logo
#

Latest news with #ZTNA

Options Launches Enhanced Netskope Managed Service for Secure, Compliant Financial IT Infrastructure
Options Launches Enhanced Netskope Managed Service for Secure, Compliant Financial IT Infrastructure

Business Wire

time13 hours ago

  • Business
  • Business Wire

Options Launches Enhanced Netskope Managed Service for Secure, Compliant Financial IT Infrastructure

CHICAGO & NEW YORK & LONDON & HONG KONG--(BUSINESS WIRE)--Options Technology (Options), a leading provider of cloud-enabled managed services today announced a major milestone in its three-year strategic partnership with Netskope, a global leader in modern security and networking. 'Together, Netskope and Options are reshaping how data is secured in the capital markets. Our continued strategic partnership represents a bold, forward-thinking approach to managed services." Share Options' AtlasWorkplace is an IT platform purpose-built for hedge funds, asset management, private equity, and financial services firms. It combines high-performance infrastructure, enterprise device management, and tightly integrated cybersecurity controls. Designed to meet the evolving security needs of modern enterprises, AtlasWorkplace's enhanced security solution is the result of years of innovation by Options, leveraging the Netskope platform. Capabilities from the Netskope One platform power key components of AtlasWorkplace, including Zero Trust Network Access (ZTNA), real-time data loss prevention (DLP) capabilities, and adaptive access policies. These features are integrated into Options' underlying infrastructure and its 14 consecutive years of SOC compliance. Danny Moore, President and CEO of Options, commented: 'Our partnership with Netskope has enabled us to address the most pressing security and networking concerns on a unified platform, built on the largest private security cloud infrastructure and tailored to the specific needs of our clients. This approach allows us to deliver a truly bespoke solution that integrates security and networking seamlessly. By adopting this model, we empower our clients to reduce cyber risk, enhance business agility, lower costs, and simplify operations - all while ensuring the highest standards of SOC compliance. In a world where complexity and threats are continuously evolving, this unified solution offers unparalleled security, efficiency, and flexibility for today's modern financial enterprises." Mike Herman, Vice President of Channel Sales at Netskope, added, 'Together, Netskope and Options are reshaping how data is secured in the capital markets. Our continued strategic partnership represents a bold, forward-thinking approach to managed services - scalable, built to enable real-time financial operations and secure without performance trade-offs.' Today's news comes as the latest in a series of major milestones at Options, including its recognition as a 2024 Emerging Partner with Equinix, the opening of a new city of London office at 100 Bishopsgate and the achievement of SOC compliance for 14 consecutive years. Options Technology (Options) is a financial technology company at the forefront of banking and trading infrastructure. We serve clients globally with offices in New York, London, Belfast, Cambridge, Chicago, Hong Kong, Tokyo, Singapore, Paris, and Auckland. At Options, our services are woven into the hottest trends in global technology, including high-performance Networking, Cloud, Security, and AI (Artificial Intelligence).

CyberRatings.org Announces Test Results for Zscaler Zero Trust Exchange
CyberRatings.org Announces Test Results for Zscaler Zero Trust Exchange

Associated Press

time3 days ago

  • Business
  • Associated Press

CyberRatings.org Announces Test Results for Zscaler Zero Trust Exchange

Achieves 100% Overall Security Effectiveness for Security Service Edge (SSE) Threat Protection and 100% Effectiveness for Zero Trust Network Access (ZTNA). AUSTIN, Texas, June 2, 2025 /PRNewswire/ -- (CyberRatings), the non-profit organization dedicated to providing insight into the capabilities of cybersecurity products and services through independent testing, has released additional results from its Security Service Edge (SSE) and Zero Trust Network Access (ZTNA) testing. This latest test focused on another leading product: Zscaler Zero Trust Exchange (ZTE). Zscaler achieved a Security Effectiveness score of 100%, successfully blocking 100% of exploits, malware and evasions in the SSE test. The test report provides details on product performance across multiple threat categories, with scoring weighted by attack severity. The SSE evaluation covered: The ZTNA results confirmed that Zscaler demonstrated strong capabilities by effectively enforcing policies and managing access according to predefined rules, policies, and user roles, achieving 100% in all categories tested. The ZTNA test covered: Of the SSE test criteria, meeting the threshold of blocking evasions had the most impact on scores. Evasion techniques are used by attackers to disguise or obfuscate attacks so that they bypass detection. SSE products must not be tricked by evasions—failure exposes organizations to entire classes of undetected threats. Zscaler scored 100% in blocking all 1,154 evasion attempts. Security Service Edge is a complex multi-layered security technology built on top of complex, ever-changing cloud technologies. Customers have minimal visibility into their operation and architecture, and testing is challenging. This double-layered opacity limits an organization's ability to diagnose performance issues, fine-tune policy enforcement, or validate security outcomes. 'The only way to know if an SSE offering works properly is to test it,' said Vikram Phatak, CEO of 'Our test determined that Zscaler provides exceptional security effectiveness and strong coverage across a wide variety of threat categories.' CyberRatings is on track to test several other SSE vendors for Threat Protection along with a Comparative Report to be published this summer. In addition to in-house testing technologies, CyberRatings used Keysight's CyPerf tool to test performance and TLS/SSL functionality as well as TeraPackets Threat Replayer tool for exploit packet capture replay. The in-depth test reports are available at Additional Resources: SSE Threat Protection Methodology v2.1 Zero Trust Network Access Methodology v2.0 About is a 501(c)6 non-profit organization dedicated to providing insight into the capabilities of cybersecurity products and services through independent testing programs. We provide enterprises with independent, objective ratings of security product efficacy to make informed decisions. To become a member, visit and follow us on LinkedIn. View original content to download multimedia: SOURCE

IIJ Launches Safous Privileged Remote Access to Strengthen Security Across IT, OT, and IoT
IIJ Launches Safous Privileged Remote Access to Strengthen Security Across IT, OT, and IoT

Yahoo

time22-05-2025

  • Business
  • Yahoo

IIJ Launches Safous Privileged Remote Access to Strengthen Security Across IT, OT, and IoT

Consolidates Zero Trust, PAM, and IAM into a single platform to streamline secure remote access and privileged account management. Helps organizations meet cybersecurity regulations through application-level controls and microsegmentation, reducing lateral movement and simplifying compliance. TOKYO, May 22, 2025 /PRNewswire/ -- Internet Initiative Japan Inc. (IIJ, TSE Prime: 3774), a leading provider of Zero Trust security solutions, today announced the launch of Safous Privileged Remote Access, an integrated platform that combines Zero Trust Network Access (ZTNA), Privileged Access Management (PAM), and Identity and Access Management (IAM) in a single, streamlined solution. Designed to address two of the most common ransomware attack vectors – unsecured remote access and compromised privileged accounts – Safous Privileged Remote Access helps organizations reduce risk, eliminate complexity, and unify access control across IT, OT, and IoT environments. The platform builds on IIJ's proven Safous Zero Trust architecture and now incorporates robust PAM capabilities that align with Gartner's Remote Privileged Access Management (RPAM) criteria. By tightly monitoring and controlling privileged sessions, the solution delivers full visibility and control over sensitive systems and users. Key features include: Unified IT, OT, and IoT security:Supports secure remote access for operational technology, RPAM for corporate IT environments, and secure connectivity for IoT systems – providing holistic protection across industries such as manufacturing, healthcare, finance, and critical infrastructure. Integrated Zero Trust + PAM + IAM:Combines VPN-less Zero Trust connectivity with role-based privileged access and identity verification. This layered approach directly targets the core vulnerabilities exploited in modern ransomware and supply chain attacks. Microsegmentation for application-level control:Limits user access based on role and application, rather than broad network access, minimizing the risk of lateral movement and unauthorized entry across systems. Built-in compliance support:Simplifies adherence to global and regional cybersecurity regulations—including ISO/IEC 27001, NIST 800-171, and APAC-specific CIIO/NCII requirements—by consolidating critical controls into a single platform. "Integrating microsegmentation and privileged access controls into a unified Zero Trust framework, we empower enterprises to better protect their critical systems and data without adding unnecessary complexity," said Miki Tanaka, Global Business Director at IIJ. "Whether your infrastructure is air-gapped on-premises, operating in the cloud, reliant on legacy systems, or restricted to a single shared privileged account, Safous Privileged Remote Access delivers modern defenses and full operational traceability across every environment." Safous Privileged Remote Access is now available. For more information, visit About IIJ Founded in 1992, IIJ is one of Japan's leading Internet-access and comprehensive network solutions providers. IIJ and its group companies provide total network solutions that mainly cater to high-end corporate customers. IIJ's services include high-quality Internet connectivity services, systems integration, cloud computing services, security services and mobile services. Moreover, IIJ has built one of the largest Internet backbone networks in Japan that is connected to the United States, the United Kingdom and Asia. IIJ was listed on the Prime Market of the Tokyo Stock Exchange in 2022. For more information about IIJ, visit the official website: The statements within this release contain forward-looking statements about our future plans that involve risk and uncertainty. These statements may differ materially from actual future events or results. This press release contains forward-looking statements about plans that involve risks and uncertainties. Actual events or results may differ materially from those anticipated. For inquiries, contact: IIJ Global Solutions Singapore (Safous Team)Regional Head, Sales and MarketingRoy KikuchiEmail: info@ View original content: SOURCE Internet Initiative Japan Inc.

Your antivirus won't see this coming. Here's how blob-based phishing attacks are silently stealing passwords from right under your nose
Your antivirus won't see this coming. Here's how blob-based phishing attacks are silently stealing passwords from right under your nose

Yahoo

time12-05-2025

  • Yahoo

Your antivirus won't see this coming. Here's how blob-based phishing attacks are silently stealing passwords from right under your nose

When you buy through links on our articles, Future and its syndication partners may earn a commission. Bypasses email gateways and security tools by never hitting a real server Blob URIs mean phishing content isn't hosted online, so filters never see it coming No weird URLs, no dodgy domains, just silent theft from a fake Microsoft login page Security researchers have uncovered a series of phishing campaigns that use a rarely exploited technique to steal login credentials, even when those credentials are protected by encryption. New research from Cofense warns the method relies on blob URIs, a browser feature designed to display temporary local content, and cybercriminals are now abusing this feature to deliver phishing pages. Blob URIs are created and accessed entirely within a user's browser, meaning the phishing content never exists on a public-facing server. This makes it extremely difficult for even the most advanced endpoint protection systems to detect. In these campaigns, the phishing process begins with an email that easily bypasses Secure Email Gateways (SEGs). These emails typically contain a link to what appears to be a legitimate page, often hosted on trusted domains such as Microsoft's OneDrive. However, this initial page doesn't host the phishing content directly. Instead, it acts as an intermediary, silently loading a threat-actor-controlled HTML file that decodes into a blob URI. The result is a fake login page rendered within the victim's browser, designed to closely mimic Microsoft's sign-in portal. To the victim, nothing seems out of place - no strange URLs or obvious signs of fraud - just a prompt to log in to view a secure message or access a document. Once they click 'Sign in,' the page redirects to another attacker-controlled HTML file, which generates a local blob URI that displays the spoofed login page. Because blob URIs operate entirely within the browser's memory and are inaccessible from outside the session, traditional security tools are unable to scan or block the content. 'This method makes detection and analysis especially tricky,' said Jacob Malimban of the Cofense Intelligence Team. 'The phishing page is created and rendered locally using a blob URI. It's not hosted online, so it can't be scanned or blocked in the usual way.' Credentials entered on the spoofed page are silently exfiltrated to a remote threat actor endpoint, leaving the victim unaware. AI-based security filters also struggle to catch these attacks, as blob URIs are rarely used maliciously and may not be well-represented in training data. Researchers warn that unless detection methods evolve, this technique is likely to gain traction among attackers. To defend against such threats, organizations are urged to adopt advanced Firewall-as-a-Service (FWAAS) and Zero Trust Network Access (ZTNA) solutions that can help secure access and flag suspicious login activity. These are the best business laptops available to buy right now And you should take a look at the best office chairs we've tried Ransomware hackers target a new Windows security flaw to hit businesses

Risk Reduction: Appgate CEO Leo Taddeo, Live at RSAC 2025
Risk Reduction: Appgate CEO Leo Taddeo, Live at RSAC 2025

Yahoo

time08-05-2025

  • Business
  • Yahoo

Risk Reduction: Appgate CEO Leo Taddeo, Live at RSAC 2025

Tech Edge hosted a fireside chat on April 30 at RSAC 2025 in San Francisco with Leo Taddeo, Chief Executive Officer at Appgate. The in-person interview was joined by Editor-in-Chief John Jannarone and they discussed how the company helps customers reduce risk in ways that translate to measurable business value or ROI, what makes Zero Trust Network Access (ZTNA) a resilient category and Appgate's position in this space, among other topics. Watch the interview below: About Leo Taddeo With over 25 years of executive federal government and commercial experience at both public and private companies, Mr. Taddeo is Appgate's Chief Executive Officer and President. He previously served as Appgate's CISO, directing global security operations, crisis management and business continuity processes, and oversaw Appgate's federal government business, working closely with sales and technical leadership to define and deliver Zero Trust solutions to meet the needs of Appgate's public sector customers. Previously, Mr. Taddeo was the CISO and President of Cyxtera Federal Group. He is the former Special Agent in Charge of the Special Operations/Cyber Division of the FBI's New York Office. In this role, he directed over 400 special agents and professional support personnel conducting cyber investigations, surveillance operations, information technology support and crisis management. About Appgate Appgate secures and protects an organization's most valuable assets and applications. Appgate is the market leader in Zero Trust Network Access (ZTNA) and online fraud protection. Appgate products include Appgate SDP for Universal ZTNA and 360 Fraud Protection. Appgate services include threat advisory analysis and ZTNA implementation. Appgate safeguards enterprises and government agencies worldwide. Learn more at Contact: Exec Edge Editor@ Error in retrieving data Sign in to access your portfolio Error in retrieving data Error in retrieving data Error in retrieving data Error in retrieving data

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into the world of global news and events? Download our app today from your preferred app store and start exploring.
app-storeplay-store