Technology Sectors

Market Sectors

<div style="text-align:center"> <p>"Mass Notification Profiles"</p> <p>Ideas and strategies<br><br /> from leading vendors</p> <p>Prepared exclusively<br><br /> for GSN Magazine<br><br /> by:</p> <p><a href="http://www.gsnmagazine.com/node/30557?c=communications">LRAD Corporation</a></p> <p><a href="http://www.gsnmagazine.com/node/30559?c=communications">Desktop Alert</a></p> <p>Available in Print or Online</p> </div>

IT Security

GSN 2012 Awards announced: White House deputy of homeland security recognized for leadership at annual gala

GSN Awards 2012

Hundreds of the best of the homeland security community’s federal, state and municipal government officials, government contractors, systems integrators, IT vendors and physical security product and solutions providers all came together the night of November 29 in a ballroom of the Washington, D.C. convention center to receive accolades.

The GSN awards dinner, which has become a Washington tradition over the last four years, offered a chance for the excellence and civic-minded spirit of homeland security efforts nationwide to be recognized.

Not only were the best tools and technologies acknowledged , but the people and groups who use them, from local police departments in Florida and Washington state, to the White House, were honored at the event.

During the awards ceremonies, Richard Reed, Deputy Assistant to President Obama for Homeland Security, received the second annual Government Security News/Raytheon Award for Distinguished Leadership and Innovation in Public Safety and Security. Reed was chosen for tireless work in his key role in leading the development of national policy related to resilience, transborder security and community partnerships. He has been described as the president’s eyes and ears during disasters. In crises, such as the Gulf oil spill, H1N1 pandemic, and Haiti earthquake, Reed has sprung into action at the White House, coordinating information and gathering people to cope with these catastrophes.

Reed told Government Security News in an interview after the dinner that gatherings like GSN’s awards ceremony were invaluable in demonstrating that the hard work of creating a resilient, strong response to crises is performed by thousands of individuals, like those in attendance. Gatherings that bring the diverse emergency response and homeland security communities together can broaden perspectives and spur new ideas, he said.

Reed has been a determined, mostly behind-the-scenes, captain of federal emergency response efforts during the Bush and Obama administrations, helping prepare for, and respond to, some of the worst natural disasters the nation has known, from one of the deadliest tornado seasons in history in the Midwest, to historic wild fires in the west, and massive storms in the eastern U.S.

Reed said the key to capable response to such staggering events lies not only in federal hands, but in enabling state, local and even personal responses. Getting resources and training in place before disasters happen goes a long way in an effective response and recovery, he said. “The true first responders are friends, neighbors and co-workers” in the immediate aftermath of a disaster, said Reed. Local police, firefighters and other agencies arrive second, he said. Enabling people with information concerning what resources are available or where they can go for help or supplies empowers them, said Reed.

Government Security News managing partner Adrian Courtenay has made the GSN/Raytheon award an annual tradition. The prize is sponsored by the Raytheon Company, a technology and innovation leader specializing in defense, homeland security and other government markets throughout the world, which is headquartered in Waltham, MA.

Notable 2012 government excellence award winners included the local police departments in Tampa and St. Petersburg, FL, for their ground-breaking work in preparing for the Republican National Convention in Tampa this past summer. The departments put together comprehensive plans to gently defuse potentially volatile political demonstrations at the event. Both departments were also praised for implementing an innovative interoperable communications network during the GOP convention.

The Lawrence Livermore National Laboratory was recognized for its groundbreaking work on a small radiation detector. The Naval Air Systems Command won an award for its work on the Kestrel Wide Area Persistent Surveillance program, which developed an aerostat for long-term surveillance capabilities to protect ground soldiers in Afghanistan.

The complete list of GSN’s 2012 Award winners appears below: 

CATEGORY 1 – VENDORS OF IT SECURITY PRODUCTS AND SOLUTIONS

 

Best Anti-Malware Solution

 

Invincea

 

Best Identity Management Platform

 

Alert Enterprise

 

Best Certificate Management Solution

 

Entrust

 

Best Compliance /Vulnerability Assessment Solution

 

Agiliance

 

Best Data Security/Loss Management Solution

 

WAVE Systems

 

Best Endpoint Security Solution

 

StillSecure

 

Best Forensic Software

 

Silvertail

 

Best Intelligence Data Fusion and Collaborative Analysis Solution

 

Lookingglass Cyber Solutions

 

Best Intrusion Detection/Prevention Solution

 

Intellidyne

Vanguard Integrity Professionals

 

Best Network Security/Enterprise Firewall

 

Black Lotus

 

Best Privileged Access Management Solution

 

Kikusema

Xceedium

 

Best Real-Time Dynamic Network Analysis

 

Fidelis Security

 

Best Continuous Monitoring Solution

 

ForeScout

Redseal

 

Best Security Incident/Event Management Solution (SIEM)

 

NetIQ

 

CATEGORY 2 – VENDORS OF PHYSICAL SECURITY PRODUCTS & SOLUTIONS

 

PHYSICAL SECURITY ACCESS CONTROL & INDENTIFICATION

 

Best Biometric Identification Solution

 

Fulcrum Biometrics

 

Best Integrated System for HSPD 12/FIPS 201 Compliance

 

Brivo

 

Best Platform for Physical and Logical Access

 

Alert Enterprise

 

COMMUNICATIONS

 

Best Interoperable First Responder Communications

 

Covia Labs

 

Best Mass Notification Systems

 

AtHoc

 

Best Regional or National Public Safety Communications Deployment

 

Desktop Alert

 

DETECTION PRODUCTS

 

Best Explosives Detection Solution

 

AS&E

 

Best Long Range Detection Systems

 

Vidisco

 

Best Nuclear/Radiation Detection

 

Lawrence Livermore National Laboratory

 

VIDEO SURVEILLANCE

 

Best Intelligent Video Surveillance Solution

 

Panasonic

 

Best Thermal/Night Vision/Infrared Cameras

 

HGH Infrared Systems

Vumii

 

Best Network IP Cameras

 

Axis Communications

 

Best Video Storage/Digital Transmission Systems

 

Panasonic

 

OTHER PRODUCTS

 

Best Perimeter Protection Solution

 

Senstar

 

Best Crash Barriers

 

Nasatka

 

Best Physical Security Information Management (PSIM) Solution

 

NICE Systems

 

SERVICES

 

Best Disaster Preparedness or Disaster Recovery & Clean-up Service

 

High-Rise Escape Systems

 

Best Facility Security/Force Protection Service

 

Whitestone Group

 

Best Homeland Security Training/Higher Education Solutions

 

Bellevue University

 

Category 3: Government Security News 2012 Government Excellence Awards

 

Most Notable Airport Security Award

 

Defense Manpower Agency

 

Most Notable Maritime/Port Security Program

 

Ohio Department of Public Safety/Northern Border Initiative

 

Most Notable Railroad/Mass Transit Security Program

 

Denver Regional Transportation Authority

 

Most Notable Critical Infrastructure Program, Project or Initiative

 

U.S. Veterans Administration Hospital, Tucson, AZ

 

Most Notable Cyber Security Program, Project or Initiative

 

U.S. Department of Energy

 

Most Notable Emergency Response Implementation

 

U.S. National Guard

Federal Emergency Management Agency (FEMA)

 

Most Notable Law Enforcement Interdiction, Arrest or Counter-Terrorism Program

 

Orange County Intelligence Assessment Fusion Center

 

Most Notable Municipal/County Programs, Projects or Initiatives

 

Seattle, Washington Police Department

Tampa and St. Petersburg, Florida Police Departments

 

Federal Government

 

Naval Air Systems Command (Kestrel Wide Area Persistent Surveillance)

GSN 2012 Homeland Security Awards program open for entries

The Government Security News 2012 Homeland Security Awards Program officially opened for entries on May 1, once again featuring 45 Awards in three broad Categories:Best Vendors of IT Security Products and Solutions, Best Vendors of Physical Security Products and Solutions and the 2011 Government Excellence Awards.

Returning as corporate Sponsors of the 2012 Program are BRS Laboratories of Houston, TX -- a leading software development company for video behavioral recognition software that deploys easily and rapidly on large scale video networks and provides actionable information without inundating end users with false alarms -- and Entrust, Inc. , of Dallas, TX, which offers physical/logical access, mobile security, certificate management and other identity-based solutions to governments and large enterprises.  Additional sponsors will be announced, and profiles of all 2012 sponsors, will be published in coming weeks. Companies interested in joining the ranks of sponsors of the 2012 Awards Program should contact GSN Publisher and World Business Media President, Edward Tyler, at 212-344-0759, ext. 2001.

The cost to submit an entry in the 2012 program is $295 for vendors of IT security and physical security products and solutions. As in previous years, there is no cost for entries in the 10 categories of awards for federal, state and local government agencies. Vendors of IT and physical security products and solutions may nominate themselves or be nominated by colleagues or government clients, while government agencies or departments may similarly nominate themselves or be nominated by other agencies, colleagues or vendors.

According Adrian Courtenay, managing partner of World Business Media, several new categories created in 2011 to acknowledge successful initiatives of federal, state or local agencies in responding to emergencies, countering terrorism and preventing crime will again be included in 2012. These categories are “Most Notable Emergency Response Implementation – Federal, State or Local”; “Most Notable Law Enforcement Interdiction, Arrest or Counter Terrorism Program – Federal, State or Local”; and “Most Notable Counter Terrorism or Crime Prevention Program”.

In the 2011 contest, the Bastrop Country, TX, Unified Command (including county, state and federal government agencies) was awarded the trophy for “Most Notable Emergency Response Implementation” in battling 2011 Texas wildfires in Bastrop County. The United States Customs and Border Protection, Detroit Sector, was winner in the “Most Notable Law Enforcement Interdiction or Arrest” category for a dramatic arrest on St. Clair River in Detroit, and the Los Angeles Police Department was recognized for having the “Most Notable Law Enforcement Counter Terrorism or Crime Prevention Program.”

Another category that was new in 2011, “Most Notable Cyber Security Program or Technology – Government or Military”, will also be continued, in recognition of the emergence of Cyber Security as a vitally important component of overall security for any nation. The winner of this award in 2011 was the National Oceanic and Atmospheric Administration.

The 2012 Awards Program will once again culminate with a gala awards dinner in the fall, at a venue to be announced shortly. In the 2011 program, the “GSN/Raytheon Award for Distinguished Leadership and Innovation” was introduced and presented to Admiral Thad Allen (US Coast Guard-ret.), who came out of retirement twice in recent years to serve his country, first in heading up the federal response to Hurricanes Katrina and Rita, and later in managing the response to the Deepwater Horizon oil spill in the Gulf of Mexico.

In remarks for the 2011 Awards Dinner audience, Admiral Allen said the continuing work of technology companies and first responders was key in any disaster. He urged everyone to become a “lifelong rapid learner” to better cope with disasters, both man-made and natural. He also said “reconciling opportunity and competency” when disaster strikes is essential to any effective recovery, and being on top of the latest, most effective technology is a product of being a lifelong rapid learner. He also said clear communications is also a key to effective response and amplified his call for a nationwide interoperable first responder radio network. 

Photos of the 2010 awards reception and dinner are available at www.flickr.com/photos/[email protected]/, and video interviews with Admiral Allen, as well as sponsors and winners in the 2011 Awards program, are available at the GSN Video Center at www.gsnmagazine.com/videocenter.

Entry forms and other information about the 2012 Awards Program are available at www.gsnmagazine.com/hsa2012/welcome.

GSN 2011 Awards Program opens for entries on April 26

Government Security News has announced that its 2011 Homeland Security Awards Program  will officially open for business and start accepting entries in the program’s 45 awards categories on Tuesday, April 26.

The 2011 program contains a number of exciting new categories, reflecting the dynamically changing threat environment, in all three of the overall awards groupings: Best Vendors of IT Security Products and Solutions, Best Vendors of Physical Security Products and Solutions, and the 2011 Government Excellence Awards.

The cost for each entry in the 2011 program is $295 for vendors of IT security and physical security products and solutions. As in previous years, there is no cost for entries in the 10 categories of awards for federal, state and local government agencies.

Vendors of IT and physical security products and solutions may nominate themselves or be nominated by colleagues or government clients, while government agencies or departments may similarly nominate themselves or be nominated by other agencies, colleagues or vendors.

Adrian Courtenay, Managing Partner of GSN’s parent company, World Business Media, LLC, cited two intriguing new categories in the government sector that have been selected to acknowledge solid “boots on the ground” achievements of federal, state or local agencies in responding to emergencies, countering terrorism and stopping crime. These categories are “Most Notable Emergency Response Implementation – Federal, State or Local” and “Most Notable Law Enforcement Interdiction, Arrest or Counter Terrorism Program – Federal, State or Local.”

Acknowledging the increasing importance of cyber security and the threat of cyber war among nation-states, Courtenay also pointed out that the government awards in 2010 have been expanded to include a category titled, “Most Notable Cyber Security Program or Technology – Government or Military.”

Returning for its third year as a sponsor of the GSN Awards Program is founding sponsor ArcSight, now a business unit of Hewlett Packard Software and Solutions, whose enterprise threat and risk platform is an integrated product for collecting, analyzing and assessing security and risk information. ArcSight is also a repeat winner in the GSN awards program for its Security Incident Event Management (SIEM) products for collecting, analyzing and assessing security incident event information.

Also returning as event sponsors are General Dynamics C4, located in Phoenix, AZ, a major developer and integrator of secure communications and information systems and technology; and  Mutualink, another GSN award winner, which creates networks of interoperable communities that can instantly share radio, voice, text, video and data files, and telephone communications in a secure environment.

The fourth and final sponsor to date in the 2011 Awards Program is Behavioral Recognition Systems, Inc., of Houston, TX, also known as BRS Labs, whose software uses the fascinating, scientifically developed cognitive reasoning and artificial intelligence of behavioral analytics to leverage a stream of intelligence from millions of surveillance cameras worldwide, in order to provide alerts regarding abnormal or suspicious behavior.

Profiles of each of the 2011 sponsors will be posted on the GSN Web site in the coming weeks.

Additional companies or organizations interested in joining the ranks of 2011 sponsors of the GSN 2011 Homeland Security Awards Program should contact GSN Publisher and World Business Media President, Edward Tyler, at 212-344-0759, ext. 2001.

According to Courtenay, the 2011 Awards Program will culminate with the annual awards dinner in early November at a venue to be announced shortly. “It’s going to be hard to top last year’s elegant dinner and spectacular after-dinner keynote presentation by four-star General Barry McCaffrey (USA-Ret.). But we’re going to try!”

In 2010, the GSN awards were presented to a sold-out ballroom at the JW Marriott Hotel in Washington, DC, that included many distinguished government and military officials, academics, law enforcement and public safety professionals from across the country, along with the systems integrators, defense contractors and vendors of products and solutions used in homeland security.

Photos of the 2010 awards reception and dinner are available at:

www.flickr.com/photos/[email protected]/.

Further information and entry forms for the 2011 Awards Program are available at:

www.gsnmagazine.com/hsa2011/welcome.

Obama seeks three percent hike in discretionary budget at DHS

Despite official murmurings a few months ago that the fiscal year 2011 budget request for DHS might decline slightly, the budget package unveiled on February 1 actually shows a three percent increase in “discretionary spending” by DHS in 2011, versus the prior year, and modest growth, at approximately the predicted rate of inflation, in the outer years.

“The total fiscal year 2011 budget request for DHS, including fee funded and mandatory spending, is $56.3 billion, a two percent increase over the fiscal year 2010 enacted level,” said Peggy Sherry, the acting  chief financial officer at DHS, in a telephone conference call with journalists on February 1. “The department’s fiscal year 2011 net discretionary or appropriated funding request is $43.6 billion, an increase of three percent over the fiscal year 2010 enacted level.”

In releasing his overall budget request, President Obama proposed a freeze in government spending for a portion of the discretionary domestic spending plan for three years, but he specifically exempted homeland security expenditures from that freeze. “It won’t apply to our national security – including benefits for veterans,” said Obama in remarks he made in the White House on February 1.

Some observers speculated that the slight bump up in DHS spending may have resulted from the nationwide trauma caused by the failed Christmas Day underwear bombing attempt, and the urgent call for stronger screening measures at the country’s airports. However, a DHS official who participated on the conference call with journalists, but requested anonymity, would not attribute the budget increase to that terrorist attack.

“As part of the budget process, we examined different scenarios and options,” explained the official. “Those are discussions that are internal to the Administration and what you see in the budget release today is the end product of all those budget deliberations.”

Among the thousands of individual line-items for specific programs and planned procurements are the following highlights:

Advanced imaging systems – The 2011 budget requests an additional $214.1 million to install about 500 extra advance imaging technology machines at airport checkpoints, above and beyond the 500 systems that had already been planned. These funds will place such whole body scanners in 75 percent of the country’s largest airports, said Sherry.

Explosive detection – Beyond body scanners, DHS will seek an additional $85 million to bolster international flight coverage by federal air marshals, an increase in $60 million for an additional 800 explosive trace detection machines and a $71 million bump up to pay for an additional 275 K-9 teams at airport check points.

Border Patrol – The new budget envisions a decrease of 180 personnel in the ranks of the Border Patrol, which will be achieved largely through attrition. A DHS official suggested that the overall operating effectiveness of the Border Patrol will not be affected by this decline in personnel slots because the Border Patrol has almost doubled in size during the past five years. “A lot of the agent workforce, the substantial portion of it, has only a couple of years experience,” said this DHS official. “As they become more seasoned and more mature in their jobs, their effectiveness will increase, and because we are not doing the extensive hiring of 2,000 to 3,000 new agents a year, we can afford to put less into training improvement.”

Cyber-security – By contrast, DHS is planning a substantial beef-up in its cyber-security efforts. The new budget seeks $379 million to develop the National Cyber Security Division, which will attempt to safeguard the dot.gov and dot.com domains, and limit the nation’s vulnerability to computer attacks. DHS wants to add another $5 million to the $5 million that was in last year’s budget for the National Cyber Security Center, which one DHS official characterized as “still in its infancy.” The budget envisions an increase in the Center’s staffing to 40 people and the enhancement of its expertise, so it can integrate with other cyber-centers throughout the federal government.

Terror trials – Contrary to media reports that a terror trial in Manhattan might require a billion dollars in security measures, the 2011 budget request for DHS includes only $200 million for such security measures, which would be available through the traditional urban area grant programs. “The department took a look at it and we think $200 million is really our best estimate of the costs,” said the DHS official.

Federal contracting – In what it calls “re-balancing the workforce,” DHS is planning to rely less on outside vendors and more on internally recruited and trained personnel, particularly in the areas of cyber-security --  where DHS is authorized to hire as many as 1,000 new cyber-specialists – and the intelligence work often referred to as “connecting the dots.” “In our analysis and operations activity, we have a major increase in the number of feds doing intelligence type work,” said Sherry.

Coast Guard – A DHS fact sheet issued by the Office of Management and Budget points out that the budget request includes $538 million for a fifth National Security Cutter and $240 million to produce four new Fast Response Cutters. Even so, the new budget seeks funds for 1,100 fewer active duty Coast Guard personnel. “We are looking to reorganize and restructure certain elements of the Coast Guard to create greater efficiency,” explained a DHS official, “and there are obviously tradeoffs made as part of that to ensure we could continue to recapitalize the Coast Guard.”

President Obama’s budget request was delivered to Capitol Hill and will now undergo months of scrutiny by lawmakers. Fiscal year 2011 begins officially on October 1, 2010.

Vectra Cognito Platform Now Available for the Department of Homeland Security Continuous Diagnostics and Mitigation Program

SAN JOSE, Calif., April 12, 2018 -- Vectra, the leader in automating the hunt for in-progress cyberattacks, today announced that its Cognito platform is now available under the Department of Homeland Security (DHS) Continuous Diagnostics and Mitigation (CDM) Program, enabling 66 Federal Civilian Agencies, as well as State and Local Government entities, to purchase Vectra cybersecurity products.

The CDM Program provides DHS with the capabilities and tools needed to identify cybersecurity risks on an ongoing basis, prioritize these risks based on potential impacts, and enable cybersecurity personnel to mitigate the most significant problems first.

"Vectra is committed to meeting the needs of the Federal Government to help protect its infrastructure from malicious nation-state actors and other threat actors that attempt to exploit Government IT systems and networks," said Sonia Walia, head of Federal sales at Vectra.

"Our technology uses patented artificial intelligence to identify attacker behaviors in real-time so security teams can take action before damage is done," Walia added. "We believe our industry-leading technology is one reason that Vectra Networks was named as the sole Visionary* in the 2018 Gartner Magic Quadrant for Intrusion Detection and Prevention Systems."

Congress established the CDM Program to provide adequate, risk-based, and cost-effective cybersecurity and efficiently allocate cybersecurity resources. Vectra Cognito is approved for purchase by all civilian organizations and the DoD for CDM Phase 3 DEFEND, which focuses on incident response and ongoing assessment.

The Vectra Cognito platform was approved for CDM Phase 3 DEFEND by continuously detecting attacker behaviors in real time, correlating alerts into incidents, and prioritizing the highest-risk threats. This reduces attacker dwell-time and speeds-up incident response – from cloud and data center workloads to user and internet-of-things devices – leaving attackers with nowhere to hide.

"Vectra is again proving that measurable improvement in enterprise cybersecurity is not only essential, but effective and affordable," said Jane Holl Lute, president and CEO of SICPA North America and former CEO of the Center for Internet Security (CIS).

Learn more about Vectra Cognito for the Federal market at https://vectra.ai/federal. Also download the 2018 RSA Conference Edition of the Attacker Behavior Industry Report at https://info.vectra.ai/2018-abir. To schedule a meeting with top Vectra executives at the RSA Conference, visit https://info.vectra.ai/rsa-2018-engage-with-vectra.

*Gartner, "Magic Quadrant for Intrusion Detection and Prevention Systems," Craig Lawson, Claudio Neiva, 10 January 2018.

Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.

About Vectra 
Vectra® is transforming cybersecurity with AI. Its Cognito platform automates cyberattack detection and response from data center and cloud workloads to user and IoT devices. Cognito correlates threats, prioritizes hosts based on risk and provides rich context to empower response with existing security systems, reducing security operations workload by 32X. Vectra was named the "Most Innovative Emerging Company" in the Dark Reading Best of Black Hat Awards. InformationWeek also named Vectra one of the Top 125 companies to watch in 2016. Vectra has been issued five U.S. patents with 14 additional patents pending for cybersecurity applications of machine learning and artificial intelligence. Vectra is headquartered in San Jose, Calif. and has European regional headquarters in Zurich. For more information, visit vectra.ai.

Palo Alto Networks Announces Intent to Acquire Secdo

SANTA CLARA, Calif., April 10, 2018 -- Palo Alto Networks® (NYSE: PANW), the next-generation security company, today announced that it has entered into a definitive agreement to acquire Israel-based Secdo. The acquisition brings sophisticated endpoint detection and response, or EDR, capabilities – including unique data collection and visualization – to Palo Alto Networks Traps™ advanced endpoint protection and the Application Framework in order to enhance their ability to rapidly detect and stop even the stealthiest attacks

Secdo's team of elite engineers will complement the deep security expertise and innovation inside the Palo Alto Networks research and development organization. The company's thread-level approach to data collection and visualization goes far beyond traditional EDR methods, which only collect general event data, hamstringing security operations teams as they try to reconstruct each step of an attack and distinguish malicious activity from normal. Once integrated with Traps and the Palo Alto Networks platform, this rich data will feed into the Logging Service and give applications running in the Palo Alto Networks Application Framework greater precision to visualize, detect and stop cyberattacks.

"We believe security operations teams need the most advanced and consistent approach to endpoint security. With Secdo's EDR capabilities as part of our platform, we will accelerate our ability to detect and prevent successful cyberattacks across the cloud, endpoint, and network."  —  Mark McLaughlin, chairman and CEO of Palo Alto Networks

"We are delighted to join the Palo Alto Networks team. We founded Secdo to dramatically increase visibility for security operations teams to reduce the time it takes to detect and respond to an alert. The combined capabilities of Secdo and Palo Alto Networks will provide customers the capabilities they need to swiftly and accurately detect and respond to cyberattacks."  — Shai Morag, co-founder and CEO of Secdo

The acquisition is expected to close during Palo Alto Networks fiscal third quarter, subject to satisfaction of customary closing conditions. Terms of the acquisition were not disclosed.

About Secdo
Secdo combines Next-generation Endpoint Detection and Response with Security Automation to provide the only purpose-built solution that force multiplies the productivity of security operations teams' day-to-day, allowing them to get ahead and be proactive in defense. Secdo makes this possible with a patented technology that uses assisted learning combined with the only thread-level visibility to automatically investigate and respond to every alert from any security technology, increasing ROI of current technology investments, resolving staff shortage issues and providing quantifiable risk reduction by cutting the security alert triage, response and remediation process down to seconds.

About Palo Alto Networks

Palo Alto Networks is the next-generation security company, leading a new era in cybersecurity by safely enabling applications and preventing cyber breaches for tens of thousands of organizations worldwide. Built with an innovative approach and highly differentiated cyberthreat prevention capabilities, our game-changing security platform delivers security far superior to legacy or point products, safely enables daily business operations, and protects an organization's most valuable assets. Find out more at www.paloaltonetworks.com.

Palo Alto Networks, Traps and the Palo Alto Networks logo are trademarks of Palo Alto Networks, Inc. in the United States and in jurisdictions throughout the world. All other trademarks, trade names or service marks used or mentioned herein belong to their respective owners.

Waratek to Demo Lightweight Application Patching Agent at RSA

DUBLIN and ATLANTA, April 10, 2018 -- Waratek, the virtualization-based application security company, announced today the company will be demonstrating Waratek Patch at RSA 2018. Waratek Patch is a tool for Java and .NET applications that applies virtual patches for long-term and newly discovered vulnerabilities.

Waratek Patch is a lightweight agent that allows security and development teams to easily create and apply custom patches based on scanning tools. Regular updates from Oracle, Microsoft, Apache and other software developers can also be instantly deployed using functional-equivalent "virtual" patches that operate just like a physical binary without delay and the risk of breaking an application

With Waratek Patch, organizations can quickly and easily improve compliance with company, industry and government regulations such as the GDPR and New York Department of Financial Services by reducing the time to apply required critical patch updates.  

Cybersecurity breaches in the month of April are stark reminders of the need for organizations to secure vulnerabilities in their networks. Under Armour, Panera Bread, Delta Air Lines, retailers Best Buy, Sears, Saks Fifth Avenue, Saks Off Fifth, and Lord & Taylor stores are among companies reporting successful cyberattacks resulting in the loss of valuable customer data. The scale of these security breaches highlights the importance of detecting software flaws and patching vulnerable software before attackers have the chance to take advantage of a flaw.

Waratek Patch is one of three solutions in Waratek's Runtime Application Security Platform. Waratek Secure offers highly accurate "always-on" protection against the OWASP Top Ten, SANS Top 25 and other known attacks with no code changes. Waratek Enterprise combines the features of Patch and Secure, and adds the ability to virtually upgrade applications built on out of support Java applications without source code changes.

Waratek will be demonstrating their products at RSA at booth #4341 in the North Hall of the Moscone Center in San Francisco, CA.

For more information on Waratek please visit https://www.waratek.com/

About Waratek

Waratek is a pioneer in the next generation of application security solutions.  Using patented technology, Waratek makes it easy for security teams to instantly patch known flaws, virtually upgrade out-of-support Java applications, and protecting against known and unknown attacks – all without time consuming and expensive code changes or unacceptable performance overhead.

Waratek is one of CSO Online's Best Security Software solutions of 2017, a winner of the RSA Innovation Sandbox Award, and more than a dozen other awards and recognitions.

Waratek is based in Dublin, Ireland and Atlanta, Georgia. For more information visit https://www.waratek.com/

Media Contact
Mike Gallo for Waratek
Lumina Communications
(212) 239-8594
[email protected]

 

SOURCE Waratek

Related Links

http://www.waratek.com

SAS® Intelligence and Investigation Management reveals hidden criminal networks

DENVER, -- SAS GLOBAL FORUM -- A single piece of information can be the loose thread that unravels an entire criminal enterprise. SAS is helping law enforcement find more of those threads with SAS® Intelligence and Investigation Management. Powered by SAS Visual Investigator, SAS Intelligence and Investigation Management helps agencies integrate more information to uncover sophisticated criminal activity, make connections in real time, and enhance collaboration in investigations.

Law enforcement operates in an increasingly complex environment, with investigators facing unprecedented amounts of data. Making sense of this data and understanding the underlying connections is critical in any investigation or intelligence-development activity.

Part of the SAS® Viya® family of products, SAS Visual Investigator alerts investigators, case workers or analysts to heightened risks or threats. Combining advanced text analytics with dynamic and interactive visual workspaces, SAS enables analysts to easily grasp causes for events or alerts and act on deep analytical discoveries.

"While the applications of SAS Visual Investigator are diverse, SAS Intelligence and Investigation Management is tailored specifically for law enforcement," said Michael Ames, Senior Director for Fraud, Compliance and Investigation Solutions at SAS. "It speeds up the grind of poring through piles of reports and provides investigators new leads, and more time to pursue them, to get criminals off the street."

SAS Intelligence and Investigation Management provides agencies an environment where large disparate data sets can be merged and managed – offering a single view of any given entity. Information is secure, while roles-based security ensures the appropriate level of access is applied to data, preventing unauthorized use. Collaborative workspaces also allow law enforcement professionals to apply traditional investigative and intelligence practices, combined with advanced analytical capabilities.

SAS Intelligence and Investigation Management supports the full range of investigation types, from low-level crime inquiries to complex major-incident response. SAS Intelligence and Investigation Management uses text analytics to search structured or unstructured data (e.g., witness accounts) to aid investigators in isolating relevant entities and linking related records. Through this process, investigators can quickly gain insight into significant networks and relationships. Through visualization workspaces, multiple investigation streams can be simultaneously managed and hypotheses developed through the generation of network link diagrams, timelines and map views.

Cracking down on serial offenders in Cary, N.C.
Already one of the safest municipalities in the country, the Town of Cary, N.C., recently selected SAS Intelligence and Investigation Management to transform its Criminal Intelligence Unit. This unit integrates police and government databases with internet and social media sources to create strategic and tactical assets to support police investigations. The execution of manual searches and the retrieval, filtering and formatting of results is a labor-intensive process, currently requiring manual document creation each time an intelligence artifact is required.

SAS Intelligence and Investigation Management is poised to greatly reduce the time and effort needed to produce intelligence reports, help Cary PD identify the most prolific criminal offenders, and better allocate resources to reduce crime. Data visualization, entity resolution and network analysis will empower Cary PD to identify "core offenders" in a quicker, more objective and more reliable way.

For example, applying the word cloud feature to police records and arrest data can instantly surface the most active suspects and perpetrators. SAS Intelligence and Investigation Management can analyze the resulting list to uncover hidden relationships, provide a fuller view of criminal activities and help determine who meets the core offender threshold.

A better understanding of the patterns and trends in criminal activity will enable Cary PD to deploy resources to better deter and prevent crime. SAS Intelligence and Investigation Management can visualize and geospatially present 911 and incident data to identify "hot spots" that require increased police presence at days and times, as well as to deploy surveillance cameras, increased lighting or other crime deterrents.

"Ultimately, SAS Intelligence and Investigation Management helps law-enforcement agencies put their data to work for the safety and security of the communities they serve," said Ames. "By allowing officers to become more proactive in their investigations, SAS is supporting men and women in uniform in the critical mission of helping to keep citizens safe."

To learn more, visit sas.com/intelligence-investigation and download the white paper Managing the Intelligence Life Cycle: A More Effective Way to Tackle Crime.

SAS Intelligence and Investigation Management is supported by the new SAS Fraud and Security Intelligence Division, launched today. Both announcements were made at SAS Global Forum, the world's largest analytics conference, with more than 30,000 business and IT users of SAS software participating on-site and online.

About SAS
SAS is the leader in analytics. Through innovative software and services, SAS empowers and inspires customers around the world to transform data into intelligence. SAS gives you THE POWER TO KNOW®.

SAS and all other SAS Institute Inc. product or service names are registered trademarks or trademarks of SAS Institute Inc. in the USA and other countries. ® indicates USA registration. Other brand and product names are trademarks of their respective companies. Copyright © 2018 SAS Institute Inc. All rights reserved.

SOURCE SAS

Related Links

http://www.sas.com

U.S. Department of Homeland Security Requires All Federal Civilian Agencies to Deploy DMARC

WASHINGTON, April 4, 2018 -- More than 95 percent of email domains managed by the Executive Office of the President (EOP) are in danger of being used in a large-scale phishing attack. Only the Max.gov email domain has fully implemented the top defense against email phishing and spoofing, according to research released today by the Global Cyber Alliance (GCA). Seven of the domains have implemented the Domain Message Authentication Reporting & Conformance (DMARC) protocol at the lowest level "none" which monitors email but does not prevent delivery of spoofed emails. Further, GCA found that 18 of the 26 email domains under management haven't started the deployment of DMARC.

Without DMARC implemented, scammers and criminals can easily "hijack" an email domain to steal money, trade secrets or even jeopardize national security. DMARC weeds out fake emails (known as direct domain spoofing) deployed by spammers and phishers targeting the inboxes of workers in all sectors of society.  According to the 2017 Symantec ISTR report, 1 in 131 emails contained malware, the highest rate in 5 years.

"Email domains managed by the EOP are crown jewels that criminals and foreign adversaries covet," said Philip Reitinger, president and CEO of the Global Cyber Alliance. "The lack of full DMARC deployment across nearly every EOP email address poses a national security risk that must be fixed.  The good news is that four new domains have implemented DMARC at the lowest level, which I hope indicates that DMARC deployment is moving forward.  The EOP domains that have recently deployed DMARC at its lowest setting includes WhiteHouse.gov and EOP.gov, two of the most significant government domains.  I hope that the government will move rapidly to block phishing attempts across all EOP domains."

Domains under the control of the EOP include Budget.gov, OMB.gov, WhiteHouse.gov, USTR.gov, OSTP.gov and EOP.gov – all well-known email domains that are valuable for phishers looking to trick government employees, government contractors, and U.S. citizens.

The weak DMARC deployment by the EOP is surprising after the U.S. Department of Homeland Security mandated that all federal agencies implement DMARC last year. Security experts praised DHS and Senator Ron Wyden, who called for agencies to implement DMARC, for pushing government agencies to quickly implement DMARC at the highest level possible.

Using GCA's DMARC tools, the researchers scanned the 26 EOP email domains:

 

DMARC Count

Effect at this level of implementation

Domains Tested

26

(The email domains of the Executive Office of the President)

Reject

1

The highest level of DMARC protection. If reject is in place, incoming messages that fail authentication get blocked.

Quarantine

0

The second highest level of DMARC protection. With quarantine in place, emails that don't meet the policy are sent to the spam or junk folder.

None

7

None means that the DMARC policy is in place, but the only thing that's happening is monitoring. No action is being taken to block spoofed emails.

No Policy

18

No policy means that DMARC is not in place. 

GCA has published five reviews of DMARC implementation – two looking at organizations in cybersecurity, one looking at banks, one examining public and private hospitals, and most recently a look at the top tax software providers. When Agari looked at Fortune 500 companies last August, they found 8 percent protected their companies' domains with DMARC.

For more details about DMARC or to check if an organization is using DMARC, visit: dmarcguide.globalcyberalliance.org.

About the Global Cyber Alliance
The Global Cyber Alliance (GCA) is an international, cross-sector effort dedicated to eradicating cyber risk and improving our connected world. We achieve our mission by to uniting global communities, implementing concrete solutions, and measuring the effect. GCA, a 501(c)3, was founded in September 2015 by the Manhattan District Attorney's Office, the City of London Police and the Center for Internet Security. Learn more at www.globalcyberalliance.org.

Coalfire Assesses Google Cloud Platform for FedRAMP JAB Authorization

WESTMINSTER, Colo., April 3, 2018 -- Coalfire, a trusted provider of cybersecurity advisory services, announced that is has performed a Federal Risk and Authorization Management Program (FedRAMP) Moderate Assessment of the Google Cloud Platform. The FedRAMP assessment confirms that the systems and security controls of the Google Cloud Platform adhere to the specifications required for moderate impact systems.

Google Cloud Platform is a suite of cloud computing products, including computing, networking, storage, big data, machine learning, identity, security, management, and development tools that runs on Google's global infrastructure. Through Coalfire's comprehensive technical testing and examination process, Google Cloud Platform achieved a recommendation that the FedRAMP Joint Authorization Board (JAB) issue a Provisional Authority to Operate (P-ATO) to the platform and 49 of its associated products.

"Coalfire is proud to have been the assessor for Google to achieve this landmark authorization," said Matt Houy Director, FedRAMP & Authorization Services for Coalfire. "Google Cloud Platform customers can be confident that Google Cloud Infrastructure and authorized Google products have been properly validated to meet all of the necessary security requirements for FedRAMP."

FedRAMP is a national, government-wide program that offers a standardized approach to security assessment, authorization and continuous monitoring for cloud products and services. Benefits of this authorization include access to the resources and expertise of the FedRAMP JAB, which includes representatives from the General Services Administration (GSA), Department of Homeland Security (DHS), and Defense Information Systems Agency (DISA).

Coalfire is the leading FedRAMP Third Party Assessment Organization (3PAO) in the industry, providing FedRAMP advisory or assessment services for CSPs that are interested in expanding into government markets.

About Coalfire
Coalfire is the cybersecurity advisor that helps private and public-sector organizations avert threats, close gaps and effectively manage risk. By providing independent and tailored advice, assessments, technical testing and cyber engineering services, we help clients develop scalable programs that improve their security posture, achieve their business objectives and fuel their continued success. Coalfire has been a cybersecurity thought leader for more than 16 years, and has offices throughout the United States and Europe.

For more information, visit Coalfire.com.

Pages

 

Recent Videos

IntraLogic's official release of the "One Button" Lockdown system on CBS 2 News.
HID Global is opening the door to a new era of security and convenience.  Powered by Seos technology, the HID Mobile Access solution delivers a more secure and convenient way to open doors and gates, access networks and services, and make cashless payments using phones and other mobile devices. ...
Mobile device forensics can make a difference in many investigations, but you need training that teaches you how to get the most out of your mobile forensics hardware and software, and certifies you to testify in court. Read this white paper to learn how to evaluate mobile forensics training...
PureTech Systems is a software company that develops and markets PureActiv, its geospatial analytics solution designed to protect critical perimeters and infrastructure.  Its patented video analytics leverage thermal cameras, radars and other perimeter sensors to detect, geo-locate, classify, and...