Vulnerability management and threat assessment solutions build on existing suite to give organizations end-to-end infrastructure protection

HelpSystems announced today the acquisition of Digital Defense, a leader in vulnerability management and threat assessment solutions. Digital Defense’s cloud-native vulnerability scanning engine gives organizations in healthcare, legal, financial services, and other industries the ability to proactively detect infrastructure security gaps and take effective remediation steps to safeguard against internal and external cyberthreats. As part of HelpSystems’ cybersecurity portfolio, Digital Defense joins Core Security and Cobalt Strike to establish a comprehensive, best-in-class security assessment toolkit.

Read more ...

Security today announced that it was recognized as a leader in The Forrester Wave: Security Analytics Platforms, Q4 2020 report. Released today, the report evaluated 11 of the top Security Analytic providers, with IBM ranking highest in the current offering category compared to other vendors, and Forrester noting that IBM is "building an open security platform on the cloud."

Read more ...

IBM announced today that the company has been recognized as a Leader in three market reports evaluating Managed Security Services Providers. Profiling IBM's strategies and capabilities in managed security services are:

  • "The Forrester Wave: Global Managed Security Services Providers, Q3 2020" by Forrester Research: IBM Security Services received the highest score in the strategy category and among the highest in the market presence category and second highest in the current offering category.
  • "The Forrester Wave: European Managed Security Services Providers, Q3 2020", by Forrester Research: IBM Security Services was top ranked in two categories – current offering and strategy with the highest score possible in the third-market presence.
  • "IDC MarketScape: Worldwide Managed Security Services 2020 Vendor Assessment" (Doc # US46235320, September 2020): IBM Security Services was cited for its key strengths as a global scale partner with local delivery capabilities able to address customer needs such as the journey to cloud, application security, threat intelligence and threat management operations.
Read more ...

New Service Translates Security Risk Exposure for Areas Like Cloud, M&A and Remote Work into Financial Terms

IBM Security today announced a new risk-based service designed to help organizations apply the same analytics used for traditional business decisions to cybersecurity spending priorities. IBM's new Risk Quantification Services creates risk assessments to help clients identify, prioritize and quantify security risk as they weigh decisions such as deploying new technologies, making investments in their business and changing processes.

Read more ...

- Combines IBM's premier technology consulting services with EY leading strategy and business consulting capabilities

- Provides clients with specialized hybrid cloud functionalities including Red Hat OpenShift, as well as IBM Watson, IBM Blockchain, 5G and edge computing technologies

- Dedicated EY professionals with broad experience across IBM's leading technologies to help solve significant client challenges

EY and IBM today announce an enhanced, global multi-year alliance designed to help organizations accelerate digital transformation and improve client outcomes, including leveraging the hybrid cloud capabilities of Red Hat OpenShift, as well as IBM Watson, IBM Blockchain and IBM's 5G and edge technologies. Together, IBM and EY professionals will focus on helping clients modernize and transform their businesses.

Read more ...

Raz-Lee Security has added a ransomware attack simulator to its iSecurity Anti-Ransomware. With this feature, customers can test how their systems would behave during ransomware attacks. Administrators can verify and fine-tune the protection that the product provides.

Ransomware usually runs from a PC. It attacks any data file it can access, including IBM i IFS files.

A few weeks ago, Sapiens, a software developer for insurance, with software for IBM i, was forced to pay a $250,000 ransom in Bitcoin. A published known Ransomware attack on an IBM i made 250,000 IFS files unusable, stopped normal work for a month and cost the organization $200,000 to get the decryption key.

“During this COVID-19 pandemic, ransomware and other cyber-attacks have increased, targeting healthcare, financial, and government organizations. Cybercriminals are looking to take advantage of this global crisis. Now more than ever, it is important to ensure that IT systems are safe,” says Shmuel Zailer, CEO, Raz-Lee Security.

The Anti-Ransomware attack simulator can simulate known ransomware such as Sodinokibi, Ryuk, CryptoLocker, or WannaCry. The attack simulator can also simulate unknown zero-day ransomware that criminals on the darknet are offering as “ransomware as a service”. The attack simulator runs from a PC. It installs quickly and can be reused repeatedly to test various conditions on the IBM i. Simulated attacks are completely safe, but the IBM i sees them as realistic ransomware attacks. With these combined capabilities, organizations can have confidence that their IBM i is well protected.

iSecurity Anti-Ransomware itself runs on the IBM i. Unlike antivirus software, which consumes a lot of CPU and can only report on the damage that an attack has caused, Anti- Ransomware consumes virtually zero resources. It stops ransomware attacks immediately when they start. It can disconnect the IBM i from the network, send an email, alert the SIEM, and shut down the attacking PC.

The new iSecurity Anti-Ransomware is now available. About iSecurity Anti-Ransomware

Anti-Ransomware is a completely independent product. It is part of the iSecurity Advanced Threat Protection (ATP) suite, which also includes Anti-Virus, an ICAP client for the Antivirus, and Object Integrity Validation.

- Global Survey Finds Use of More Than 50 Security Tools Leads to Less-Effective Security Response

- Majority of Organizations Don't Have Specific Plans for Common and Emerging Attacks

IBM Security announced the results of a global report examining businesses' effectiveness in preparing for and responding to cyberattacks. While organizations surveyed have slowly improved in their ability to plan for, detect and respond to cyberattacks over the past five years, their ability to contain an attack has declined by 13% during this same period. The global survey conducted by Ponemon Institute and sponsored by IBM Security found that respondents' security response efforts were hindered by the use of too many security tools, as well as a lack of specific playbooks for common attack types.
Read more ...

X-Force Red Expands Testing Practice to Help Organizations Strengthen Work from Home Security

IBM Security released findings from a study focused on the behaviors and security risks of those new to working from home (WFH) during the COVID-19 pandemic. The study shows more than 80% of respondents either rarely worked from home or not at all prior to the pandemic, and, in turn, more than half are now doing so with no new security policies to help guide them. This shift to working from home has exposed new security risks and has left nearly 50% of those employees worried about impending cyber threats in their new home office settings.

Read more ...