Industry Spotlight Archives - Security IT Summit | Forum Events Ltd
Posts Tagged :

Industry Spotlight

INDUSTRY SPOTLIGHT: HANDD Business Solutions

960 640 Stuart O'Brien

HANDD Business Solutions (HANDD) are a data centric cyber security service partner. We work within the IT security channel marketplace to provide software and the services required to address your business security needs.

As a result, we do not author our own product sets and instead offer consultancy, sales and aftersales support for the product offerings provided by our vendors.

The simplest way to think of the services a channel partner or Value-Added Reseller provides is that we go over and above what the vendors will provide themselves;

  1. Local Support; lots of technology vendors are based in the United States. If you’re elsewhere in the world you don’t want to wait for the west coast to wake up to get a major issue fixed. Here at HANDD we provide follow-the-sun support enabling our customers to get prompt resolution when experiencing issues regardless of their location.
  2. Agnostic Approach; we’re not tied to one solution, and as such focus solely on providing the right fit for your business challenge. This could encompass X number of solutions to get the job done.
  3. Services; because we’re vendor agnostic we’ve experience of engineering different solutions together, migrating from one or another and integrating existing pieces of technology which may exist already in your business.

Fundamentally, using HANDD to deploy your project you’re going to get more for your money! More time, care and attention discover more at https://www.handd.co.uk/data-services/.

Industry Spotlight: tenfold Software

960 640 Stuart O'Brien

tenfold is an Identity and Access Management solution designed to meet the needs of mid-market organizations. Thanks to a data importing tool and a large set of out-of-the-box plugins, tenfold can be set up quickly and easily, providing businesses with a central platform for managing users and permissions across all their systems.

The ability to automate routine tasks like user provisioning and joiner-mover-leaver processes not only lowers your IT workload, but also makes user management more secure. Eliminating outdated and unnecessary permissions helps businesses avoid security risks and meet compliance standards

More and more laws and regulations, including the UK’s own NIS directive, demand that companies take control of access rights by restricting them to a need-to-know-basis and regularly reviewing all existing permissions. Without proper support, keeping track of the hundreds and thousands of permissions used in mid-market organizations is next to impossible!

tenfold provides you with the tools needed to face cybersecurity and compliance challenges head on. With automatic notifications for access reviews and full documentation of every change made to user accounts, preparing for audits has never been easier.

Twitter – @tenfoldsecurity

Facebook – https://www.facebook.com/tenfoldsoftware

LinkedIn – https://www.linkedin.com/company/tenfold-software-gmbh/

Visit our website to sign up for a free trial and find out more about tenfold’s wide range of powerful features.

INDUSTRY SPOTLIGHT: The UK Cyber Security Association (UKCSA)

960 640 Stuart O'Brien

The UK Cyber Security Association (UKCSA) is a membership organisation for individuals, small businesses, SME’s and corporate companies who are involved in the cyber security industry or who want to gain access to information to help them be more cyber aware.

Members receive a wide range of benefits including access to the latest cyber security industry news, networking events (virtual at the moment of course),  a yearly conference (also virtual at the moment), training, discounts on cyber security software products, insurance and much more.  

The UKCSA also raises awareness of cyber security awareness, cyber skills, training and best practice as well as helping more women enter careers in the industry neurodiversity in cyber security, the cyber skills gap and education as to the importance of cyber security and why businesses should take it seriously. 

Twitter – @ukcybersecassoc
LinkedIn – https://www.linkedin.com/company/uk-csa/
Facebook – https://www.facebook.com/ukcybersecassoc 

www.cybersecurityassociation.co.uk.

INDUSTRY SPOTLIGHT: Falanx penetration testing

960 640 Guest Post

To minimise risks from hackers you need to think and act like a hacker.

Penetration testing does just that, pseudo hackers attack your systems to help expose and fix vulnerabilities.

Whether it’s web applications, internal networks, mobile devices or wireless networks, penetration testing is critical to ensure high levels of cyber security. But why, when and how often should you penetration test?

Find out more at: https://falanx.com/cyber/why-when-and-how-often-should-you-pen-test/

INDUSTRY SPOTLIGHT: EveryCloud – Email Security

960 640 Stuart O'Brien

EveryCloud partners with Gartner and Forrester cloud security leaders to access, compare and improve your cloud security capabilities.

We assist you to build combined solutions from products that suit your needs and goals and assist with GDPR data protection compliancy. From Cloud Access Security (CASB), Identity Access Management (IAM) and Email & Web Security, our solutions offer you the full protection and control to keep your business safe.

Solution Focus:

We assist business’ to secure their mailbox and not just their email server! Providing up to the minute intelligence and protection from mature and emerging threats.

INDUSTRY SPOTLIGHT: EveryCloud – Identity Access & Management

960 640 Stuart O'Brien

EveryCloud partners with Gartner and Forrester cloud security leaders to access, compare and improve your cloud security capabilities.

We assist you to build combined solutions from products that suit your needs and goals and assist with GDPR data protection compliancy.

From Cloud Access Security (CASB), Identity Access Management (IAM) and Email & Web Security, our solutions offer you the full protection and control to keep your business safe.

Solution Focus:

We assist you to securely connect to the technologies and services that your business uses, with one integrated service that is born and built in the cloud.

INDUSTRY SPOTLIGHT: EveryCloud Cloud Access Security

960 640 Stuart O'Brien

EveryCloud partner with Gartner and Forrester, cloud security leaders to access, to compare and improve your cloud security capabilities.

We assist you to build combined solutions from products that suit your needs and goals and assist with GDPR data protection compliancy. From Cloud Access Security (CASB), Identity Access Management (IAM) and Email & Web Security, our solutions offer you the full protection and control to keep your business safe.

Solution Focus:

We assist you to govern your business’ cloud usage with visibility and control, protect and prevent the loss of sensitive data and guard against cloud-based threats such as malware and ransomware.

INDUSTRY SPOTLIGHT: Gallagher access control systems

1024 683 Stuart O'Brien

Does your access control system allow you to implement, enforce and report on business policies and processes at every point using physical security infrastructure and command centre?

If not, it should. Access management can be based on individual competencies allowing your business to effectively manage compliance with business policy and government regulations.

Features and benefits

  • Check personnel at the door to make sure they are capable, qualified and compliant.
  • Monitor inductions, licenses, training and qualifications to only allow people access to areas they are qualified to be in.
  • Use random cardholder selection to check competencies and licensing.
  • Import competencies, images, roles and access rights from existing human resources, contractor management, or enterprise identity management systems.
  • Real-time audit trail provides prompt and reliable decision-making information.

Competency-based access management

  • Access management can be based on individual competencies.
  • Safety – is the employee inducted, trained, licensed and fit for work?
  • Equipment – does the employee have the right safety equipment?
  • Security – does the employee have the right clearance?
  • Regulatory compliance – are there other requirements the employee has to meet?
  • Validity periods and competence expiry can also be monitored. Access decisions are delivered to the individual instantly by the door reader or display monitor, or via SMS.
  • A variety of messages can be displayed which prompt the employee to proactively address any forthcoming issues that arise. If access is denied, then the individual is immediately informed of the appropriate corrective action.

The benefits of competency-based access management are:

  • Automatic enforcement of business OH&S rules and policies.
  • Reducing production disruption caused by presence of non-compliant staff.
  • Tangible evidence of duty of care to staff and customers.
  • Automatic compliance with government regulations.
  • Reduction in financial penalties for non-compliance.
  • Reduction in legal risks arising from employee accident claim.
  • Reduced likelihood of an employee failing to maintain access requirements.

www.gallagher.com

Varonis Systems

INDUSTRY SPOTLIGHT: Varonis Systems

960 640 Stuart O'Brien

In 2003 a large oil and gas company nearly had a disaster. They spent millions of dollars capturing hi-resolution images of the ocean floor and stored them on their file servers. One day these images were gone.

Were they accidentally deleted? Deliberately stolen? Two storage experts discovered that there was no record of what had happened, and no easy way to figure it out.

From this potential disaster, these storage experts saw opportunity. File systems were growing exponentially in complexity and size. Data was becoming more valuable than ever, and it needed to be better protected.

And so in 2005, those storage experts – Yaki Faitelson and Ohad Korkus – founded Varonis to give organizations more visibility into their data, and to protect their critical information.

Varonis protects sensitive information from insider threats, automates time-consuming tasks, and extracts valuable insights from enterprise data.

www.varonis.com

LogRhythm

INDUSTRY SPOTLIGHT: LogRhythm

960 640 Stuart O'Brien

LogRhythm, the leader in security intelligence and analytics, empowers organisations around the globe to rapidly detect, respond to and neutralize damaging cyber threats.

The company’s patented and award-winning platform uniquely unifies next-generation SIEM, log management, network and endpoint forensics and advanced security analytics.

In addition to protecting customers from the risks associated with cyber threats, LogRhythm provides unparalleled compliance automation and assurance and enhanced IT intelligence.

www.logrhythm.com

  • 1
  • 2