April 2017 Digital Edition
March 2017 Digital Edition
Feb. 2017 Digital Edition
Nov/Dec 2016 Digital Edition
Oct 2016 Digital Edition
AUSTIN, TX June 14, 2017 (SailPoint Navigate '17) Edgile, the leading cyber risk and compliance consulting firm, today announced the launch of Cloud Jumpstart, a program to address the identity provisioning and governance challenges faced with enterprise-wide shifts to the cloud. Designed to leverage both Microsoft Azure's secure access and SailPoint's identity governance, Edgile's Cloud Jumpstart helps organizations create business-aligned programs to ensure a secure and compliant shift.
"Enterprises moving to the cloud must ensure they maintain an appropriate level of security and account for increasing compliance issues in today's complex digital environment. Risk officers are realizing they need additional dedicated expertise if they want to successfully transform their company with a lasting, issue-free shift to the cloud," said Don Elledge, CEO of Edgile. "Our new Cloud Jumpstart program delivers organizations a customized blueprint for an efficient, secure, and compliant move to the cloud that improves their overall risk profile."
Award winning expertise with Microsoft and SailPoint
The Cloud Jumpstart program enables enterprise customers to take advantage of Edgile's combination of deep IAM and cloud experience. With multiple EM+S and Azure Active Directory experts honored as Microsoft MVPs, Edgile has a long history of success as a Microsoft Gold Partner. Edgile was recently named a 2017 Microsoft Enterprise Mobility Award Partner of the Year finalist. Based on an outstanding track record as a SailPoint Premiere Partner, Edgile was also named SailPoint Partner of the Year for the Americas.
Through Edgile's new Cloud Jumpstart program, organizations can confidently leverage the cloud with a business-aligned strategy for hybrid access governance. The program defines a clear path to compliance in the cloud—combining SailPoint's identity governance capabilities and extending Azure Active Directory Premium—to cover the most demanding security needs of the modern enterprise.
"We're excited about the innovative new way Edgile's Cloud Jumpstart program helps customers strategically assess and implement Microsoft Azure Active Directory with SailPoint's Identity Governance to protect their entire enterprise," said Alex Simons, Director of Program Management, Identity Division, Microsoft Corp.
"Edgile is a valued strategic consulting partner and we have a long history of working together to help our customers fully leverage the power of our identity governance platform," said Kevin Cunningham, president and co-founder of SailPoint. "Edgile's Cloud Jumpstart program accelerates our joint customers' ability to leverage SailPoint's collaboration with Microsoft and integration with Azure Active Directory. This allows security organizations to quickly evaluate and strategically deploy an integrated SailPoint-Microsoft hybrid solution. This collaboration is a powerful combination. Once deployed, it empowers users with seamless access while ensuring security requirements are met through identity governance."
- To learn more download the Cloud Jumpstart PDF
- Contact Edgile to Cloud Jumpstart your IAM and Governance
Edgile Cloud Risk & Security: We Secure the Cloud SM
The shift to the cloud is accelerating as the agility, reliability, and reduced costs of cloud services rapidly overcome concerns about protected information and regulatory compliance. Edgile provides clients with a secure and compliant path to the cloud by delivering a strategic roadmap while managing risk and modernizing the organizational security model. Our cloud specialists—with deep expertise in IAM, GRC, and cybersecurity—deliver a transformational skill set to successfully lead organizations through enterprise-wide shifts.
Edgile is the trusted security partner to the world's leading organizations, providing consulting, managed services, and regulatory content services. Our mission is to secure the modern enterprise by developing programs that increase business agility and create a competitive advantage for our clients. Our strategy-first model helps organizations achieve their business goals through on-premises and cloud security programs, IAM, GRC, and cybersecurity.
Technavio Announces Top Five Vendors in the Global Armored Vehicles Automatic Fire Extinguishing Systems Market from 2016 to 2020
LONDON --Technavio has announced the top five leading vendors in their recent global armored vehicles automatic fire extinguishing systems (AFES) market report. This research report also lists four other prominent vendors that are expected to impact the market during the forecast period.
Competitive vendor landscape
The global armored vehicles AFES market is highly competitive with vendors competing based on cost, reliability, quality, and aftermarket services. Therefore, to survive and succeed in such a highly competitive environment, it is crucial for the vendors to provide cost-effective and high-quality services. Vendors have to focus on maintaining a global presence, in-house manufacturing capabilities, product offerings, investment in R&D, and a strong client base to gain an edge over competitors.
According to Abhay Singh, a lead analyst at Technavio for defense, “The competition in this market is expected to rise over the next four years with the increase in product extensions, technological innovations, and increase in the number of M&A. International players may grow progressively during the projected period by acquiring smaller players.”
Top five armored vehicles AFES market vendors
Bulldog Direct Protective Systems
Bulldog Direct Protective Systems (Bulldog) was founded in 1998 and is headquartered in Cincinnati, Ohio, US. The company manufactures and markets bullet-resistant products that are used in applications in the homes, offices, and vehicles. The company, along with its diverse product portfolio, provides fire suppression systems primarily under Automatic Halon 1211, for armored, fire, police, and passenger vehicles. This system is triggered when its sensors detect fire. Bulldog also provides custom design services for its customers.
The company has been supplying armored vehicles and customized bulletproofs cars to the military and peacekeeping agencies since its inception in 1998.
Firetrace Aerospace was founded in 2003 and is headquartered in Scottsdale, Arizona, US. The company manufactures and sells wheeled vehicles and aviation fire protection systems globally. It operates as a subsidiary of a UK-based health and safety technology provider, Halma.
The company provides fire suppression systems for the armored vehicles that are deployed in combat missions. It supplies fuel tank fire suppression systems (Fire Panel) to the US military, the US Marine Corps (USMC), and their allied forces for the deployment armored combat vehicles. The Fire Panel is designed to fit in the combat vehicles' fuel tanks during the design phase or in-theater phases.
Kidde Deugra was founded in 1958 and is headquartered in Ratingen, Germany. The company provides fire protection systems for armored vehicles and non-military vehicles, as well as for the aviation industry.
The company offers fire protection solutions at two different points in the vehicle. It provides fire-extinguishing systems in the engine room, as well as installs the fire suppression systems for protecting crew's quarters in the armored vehicles. Its fire detection system sends alarms to the control unit of the engine room for automatic fire fighting process. In this process, the linear sensors or point detectors serve as a fire detection agent.
N2 Towers was founded in 2002 and is headquartered in Belleville, Ontario, Canada. The company manufactures and sells inert gas generators (IGG) explosion and fire suppression systems that are used in many industries, including telecommunications and IT, transportation, oil and gas, mining, aviation, military armored vehicles, and medical facilities.
The company supplies automatic fire detection systems and generator explosion suppression systems for installation in military armored vehicles. These systems are installed either as a retrofit-type assembly or as new supplemental systems to ensure enhanced and sustainable protection for onboard military personnel.
Spectrex was incorporated in 1981 and is headquartered in Cedar Grove, New Jersey, US. The company manufactures and markets flame and open path gas detectors globally. The company provides automatic fire detection and suppression systems for the army and marine armored vehicles primarily in the US. It provides its products to different industries including oil and gas, chemical and petrochemicals, pipelines, power, automotive, mining, aviation, pharmaceuticals, and defense. Since September 2015, the company has been operating as a subsidiary of Emerson, a US-based technology and engineering services provider.
Browse Related Reports:
Purchase these three reports for the price of one by becoming a Technavio subscriber. Subscribing to Technavio’s reports allows you to download any three reports per month for the price of one. Contact [email protected]with your requirements and a link to our subscription platform.
Investigators have discovered a potential cyber security threat to the U.S. critical infrastructure. BlackEnergy is a trojan horse discovered within the software that controls oil and gas pipelines, water systems, and power transmission grids in the U.S. Using Black Energy, hackers could have the ability to use the internet to shut down pipelines, nuclear power plants, wind turbines, and water treatment plants.
Department of Homeland Security’s (DHS) Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) identified the sophisticated malware believed to be inserted by hackers sponsored by the Russian government.
ICS-CERT has determined that users of HMI products from various vendors have been targeted in this campaign, including GE Cimplicity, Advantech/Broadwin WebAccess, and Siemens WinCC. It is currently unknown whether other vendor’s products have also been targeted, according to DHS. ICS‑CERT is working with the involved vendors to evaluate this activity and also notify their users of the linkages to this campaign.
According to DHS, the BlackEnergy hacking campaign has been ongoing since 2011, but no attempt has been made to activate the malware to damage, modify, or otherwise disrupt affected systems. ICS-CERT officials believe that Russian intelligence agencies helped place the malware in key U.S. systems as a threat or a deterrent to a U.S. cyberattack on Russian systems -- mutual assured destruction from a cold war-era playbook.
ICS-CERT has not been able to verify if the intruders expanded access beyond the compromised HMI into the remainder of the underlying control system. However, typical malware deployments have included modules that search out any network-connected file shares and removable media for additional lateral movement within the affected environment. The malware is highly modular and not all functionality is deployed to all victims, according to DHS.
Black Energy is the same malware that was used by a Russian cyber-espionage group dubbed Sandworm, to target NATO and some energy and telecommunications companies in Europe earlier this year. Investigators found linkages in the shared command and control infrastructure between the BlackEnergy and Sandworm campaigns, suggesting both are part of a broader campaign by the same threat actor.
ICS-CERT coordinates control systems-related security incidents and information sharing with Federal, State, and local agencies and organizations, the intelligence community, and private sector constituents, including vendors, owners and operators, and international and private sector CERTs. The focus on control systems cybersecurity provides a direct path for coordination of activities among all members of the critical infrastructure stakeholder community.
If you want to keep any warm and fuzzy feelings you have about your firewall because it has received good grades from a test lab, you won't want to read the latest report from NSS Labs.
The independent testing lab in Carlsbad, CA, revealed in its Network Firewall Group Test Report for 2011's first quarter that five of the six firewalls examined by the organization failed to correctly handle a TCP Split Handshake spoof, or Sneak ACK attack. That failure is an invitation for hackers to breach your firewall.
The researchers also found that three out of six products tested failed to remain operational when subjected to the boffin's stability tests. "This lack of resiliency is alarming, especially considering the tested firewalls were ICSA Labs and Common Criteria certified," NSS said in a statement released April 12. Like NSS, ICSA and Common Criteria test and certify computer products.
Another finding in the report was that measuring network performance based on the RFC-2544 (UDP) standard does not provide an accurate picture of how a firewall will perform in real-world environments. RFC-2544 is a benchmarking methodology that discusses and defines a number of tests that may be used to describe the performance characteristics of network devices.
What's disconcerting about the NSS findings is that firewalls are considered the main barriers between an organization's internal and external networks. Over the past 25 years, they have become the foundation of perimeter security and are considered to be commodity products.
“IT organizations worldwide have relied on third-party testing and been misled,” NSS CTO Vik Phatak stated. “These test results point towards the need for a much higher level of continuous testing of network firewalls to ensure they are delivering appropriate security and reliability.”
All major firewall makers were invited to participate in the tests, which were conducted by NSS free of charge. Makers that took up the offer were
- Check Point Power-1 11065
- Cisco ASA 5585
- Fortinet Fortigate 3950
- Juniper SRX 5800
- Palo Alto Networks PA-4020
- Sonicwall E8500
More than 60 percent of the computers in China and Thailand are infected with malware, according to a report released April 5 by a maker of security software.
Close behind those Asian nations are a handful of countries with infection rates exceeding 50 percent—Japan, Latvia, Russia, Turkey and Saudi Arabia—the quarterly report from Panda Security's anti-malware lab revealed.
The United States dropped out of the top 20 infected computer list during the period. France, Spain and Ireland—all with infection rates of around 40 percent—had the dubious distinction of being added to the list during the quarter.
The most popular form of malware found on infected computers was the Trojan, the report said. In China, for example, more than 75 percent of all infections involved that form of bad app. The next most prevalent malware forms—adware and viruses—represented less than 15 percent of the malicious software pie in that nation.
During the quarter the report noted, "We have seen a number of attacks on cell phones and Facebook remains the king of all social networking sites, which has turned it into a lucrative draw for cyber crooks aiming to trick users."
"Additionally," it continued, "some international events—like the civic rebellions sweeping across Northern Africa—have been largely reflected in the cyber-activism and security worlds."
"This first quarter has also seen cyber war and cyber espionage in the spotlight, with China as the usual suspect in most cases," it added.
Folks with a yen for cyber crime found it easier than ever to embrace their dark side in 2010 thanks to the wide availability of "toolkits"—software designed to steal information from computers without its user needing much in the way of tech savvy, according to an annual report released March 31 by an Internet content security company.
"More than anything else, 2010 was distinguished by the full and proper emergence of toolkits as a means to perpetrate cyber crime," Trend Micro researchers noted in their 2010 Threat Trends report.
"While these have always been a part of the cybercrime underground," the report continued, "in 2010 they flourished and became an even bigger part of the overall threat landscape."
Toolkits cost a little more than say, an off-the-shelf office suite. The report pegged the basic price for a copy of a thiefware program called ZeuS to be $8000. "More features can easily double the price," it said. More modest offerings, like SpyEye, cost around $3000. "However," the report noted, "what that price buys cyber-crime gangs are proven, reliable, and stealthy malware that are capable of comprehensive theft."
Because toolkits remove what used to be a significant obstacle to entry into cyber crime, their impact can't be underestimated, the report maintained. "There used to be something of a barrier to entry, as technical knowledge and expertise were both necessary to enter the world of cyber crime," it said. "Today, with cyber-crime toolkits in full production, very little, if any, technical knowhow is needed to profit."
Trend Micro researchers also found that the Web has become the favorite means of information highwaymen for reaching their victims. More than 80 percent of the top bad apps of 2010 were delivered via the Web, they noted.
"Mass compromises continued to be a prevalent risk that Web users had to contend with," the report added. "For instance, in the early part of the June, some 100,000 sites were compromised. Users who visited infected sites ended up with systems infected by data stealers that targeted online games."
Another finding by the researchers was that spam volumes in 2010 continued to rise compared to the previous year. However, volumes did decline at the end of the year—a development that the researchers attributed to the end of the Spamit network at the end of October.
"So far," the report said, "our analysts believe that spamming is still too lucrative a business to completely abandon so any intervention that may affect the overall volume can only lead to a temporary slump."