Israel-based leading internet security solutions provider Cyber Observer has reportedly introduced new updates to its renowned platform that allows CISOs and other security management teams to acquire new, unified, and continuous visibility regarding their cybersecurity tools.
For those uninitiated, Cyber Observer’s Continuous Controls Monitoring (CCM) solution simplifies compliance, improves risk posture management, and reduces mean time while detecting and responding to cyberthreats. The company achieves this by continuously obtaining an analyzing CSCs (Critical Security Controls) from in-cloud or on-premise applications in an enterprise.
It is also worth noting that internet security teams are lately overwhelmed with the complexity associated while managing a large number of security tools deployed across hybrid enterprises. Moreover, enterprise executives are identifying malfunctioning or misconfigured tools which are often considered to be a blind spot among security defenses.
These blind spots are eliminated by Cyber Observer’s CCM platform, further allowing enterprises to keep track of their respective security tools. The company is known to connect and acquire data from an enterprise’s in-cloud and on-premise tools to offer a broad perspective of the security tools deployed.
Apart from continuously evaluating around 5,000 CSCs, the company has deployed a new set of features namely real-time dashboards, continuous reporting, and open API enhancements. The real-time dashboard will offer enterprise information regarding the status of each cybersecurity tool deployed, prioritize vulnerabilities and alert if a deviation from normal behavior.
Meanwhile, continuous reporting will allow an organization to assess cybersecurity tools’ performance remotely. The open API enhancements will allow a business to easily share data acquired by Cyber Observer with third-party tools that offer security information.
According to Cyber Observer Co-founder and VP Product, Shimon Becker, managing risk requires more than deploying security solutions. Continuous monitoring, management, and overview of the security tools ensure that the technology, as well as the processes, are protecting an enterprise’s data.
Source Credits –
Endowed with a post graduate degree in management and finance, Pankaj Singh has been a part of the online content domain for quite a while. Having worked previously as a U.K. insurance underwriter for two years, he now writes articles for fractovia.org and other online portals. He can be contacted at- [email protected] | https://twitter.com/PankajSingh2605
Bayer newly appointed CEO, Bill Anderson, has reportedly unveiled plans to streamline the companys management structure in a bid to expedite decision-making processes. This marks the first step in a broader effort to transform the embattled German company, which has been under pressure from inv... Read More>>
Smurfit Kappa, a prominent player in the packaging industry, is reportedly engaged in merger discussions with its US counterpart, WestRock. This prospective merger has the potential to create a cardboard box-making powerhouse boasting a market value approaching $19 billion (€17.8 billion). Furt... Read More>>
The Royal Bank of Canada is reportedly planning to reduce its workforce by approximately 1,800 jobs as part of cost-cutting measures, on account of the anticipated upcoming economic landscape. This decision comes after the country's largest bank surpassed analysts' predictions for the third ... Read More>>