Israel-based leading internet security solutions provider Cyber Observer has reportedly introduced new updates to its renowned platform that allows CISOs and other security management teams to acquire new, unified, and continuous visibility regarding their cybersecurity tools.
For those uninitiated, Cyber Observer’s Continuous Controls Monitoring (CCM) solution simplifies compliance, improves risk posture management, and reduces mean time while detecting and responding to cyberthreats. The company achieves this by continuously obtaining an analyzing CSCs (Critical Security Controls) from in-cloud or on-premise applications in an enterprise.
It is also worth noting that internet security teams are lately overwhelmed with the complexity associated while managing a large number of security tools deployed across hybrid enterprises. Moreover, enterprise executives are identifying malfunctioning or misconfigured tools which are often considered to be a blind spot among security defenses.
These blind spots are eliminated by Cyber Observer’s CCM platform, further allowing enterprises to keep track of their respective security tools. The company is known to connect and acquire data from an enterprise’s in-cloud and on-premise tools to offer a broad perspective of the security tools deployed.
Apart from continuously evaluating around 5,000 CSCs, the company has deployed a new set of features namely real-time dashboards, continuous reporting, and open API enhancements. The real-time dashboard will offer enterprise information regarding the status of each cybersecurity tool deployed, prioritize vulnerabilities and alert if a deviation from normal behavior.
Meanwhile, continuous reporting will allow an organization to assess cybersecurity tools’ performance remotely. The open API enhancements will allow a business to easily share data acquired by Cyber Observer with third-party tools that offer security information.
According to Cyber Observer Co-founder and VP Product, Shimon Becker, managing risk requires more than deploying security solutions. Continuous monitoring, management, and overview of the security tools ensure that the technology, as well as the processes, are protecting an enterprise’s data.
Source Credits –