance to operate in our cloud.”
Stealth software provides additional protection to data and applications on the Azure cloud platform using encryption and identity-driven micro-segmentation techniques – a new approach to security that allows enterprises to quickly and easily divide physical networks into thousands of logical micro segments. Even if adversaries infiltrate one micro-segment, they would not be able to move across to other parts of the enterprise environment. In addition, enterprises that want to dynamically extend their on-premises infrastructure to Azure can easily use the XDC (extended data center) capability of Stealth that automates the shifting of secure workloads from their data centers directly into Azure, saving time and money.
By providing additional security features, Stealth removes roadblocks for many organisations looking to take advantage of the cloud as a way to remain ahead in today’s competitive business environment. Stealth allows organisations to seamlessly expand Stealth protection from their data centers to the Azure cloud platform on demand, providing end-to-end data encryption from a workstation, server or virtual machine in the data center all the way to a virtual machine (VM) in Azure. Stealth-protected Azure VMs are undetectable to unauthorised users.
Unisys was selected by Microsoft for its 2015 Azure Innovation Partner of the Year award. The new solution underscores Unisys’ continuing strategy of working with leading cloud technology providers, and bolsters the company’s commitment to solving real-world business challenges by providing advanced capabilities in infrastructure and service management, analytics, application services and software, differentiated by security.
Unisys is a global information technology company that works with many of the world's largest companies and government organisations to solve their most pressing IT and business challenges. Unisys specializes in providing integrated, leading-edge solutions to clients in government, financial services and commercial markets. With more than 20,000 employees serving clients around the world, Unisys offerings include cloud and infrastructure services, application services, security solutions, and high-end server technology.