Blue Turtle extends Imperva Partnership

Blue Turtle extends its Enterprise Security Solutions portfolio with Imperva’s market leading Security Product Suite. Their partnership helps address increased demand for cyber-security in South Africa.

Blue Turtle, has extended its partnership with Imperva, with the introduction of Imperva’s Cloud solutions meeting the need for security aimed at cloud applications.

The partnership provides Blue Turtle’s customers with market-leading cloud and on-premises security design to protect business critical data and applications. Imperva, recognised leader in Web Application Firewall’s and Database Security has extended these capabilities to Cloud and SaaS, including Microsoft 365; whilst introducing the new Skyfence CASB (Cloud Access Security Broker) to deliver an ‘all-round’ cloud security suite.

Enterprises around the world are battling with cybercriminal activities. Various studies have shown that cybercriminals have breached almost every major corporation and government department. For all the defenses deployed today, cybercriminals are not just getting through, they are able to stay within the network undetected longer than ever before.

The reality is that many organisations need to establish more holistic security programs that reduce risk while meeting business objectives. With traditional endpoint and network security no longer enough to prevent breaches protecting your data and applications is paramount. Whether in the cloud or on-premises, Imperva delivers cyber security which has the ability to effectively identify and mitigate threats to critical business assets, resulting in faster time to detection and response.

Comments Willem Barnard, IT Risk & Security Business Unit Manager at Blue Turtle,“Protecting our customers’ information requires us to be at the top of our game, as we’ve seen in recent months, business impact through cyber-threats is a reality and is here to stay.” “We are excited to be able to offer Imperva’s latest cyber-security technology to our customers bringing industry leading data and application security to Cloud and SaaS applications, file-systems and databases.”

Blue Turtle and Cybereason Announce Strategic Partnership to Meet Increased Demand for Endpoint Protection in South Africa

This partnership strengthens Blue Turtle’s IT Risk & Security Solutions by leveraging the Cybereason Military-Grade, Real-Time Detection and Response Platform. This partnership helps fuel increased demand for cyber based network security in Sub Saharan Africa.

Blue Turtle and Cybereason, are pleased to announce their strategic partnership. The partnership helps solidify Cybereasons’ growth in Sub Saharan Africa by providing Blue Turtle’s client base with Cybereason’s market-leading Military-Grade, Real-Time Endpoint Detection and Response (EDR) Platform.

The reality is that hackers are getting better at exploiting various organization’s IT environment. Cybereason offers a real-time attack detection and response platform that uses endpoint data to detect and remediate simple and complex threats. This world class technology will further assist in protection against advanced cyber threats, for instance cybercriminals have long considered the African region as opportune to commit their criminal acts.

Statistics from various sources indicate that Africa is very prone to cyber-related threats due to the high number of domains coupled with very weak network and information security. According to the Norton Cyber-Crime Report, “every second, 18 adults are victims of cybercrime, resulting in more than 1.5 million victims globally per day.”[1]

Cybereason provides unmatched visibility and detection of adversarial activity on enterprise endpoints. Silent Sensors, agents placed on all endpoints within an enterprise, continuously collect and transparently communicate to the Cybereason Malop Hunting Engine, a big data, behavioral analytics platform designed to reveal malicious operations, known as Malops.  Malops are intuitively presented on the Incident and Response Console.

“It is critical that organisations take a proactive, layered approach to protecting their most valuable assets – making endpoint detection and response the first thing organizations should focus on when prioritizing their cyber attack risk & security strategies,” said Willem Barnard, IT Risk & Security Business Unit Manager at Blue Turtle. “We are excited to have Cybereason as a partner, as their renowned technology will enable us to further capitalize on business opportunities which help our  clients to take advantage of Cybereasons’ global reach and security expertise, as well as their understanding of risk detection in delivering crucial protection against evolving threats.”

“Cybereason is thrilled to be increasing its presence in South Africa and our partnership with Blue Turtle further validates a demand corporations have for endpoint protection. Cybereason has developed an award-winning threat hunting platform that will help corporations and organizations across South Africa root out malicious activity and provide real time intelligence across the entire network, notifying them that they are under attack and then stopping it,” said Simon Sharp, vice president, EMEA, Cybereason.

[1] United Nations Policy Brief, Tackling the challenges of cybersecurity in Africa, NTIS/002/2014, http://www.uneca.org/sites/default/files/PublicationFiles/ntis_policy_brief_1.pdf

 

Blue Turtle Strengthens Security Portfolio with SentinelOne’s Next Generation Endpoint Protection

First Next Generation Endpoint Protection to be launched in South Africa, combines best-in-class detection, prevention and remediation against sophisticated malware and exploit-based attacks

Blue Turtle Technologies, leaders in solutions for optimization and management of IT systems, today announced it has selected SentinelOne’s next-generation endpoint protection platform as the latest addition to its IT Security portfolio.  The partnership means that Blue Turtle will be the first provider of a next generation endpoint security solution of this kind in South Africa.

SentinelOne provides an advanced solution which protects organizations from becoming victims of advanced malware and exploit-based attacks.   Unlike signature-based security products that rely on static analysis, SentinelOne’s Dynamic Behaviour Tracking (DBT) engine closely monitors each newly-created process on a machine through its lifecycle, identifying malicious patterns and eliminating threats in real-time. This approach defends against advanced cyber attacks and insider threats that use stealthy evasion techniques, which can bypass traditional security methods.

Large enterprises like Neflix have shared their plans to “dump legacy anti-virus” and replace it with new, more advanced solutions from SentinelOne which is one of the only next-generation endpoint protection companies that has been certified by AV-Test to be a true replacement to AV.

Comments Martyn Healy, Marketing Director at Blue Turtle Technologies:

“SentinelOne’s solution is a significant addition to our comprehensive suite of security products and further strengthens the protection that we can offer customers as cyber attacks become harder to detect.  As we’ve seen in recent months, the volume of malware and ransomware attacks has grown substantially, so it’s more important than ever that we provide customers with the most advanced solutions to protect them from these threats, including zero day variants. SentinelOne’s solution stood out to us as providing an innovative and dynamic new approach, combining sophisticated machine learning with real-time threat intelligence to ensure customers have the best possible endpoint protection.”

Comments Magali Bohn, Head of Worldwide Channel Sales at SentinelOne

“We’re delighted to partner with Blue Turtle Technologies and to be expanding our global footprint by launching in a new region, which marks a significant milestone in our growth. Organizations have some very real challenges in this new era of malware and our solution is designed to help them keep pace with these and to protect what is often seen as the ‘soft’ target by cyber criminals: their endpoints.”

In the new digital age, anyone can fall prey to cyber crime

This year, South African business will continue to embrace digital transformation. From network-connected smart TVs and photocopiers to air-cons in the boardroom for greater convenience, and the wider adoption of cloud, employees are able to work anytime and anywhere, using smartphones, tablets and even smart watches.

And we can expect cyber criminals to slap their keyboards with joy for the opportunities the growing ‘digital business’ brings.

Well-reported cases show that even large and well-resourced organisations fall victim to cyber attacks, and they’ve suffered data theft, interruption of services or reputational damage as a result. In parallel, security budgets have increased faster than any other, and most companies have board-level visibility and backing for security. Despite the increased investment and business backing, chief information security officers (CISOs) are facing a security challenge greater than any seen in the past 10 years.

Why is this?

For many years, digital security has operated on the principle that you can keep attackers out. Our defence systems attempt to do this by guarding the perimeter of the network, with tools such as firewalls, anti-virus programs and patching. However, it’s clear that this current approach is outdated and ineffective against today’s advanced cyber threats. Sophisticated cyber attackers are capable of ‘bypassing’ the perimeter, and insiders are, by definition, already operating within the firewall. Breaches are a reality within our organisations, whether we know it or not!

We must also accept that cyber security is not just a technical challenge. Human ingenuity and creativity has made it extremely difficult to second-guess how an attack might present itself, or understand in advance which employee or insider poses the greatest risk to your organisation. This new era of cyber threats calls for technologies that can deal with subtlety and uncertainty, and empower individuals to take informed decisions that will tangibly minimise risk, as well as take action in real-time (actionable intelligence).

Why change?

Legacy security defences are also over-reliant on signatures and rules, which by definition can only stop pre-identified threats. As attack methodologies continue to evolve at speed, rules are continually outdated and outmanoeuvred. Would-be attackers may make fractional changes to their binary appearance within a network to evade a signature scan, socially coerce a user into clicking a malware packaged in an attachment to an e-mail, or use other readily available methods to subvert existing security systems.

The insider, an employee, is most likely using authorised access to applications to steal data or execute transactions for personal gain. They may have similar objectives to the criminal, but they will be approaching the objective in a different manner. If we accept the new reality of cybe rcrime and consider this against current SecOps’ modus operandi and the associated cost, we need to ask if we’re getting a return on investment. Are the operating investments delivering measureable improvements in our security posture? These are definite reasons for a change in strategy, technology and execution.

Next-generation digital security

There are several key requirements for effective cyber-threat management – these include comprehensive capture of activity and traffic across users, systems and networks; real-time detection and analysis of anomalous behaviour and malware; advanced visualisation and alerting of threats; and automated remediation and recovery of breaches.

The technologies that come together to deliver the functionality have similar characteristics in that they exploit major advances in machine learning, mathematics and big data in their solutions. No sign of a signature, no rule to be written, no trawling of millions of events, and no waiting for a patch!

So, what makes the emerging security technologies so different? Take a look at Darktrace, one of the leaders in this field. Darktrace’s unique technology is powered by advanced machine learning, allowing it to self-learn what is normal for a company’s network environment, so that it can then determine if any behaviour is abnormal – the business ‘pattern of life’. This allows it to detect outliers to these learned patterns, as they emerge, which may represent a serious threat – cyber attacks of a nature that may not have been observed before, the unknown unknowns. Darktrace does this through the use of advanced mathematical models to establish an evolving understanding of every device, user and network, and stay ahead of developing advanced persistent threats (APTs), insider attacks and other live-threat scenarios.

Enterprise-wide threat visibility is key, and this is mirrored by the need for capabilities that take ‘action’ on intelligence. We need to protect the enterprise’s assets (servers, applications, client devices, etc) that are of criminal interest. Consider the challenge of end-point security – that never-ending cycle of patching and anti-virus updates – and that SentinelOne, an innovative start-up, is changing the end-point game using machine learning to deliver protection against targeted attacks, advanced threats, and zero-day attacks. SentinelOne’s dynamic execution inspection detects advanced threats, provides automated mitigation, and generates real-time forensics.

It’s not only that the sophistication of cyber attackers has developed out of all recognition, but the changing IT landscape also compounds this problem. Just consider cloud, a hot topic in South Africa at the moment. Cloud is now a part of our lives, so why not apply innovation in this space, too?

The use of machine learning and big data for cyber threats is almost mainstream, enabling next-generation SecOps. Looking forward, we should see software-defined security, decoy and deception, and micro-segmentation techniques adding significantly to our defence capabilities.

With next-generation technologies, a company’s CISO will regain the advantage that comes with visibility, early warnings and automated responses and remediation. So in the event of a compromise, the organisation is confident of the capabilities to act before a real crisis occurs.

To learn more about a suitable approach to managing your cyber threat, contact Blue Turtle for a consultation at +27 (0) 11 206 5600 or info@blueturtle.co.za.

Data security through the lens of an IT security industry expert

Security concerns loom in today’s complex, ever-changing environment, with employees seeking mobile convenience and organisations trying to ensure that these demands do not compromise security. Several IT policies and practices are being pushed to the limits with the escalation of security threats and the resulting requirements for greater compliance.

According to the Global State of Information Security Survey 2016 Report, there has been an increase in the theft of sensitive and confidential data. The report uncovers a multitude of significant areas around how companies are trying to protect their data, and the most prominent data security challenges facing business IT in the year 2015 – 2016. These facts alone should encourage every company to tighten its data security policies and capabilities.

Data Security is the main priority for organisations of all sizes. There is no doubt that big data security is one of the key pillars of making big data ready for analytical success. Successful organisations are moving beyond traditional and superficial approaches to security to focus on more intelligent and metadata driven approaches to data security. By leveraging a systematic understanding of big data, enterprises can more holistically improve their big data security positions and ensure big data remains an asset, and not a liability.

One of the major issues with big data is the rate at which it is growing and volumes of data that are being added each day. Although detection technologies and threat intelligence sharing are improving in many cases, many businesses are still not able to prevent a breach, which is something that can have huge legal and financial consequences as well as a significant loss of customer trust and reputation.

Martyn Healy, Director at Blue Turtle states that: “When it comes to matters related to security, the African continent as an emerging market is a target and as the use of big data analytics increases, the range of data sources will spread. One of the key messages that I would like to get across is that big data analytics is not just about log analysis; it is about seeing a wider picture. In order to balance the business benefits of big data analytics with the cost of storage, organizations need to regularly review the data that they are collecting, why and for how long they need it, and where and how they store it. Approaching data differently ensures that organizations ultimately protect their sensitive data and will go on to achieve their compliance objectives.”

Resources

The Global State of Information Security Survey 2016: http://www.pwc.com/gx/en/issues/cyber-security/information-security-survey/download.html
The 2015 Internet Security Threat Report: https://know.elq.symantec.com/LP=1542
Data Threat Report: http://www.vormetric.com/campaigns/datasheet/2016/

 

Blue Turtle Chooses TrapX Security’s DeceptionGrid for its Security Service Portfolio

TrapX Security™, a global leader in advanced cyber security defense, today announced that Blue Turtle, leaders in solutions for optimization and management of IT systems, has chosen TrapX DeceptionGrid™ to expand its security service portfolio. The partnership helps solidify TrapX’s growth in South Africa by providing Blue Turtle’s customers with the industry’s leading deception-based technology.

DeceptionGrid automates the deployment of a network of camouflaged malware traps that are intermingled with real information technology resources. If malware touches DeceptionGrid just once, it sets off a high-confidence alert. Real-time automation isolates the malware and delivers a comprehensive assessment directly to an organization’s security operations team.

“We offer a comprehensive network security portfolio of products to our customers,” said Martyn Healy, Marketing Director at Blue Turtle. “But, as we’ve seen in recent months, there’s always going to be some element of risk even to organizations that have bottomless pockets and spend untold millions attempting to build a fortified network perimeter. We are excited to partner with Trapx, as we believe that TrapX DeceptionGrid seeks to offer an extra layer of protection and mitigation that’s been proven reliable in case an attacker does manage to penetrate our perimeter defenses.”

“The fact is there is no one foolproof way to protect an organization’s data against aggressive attackers and crime syndicates. It’s no longer a question of ‘if’ a large organization has been penetrated, but ‘when,” said Carl Wright, General Manager of TrapX Security. “What’s important is a layered security approach that includes a fully-featured firewall, endpoint and deception protection. A properly configured network security stack with DeceptionGrid substantially reduces the time to breach detection and practically eliminates false positive alerts, which is one of the biggest complaints coming out of IT departments today. We are pleased to be offering Blue Turtle’s customers peace of mind that our software will help protect them from the latest malware and advanced persistent threats.”

Blue Turtle offers innovative solution for emerging Cyber Threat with Darktrace partnership

Blue Turtle Technologies, a leading security solutions provider and Darktrace, the leader in Enterprise Immune System Technology, have announced a strategic partnership to deliver Darktrace’s award winning cyber defense technology to the South African market.

Acknowledged for its expertise in providing best-in-class technology management solutions.  Blue Turtle offers carefully selected world-leading products to enhance the performance and efficiency of its customers’ digital environment. Partnering with Darktrace allows it to strengthen its cyber security defense platform and deliver the self-learning Enterprise Immune System to its customers, enabling them to detect advanced cyber threats that pass undetected through traditional perimeter defense solutions.

Darktrace’s innovative technology is based on unsupervised machine learning and mathematics developed at the University of Cambridge. The Enterprise Immune System monitors large volumes of data within networks on a 24/7 basis and ‘learns’ the pattern of life for every device, individual user and network. In achieving this understanding of an organisation’s ‘self’, Darktrace can spot new, emerging behaviors that fall outside this pattern of normality. Users benefit from an unparalleled visibility of their network, are able to address any rising issues early and take proactive measures to mitigate the risk.

“As disruptive cyber-attacks are becoming more effective at breaching security defenses, our partnership with Darktrace can provide great benefits to the Southern Africa market. Darktrace’s immune-system approach assists large organizations and government bodies in detecting behavioral anomalies in real time, allowing organizations to take timely action,” said Ronnie Koch, Infrastructure Security Architect, at Blue Turtle. “By detecting them earlier, they are able to protect themselves against advanced attacks and data compromises from within the network.”

“We are delighted to be working with Blue Turtle and extend the Enterprise Immune System to South African market,” said Nick Trim, Managing Director EMEA, at Darktrace. “Darktrace’s self-learning technology and unique approach to tackling sophisticated cyber threats helps organizations build resilient defense strategies and protect their reputation in an increasingly complex threat landscape.”

Common Myths about DCIM – Debunked

Myth Busters! Have you ever received conflicting information about DCIM? How about wrong information? Data center infrastructure management (DCIM) is a complex topic, so it’s no wonder that misperceptions and spin-doctoring are common.

Register for Nlyte Software’s educational webinar to find out more on DCIM myths, then discuss the pertinent facts and steps to take when faced with a DCIM myth.

Webinar Registration : Common Myths About DCIM – Debunked

Choose a session on Wednesday, April 29:

Session 1 at 15:00 GMT / 10am ET

Session 2 at 2pm ET / 1pm CT / 11am PT

Blue Turtle expands its security offering with Phish5

Blue Turtle Technologies expands its current security service portfolio with the introduction of a comprehensive phishing risk assessment tool.

Phish5 is a product of 4Di Privaca, a leading provider of Information Security. 4Di Privaca offers a variety of services which seek to minimize companies’ exposure to risk, unnecessary delay, or overtly restrictive controls on online networks. By adding Phish5, Blue Turtle is looking to emphasize security awareness, and to offer a solution that addresses the risk phishing poses to an organization.

Blue Turtle believes that Phish5 will enable businesses to gain an understanding of their phishing risks. As a direct result of understanding these risks, these businesses will be able to improve the performance and operation of secure working environments by disabling the danger that phishing poses.

Simon Shaw, Business Development Manager at Blue Turtle states that “We are excited about adding Phish5, a South African developed product, to our solution set. It is mostly concerned with resolving the risk around the behavior of employees carelessly responding to inappropriate emails and exposing credentials to unauthorized parties. If these risks are not understood, organizations stand to lose not only money, but also risk reputational damage.”

South Africa is the second-most targeted country globally, with 1 in 170.9 emails identified as phishing attacks.[1] Newton Lee, the author of Counterterrorism and Cybersecurity, put it like this: “As the world is increasingly interconnected, everyone shares the responsibility of securing cyberspace.” Running these phishing campaigns, promises a more secure online environment.

[1] Symantec Intelligence Report, June 2012