Connect with us

Channel Talk

CyberKnight Becomes Utimaco VAD

Published

on

Hardware Security Modules (HSM) protect sensitive assets against disclosure, manipulation, and misuse. To address customer challenges related to generating, safeguarding, and managing cryptographic keys to perform encryption and decryption functions, CyberKnight has signed a distribution agreement with Utimaco, a leading global provider of cybersecurity and compliance solutions, to distribute HSMs and key management solutions in the Middle East.

Based on more than 30 years of experience in hardware-based security, Utimaco have designed and optimized a family of payment and general-purpose HSMs, with models that address different levels of performance and physical security for use cases in financial institutions, as well as enterprise and government organizations. In addition, Utimaco products have been protecting people around the world against terrorism and organized crime and have secured private and sensitive data against theft or abuse.

“Utimaco produces the world’s fastest multi-core HSM that can perform upgrades in real-time. That’s four times the power of the closest competitor and with software upgrades in under five minutes, performance is never impacted. We are excited to join forces with Utimaco to provide our customers with such a powerful on-premises HSM, that is also available in a fully containerized cloud version. Utimaco’s key management platform allows organizations to streamline processes and reduce workloads while minimizing costs and risk of human error,” commented Avinash Advani, Founder and CEO at CyberKnight.

“The increased speed of digitization in 2021 in the Middle East increases the need for organizations to define their cloud strategy and make use of the flexibility as well as the potential for cost reduction that an as-a-Service model can offer. This includes security solutions, and we want to provide our customers with the high standard of HSMs in whichever form they need them, be it on premise or in the cloud. We are delighted to partner with CyberKnight to leverage their network of strategic partners, security expertise, and accelerate our expansion plans in the region,” said Mario Brand, VP Sales EMEA, at Utimaco.

Channel Talk

GITEX 2021: Cybereason and Taqnia Cyber Partner to Secure Saudi Businesses and Government Agencies

Published

on

Cybereason has announced a partnership with Taqnia Cyber, the cybersecurity arm of Saudi Arabia’s government-owned technology investment company, Taqnia, to bring best-of-breed technologies and cybersecurity capabilities to large enterprises, and defense and government organizations across the kingdom. As part of the partnership, Taqnia Cyber, will act as both a reseller and systems integrator for the Cybereason Extended Detection & Response (XDR), Endpoint Detection and Response (EDR), and Endpoint Protection Platform (EPP) solutions. Cybereason will provide Taqnia Cyber with technical and sales training and marketing support, as well as joint lead-generation and business development support.

Saudi Arabian businesses were the targets of cyberattacks more than seven million times in the first quarter of 2021. The kingdom was hit particularly hard by attackers targeting companies that haven’t secured remote workplaces, and the kingdom saw a tenfold increase in the number of ransomware attacks. “We stand as the kingdom’s trusted advisor on technology matters, counseling entities that include military and defense organizations,” said Dr. Zeyad Alkhalifa, CEO, Taqnia Cyber. “We have invested more than SAR 50 million in the nation’s start-ups, but we also talk frequently to those that defend our borders and oversee our critical infrastructure.”

“On the issue of cybersecurity, Cybereason is an established leader in unified endpoint protection, covering XDR, EDR, and EPP and the ideal partner for us across the region. We will work closely with Cybereason to help businesses and government agencies stop cyber-attacks on endpoints and across the enterprise. Furthermore, given that we work with entities in the government sector, the fact that Cybereason has a cloud infrastructure in Saudi that enables in-country hosting, to meet regulatory data sovereignty requirements, makes them an ideal regional partner for us.”

“Taqnia Cyber is Saudi Arabia’s established cybersecurity champion — a fueler of growth and sustainable development,” said Tarek Kuzbari, Regional Director for the Middle East and Turkey at Cybereason. “Cybereason was among the first vendors in the region to deliver a viable endpoint protection platform, and we look forward to helping joint customers end cyber-attacks, reduce network risk, and support defenders in protecting critical assets.”

Continue Reading

Channel Talk

Seqrite Partners With Shifra to Secure Digital Transformation Journey of Businesses in the Middle East and Turkey Region

Published

on

Seqrite, the enterprise arm of Quick Heal Technologies Ltd, has joined forces with Shifra to introduce superior cybersecurity solutions in the Middle East and Turkey. The strategic partnership aims at safeguarding businesses from the evolving threat landscape using Seqrite’s world-class cybersecurity solutions, which will be accessible through Shifra’s strong base of channel partners in the region. Seqrite is a specialist provider of enterprise cybersecurity products and solutions.

The rapid adoption of digitization initiatives across the Middle East and Turkey brings with it the growing risks of cyber-attacks backed by organized cybercriminal groups. The rising sophistication of attacks like Ransomware, Data Breaches, and Advanced Persistent Threats (APTs) have the potential to upset the process of digitization and threaten the business benefits. Recognizing these pain points, leaders are being compelled to pause and reconsider their security strategies.

The association of Seqrite and Shifra Distribution shows their commitment towards securing digitization initiatives and strengthening the cybersecurity posture of businesses in the Middle East and Turkey region. Speaking about the partnership, Ramzi Jalajel, the Director for Sales at Seqrite Middle East, Turkey, and Africa region said, “We are immensely excited to partner with Shifra to deliver our solutions in the Middle East and Turkey region. Over the years, the distributor has developed a deep knowledge of the market and understanding of both, the partner and the end client needs. We believe that this partnership will further propel our growth in the region with our cloud-powered offerings.”

Ahmad Soltan, the Managing Director for Shifra, said, “It has become essential for businesses to protect their sensitive data and information from the clutch of ever-evolving threat actors. Collaborating with a leading cybersecurity player like Seqrite at this critical juncture is a step in the right direction, and we are confident that this partnership will help us achieve our goal of securing businesses at every point possible. It will also enable us to expand our existing product portfolio and gain traction among businesses in Middle East and Turkey.”

Continue Reading

Channel Talk

Traditional Perimeter Security Simply Isn’t Enough

Published

on

Maher Jadallah, the Senior Director for the Middle East and North Africa at Tenable, says that companies need to invest in adaptive user and data risk profiles to disrupt attack paths

What are the cybersecurity challenges organisations face in 2021 and beyond?
The increasing threat and severity of cyberattacks have been well documented with governments, businesses, and even civilians all questioning how safe their personal information is. More recently this concern has intensified as we’ve seen threat actors target the very infrastructure that underpins our lives – from water purification plants, oil refineries, medical facilities, and transportation systems, nothing is off-limits. With defenses falling we need a new approach to cybersecurity practices.

When we think of traditional network security, the premise is to fortify the perimeter. The aim is to prevent threats outside of the network from getting in. The downside is that, once users – or bad actors – clear the perimeter, they are free to move about the network, taking whatever they find with them as they leave.

Traditional perimeter security simply isn’t enough to protect multiple environments against today’s cybercriminals. Instead, security needs to adopt a model in which nothing – no device, person, or action – is inherently trusted. In tandem, they need to invest in adaptive user and data risk profiles to disrupt attack paths by accounting for misconfigurations in Active Directory and the cloud and step up security based on changing conditions, behaviors, or locations.

Finally, they must take a hard look at the limits of traditional, perimeter-based security architectures, to consider more sophisticated options that continuously monitor and verify every attempt to request access to corporate data at all levels, whether that’s a device, app, user, or network attempting to make that connection.

How does Tenable help customers address their cyber risks?
Tenable is focused on enabling our customers to see every asset and vulnerability across their entire modern attack surface, predict the vulnerabilities that will be leveraged in an attack on the assets that matter to the business, and guide our customers on where they need to act to address risk.

Our solutions include:

  • Tenable.io: Cloud-based vulnerability management platform provides a risk-based view of the entire attack surface – from IT to cloud to OT and containers – to quickly identify, investigate and prioritize vulnerabilities.
  • Tenable.sc: On-premises Vulnerability Management with comprehensive compliance reporting, highly customized dashboards, and real-time asset and vulnerability discovery.
  • Tenable.ad: Continuously and non-disruptively discovers new Active Directory attack pathways and detects ongoing attacks in real-time, recommending remediations without the need to deploy agents or leverage privileged accounts.
  • Tenable.ot: Asset inventory, threat management, vulnerability management, and configuration control of OT assets that integrates with Tenable.sc and Tenable.io for full visibility across converged IT/OT environments.

What can a partner expect from Tenable’s channel strategy?
Tenable’s channel strategy is tailored for each country to address the market dynamics and provide the needed support for local partners. As a vendor, we look for and actively nurture relationships with partners that do more than just sell our products.

We want to see commitment as we know that is what our customers demand, and we’re prepared to offer the same. Our partners need to be as invested in the technology as we are, and from this basis, we will actively work to help and support them build services and value around our solutions.

This could include complementary technologies that ultimately address the challenge the customer is facing. Tenable is committed to the Middle East region and the strategy we have built has managed to successfully win major customers across all sectors.

Continue Reading
Advertisement

Follow Us

Trending

Copyright © 2021 Security Review Magazine. Rysha Media LLC. All Rights Reserved.