website security checker - AI-Tech Park https://ai-techpark.com AI, ML, IoT, Cybersecurity News & Trend Analysis, Interviews Fri, 30 Aug 2024 04:45:10 +0000 en-US hourly 1 https://wordpress.org/?v=5.4.16 https://ai-techpark.com/wp-content/uploads/2017/11/cropped-ai_fav-32x32.png website security checker - AI-Tech Park https://ai-techpark.com 32 32 Oligo Security Announces Mike O’Malley as Chief Marketing Officer https://ai-techpark.com/oligo-security-announces-mike-omalley-as-chief-marketing-officer/ Thu, 29 Aug 2024 14:30:00 +0000 https://ai-techpark.com/?p=178096 Proven Industry Veteran to Help Drive Next Stage of Company Growth As it continues to rapidly accelerate growth in the market, Oligo Security, the leading runtime application security and observability platform, today announced the appointment of Mike O’Malley as Chief Marketing Officer (CMO). O’Malley brings more than 2 decades of...

The post Oligo Security Announces Mike O’Malley as Chief Marketing Officer first appeared on AI-Tech Park.

]]>
Proven Industry Veteran to Help Drive Next Stage of Company Growth

As it continues to rapidly accelerate growth in the market, Oligo Security, the leading runtime application security and observability platform, today announced the appointment of Mike O’Malley as Chief Marketing Officer (CMO).

O’Malley brings more than 2 decades of experience in marketing, go-to-market, and community building to Oligo Security. He has a proven track record of successfully launching innovative new products in emerging markets, scaling global demand engines, and driving business strategy through multiple stages of substantial growth.

O’Malley most recently served as CMO of Noname Security, which was acquired by Akamai in June of 2024. He has also held leadership roles at CyberArk, 128 Technology (acquired by Juniper), EMC, Acme Packet, and VMware.

“Mike brings expertise and demonstrated success across the marketing and go-to-market disciplines, as well as a deep understanding of the cybersecurity market – all of which will be critical as we take Oligo through its next stages of accelerated growth,” said Nadav Czerninski, CEO and Co-Founder at Oligo Security. “Mike’s addition to the team is a critical one as we continue to redefine application security with Oligo’s novel approach to our application detection and response platform and deliver significant results to our customers.”

“I’m thrilled to be joining the team at Oligo, and help take a truly disruptive solution to market, as well as contribute to an already fantastic culture at the company,” said Mike O’Malley, Oligo CMO. “I truly believe this is going to be an industry-changing company, and one that customers will look to as a major driver of value for their cybersecurity teams.”

Explore AITechPark for the latest advancements in AI, IOT, Cybersecurity, AITech News, and insightful updates from industry experts!

The post Oligo Security Announces Mike O’Malley as Chief Marketing Officer first appeared on AI-Tech Park.

]]>
F5 Collaborates with Intel to Simplify AI Services Security & Delivery https://ai-techpark.com/f5-collaborates-with-intel-to-simplify-ai-services-security-delivery/ Thu, 29 Aug 2024 09:11:21 +0000 https://ai-techpark.com/?p=178026 Enhancing the protection and performance of enterprise AI inference solutions with F5 NGINX Plus, Intel OpenVINO, and Intel IPUs F5 (NASDAQ: FFIV) today announced it is bringing robust application security and delivery capabilities to AI deployments powered by Intel. This new joint solution combines industry-leading security and traffic management from F5’s...

The post F5 Collaborates with Intel to Simplify AI Services Security & Delivery first appeared on AI-Tech Park.

]]>
Enhancing the protection and performance of enterprise AI inference solutions with F5 NGINX Plus, Intel OpenVINO, and Intel IPUs

F5 (NASDAQ: FFIV) today announced it is bringing robust application security and delivery capabilities to AI deployments powered by Intel. This new joint solution combines industry-leading security and traffic management from F5’s NGINX Plus offering with the cutting-edge optimization and performance of the Intel Distribution of OpenVINO toolkit and Infrastructure Processing Units (IPUs) to deliver superior protection, scalability, and performance for advanced AI inference.

As organizations increasingly adopt AI to power intelligent applications and workflows, efficient and secure AI inference becomes critical. This need is addressed by combining the OpenVINO toolkit—which optimizes and accelerates AI model inference—with F5 NGINX Plus, providing robust traffic management and security.

The OpenVINO toolkit simplifies the optimization of models from almost any framework to enable a write-once, deploy-anywhere approach. This toolkit is essential for developers aiming to create scalable and efficient AI solutions with minimal code changes.

F5 NGINX Plus enhances the security and reliability of these AI models. Acting as a reverse proxy, NGINX Plus manages traffic, ensures high availability, and provides active health checks. It also facilitates SSL termination and mTLS encryption, safeguarding communications between applications and AI models without compromising performance.

To further boost performance, Intel IPUs offload infrastructure services from the host CPU, freeing up resources for AI model servers. The IPUs efficiently manage infrastructure tasks, opening up resources to enhance the scalability and performance of both NGINX Plus and OpenVINO™ Model Servers (OVMS).

This integrated solution is particularly beneficial for edge applications, such as video analytics and IoT, where low latency and high performance are crucial. By running NGINX Plus on the Intel IPU, the solution helps ensure rapid and reliable responses, making it ideal for content delivery networks and distributed microservices deployments.

“Teaming up with Intel empowers us to push the boundaries of AI deployment. This collaboration highlights our commitment to driving innovation and delivers a secure, reliable, and scalable AI inference solution that will enable enterprises to securely deliver AI services at speed. Our combined solution ensures that organizations can harness the power of AI with superior performance and security,” said Kunal Anand, Chief Technology Officer at F5.

“Leveraging the cutting-edge infrastructure acceleration of Intel IPUs and the OpenVINO toolkit alongside F5 NGINX Plus can help enable enterprises to realize innovative AI inference solutions with improved simplicity, security, and performance at scale for multiple vertical markets and workloads,” said Pere Monclus, Chief Technology Officer, Network and Edge Group of Intel.

The solution is now available. For more information, visit f5.com/intel. In addition, a companion blog from F5 CTO Kunal Anand provides further insight on this offering.

Explore AITechPark for the latest advancements in AI, IOT, Cybersecurity, AITech News, and insightful updates from industry experts!

The post F5 Collaborates with Intel to Simplify AI Services Security & Delivery first appeared on AI-Tech Park.

]]>
Apiiro Launches AI-Driven Risk Detection at the Design Phase https://ai-techpark.com/apiiro-launches-ai-driven-risk-detection-at-the-design-phase/ Wed, 07 Aug 2024 09:53:43 +0000 https://ai-techpark.com/?p=175624 Apiiro shifts risk detection left before code is written, re-inventing Secure-by-Design for today’s agile software environments Apiiro, the leading application security posture management (ASPM) platform, today introduced Risk Detection at Design Phase, a new, AI-driven capability that automatically analyzes feature requests to identify risks and proactively initiate security reviews or...

The post Apiiro Launches AI-Driven Risk Detection at the Design Phase first appeared on AI-Tech Park.

]]>
Apiiro shifts risk detection left before code is written, re-inventing Secure-by-Design for today’s agile software environments

Apiiro, the leading application security posture management (ASPM) platform, today introduced Risk Detection at Design Phase, a new, AI-driven capability that automatically analyzes feature requests to identify risks and proactively initiate security reviews or threat models at the earliest stage of the application development lifecycle. With this new, first-of-its-kind capability, application security (AppSec) practitioners can now scale their secure software development lifecycle (SSDLC) processes by mitigating security and compliance concerns before a single line of code is written.

Security products on the market today detect risks only after the development process has begun. This results in wasted time for developers due to manual risk assessment questionnaires, which impact release velocity and business value. With the detection of risks at the design phase, Apiiro customers can proactively address security, data privacy, infrastructure, compliance, and other risks at the onset of development, saving significant time and costs while minimizing rework and accelerating secure software delivery.

Apiiro’s detection of risky feature requests is built on cutting-edge AI technology, including Apiiro’s native private LLM. This model, not accessible by ChatGPT or any other public LLM services, ensures customer privacy and compliance by automatically analyzing feature requests and proactively identifying potential risks associated with:

  • Generative AI technology: adding or changing generative AI tools, frameworks, technologies, and the data that is exposed to them.
  • Sensitive data handling: storing and/or processing sensitive information like PII, PHI payment data fields as part of the application data flow, changing encryption mechanisms, data migrations, writing sensitive data to logs, and using sensitive data as an API return type.
  • User permissions and access management: user authentication and authorization, login or registration processes, and changing user permissions.
  • Third-party integrations, and open source dependencies: changing or adding open source dependencies and integrations with third-party services.
  • Architecture design and security controls: requests for changes in APIs, network, databases, web servers, web clients, logging, serialization and other component configurations, architecture designs, and deployment of new or changed components.

For each risky feature request, enriched by the code architecture generated by its Deep Code Analysis (DCA) technology, Apiiro’s native private LLM model automatically generates contextual questions for a security review and produces threat stories using the STRIDE threat model. This automation eliminates the need for manual security processes, accelerating development velocity and deployment of secure code to the cloud, ultimately driving business growth. In addition, Apiiro enhances design risk context by automatically mapping to specific code commits, repositories, and pull requests, providing deeper insight into how potential risks may manifest in the actual codebase.

“Detecting potential risk at the design phase gives us the opportunity to remediate risks before they exist, and in the most efficient way for our developers. However, it’s challenging to do this at scale and to ensure full coverage of features our development team are building. Apiiro’s design phase risk detection engine is a unique capability in the ASPM space. It allows us to modernize our approach to Secure-by-Design, scale and strengthen our security engagement, and provide some automation to our threat modeling and security requirements processes.” -Head of Security Engineering at Fortune 100 retail company

“Amidst the ever-changing complexity of modern software development processes and application architectures, Apiiro is committed to delivering complete risk-based visibility and protection from design to runtime,” said Moti Gindi, chief product officer at Apiiro. “Building secure software starts with secure design, and the new AI-Driven Risk Detection at Design Phase from Apiiro takes the ‘shift left’ approach a step further, addressing risks even before a single line of code is written. This first-of-its-kind functionality leverages the power of AI to ensure customers have the context required to facilitate efficient security reviews and evolve from a reactive to a proactive approach to application security.”

Click here to learn more and visit the Apiiro booth #2622 at Black Hat USA for a live demonstration of the Risk Detection at Design Phase.

Supporting Resources

  • Apiiro blog
  • Apiiro on LinkedIn
  • Apiiro on Twitter

Explore AITechPark for the latest advancements in AI, IOT, Cybersecurity, AITech News, and insightful updates from industry experts!

The post Apiiro Launches AI-Driven Risk Detection at the Design Phase first appeared on AI-Tech Park.

]]>
Backslash Security introduced two new capabilities https://ai-techpark.com/backslash-security-introduced-two-new-capabilities/ Thu, 25 Jul 2024 16:00:00 +0000 https://ai-techpark.com/?p=174181 Simulated vulnerability fixes and LLM-powered remediation guidance extend the Backslash platform across the full software development lifecycle Backslash Security, a modern application security solution that leverages deep reachability analysis for enterprise AppSec and product security teams, today introduced its Fix Simulation and AI-powered Attack Path Remediation capabilities. The new features...

The post Backslash Security introduced two new capabilities first appeared on AI-Tech Park.

]]>
Simulated vulnerability fixes and LLM-powered remediation guidance extend the Backslash platform across the full software development lifecycle

Backslash Security, a modern application security solution that leverages deep reachability analysis for enterprise AppSec and product security teams, today introduced its Fix Simulation and AI-powered Attack Path Remediation capabilities. The new features equip security teams and developers with enhanced remediation guidance that is safe, secure and in the relevant context of the given application, ensuring that critical vulnerabilities can be fixed without introducing new risks.

Fix Simulation addresses a pervasive pain point faced by AppSec teams and developers: any version upgrade can introduce new risks due to unforeseen code dependencies, undoing progress and placing teams back at square one. Backslash Fix Simulation addresses this issue by simulating multiple fix options and demonstrating the resulting security posture for each one. This enables developers to save time, choose the best option, take multiple considerations into account including those unrelated to security, and avoid introducing new risks while addressing security issues

Attack Path Remediation integrates with LLMs to give developers highly contextual guidance on code vulnerability remediation, while ensuring source code stays confidential. Drawing from the comprehensive contextual insight generated via Backslash reachability analysis, the platform produces safe and secure remediation guidance. By using code metadata from Backslash scans such as technology stacks and frameworks without sharing any code snippets, organizations can leverage LLM technology while protecting against data leaks and maintaining code privacy.

“We finished the first half of the year with a record number of new customers. This reinforced our belief that it’s critical not only to focus the AppSec team on what really matters, but also to simplify the process of fixing the issues found,” said Yossi Pik, co-founder and CTO of Backslash Security. “To address this need, we developed new remediation capabilities that ensure vulnerabilities are identified, prioritized, and fixed promptly, closing the loop with tailored, context-rich recommendations. It’s like having an insider provide fix suggestions, streamlining the process for security and development teams.”

These new capabilities align with CISA’s Secure by Design Pledge requirements, providing organizations with a robust framework for maintaining security throughout the software development lifecycle. Backslash simplifies security integration into the development process, ensuring vulnerabilities are caught early and thus reducing entire classes of vulnerabilities.

Start a free trial with full access to the Backslash platform via a pre-configured demo environment that includes SAST, SCA, phantom packages, VEX, SBOM, secrets, and more, now available at backslash.security/trial.

Explore AITechPark for the latest advancements in AI, IOT, Cybersecurity, AITech News, and insightful updates from industry experts!

The post Backslash Security introduced two new capabilities first appeared on AI-Tech Park.

]]>
Heeler Security Secures $8.5M Seed Funding https://ai-techpark.com/heeler-security-secures-8-5m-seed-funding/ Mon, 22 Jul 2024 14:07:32 +0000 https://ai-techpark.com/?p=173717 Amid Real-Time Context Crisis Across the SDLC, Heeler Aims to Fix Fundamentally Broken Application Security Heeler Security Inc., a pioneering startup in the application security space, today announced the successful closing of an $8.5 million Seed Series funding round, led by Norwest Venture Partners with significant participation from Storm Ventures....

The post Heeler Security Secures $8.5M Seed Funding first appeared on AI-Tech Park.

]]>
Amid Real-Time Context Crisis Across the SDLC, Heeler Aims to Fix Fundamentally Broken Application Security

Heeler Security Inc., a pioneering startup in the application security space, today announced the successful closing of an $8.5 million Seed Series funding round, led by Norwest Venture Partners with significant participation from Storm Ventures.

“Application security requires a new approach that focuses on runtime visibility and that’s exactly what Heeler has done,” said David Zilberman, General Partner at Norwest Venture Partners. “The founders of Heeler have storied backgrounds that demonstrate an ability to execute. They have launched application security and cloud security products at enterprise scale and have started and grown companies from initial stages to acquisition and IPO.”

The growing complexity of modern applications has created an expanding and often obscure attack surface, overwhelming security teams who lack the real-time context needed to secure them. This results in fragmented security insights across the software development lifecycle (SDLC), heightened risks of breaches and vulnerabilities, and reactive firefighting.

To address these escalating challenges, founders Chris Hertz, Chief Executive Officer, James Green, Chief Product Officer, Trever McKee, Chief Technology Officer, and Chris DeRamus, Chief Strategy Officer, launched Heeler in June 2023, driven by a vision to fundamentally transform application security by delivering:

  • Real-time security and business context
  • Detection, enrichment and posture management
  • Response orchestration

“We are uniquely positioned to seize a massive market opportunity by creating a platform that offers comprehensive SDLC security at the convergence of application and cloud,” said Chris Hertz, CEO of Heeler. “This round of seed funding will support our execution of that vision.”

Heeler’s patent-pending ProductDNA technology unifies the code, behavior, and business context of applications in real-time. ProductDNA delivers what was previously impossible: a frictionless chain of custody between the intended state in code and the running state in production. Acting as a shared operating platform for both security and developers, it embeds security seamlessly into the development lifecycle, benefiting both security and developer teams alike.

For the first time, Heeler enables organizations to fulfill their mandate of customer trust by enhancing security and availability while maintaining speed and efficiency. Heeler automates the repetitive and time-intensive task of assessing the impact of security issues on business applications, significantly reducing noise and false positives. Developers can now understand the security impact of their changes as they code, allowing guidance and development of resilient applications.

“Heeler is making it effortless for security teams and developers to easily collaborate on preventing and managing security risks throughout their entire SDLC, ” said Justin Pagano, Director of Security Risk & Trust at Klaviyo. “As innovation accelerates cloud and application complexity, Heeler’s ProductDNA provides a scalable and simplified approach to maintaining a holistic, real-time view of SDLC security and lineage with quickly actionable ownership, integrity, and security risk context.”

Heeler’s ProductDNA is already used by design partners, ranging from unicorn startups to Fortune 500 firms, and will be generally available in Q4 2024.

Heeler Security will be displaying its solution at Black Hat USA 2024. Interested parties are invited to meet the founders at booth SC316 in Startup City to learn more about the company’s vision and upcoming product launch. Schedule a demo here: www.heeler.com

Explore AITechPark for the latest advancements in AI, IOT, Cybersecurity, AITech News, and insightful updates from industry experts!

The post Heeler Security Secures $8.5M Seed Funding first appeared on AI-Tech Park.

]]>
Organizations Struggle with Outdated Security as Online Threats Increase https://ai-techpark.com/organizations-struggle-with-outdated-security-as-online-threats-increase/ Wed, 26 Jun 2024 10:00:00 +0000 https://ai-techpark.com/?p=170895 Insights reveal record-breaking time-to-exploit of new zero-day vulnerability, largest DDoS attack in the history of the Internet, and increasing supply chain threats Cloudflare, Inc. (NYSE: NET), the leading connectivity cloud company, today published its State of Application Security 2024 Report. Findings from this year’s report reveal that security teams are struggling to...

The post Organizations Struggle with Outdated Security as Online Threats Increase first appeared on AI-Tech Park.

]]>
Insights reveal record-breaking time-to-exploit of new zero-day vulnerability, largest DDoS attack in the history of the Internet, and increasing supply chain threats

Cloudflare, Inc. (NYSE: NET), the leading connectivity cloud company, today published its State of Application Security 2024 Report. Findings from this year’s report reveal that security teams are struggling to keep pace with the risks posed by organizations’ dependency on modern applications—the technology that underpins all of today’s most used sites. The report underscores that the volume of threats stemming from issues in the software supply chain, increasing number of distributed denial of service (DDoS) attacks and malicious bots, often exceed the resources of dedicated application security teams.

Today’s digital world runs on web applications and APIs. They allow ecommerce sites to accept payments, healthcare systems to securely share patient data, and power activities we do on our phones. However, the more we rely on these applications, the more the attack surface expands. This is further magnified by the demand for developers to quickly deliver new features—e.g., capabilities driven by generative AI. But if unprotected, exploited applications can lead to the disruption of businesses, financial losses, and the collapse of critical infrastructure.

“Web Applications are rarely built with security in mind. Yet, we use them daily for all sorts of critical functions, making them a rich target for hackers,” said Matthew Prince, co-founder and CEO at Cloudflare. “Cloudflare’s network blocks an average of 209 billion cyber threats for our customers every single day. The layer of security around today’s applications has become one of the most essential pieces to making sure the Internet stays secure.”

Key findings from Cloudflare’s State of Application Security 2024 Report include:

  • DDoS attacks continue to increase in number and volume: DDoS remains the most leveraged threat vector to target web applications and APIs, comprising 37.1% of all application traffic mitigated by Cloudflare. Top targeted industries were Gaming and Gambling, IT and Internet, Cryptocurrency, Computer Software and Marketing and Advertising.
  • First to patch vs. first to exploit—the race between defenders and attackers accelerates: Cloudflare observed faster exploitations than ever of new zero-day vulnerabilities, with one occurring just 22 minutes after its proof-of-concept (PoC) was published.
  • Bad bots—if left unchecked—can cause massive disruption: One-third (31.2%) of all traffic stems from bots, the majority (93%) of which are unverified and potentially malicious. Top targeted industries were Manufacturing and Consumer Goods, Cryptocurrency, Security and Investigations, and US Federal Government.
  • Organizations are using outdated approaches to secure APIs: Traditional web application firewall (WAF) rules that use a negative security model—the assumption that most web traffic is benignare most commonly leveraged to protect against API traffic. Far fewer organizations use the more widely accepted API security best practice of a positive security model—strict definitions on traffic that is allowed, rejecting the rest.
  • Third-party software dependencies pose growing risk: Organizations use an average of 47.1 pieces of code from third-party providers and make an average of 49.6 outbound connections to third-party resources to help enhance website efficiency and performance—e.g., leveraging Google Analytics or Ads. But as web development has largely shifted to allow these types of third-party code and activity to load in a user’s browser, organizations are increasingly exposed to supply chain risk and liability and compliance concerns.

Report Methodology: This report is based on aggregated traffic patterns (observed from April 1, 2023 – March 31, 2024) across the Cloudflare global network. This data and threat intelligence from Cloudflare’s network has been complemented by third-party sources, as cited throughout the report. Cloudflare mitigated 6.8% of all web application and API traffic during the data collection period. Mitigated traffic is defined as any traffic that is blocked or is served a challenge by Cloudflare. The specific threat type and relevant mitigation technique depend on many factors, such as the application’s potential security gaps, the nature of the victim’s business and the attacker’s goals.

Explore AITechPark for the latest advancements in AI, IOT, Cybersecurity, AITech News, and insightful updates from industry experts!

The post Organizations Struggle with Outdated Security as Online Threats Increase first appeared on AI-Tech Park.

]]>
Verimatrix announced enhancements to XTD Dashboard https://ai-techpark.com/verimatrix-announced-enhancements-to-xtd-dashboard/ Thu, 20 Jun 2024 10:00:00 +0000 https://ai-techpark.com/?p=170262 New Risk Classification Logic, Identity Tags and User Experience Upgrades Empower Customers to Streamline Threat Response Verimatrix, (Euronext Paris: VMX), the leader in powering the modern connected world with people-centered security, today announced major enhancements to its XTD dashboard, providing customers with greater visibility into application security risks and more...

The post Verimatrix announced enhancements to XTD Dashboard first appeared on AI-Tech Park.

]]>
New Risk Classification Logic, Identity Tags and User Experience Upgrades Empower Customers to Streamline Threat Response

Verimatrix, (Euronext Paris: VMX), the leader in powering the modern connected world with people-centered security, today announced major enhancements to its XTD dashboard, providing customers with greater visibility into application security risks and more actionable insights to better protect mobile apps and users.

First launched in early 2022, the updated XTD dashboard introduces an all new risk classification model that replaces numerical scores with four clear implication classifications — Informational, Low, Suspicious and High. This allows security teams to quickly understand the severity and context around detected threats. Detailed explanations accompany each risk level, ensuring transparency.

In addition to the new risk scoring model, the XTD dashboard provides specific remediation guidance mapped to each risk level. Teams can immediately see recommended steps for investigating, applying protections or addressing vulnerabilities based on the evaluated threats.

The redesigned dashboard UI streamlines information delivery with optimized layouts and intuitive navigation:

  • Main Dashboard Page offers an at-a-glance view of the overall app security posture, key metrics and critical detections requiring attention
  • App Instance View enables drill-down analysis of individual application instances to identify patterns and focus risk mitigation efforts

“With the surge in mobile app usage and evolving cyber threats, organizations need robust threat intelligence that allows them to prioritize and respond swiftly,” said Tom Powledge, Head of Cybersecurity Business for Verimatrix. “Our enhanced XTD dashboard applies intelligence and automation to translate raw data into actionable information that enables teams to mitigate risks effectively.”

The company has also introduced Verimatrix User Identity Tag™, a new XTD feature that associates a unique identifier with each individual app user. This makes it possible to trace compromised app instances back to the account source, empowering more effective threat containment and forensic investigation processes.

“Verimatrix User Identity Tag™ enhances mobile app security by bridging the gap between detecting compromised app instances and actually tracing them back to the impacted user accounts,” said Dr. Klaus Schenk, SVP Security and Threat Research at Verimatrix. “For regulated enterprises like banks, this capability is game-changing. It transforms a broad ‘potential breach’ scenario into a laser-focused incident response, allowing surgical containment of just the involved accounts. This preserves business continuity and enhances compliance specificity, while providing authoritative evidence trails — something that’s been virtually impossible until now with the disconnected nature of mobile app security.”

Explore AITechPark for the latest advancements in AI, IOT, Cybersecurity, AITech News, and insightful updates from industry experts!

The post Verimatrix announced enhancements to XTD Dashboard first appeared on AI-Tech Park.

]]>
Checkmarx, DXC Technology to Deliver Scalable, Holistic AppSec Globally https://ai-techpark.com/checkmarx-dxc-technology-to-deliver-scalable-holistic-appsec-globally/ Wed, 19 Jun 2024 15:15:00 +0000 https://ai-techpark.com/?p=170095 Enhanced collaboration will reduce risk, improve software quality and accelerate digital transformation and cloud migration for global enterprises Checkmarx, the industry leader in cloud-native application security for the enterprise, is stepping up collaboration with DXC Technology (NYSE: DXC), a leading Fortune 500 global technology services company, to offer robust and...

The post Checkmarx, DXC Technology to Deliver Scalable, Holistic AppSec Globally first appeared on AI-Tech Park.

]]>
Enhanced collaboration will reduce risk, improve software quality and accelerate digital transformation and cloud migration for global enterprises

Checkmarx, the industry leader in cloud-native application security for the enterprise, is stepping up collaboration with DXC Technology (NYSE: DXC), a leading Fortune 500 global technology services company, to offer robust and fully scalable application security (AppSec) programs and services around the world. DXC Technology will now sell and support the Checkmarx One™ application security platform at its customer sites to enable enterprise-grade, comprehensive protection across the software development life cycle and help them find and fix software vulnerabilities faster.

Together, Checkmarx and DXC Technology have over 5000 experts and a vast ecosystem of partners to design, build, deliver and support holistic application security programs to:

  • Protect all applications and application footprints on a single platform that covers the entire software development life cycle (SDLC), from code to cloud
  • Reduce cost and risk while improving customer outcomes
  • Help organizations take applications to market faster
  • Tailor and customize services to match each customer’s needs

“DXC and Checkmarx have built a powerful relationship to significantly reduce risk and ensure faster innovation for enterprise organizations around the world,” said Yigal Elstein, Chief Revenue Officer at Checkmarx. “The enterprise has a critical need to speed and scale business-critical projects without compromising application security, including digital transformation and cloud migration​. Checkmarx and DXC deliver a real solution through Checkmarx One with DXC’s global reach that enables alignment of processes, tools and methodologies across regions and business units.”

Remarked Roger Smith, Global Testing and Digital Assurance Practice Leader at DXC, “I’m excited about the new partnership with Checkmarx and the advanced capabilities of the Checkmarx One platform as an integral part of DXC Application Security on Demand services to proactively integrate security into the development lifecycle through developer-friendly features that accelerate speed to value.“

In addition to selling and supporting Checkmarx One, DXC will provide the following services:

  • Application security strategy and consulting​
  • Comprehensive application threat analysis
  • Project-level optimization to ensure high-fidelity results and priority-based remediation
  • Query customization, triage and remediation
  • Static, dynamic, API, IaC security testing​
  • Open-source software composition analysis​
  • Migration​ to Checkmarx One

Purpose-built for enterprise cloud development, Checkmarx One is a highly scalable platform that addresses the need to close application security gaps while speeding time to delivery. The platform integrates into any workflow or tool, delivering security with the speed, scale and flexibility to support the latest development requirements, seamlessly working with all modern frameworks and development infrastructures through webhook integrations, a standard set of APIs or command-line interface. Checkmarx One dramatically improves the end-to-end developer experience of AppSec while expanding the AI-driven security capabilities across the platform, its reporting and analytics capabilities and its software Supply Chain Security solution.

Explore AITechPark for the latest advancements in AI, IOT, Cybersecurity, AITech News, and insightful updates from industry experts!

The post Checkmarx, DXC Technology to Deliver Scalable, Holistic AppSec Globally first appeared on AI-Tech Park.

]]>
Radware Recognized as Voice of the Customer for Cloud Web Application https://ai-techpark.com/radware-recognized-as-voice-of-the-customer-for-cloud-web-application/ Mon, 10 Jun 2024 11:45:00 +0000 https://ai-techpark.com/?p=168859 99% of end users willing to recommend Radware® (NASDAQ: RDWR), a leading provider of cyber security and application delivery solutions, has been named as a Strong Performer in the 2024 Gartner Peer Insights Voice of the Customer for Cloud Web Application and API Protection (WAAP) Report. According to the report,...

The post Radware Recognized as Voice of the Customer for Cloud Web Application first appeared on AI-Tech Park.

]]>
99% of end users willing to recommend

Radware® (NASDAQ: RDWR), a leading provider of cyber security and application delivery solutions, has been named as a Strong Performer in the 2024 Gartner Peer Insights Voice of the Customer for Cloud Web Application and API Protection (WAAP) Report. According to the report, 99% of customers are “willing to recommend” Radware.

Gartner defines cloud WAAP as a category of security solutions “that provide protection from a broad range of runtime attacks. It offers protection from the top 10 web application security risks defined by the Open Web Application Security Project (OWASP) and automated threats, provides API security, and can detect and protect against multiple sophisticated Layer 7 attacks targeted at web applications.” The report also notes “Cloud WAAP’s core features include web application firewall (WAF), bot management, distributed denial of service (DDoS) mitigation, and API protection.”

“It’s a pleasure to be recognized by the customers who we serve,” said Sharon Trachtman, chief marketing officer at Radware. “For us, knowing that 99% of Radware’s customers would recommend our products to peers speaks volumes. Our team of experts work diligently to defend our customers on cybersecurity’s front line each day.”

Below are examples of some customer reviews that contributed to the report and were based on direct experience with Radware and its products:

  • “The Radware CWAF team was helpful in getting the protection service operational within 30 minutes and the overall support has also been exceptional. With a local in-country CWAF there was no noticeable latency accessing our web applications.”  Network Architect, Banking
  • “The overall experience is great. I like the product very much. Easy to use and manage. Overall, product is superb.” Manager of IT Services, IT Services
  • Radware’s “Cloud WAF offers a comprehensive, scalable, and user-friendly solution for safeguarding web applications, making it an excellent choice for organizations looking to enhance their cybersecurity posture.” Network Engineer, Telecommunications
  • “Overall, I have nothing but praise for Radware as a security platform provider. They have proven to be reliable, effective, and highly professional in their approach to enterprise security.” Chief Security Officer, Government

“The ‘Voice of the Customer’ is a document that synthesizes Gartner Peer Insights’ reviews into insights for IT decision makers. This aggregated peer perspective, along with the individual detailed reviews, is complementary to Gartner expert research and can play a key role in the buying process, as it focuses on direct peer experiences of implementing and operating a solution.”

Radware was also recently ranked as a Leader and Fast Mover in GigaOm’s 2024 Radar for Application and API Security Report. Radware was the only vendor among the 13 security providers evaluated in GigaOm’s report to earn a top score for AI enhanced vulnerability detection. In addition, Radware was also just named a Product, Innovation, Market and Overall Leader in the 2024 KuppingerCole Leadership Compass Report for Web Application Firewalls (WAF).

Gartner Attribution and Disclaimer
Gartner, Voice of the Customer for Cloud Web Application and API Protection, Peer Contributors, 25 April 2024

Gartner and Peer Insights™ are trademarks of Gartner, Inc. and/or its affiliates. All rights reserved. Gartner Peer Insights content consists of the opinions of individual end users based on their own experiences, and should not be construed as statements of fact, nor do they represent the views of Gartner or its affiliates. Gartner does not endorse any vendor, product or service depicted in this content nor makes any warranties, expressed or implied, with respect to this content, about its accuracy or completeness, including any warranties of merchantability or fitness for a particular purpose.

Explore AITechPark for the latest advancements in AI, IOT, Cybersecurity, AITech News, and insightful updates from industry experts!

The post Radware Recognized as Voice of the Customer for Cloud Web Application first appeared on AI-Tech Park.

]]>
Security Innovation Recognized as a Leader in Cybersecurity Training https://ai-techpark.com/security-innovation-recognized-as-a-leader-in-cybersecurity-training/ Wed, 05 Jun 2024 10:16:25 +0000 https://ai-techpark.com/?p=168432 Company Named a Leader in the G2 Secure Code Training Report; CMD+CTRL Cyber Range Named a Contender in Datos Insights’ Matrix of Cyber Range Solutions Security Innovation, a leader in software security assessment and training, today announced it recently received four cybersecurity industry awards and was recognized by advisory firm...

The post Security Innovation Recognized as a Leader in Cybersecurity Training first appeared on AI-Tech Park.

]]>
Company Named a Leader in the G2 Secure Code Training Report; CMD+CTRL Cyber Range Named a Contender in Datos Insights’ Matrix of Cyber Range Solutions

Security Innovation, a leader in software security assessment and training, today announced it recently received four cybersecurity industry awards and was recognized by advisory firm Datos Insights for its cybersecurity training solutions.

In May, Security Innovation received company recognition with three awards. During RSA 2024, Security Innovation was named a “Hot Cybersecurity Training Company” by Cyber Defense Magazine, the industry’s leading digital information security magazine, at the Global Infosec Awards. Security Innovation also won a Business Intelligence Group 2024 Fortress Cybersecurity Award as a leading cybersecurity training organization. This recognition program honors the industry’s leading individuals, companies and products that are at the forefront of safeguarding data and digital assets.

The company and its CEO Ed Adams each received a 2024 Cybersecurity Excellence Award from Cybersecurity Insiders which reflect outstanding commitment to the core principles of excellence, innovation, and leadership in cybersecurity. Security Innovation was recognized as “Best Cybersecurity Education Provider.” In addition, “See Yourself in Cyber: Security Careers Beyond Hacking,” a book byAdams, a security industry veteran, received the award for “Best Cybersecurity Book.” Published by Wiley earlier this year, the book explores the breadth and depth of careers available in cybersecurity and provides a playbook for how people outside of traditional cybersecurity roles can contribute to their organization’s security.

Security Innovation Named a Leader in the G2 Secure Code Training Report

G2, one of the world’s largest software marketplaces and aggregator of user reviews for business software, named Security Innovation a leader in their G2 Grid® Spring 2024 Report for Secure Code Training.

The Grid® represents the democratic voice of real software users. Scoring is based on verified user reviews and data aggregated from online sources. Users cited depth and breadth of content, coverage across roles and technologies, and ease of deployment in their reviews of Security Innovation training solutions.

CMD+CTRL Cyber Range Positioned as a Contender in Datos Insights Matrix

Datos Insights, a global leader in financial services research, data, advisory, and consulting services, included Security Innovation’s CMD+CTRL Cyber Range as a contender in its first matrix report of Cyber Range Solutions. One of six solutions included in the matrix, Security Innovation was recognized for its best-in-class client service.

Realistic simulations are an increasingly important component of software security training, and Security Innovation’s CMD+CTRL Cyber Range platform is unique in application security specific training. A recent report from Security Innovation and the Ponemon Institute found that 60% of companies now include realistic simulations as part of their cybersecurity training programs compared to 36% in 2020.

Security Innovation offers 11 immersive, hands-on, cyber ranges that vary in difficulty from basic to advanced and train participants how to better protect against the latest cybersecurity threats in a simulated system by having them think like attackers. In addition to the CMD+CTRL Cyber Range, the company’s training solutions combine 250+ interactive modules and 125+ scenario-based labs. More than 300 companies and over one million participants have enhanced their skills with Security Innovation cyber ranges, from Global 100 software companies to mid-size tech companies, to financial services firms and retailers.

“These industry accolades are a testament to the more than two decades our team has dedicated to developing solutions that enable our clients to build a ‘security-first’ culture across their organizations with hands-on training and role-based skills development,” said Adams. “As we move into the era of AI, it is more critical than ever for enterprises to bolster their security defenses with proactive training programs that empower software teams to defend against emerging cybersecurity threats.”

Explore AITechPark for the latest advancements in AI, IOT, Cybersecurity, AITech News, and insightful updates from industry experts!

The post Security Innovation Recognized as a Leader in Cybersecurity Training first appeared on AI-Tech Park.

]]>