Advertisement
Home Blog

Security Solutions Issue 115 Out Now!

In Security Solutions Issue 115, we look at the role of the private security industry in Australia’s national counter-terrorism plans. We also discuss strategies to help identify insider threats, examine whether or not prisons are fertile recruiting grounds for terrorist groups and explore ways to demonstrate the value of an effective cyber security strategy to the company board.

Check out the latest issue today and subscribe!

Check Point Software Technologies Transforms Email Security Again: Patented Unified Administration Boosts Efficacy and Improves Productivity

Gil Friedrich, Vice President of Email Security at Check Point Software Technologies

Check Point Software Technologies Ltd. (NASDAQ: CHKP), a leading AI-powered, cloud-delivered cyber security platform provider, today announced new email security features that enhance its Check Point Harmony Email & Collaboration portfolio: Patented unified quarantine, DMARC monitoring, archiving, and Smart Banners. Since 2023, Check Point has released over 75 new features for Harmony Email & Collaboration, further strengthening collaborative email security with preventative measures to combat the growing threat of cyber-attacks. The addition of these new features allows for leading protection against advanced threats on a single screen.

Despite the rise of sophisticated cyber defence technologies, email remains the primary conduit for cyber attacks, encompassing phishing attempts, malware, and business email compromise (BEC) scams. According to a CISA assessment, within the first 10 minutes of receiving a malicious email, 84% of employees took the bait by either replying with sensitive information or interacting with a spoofed link or attachment. With phishing attacks being further enhanced by AI to make them even more convincing, it is crucial that organisations give email security top priority.

“As a leading provider of email security solutions, we strive to consistently deliver complete security with our Archiving and DMARC capabilities, as well as drive innovation through our recent U.S. patent for unified quarantine,” said Gil Friedrich, Vice President of Email Security. “With threat actors finding new ways to weaponize email, we continue to pioneer a comprehensive, 360-degree security solution that proactively counters sophisticated phishing tactics wherever they may occur.”

The increasing complexity of email-based threats requires advanced protection strategies, including AI-powered detection mechanisms. As part of the Check Point Infinity Platform, Harmony Email & Collaboration features include:

  • Unified Quarantine: This patented feature streamlines email management by allowing administrators and end-users to view and restore all quarantined emails from both Microsoft and Harmony Email through a single, integrated Check Point screen, simplifying the process and reducing administrative effort and redundant friction with end users
  • DMARC Monitoring: Allows organisations to protect their brand reputation and prevent impersonation attacks on their customers and partners by maintaining a strict DMARC policy, without impacting business operations
  • Archiving: Enables the storage of all internal, incoming and outgoing emails for many years, as well as importing archives from competitors, and to support disaster recovery and legal use cases
  • Smart Banners: Educates users on cyber security directly within their emails, promoting policy compliance and enabling precise reporting of suspicious, yet subtly malicious, emails 

“Partnering with Check Point offered the most comprehensive and effective solution,” says Kinson Chan, Chief Executive Officer for eSix. “We chose Check Point for its strong reputation in the cybersecurity industry, ability to offer a comprehensive security solution and its commitment to keeping pace with emerging threats.”

To learn more about how Harmony Email & Collaboration can protect your business visit: www.checkpoint.com/harmony/email-security/.

i-PRO announces support for Genetec Security Center SaaS

New and existing camera models utilise flexible application approach for direct-to-cloud workflow

 

i-PRO Co., Ltd. (formerly Panasonic Security) has announced support for Genetec™ Security Center SaaS. The company will enable Security Center SaaS support in its new edge AI-enabled cameras while also releasing an app for existing cameras in the field at no cost.

Users of AI-enabled i-PRO cameras will be able to simply install an application on the camera to give direct access to Genetec Security Center SaaS.

“Genetec has taken a bold step forward in providing customers with unprecedented flexibility and scale,” said Hiroshi (Huey) Sekiguchi, CMO, i-PRO Co., Ltd. “At i-PRO our goal is to offer a wide range of new and existing AI-enabled camera models for customers to choose from when connecting to Security Center SaaS. Most importantly, we want our customers to be able to leverage their existing i-PRO camera investment when taking advantage of this important new SaaS solution.”

Genetec Security Center SaaS is a highly scalable, enterprise-grade unified physical security solution that is offered as a service and deployed on a hybrid-cloud architecture. It offers ease of deployment and the flexibility for organisations to choose the devices and cameras that work best for their business.

“Security Center SaaS was designed to deliver flexibility and scalability through an open platform approach,” said Andrew Elvish, Vice President, Marketing, Genetec Inc. “i-PRO shares the same core values which makes our combined solution that much more valuable to our shared customers.”

i-PRO AI cameras can deliver 98 different metadata attributes, including unique descriptions such as the colour of shoes and bags carried or whether a person has a beard or not. The cameras also support various 3rd party analytic applications including video and sound to provide operators with unprecedented “event alarm” capabilities for both people and vehicles.

By focusing on an application-based approach, the intent is to not require existing customers to buy new i-PRO cameras to support Security Center SaaS.

Making Hybrid Architectures Work for the Security Industry

By Mats Thulin, Director Core Technologies, Axis Communications and George Moawad, Country Manager for Oceania, Genetec

The security industry is witnessing a gradual but undeniable shift towards cloud-based solutions with the rise of Video Surveillance as a Service (VSaaS) – from Camera to Cloud – highlighting the growing importance of connected devices. As a result of this transition, hybrid solution architectures have emerged as the new standard.

By hosting functionalities where they are most efficient, hybrid architectures enable capabilities to be hosted where they are most efficient, leveraging the strengths of each system instance. This approach introduces an unprecedented level of flexibility, optimising performance and resilience in security solutions.

However, the journey to fully adopting a hybrid approach encompasses a number of challenges but also many opportunities. The security industry must collectively push towards greater collaboration in ecosystems and increased standardisation.

Public Clouds: A Double-Edged Sword

Public clouds offer undeniable advantages, such as removing the need to host servers at the customer site, scalability, and an operational expenditure cost model. These advantages make public clouds an attractive proposition for security providers, facilitating rapid expansion and flexible resource utilisation. Yet, this is not without its pitfalls.

In Australia, where vast distances and remote locations present unique connectivity challenges, these issues are magnified, requiring solutions to ensure uninterrupted security services. These concerns highlight the need for a cautious and strategic approach to leveraging public cloud resources within security solutions.

Private Clouds: Secure but Costly

On the other end of the spectrum, private clouds present a fortress of security and privacy, allowing for customisation, dedicated resources, and predictable fixed costs. For Australian organisations where data privacy laws and regulations demand rigorous compliance, private clouds offer a compelling alternative to public clouds.

However, the luxury of enhanced security and control comes at a price, including higher initial costs, potential scalability limitations, and operational complexities. These factors necessitate a balanced evaluation of investment and long-term scalability.

Hybrid Architectures: The Best of Both Worlds

Hybrid architectures stand at the intersection of public and private clouds, combining the benefits of both public and private clouds. This model offers resilience and adaptability, providing a robust framework for security solutions.

Using a unified physical security platform, organisations can unlock the ability for remote sites to bring hardware into the cloud and make data available in a unified physical security solution within minutes. This enables operators, such as in the education sector, to easily select which capabilities to host on-premises and which can be hosted in the cloud.

Despite the clear advantages of hybrid architectures, their adoption also comes with its own set of challenges, including cybersecurity consistency, interoperability, and increased complexity, which necessitates a more sophisticated management approach. These challenges underscore the importance of a strategic, well-planned implementation to fully leverage the benefits of hybrid clouds.

Meeting Data Sovereignty Regulations

Hybrid architectures will play a pivotal role in helping Australian security organisations meet data sovereignty regulations by providing the flexibility to store data where it is most appropriate, ensuring compliance with these regulations.

Private clouds can be configured to provide enhanced security measures, making them an ideal choice for storing sensitive data. Meanwhile, less sensitive data can be stored in public clouds, which can be scaled up or down based on demand, leading to cost savings. This provides a pathway for Australian organisations to gradually transition to the cloud while maintaining compliance with data sovereignty regulations.

Rather than moving all data to the cloud at once, organisations can move data incrementally, ensuring that each step of the process is in compliance with Australian data sovereignty laws. This approach reduces the risk of non-compliance and allows organisations to leverage the benefits of cloud computing at their own pace.

Making Hybrid Architectures Work

To make hybrid architectures work in the security industry, open collaboration and the standardisation of APIs and metadata are essential. These elements are particularly important in Australia, where the industry is characterised by a diverse range of security providers, from small local businesses to enterprise organisations. Standardisation and collaboration across these varied entities are essential for the seamless integration of hybrid architectures.

However, collaboration is not only essential across the industry but must happen within end customer organisations, requiring close engagements between security and IT teams. A good starting point is to have a ‘Hybrid first’ mindset where infrastructure is built using a hybrid architecture with seamless integration and interoperability across diverse systems and platforms in mind. This partnership should embrace a step-by-step methodology, prioritising cybersecurity, and system hardening of security systems in an early phase. To enable possibilities for creating valuable business insights an early focus on relevant data for the business is crucial.

When evaluating cloud and hybrid solutions it is important to assess the different aspects of the solution and the provider of the services. Areas such as cybersecurity, 24/7 incident support capabilities, resilience of the solution and Service Level Agreements (SLAs) are particularly important.

By championing these principles, the industry can unlock the full potential of hybrid architectures, driving efficiency and innovation.

SentinelOne® Revolutionises Cybersecurity with Purple AI

Ric Smith, Chief Product and Technology Officer, SentinelOne

AI security analyst radically transforms threat investigations and response with simple, one-click hunting, suggested queries, and auto-generated reports, empowering security teams to deliver new levels of defence, savings, and efficiencies

A year ago, SentinelOne (NYSE: S,) introduced the first generative AI-powered platform for cybersecurity. Today, the company is again breaking new ground with the general availability of Purple AI, a transformative AI security analyst designed to unlock the full potential of security teams, empowering them to save time and money by radically simplifying and accelerating threat hunting, investigations, and response.

“The average enterprise security team receives north of 1,000 alerts per day that require investigation. The same teams must also proactively hunt for threats that evade detection. They are overworked and understaffed and in dire need of help to keep pace,” said Ric Smith, Chief Product and Technology Officer, SentinelOne. “With Purple AI , SentinelOne is delivering the industry’s most advanced GenAI security technology to help detect threats earlier, respond faster, and stay ahead of attacks in an efficient, scalable way.”

Leading the Way

Early adopters of Purple AI report executing hunts 80 percent faster, and innovative companies are already taking advantage of this technology to empower their security teams and stay ahead of threats.

“The security insights provided by Purple AI have surpassed anything PruittHealth had before,” said Richard Bailey, SVP IT, PruittHealth Connect Inc . “PurpleAI assists in identifying weaknesses and vulnerabilities, thus bolstering PruittHealth’s overall security. Additionally, it enhances accuracy and reduces human error in data queries, allowing more time for other tasks.”

A Force Multiplier

Far beyond a security chatbot or console search box, Purple AI is an AI-powered security analyst that radically simplifies threat hunting and investigations by translating natural language into structured queries, automatically querying native and partner data,  intelligently summarising results and suggesting follow-on queries in natural language and saving investigations in collaborative notebooks. With Purple AI, security teams can:

  • Simplify complex queries and streamline investigations with natural language translations. Purple AI is the only AI security analyst that supports the Open Cybersecurity Schema Framework, so analysts have a single normalised view of native and partner data.
  • Find and mitigate hidden risk across their environment with pre-populated Purple AI Threat Hunting Quick Starts to launch investigations with a single click.
  • Drive down mean time to respond and time to investigate with suggested next queries and intelligent summarised results in natural language.
  • Easily collaborate with shared, exportable investigation notebooks and auto-generated emails.

Delivering Results

With Purple AI, security teams can save time, increase visibility, and maximise resources, and enterprises of all sizes, across industries are tapping its power to streamline and enhance their security operations and bolster their defences.

“Purple AI really increases the efficiency of our team that is focused on log management and SIEM use cases,” said John McLeod, Chief Information Security Officer at energy solutions manufacturer NOV, Inc.  “The technology allows them to quickly query data and use suggested next queries and intelligent summaries to get the answers they need in a fraction of the time, reducing our mean time to respond.”

NOV Cyber Incident Response Analyst Ryan Mason can attest to this. “Purple AI’s Notebooks help me save time building and organising EDR queries for IR hunting scenarios,” he said. “Prompts are predictably summarised in a narrative and a table, prepared queries can be fine-tuned, and suggested follow-up questions help uncover quick answers.”

Availability

Purple AI is available today in all global regions.  Click to here to learn more about the technology and how it can transform your security operations.

Axis Communications unveils Axis Cloud Connect

Axis Communications, a leader in network video, introduces Axis Cloud Connect, an open hybrid cloud platform designed to provide customers with more secure, flexible, and scalable security solutions. Together with Axis devices, this platform enables a range of managed services to support system and device management, video and data delivery and meet high demands in cybersecurity.

The video surveillance market is increasingly utilising connectivity to cloud, driven by the need for remote access, data-driven insights, and scalability. According to the Novaira Insights report, “Cloud Trends in Video Surveillance – 2023 edition”, the number of cloud-connected cameras is growing in the US and Canada at a rate of over 80% per year. Lately, this trend toward cloud adoption has shifted more toward the implementation of hybrid security solutions, a mix of cloud and on-premises infrastructure, using smart edge devices as powerful generators of valuable data.

Axis Cloud Connect enables smooth integration of Axis devices and partner applications by offering a selection of managed services. To keep systems up to date and ensure consistent system performance and cybersecurity, Axis takes added responsibility for hosting, delivering, and running digital services to ensure availability and reliability. The managed services enable secure remote access to live video operations, and improved device management with automated updates throughout the lifecycle. It also offers user and access management for easy and secure control of user access rights and permissions.

Axis Communications have a history of using cloud connectivity, spanning over 15 years and have one million connected cameras in the field. Today, Axis is introducing the next generation of cloud technology on a broader scale. In Axis offerings, such as AXIS Camera Station, there will be additional cloud-based services so customers can benefit from capabilities such as a web client for efficient video operations, user, and device management ­– all powered by Axis Cloud Connect​. Axis Cloud Connect also enables selected partners to develop cloud-based solutions to further meet the needs of end customers.

Johan Paulsson, CTO at Axis, commented “Axis Cloud Connect is a continuation of our commitment to deliver secure-by-design solutions that meet changing customer needs. This offering combines the benefits of a hybrid cloud architecture with our deep knowledge of analytics, image usability, and cybersecurity – all managed by our team of experts to reduce friction for our customers.”

Axis Cloud Connect gives customers the flexibility to integrate Axis products with any system, regardless of complexity. Leveraging the benefits of edge, on-premises, and cloud, this platform is well-suited for both traditional and more modern architectures.

With the critical importance of data security in mind, Axis Cloud Connect together with Axis devices is built with robust security measures in place. Developed using Axis’ expertise in cybersecurity and data privacy, it ensures compliance with industry standards and regulations.

About Axis Communications

Axis enables a smarter and safer world by creating network solutions that provide insights for improving security and new ways of doing business. As the industry leader in network video, Axis offers products and services for video surveillance and analytics, access control, intercom, and audio systems. Axis has more than 3,8​00 dedicated employees in over 50 countries and collaborates with partners worldwide to deliver customer solutions. Axis was founded in 1984 and has its headquarters in Lund, Sweden. For more information about Axis, please visit our website www.axis.com.

ExtraHop® Launches New Partner Program, Appoints Global Channel Leader to Unlock Value for Joint Customers

Christine Camp, Vice President of Worldwide Channel Sales

ExtraHop®, a leader in cloud-native network detection and response (NDR), today announced the launch of its new partner program to create maximum value and opportunity for partners modernising security infrastructures. The program will debut under the leadership of newly appointed Vice President of Worldwide Channel Sales, Christine Camp.

ExtraHop capped off a strong 2023 with US $200 million in ARR, largely driven by strategic alliances with key technology and channel partners. According to Gartner®, NDR market spending is expected to grow to US $2.64B by 2027. Amid a growing demand for NDR services, there is a strong opportunity for ExtraHop and its partners to further develop even more innovative offerings that empower customers to buy down their cyber risk.

Following $100 million in growth capital from investors, ExtraHop is fully committed to its partner-first strategy, launching the new program to revitalise partner relationships with greater resources and support. Prioritising a frictionless experience, partners and joint customers will benefit from new pricing and discounts, an interactive partner portal, a restructured tiering system, free training and enablement, recognition and awards programs, and more.

“Partners are a foundational component of ExtraHop’s sales efforts and a long-term investment in the channel is a primary scale vehicle as we expand our global footprint,” said Marc Andrews, CRO, ExtraHop. “Our new partner program will offer an opportunity to further address the growing need for cutting-edge network visibility solutions and help customers build business resilience in the face of advancing cyber threats.”

“Working with ExtraHop has been a game-changer,” said Tim Hall, Director of Alliances, Blackwood. “Their team isn’t just about products, they’re all about rolling up their sleeves and helping us bring NDR to our customers. They take the time to make sure our customers truly understand the power of their network data. This new partner program just takes things to the next level – we’re excited to see what we can further achieve together.”

Steering the new partner program, Christine Camp, Vice President, Worldwide Channel Sales, comes to ExtraHop with more than 20 years of experience at leading enterprise technology organisations. She most recently led global channel strategy at Palo Alto Networks, where she launched two new, innovative partner programs and drove measurable revenue growth. Prior to Palo Alto, Camp held leadership positions at NTT Communications, Visage Mobile, and Verizon.

“Across the industry, ExtraHop has demonstrated the power of the network and is recognised for its revolutionary platform that can stop cyberattacks in a way other technologies can’t,” said Camp. “NDR has the potential to make a tremendous impact on how we approach enterprise cybersecurity, and there is a significant opportunity for partners to reap the benefits. With a channel-dependent culture, we’re committed to offering them even more meaningful engagement and resources to succeed.”

ExtraHop’s partner-led strategy recently received recognition from CRN® with a prestigious 5-Star award in its 2024 Partner Program Guide and inclusion in its Security 100 list. As many partners look to expand their zero trust offerings, the company was also named a winner of the 2023 Zero Trust Security Excellence Award presented by TMC.

Read our blog to learn more and follow our LinkedIn Partner Page for the latest program updates.

The Gartner Forecast Analysis: Information Security and Risk Management, Worldwide, 29 February, 2024

GARTNER is a registered trademark and service mark of Gartner, Inc. and/or its affiliates in the U.S. and internationally and is used herein with permission. All rights reserved.

Genetec announces availability of Security Center SaaS

Enterprise-grade SaaS solution gives Australian, New Zealand and organisations globally the freedom to choose the door controllers, cameras, and devices that work best for their business.

Genetec Inc. (“Genetec”), a leading technology provider of unified security, public safety, operations, and business intelligence solutions, today announced the availability of Security Center SaaS from its global network of certified partners. A massively scalable, open, and unified software as a service (SaaS) solution, the new offering will combine access control, video management, forensic search, intrusion monitoring, automation, and many other advanced security capabilities.

“The physical security industry has been eagerly anticipating an enterprise-grade offering that can be implemented in the cloud or in a hybrid deployment based on customers’ needs and requirements. Security Center SaaS not only fills this important gap in the market, but it redefines the possibilities for cloud-based physical security,” said Michel Chalouhi, Vice President of Global Sales at Genetec Inc.

Because of its open architecture, Security Center SaaS gives organisations in Australia, New Zealand and globally the freedom to choose the door controllers, cameras, and devices that work best for their business. It also features powerful forensic search tools designed to simplify and speed up investigations. These tools extract crucial information from the rich metadata collected by the system’s connected edge devices. The information is presented in a single, intuitive user interface, facilitating faster and more informed decision-making processes.

Security Center SaaS features powerful and comprehensive systems management tools, making it easier and faster for channel partners to configure, provision, and deploy complex, multi-site enterprise systems at scale. From quote to delivery, Security Center SaaS helps partners to efficiently manage and oversee all their Security Center SaaS installations, no matter the size of the project.

Direct to cloud connection with Axis Cloud Connect (ACC) and Axis Powered by Genetec 

In addition to an open portfolio of cameras by a range of manufacturers, Security Center SaaS takes full advantage of the newly announced Axis Cloud Connect solution, and the existing Axis Powered by Genetec network door controller. Building on years of close collaboration with Axis, Security Center SaaS enables customers to securely connect, enroll, and manage Axis devices in a diversity of deployment options, including direct device-to-cloud streaming of video, metadata, and access control data.

Together, both ACC and Axis Powered by Genetec offer users a complete enterprise-grade deployment of both network access control and video technologies designed to work seamlessly across hybrid and cloud environments, as well as in fully on-premises deployments. Easily installed and maintained, these Axis devices enable Security Center SaaS customers to deploy a unified cloud-ready installation quickly and reliably.

Pricing and availability

Security Center SaaS is offered in two subscription plans starting at $149 US MSRP per year per device connection (these can be door controllers, cameras, intercoms, intrusion panels, or other device connections).

The new offering is also available in competitively priced video bundles, including software and camera connections, starting at $2,700 US MSRP*. These include the option of either 8 or 20 camera connections (with 8 and 20 TB of storage, respectively), the Security Center SaaS software, and the Genetec Cloudlink™ 310 appliance that allows any non-cloud-ready camera to be easily connected to Security Center SaaS.

Security Center SaaS is available to be quoted and ordered immediately in all regions and will begin shipping as of May 30th, 2024.

For more information, please visit:https://www.genetec.com/a/security-center-saas-launch.

Critical Convergence: United Physical and Cybersecurity for Optimal Protection

Kasia L. Hanson, Global Security Ecosystem Development and Partnerships, Intel Corporation

It is challenging in today’s threat environment for organisations to have a sustainable, effective security posture in which physical security and cybersecurity are separate. These domains are two sides of the same coin and the convergence of the two is the future of the security landscape.

Joining us on this episode of the Security Insider podcast is Kasia L. Hanson. Kasia discusses the threat landscape and its impacts on physical security and how to integrate both physical and cybersecurity best practices for optimal protection.

Kasia leads Intel’s Global Security Ecosystem Development and Partnerships. She is responsible for shaping the strategy, go-to-market, and sales strategies within Intel’s security ecosystem for physical and cybersecurity. She is a passionate and dynamic security leader with over 23 years of experience driving digital transformation across Edge, IoT/OT, AI, Computer Vision, Cybersecurity, and Datacenter and is well-versed in security software and hardware that drives business outcomes from data protection to physical infrastructure protection. She actively contributes to industry advancement and diversity and inclusion initiatives. Notably, she has served as the Past Chair of the Security Industry Association Women in Security Forum, is a member of the WISF Executive Committee, and is a member of the SIA Cybersecurity Advisory Board. Recognized for her contributions, Kasia was honoured with the 2022 SIA Progress Award and is a 2x Women in Security Power 100 honoree. In 2023, she was awarded the IIFX Women Innovator award in Sports and holds the title of Distinguished Fellow for the Innovation Institute for Fan Experience in Sports (IIFX).

 

Google Cloud reports on state of AI adoption

A recent survey conducted by the Cloud Security Alliance (CSA) and Google Cloud has revealed some significant insights into the future of artificial intelligence (AI) adoption in organisations. The findings indicate a strong inclination towards integrating AI solutions, particularly Generative AI (GenAI), within the coming year.

Key Takeaways:

  1. C-suite Prioritisation: A remarkable 55% of surveyed organisations plan to adopt GenAI solutions within the next year. This surge is largely attributed to executive leadership, with 82% of respondents indicating C-level executives are behind the push.
  2. AI in Cybersecurity: AI integration into cybersecurity is becoming a practical reality for many organisations. 67% of respondents have tested AI specifically for security purposes.
  3. Optimism and Concerns: While 63% of respondents believe in AI’s potential to enhance security measures, there are concerns about its implications. 25% expressed concerns that AI could be more advantageous to malicious parties.
  4. Empowering Security Professionals: Contrary to fears of job replacement, only 12% of security professionals believe AI will completely replace their role. Instead, the majority see AI as a tool to enhance their skill set or support their role.
  5. C-suite Perspectives: C-level executives demonstrate a higher familiarity with AI technologies compared to their staff. They also report a clearer understanding of potential AI use cases.
  6. 2024: The Year for AI Implementation: Over half (55%) of organisations are planning to implement security solutions and tools with GenAI, exploring various use cases such as rule creation, attack simulation, and compliance violation detection.

The report underscores the need for a strategic, unified approach to successfully integrate AI into cybersecurity. As Phil Venables, CISO of Google Cloud, highlights, AI has the potential to transform cybersecurity profoundly, offering both opportunities and challenges.

The insights from this report are crucial for navigating the evolving role of AI in cybersecurity and ensuring a resilient digital infrastructure.

Victoria Police upgrade EPINS system with OutSystems low-code app

In a move aimed at modernising its operational framework, Victoria Police has partnered with OutSystems, a global leader in high-performance low-code application development. This collaboration marks a significant stride towards streamlining various operational processes within the law enforcement agency, with a focus on enhancing productivity and efficiency across the board, particularly in providing better digital resources for officers out in the field.

Recognising the imperative to optimise numerous inefficient business processes, Victoria Police embarked on a quest for a cutting-edge Business Process Management (BPM) platform. The department’s electronic penalty infringement notice system (EPINS) emerged as a critical focal point. After an exhaustive selection process, OutSystems emerged as the standout choice.

Paul Arthur, Regional Vice President for Australia and New Zealand at OutSystems, underscored the comprehensive feature set of the platform, which seamlessly demonstrated its adaptability and ease of adoption during a rigorous developer enablement exercise. This capability, he noted, aligned perfectly with the requirements of Victoria Police.

OutSystems offers a class-leading platform for efficient application development through visual development, pre-built code modules, and one-click publish functionalities. This empowers developers of all skill levels to build customised applications that automate and orchestrate unique cross-functional workflows, thereby eliminating errors and repetitive tasks.

The core objective of this strategic partnership is to equip frontline members of Victoria Police with better tools to excel in their roles within the community. To achieve this, OutSystems and the Police Department collaborated closely to integrate a platform that offers high flexibility, allowing for seamless adaptation to evolving requirements.

The selection of OutSystems heralds a new era for Victoria Police, enabling the organisation to address a wide spectrum of process and user experience use cases across web and mobile platforms in record time. OutSystems will work hand in hand with multi-award-winning partner PhoenixDX to ensure the timely delivery of critical applications, with a paramount focus on security compliance.

Pedro Carrilho, Founder and Managing Director of PhoenixDX, reiterated the commitment to delivering robust business process automation capabilities tailored to meet the frontline mobility needs of sworn members of Victoria Police.

By harnessing industry-leading platform technology and agile implementation models, Victoria Police stands poised to significantly enhance innovation and user experience for thousands of its members. Peter Swart, Regional Director at OutSystems, expressed satisfaction at the partnership, highlighting the seamless integration of technology with the pivotal work carried out by Victoria Police in the community.

The deployment of OutSystems promises not just a technological transformation, but a holistic advancement in operational efficiency and effectiveness for Victoria Police, ultimately reinforcing its commitment to serving and safeguarding the community.

Radware – Asian tax office deal strengthening cyber defences in the Public Sector

In a world increasingly reliant on digital infrastructure, the protection of sensitive data and critical systems is paramount, particularly for governmental bodies entrusted with safeguarding national interests. Radware’s recent announcement of a million-dollar deal with an Asian tax authority underscores the growing urgency for robust cybersecurity measures in the public sector.

As threats from cyberattacks continue to evolve in frequency and sophistication, institutions such as tax authorities face mounting pressure to fortify their defences. Radware’s Defense Pro® X DDoS protection offers a timely solution, providing advanced capabilities to mitigate a range of threats, including volumetric layer 7 DDoS attacks that can cripple essential services and compromise sensitive information.

The significance of this partnership extends beyond mere procurement; it reflects a broader trend wherein governments worldwide are grappling with the complexities of safeguarding sprawling infrastructures and legacy systems against relentless cyber threats. Yoav Gazelle, Radware’s chief business officer, aptly points out the challenges faced by governments in balancing security requirements with the need to maintain uninterrupted operations amidst escalating cyber risks.

Radware’s DefensePro X stands out for its ability to adapt to emerging threats, offering automated defence mechanisms against a spectrum of malicious activities, from IoT-based attacks to ransom DDoS campaigns. Notably, the solution’s efficacy in detecting and mitigating layer 7 encrypted web application attacks underscores its relevance in today’s threat landscape, where such attacks have seen a significant surge.

The company’s track record in cybersecurity speaks volumes, with numerous accolades and industry recognition affirming its leadership in DDoS mitigation, application protection, and bot management solutions. Analysts from esteemed firms such as Forrester Research and Gartner consistently acknowledge Radware’s role as a market leader, further cementing its reputation for delivering cutting-edge cybersecurity solutions.

In an era defined by digital transformation and interconnectivity, the need for proactive cybersecurity measures cannot be overstated. Radware’s collaboration with the Asian tax authority exemplifies a strategic step towards enhancing cyber resilience in the public sector, setting a precedent for other governmental entities to follow suit in safeguarding critical infrastructure and ensuring the continuity of essential services.

As cyber threats continue to evolve, partnerships between cybersecurity providers and governmental agencies will remain instrumental in staying ahead of the curve and protecting national interests in an increasingly digitised world. Radware’s commitment to innovation and security underscores its pivotal role in shaping the future of cybersecurity, where vigilance and adaptability are paramount.

i-PRO commits to ethical uses of AI in physical security

i-PRO has released its framework for regulating AI practices.

Recognising the profound impact of AI on society, the company states that it ‘has always placed paramount importance on fostering an environment of responsible and ethical AI usage’.

To this effect, i-PRO has formulated its Ethical Principles for AI, creating a framework designed to balance the advancement of AI technology with social responsibility and ethical considerations.

By 2026, Gartner predicts that 50% of governments worldwide will enforce the use of responsible AI through regulations, policies, and the need for data privacy. While these guidelines are being developed, AI continues to evolve at a rapid pace.

The key tenets of the i-PRO Ethical Principles for AI include:

  1. Achieving enhanced quality of life and fostering a safer, more secure society:

i-PRO endeavours to create enduring value that contributes to the safety and security of society, through continued AI research and development. The company will continuously evaluate the human, societal, and environmental impact of its AI products and services to further improve its technology offering.

 

  1. Protecting human rights and privacy: i-PRO prioritises the protection of fundamental human rights in the development and deployment of AI solutions. Upholding data protection and privacy principles guides every aspect of our operations. We enforce stringent authorisation and authentication protocols to safeguard sensitive data within our AI-driven applications. Furthermore, we are committed to providing our customers with embedded tools to facilitate compliance with evolving AI regulations.

 

  1. Transparency and fairness: i-PRO pledges to uphold principles of transparency and fairness, fostering diversity and equality to combat bias, discrimination, and unfair practices that could potentially be created by the use of AI. We will achieve this by consistently and thoroughly testing our AI models to build confidence in their performance and mitigate risks.

 

  1. Education and training: As a driving force in the development of AI solutions, i-PRO will continue to focus on educating its workforce, partners, customers and the industry at large on the power, potential and ethical consideration of AI in the physical security environment. By fostering collaboration and establishing an open dialog with key stakeholders, i-PRO will be able to address emerging challenges and drive meaningful change within the AI ecosystem.

 

“While we believe AI solutions can enhance automation and inform decisions, we also believe that this should not come at the expense of responsible usage, ethical standards, or privacy compliance,” said Masato Nakao, CEO at i-PRO. “As the physical security industry continues to embrace the promise of AI, we look forward to working together with our industry colleagues, partners, and customers to foster a culture of responsible AI development and usage.”

 

By championing ethical principles, i-PRO endeavours to set a new standard of integrity within the physical security industry, reaffirming its unwavering commitment to safety, security, and societal well-being.

 

 

 

BeyondTrust Bolsters Leadership Team to Drive Next Chapter of Growth

Sean Cashin, Chief Customer Officer, BeyondTrust

  • New Chief Customer Officer, Chief Marketing Officer, and Chief Information Security Officer to drive innovation and excellence
  • Completion of BeyondTrust executive leadership team positions company for next stage growth

BeyondTrust, the worldwide leader in intelligent identity and access security, today announced the finalisation of its executive leadership team, comprising seasoned professionals with over 100 years of experience in driving growth and innovation across diverse industries. With the appointment of Sean Cashin as Chief Customer Officer, Brett Theiss as Chief Marketing Officer, and Michael Machado as Chief Information Security Officer, BeyondTrust solidifies its commitment to delivering unparalleled value and excellence to its customers worldwide through its identity security leadership.

As Chief Customer Officer, Sean Cashin assumes responsibility for ensuring customers achieve their business objectives and cybersecurity goals through BeyondTrust’s innovative solutions.   Sean joined BeyondTrust in 2018 and has held several progressive roles within the Customer Success team. With over 25 years of experience in Software Development, Operations, and Customer Experience roles, Sean brings a wealth of expertise to his position. He spearheads efforts to enhance customer satisfaction and oversees key functions, including Customer Success, Education, Professional Services, Support, and Technical Account Management. Sean’s prior engagements at NTT DATA and his background in Operations Excellence uniquely position him to drive transformative change within BeyondTrust.

Brett Theiss, Chief Marketing Officer – BeyondTrust

Brett Theiss, appointed Chief Marketing Officer, leads BeyondTrust’s global marketing strategy, focusing on brand reputation and market leadership in the identity security landscape. With a rich background spanning over two decades in technology and SaaS marketing, Brett has a proven track record of driving revenue growth through strategic marketing initiatives. His leadership roles at Anaplan, Xactly, and CA Technologies demonstrate his ability to build and lead high-performing marketing teams.

Michael Machado, Chief Information Security Officer – BeyondTrust

Michael Machado assumes the role of Chief Information Security Officer, where he is tasked with strategic planning and governance of BeyondTrust’s information security program. With over 20 years of experience in global companies, ranging from pre-IPO to Fortune 100, Mike brings a wealth of expertise in cybersecurity and data protection. His prior roles at Shippo and RingCentral, where he led cybersecurity and trust strategies, highlight his ability to navigate complex security landscapes.

“We are thrilled to welcome Sean, Brett, and Mike to the Executive Leadership Team,” said Janine Seebeck, CEO at BeyondTrust. “Their collective experience and expertise will be instrumental as we embark on our next phase of growth, and BeyondTrust is poised to continue delivering best-in-class identity security solutions to our valued customers worldwide.”

For more information on the BeyondTrust Leadership team, visit:  https://www.beyondtrust.com/company/leadership.

World backup day – a reminder to always consider data safety

With World Backup Day having recently passed, it is prescient to reflect on the sheer volume of data in the modern enterprise, and consider the enormous risk that it poses – both to operational stability and customer trust.

 

In today’s digital landscape, safeguarding data has become an increasingly critical endeavour. As cyber threats continue to evolve in sophistication and frequency, the importance of robust backup and recovery measures cannot be overstated. In the aftermath of World Backup Day, it’s imperative to reflect on the significance of protecting vital information against a backdrop of escalating cyber assaults.

 

Martin Creighan, Vice President for APAC at Commvault, points out that cybercriminals not only infiltrate and compromise enterprise data but often also implant malware within backups. This tactic captures the organisation in a cycle of attempting to restore functionality, only to inadvertently reinstate the assailants’ access. Sadly this tactic often leaves ransom payment as the only viable option.

 

Creighan emphasises the gravity of the situation, citing research indicating that 65% of Australian companies feel they could sustain business operations for only five days without access to their critical data. However, fewer than half have confidence in their capacity to fully restore data after ransomware activity.

 

These sobering statistics underscore the urgency for robust cybersecurity measures to safeguard resilience in the face of escalating cyber threats.

 

The Australian Signals Directorate (ASD) responded to over 1,100 cybersecurity incidents from local entities in the last financial year, coupled with nearly 94,000 reports filed via the government’s ReportCyber portal. This paints a vivid picture of the magnitude of the challenge at hand, with incidents occurring at a rate of one report every six minutes.

 

“The cornerstone of effective cybersecurity lies in prioritising the security of backups and streamlining recovery processes to swiftly restore operational functionality post-attack,” says Creighan. “It is necessary to integrate anomaly detection systems and early warning mechanisms, which are indispensable tools for pre-empting cyber intrusions into backup repositories.”

 

Moreover, Creighan underscores the critical importance of testing recovery plans within controlled, malware-free environments. “Traditionally, such endeavours have been beset by exorbitant costs and logistical complexities. However, with the advent of cloud technology and AI, the tide is turning, enabling organisations to execute robust testing protocols at minimal expense and scale.”

 

Daniel Dale, Operations Director at Leaseweb, echoes this sentiment, emphasising the need for secure and readily available data amidst rising reliance on digital information. “Backups provide a way of recovery in today’s world where every minute matters,” says Dale. “Ensuring you have a solution in place which is tried and tested is imperative.”

 

Recent statistics underscore the severity of data loss incidents, with small businesses without recovery plans facing up to 75% risk. The average cost of a data breach globally stands at $4.45 million, with hardware failures accounting for 43% of data losses. These figures highlight the dire consequences organizations face in the absence of robust backup and recovery strategies.

 

“In summary, losing data, for whatever reason, is not something any user or corporate should take lightly,” concludes Dale. “As the growth of online data and the demand for cloud and AI services continue to rise, backup and recovery should not be overlooked.”

 

Ultimately, World Backup Day serves as a reminder of the critical role data protection plays in organisational resilience and continuity. By prioritising cybersecurity measures, implementing robust backup solutions, and conducting regular testing, organisations can mitigate the risks posed by escalating cyber threats and ensure business continuity in an increasingly interconnected world.

 

 

LogRhythm Unveils Advanced Capabilities for Cloud-Native SIEM Platform, LogRhythm Axon

Chris O’Malley, CEO of LogRhythm

LogRhythm’s Eighth Quarterly Release Enhances Global Security Communication and Collaboration

Recent global research reveals 61% of organisations still rely on manual and time-intensive methods for sharing security status updates. In response, LogRhythm, the company helping security teams stop breaches by turning disconnected data and signals into trustworthy insights, today announced its eighth consecutive quarterly release. The latest innovations to LogRhythm Axon facilitate seamless dashboard and search import/export to community repositories, bridging the communication gap.

Furthermore, LogRhythm Axon introduces key features to streamline auditing for compliance standards and enable greater efficiency with security analytics mapped to MITRE ATT&CK use cases. This quarter simplifies compliance auditing for PCI-DSS 4.0, HIPPA, CMMC, NIST 800-53 and ISO27001standards and provides comprehensive views of ongoing investigations through advanced case management metrics. LogRhythm Axon’s continued innovation equips security professionals with the tools needed to respond promptly to emerging threats and enhance threat detection, investigation, and response strategies.

“Our eighth consecutive quarterly release epitomises our relentless dedication to customer satisfaction and our tireless pursuit of innovation that matters in our quest to save the world from cyberthreats,” said Chris O’Malley, CEO of LogRhythm. “By providing security teams advanced intelligence and analytics capabilities, we enable organisations to stay ahead of threats and safeguard their digital assets with confidence. At LogRhythm, we understand our success is intricately tied to the success of our customers, and that commitment fuels our tireless pursuit of excellence in service and experience.”

Empowering Security Teams with Advanced LogRhythm Axon Capabilities

  • Import and export of dashboards and searches enables community sharing through a GitHub repository, directly addressing the manual and time-intensive approaches reported by 61% of organisations.
  • Out-of-the-box content for PCI-DSS 4.0, HIPAA, CMMC, NIST 800-53 and ISO27001 enable analysts to easily generate evidence required for compliance audit standards
  • Publishing of pre-populated lists for customers to customise for their environment drives additional MITRE ATT&CK use cases such as trusted relationship and default accounts
  • Alerts for when critical sources stop sending data to ensure complete visibility in monitoring and detecting
  • Enhanced case management metrics provide a holistic view of current open cases enabling security teams to make informed decisions quickly

 New LogRhythm SIEM Enhancements Aim to Improve Data Management and Operational Efficiency

  • Access to cases adheres to separation based on entities and RBAC controls, enabling multitenant customers and individual business to only access data assigned to them
  • Simplified the process to retire log sources and Beats in LogRhythm SIEM, reducing administrative overhead
  • Expanded library of supported log sources and parsing for improved correlation and analysis

“LogRhythm’s dedication to empowering security teams with advanced analytics, threat management capabilities, and streamlined processes reflects their commitment to cybersecurity leadership,” said Alex Bredikhin, CTO & Co-Founder at SOC Prime. “Their continuous innovation reaffirms our partnership and the value it brings to the industry.”

“LogRhythm Axon has bolstered our security operations, and the impact of the products bi-weekly releases is unparalleled. LogRhythm’s commitment to continuous innovation is not just a promise; it’s a reality that consistently exceeds our expectations,” said Daniel S., Director, IT and Security Operations at a software company. “With each release, LogRhythm reaffirms their dedication to customer satisfaction and cybersecurity excellence, making them an invaluable partner in our defence against evolving threats.”

To explore a preview of the global research, please visit: https://logrhythm.com/.