Good Contents Are Everywhere, But Here, We Deliver The Best of The Best.Please Hold on!
Your address will show here +12 34 56 78
SaaS-Ready platform is the force multiplier for overwhelmed and understaffed IT and Security operations Ayehu today launched its next generation automation and orchestration platform for IT and Security operations. The new platform is Software-as-a-Service (SaaS)-ready for hybrid deployments and is powered by artificial intelligence (AI) and machine learning driven decision support, for fully enhanced and optimized automated workflows. Today’s IT and Security operations teams are overwhelmed by the increasing influx of alerts, incidents, and requests. This state of affairs combined with a growing shortage of skilled, talented IT and security professionals, has created the need for intelligence-backed, automated solutions.
“We’ve received overwhelmingly positive initial feedback from our partners and customers who have previewed our new platform and are excited to now make it generally available,” said Gabby Nizri, Co-founder & CEO of Ayehu. “We developed it because we wanted to make it even easier for our customers to incorporate and use automation as a game changer in their business.  The SaaS-ready, multi-tenant platform is now able to deliver efficiencies across hybrid environments. This sets the stage for CIOs around the world to start the journey to enable the Self Driving Enterprise.”
The platform includes an architecture redesign to support managed service providers (MSP) and businesses with hybrid deployments across on-premise, private and public cloud environments such as AWS and Azure. It also enriches product security in areas such as message encryption across internal and external networks and presents a brand new user interface. Key features include:
  • AI Powered – Machine learning delivers decision support via prompts to optimize workflows and dynamically creates rule-based recommendations, insights, and correlations
  • SaaS Ready – Ideal for hybrid deployments, supports multi-tenant, communication encryption, OAuth2 authentication, and internal security improvements
  • High Availability and Scalability – Ayehu easily scales to support organizations with a high volume of incidents and safe guards against a single-point-of-failure
  • Workflow Version Control – Ayehu is the first IT automation and orchestration platform to provide version control on workflows, allowing users to rollback changes and review, compare or revert workflows
  • Tagging and Labeling – Ayehu users can associate workflows with keywords through tags to quickly search and return commonly used workflows
  • User Interface Enhancements – The new angular 2.0 web-based interface, offering easy and user-friendly workflow designer and template navigation, as well as white labeling options for OEM partnerships
Ayehu acts as a force multiplier, driving efficiency through a simple and powerful IT automation and orchestration platform powered by AI. The next generation automation platform helps enterprises save time on manual and repetitive tasks, accelerate mean time to resolution (MTTR), and maintain greater control over IT infrastructure. IT and security operations teams can fully- or semi-automate the manual response of an experienced IT or security operator/analyst, including complex tasks across multiple, disparate systems. Ayehu’s response time is instant and automatic, executing pre-configured instructions without any programming required, helping to resolve virtually any alert, incident or crisis. For more information and to request a live, personalized demonstration of the next generation platform, visithttps://ayehu.com/nextgen

About Ayehu

Named by Gartner as a Cool Vendor, Ayehu’s Intelligent IT automation and orchestration platform is a force multiplier for IT and security operations, helping enterprises save time on manual and repetitive tasks, accelerate mean time to resolution, and maintain greater control over IT infrastructure. Trusted by major enterprises and leading technology solution and service partners, Ayehu supports thousands of automated processes across the globe. For more information, please visitwww.ayehu.com and the company blog.  Follow Ayehu on Twitter and LinkedIn.

 Source: https://ayehu.com/ayehu-launches-next-generation-automation-orchestration-platform-powered-artificial-intelligence/

0

Bayshore Industrial Cyber Protection Platform Honored for Exceptional Innovation BETHESDA, Md., July 25, 2017 (GLOBE NEWSWIRE) — Bayshore Networks, the leading provider of cyber protection for industrial infrastructure, today announced that the Bayshore Industrial Cyber Protection Platform has received a 2017 IoT Evolution Product of the Year Award from IoT Evolution magazine and IoT Evolution World, the leading magazine and Web site covering IoT technologies. IoT-POTY_17.jpg
The Bayshore Industrial Cyber Protection Platform provides all the necessary tools required to defend Operational Technology (OT) infrastructure against sophisticated, complex attack systems, allow industrial data to be shared, enable the managed interconnection of industrial assets, and reduce cyber security concerns. The platform incorporates state of the art threat intelligence, and operates at scale, providing visualization of industrial assets, anomaly and intrusion detection, high-performance deep filtration of industrial protocols, policy enforced alerting and/or blocking of unauthorized traffic, and transformation of industrial data to business formats.
“We are delighted to be recognized as Product of the Year by IoT Evolution,” said Mike Dager, Bayshore CEO. “The Bayshore Industrial Cyber Protection Platform represents breakthrough innovation enabling customers to deploy preventative, defense-in-depth technologies that stop industrial cyber threats before they start, and unlock the business benefits heralded by the Industrial Internet.” “The solutions selected for the IoT Evolution Product of Year Award reflect the diverse range of innovation driving the machine to machine market today. It is my honor to congratulate Bayshore Networks for their innovative work and superior contribution to the rapidly evolving IoT industry,” said Carl Ford, CEO of Crossfire Media, a co-publisher of IoT Evolution. “It is my pleasure to recognize the Bayshore Industrial Cyber Protection Platform, an innovative solution that earned Bayshore Networks the 2017 IoT Evolution Product of the Year Award,” said Rich Tehrani, CEO, TMC. “I look forward to seeing more innovation from Bayshore in the future.” The Bayshore Industrial Cyber Protection Platform The comprehensive Bayshore Industrial Cyber Protection Platform uniquely offers customers a long-term solution by providing the following capabilities and features in a single tightly integrated, extensible and scalable architecture: Visibility
  • Discovery – non-disruptive, automated identification and inventory of devices, networks, and systems throughout the Operational Technology (OT) environment delivers actionable visibility and reporting.
  • Detection – real-time monitoring and deep content filtration of industrial protocols offers actionable insights by identifying changes to assets and traffic, anomalies from baseline behavior, and violations of specific pre-established policies.
Protection
  • Prevention – active alerting and optional blocking of offending communication and commands prevent cyber threats from affecting targeted objects and data. Because Bayshore operates at line speed, and protection is provided at a fine-grained transaction level, authorized traffic flows unimpeded allowing normal workflows to continue even in the face of ongoing cyberattacks.
Connection
  • Optimization – Conversion of industrial data into formats consumable by business analytics programs supports digital transformation and Six Sigma process improvement initiatives, including reductions in cost, waste, energy consumption, and improvements in safety, efficiency, quality, and timeliness.
  • Innovation – Extending protection outside the plant, Bayshore can establish trusted communication channels with outside entities, while controlling the content communicated over those channels. Third party contractors, for instance, can be allowed remote access to a specific machine, while their interactions with that machine can be policy protected to prevent unauthorized activity. In the same way, communication with external partners, suppliers and service providers can be established and controlled, allowing secure confident connection to the Industrial Internet.
For more information on the Bayshore Industrial Cyber Protection Platform, visit www.bayshorenetworks.com/platform. The winners of the 2017 IoT Evolution Product of the Year Award will be published in the next issue of IoT Evolution magazine. About Bayshore Networks Bayshore Networks is the leading provider of industrial cyber protection. The Company’s award-winning Industrial Cyber Protection Platform unlocks the power of the Industrial Internet of Things (IIoT), providing enterprises with unprecedented visibility into their Operational Technology (OT) infrastructure while safely and securely protecting ICS systems, industrial applications, networks, machines, and workers from cyber threats. Bayshore’s strategic partners include among others Arista, AT&T, BAE, Cisco, Dell, SAP, VMware, and Yokogawa. Bayshore is a privately held company headquartered in Washington, DC and backed by Trident Capital Cybersecurity, Yokogawa, Samsung Next, and BGV Capital. For more information, visit www.bayshorenetworks.com
[border_divider_fit_page_content] Source: https://www.bayshorenetworks.com/news/bayshore-networks-launches-industrys-first-industrial-cyber-protection-icp-platform-0
0

IdentityMind, a a BGV portfolio company, won the Crowd Favorite award at FinDEVr London 2017 last week. CMO Jose Caldera and CTO Kieran Sherlock presented the Identity Mind’s new product, IdentityLink API: “The IdentityLink API takes the entity graph’s ability to uncover complex risk an money laundering scenarios, and delivers it through an easy to use Rest API. The result is that companies can layer the IdentityLink API on their current risk and compliance investments, and still get the advanced power of machine learning and big data analysis to identify the correlations between a digital entity’s identity attributes, transactions and behaviors.” (David Andrews for IdentityMind)

Congratulations on the well deserved award!

More on IdentityMind at FinDEVr London 2017 here.

0

BGV portfolio company IntelliVision was awarded the honor of inclusion on the Top 100 Red Herring North America 2017 list on June 14th.  CEO Vaidhi Nathan was selected to present at the final panel of the Red Herring Finals Top 100 conference in LA this week.  From the Red Herring website, more about the Top 100 annual awards: Red Herring has announced the winners of its Top 100 North America 2017 event, held this week in Los Angeles. The winning companies, selected from thousands of prospective startups and tech firms, represent the cutting edge of North America’s world-class technology industry–and demonstrate the region’s continued reputation for digital excellence. The Top 100 awards were handed out at a special ceremony tonight at the Marina Del Rey Marriott Hotel, where for the past two days companies’ executives have presented their companies to a judging panel comprising industry insiders, analysts and journalists. Entrants also enjoyed a host of keynote speeches and panel discussions featuring some of North America’s top technology leaders. “This is one of the most innovative and exciting groups of companies we’ve ever hosted at a Top 100 awards show,” said Alex Vieux, chairman of Red Herring. “It’s always a pleasure to come to California and see the cream of North America’s tech crop. 2017 has proven to be another fine year for tech, which is now simply the economy rather than a small part of it.” Finalist companies operate in all aspects of the tech industry, from fintech and IoT to robotics, security and clean technology. It was a particularly good year for cybersecurity platforms, whose market has diversified and expanded amid technical breakthroughs, and hacks that have made headlines around the world. “The fact that so many companies here are working at the bleeding edge of tech, goes to show just how fast this sector is moving,” said Vieux. “I’m proud to see so many exciting entrepreneurs at this awards ceremony, and have no doubt they will go on to achieve great things.”  
  Source: http://www.redherring.com/startups/red-herring-announces-2017-winners/
0

Apple CEO Tim Cook was recently seen test-driving a prototype blood sugar tracker on his Apple Watch. The sighting was a reminder of the two-edged sword of technological innovation in the connected healthcare arena.   On the one hand, the prototype hints at future applications that will make life easier for the millions of people who suffer from diabetes—perhaps even achieving the diabetes holy grail of non-invasive and continuous glucose monitoring (which Apple is also working on). On the other hand, the prototype is a reminder of the endless proliferation of potential cyber-attack vectors that come with innovation in the healthcare space.   Not that we need a reminder. Thousands of hospitals and other organizations around the world are still recovering from the recent WannaCry ransomware cyber-attack that struck computers running Microsoft Windows on May 12, disrupting healthcare and other services, and potentially threatening every aspect of connected health care, including connected medical devices. In the future, what could such an attack mean for diabetics who depend on an Apple Watch app to keep track of their blood sugar levels? One shudders to think.   A recent article in Forbes by former Homeland Security Secretary Michael Chertoff, now executive chairman of The Chertoff Group, and information security and technology expert Jason Cook, zeroed in on this same two-edged sword.   Connected medical devices provide patients and physicians with technology to better manage chronic conditions, improve outcomes and reduce the overall cost of care. They also reduce doctor visits, shrink response times and shorten hospitalizations by empowering patients to manage aspects of their own care. However, they also increase exposure to the threat of cyber-attacks.   As Chertoff and Cook write in Forbes: “To mitigate cybersecurity risks associated with connected medical devices, and ensure patients continue to derive their full benefits, industry must not only build security into its innovation process, but ensure resources are in place to conduct ongoing monitoring efforts.”   It is precisely for this reason that, earlier this month, Blue Cedar issued a new release of its mobile security platform.  Unlike traditional Enterprise Mobility Management solutions (EMM), Blue Cedar’s security controls are injected into the apps  themselves.  The result is superior security controls that don’t affect user privacy or the ease of use they have come to expect from consumer mobile apps.  Patients and physicians simply download secured apps from the public app store.   It also means, for example, that doctors could use their own smartphones or tablets to securely access patient information. This is what one of our healthcare provider customers had in mind when it chose Blue Cedar as the platform on which to build a mobile app. The customer—a major medical institute that catalyzes innovation in order to advance health—built an app that contains protected patient information and can be run by clinicians on their own personal mobile devices. According to the customer’s chief innovation officer, the Blue Cedar platform met two critical design specs that the healthcare provider was looking to fulfill simultaneously: rigorous security and rapid access.   The chief innovation officer said the solution had to act heavy but feel light, meaning it had to be transparent to the busy clinicians who cannot spend even seconds navigating layers of controls that create user friction and discourages use—which in turn can impede early diagnosis and immediate treatment.   As Chertoff and Cook note, citing the FDA, effective cybersecurity measures are necessary to assure proper device functionality and to protect health information stored on connected medical devices. Blue Cedar’s app-centric approach to security allows enterprises to avoid the drawbacks of existing device-centric approaches, and empowers them to expand the depth and breadth of their mobile app coverage. It’s the logical evolution of mobile security.   To learn more, please contact Blue Cedar, sales@bluecedar.com, 415-329-0401.    
  Source: https://www.bluecedar.com/blog/an-app-centric-approach-to-mobile-security-in-healthcare
0

Israel continues to produce an impressive number of highly successful tech companies for a country with a population of just 9 million people. The Middle Eastern country is sometimes referred to as “Startup Nation” thanks to the sheer number of entrepreneurs building businesses there, particularly in cities like Tel Aviv. Multinational tech companies like Google, Apple, Facebook, and Microsoft all have research centres in Israel but some of the local companies are arguably more interesting, with many of them specialising in drones, cybersecurity, and autonomous driving technology. Take Mobileye, for example. The company’s autonomous driving technology was so interesting that Intel paid a whopping $15.3 billion (£11.8 billion) for it in March when it acquired the company. The tech companies have been ranked based on interviews with multiple investors on the ground in Israel and what the firms have achieved over the last year.  
 

14. Secret Double Octopus — password elimination service

14. Secret Double Octopus — password elimination service
Secret Double Octopus
Despite its rather peculiar name, Secret Double Octopus has a credible mission: to eliminate passwords from our daily lives. The company’s app allows people to use their smartphones to authenticate that they are who they say they are. Instead of typing a password, which can be forgotten, phished, or compromised, users simply tap a push notification that’s sent to their phone when they try and access an account. Secret Double Octopus announced it had received $6 million (£4.2 million) from investors in January and it launched a new authenticator app for businesses called “Octopus Authenticator” in March.   Source, full article: http://www.businessinsider.com/coolest-tech-startups-in-israel-2017-5/#15-dapulse-team-management-and-productivity-platform-11
0

SAN FRANCISCO, May 3, 2017 Blue Cedar today redefined enterprise mobility management (EMM) with a new release of its highly acclaimed mobile security platform, which can extend or completely replace traditional EMM solutions to provide secure mobile data access for all enterprise mobile end users, employees, external partners and customers. The new release extends Blue Cedar’s enterprise offering with enhanced functionality and robustness to create a mobile device management (MDM) alternative that secures access to mobile data without having to manage devices, and boosts mobile adoption by eliminating the usability, privacy and other constraints that have plagued traditional, device-centric EMM solutions. “Blue Cedar has had great success in offering enterprises a fast yet simple way to supplement traditional MDM solutions by delivering secure mobile access to their high-value data for every user,” said Chris Ford, chief product officer at Blue Cedar. “With the new platform release, Blue Cedar has significantly broadened its market with the first viable alternative to traditional MDM, enabling businesses to use it as the primary solution for securing mobile data access for all knowledge workers across the enterprise.” Because the Blue Cedar solution secures only the enterprise mobile app and not the device, or the device-resident container, the company is able to deliver superior security controls without impacting end users’ productivity or privacy requirements. Using enterprise apps secured by Blue Cedar on any device is as easy and intuitive as using the myriad of consumer mobile apps that users have become accustomed to. The Blue Cedar security controls are baked into the apps, and do not impose any unnatural burdens that hinder app usage for the end user. “The MedStar Institute for Innovation chose Blue Cedar as the platform on which to build a mobile app that contains protected patient information and that could be run by clinicians on their own personal mobile devices,” said Mark Smith, MD, chief innovation officer of MedStar Health, the largest healthcare provider in the Maryland and Washington, DC region. “We were looking for the simultaneous fulfillment of two critical design specs: rigorous security and rapid access. The solution had to act heavy but feel light, i.e. be transparent to the busy clinicians who cannot spend even seconds navigating layers of controls that create user friction and discourages use, which in turn can impede early diagnosis and immediate treatment. The Blue Cedar platform met our design criteria to a T.” The Blue Cedar platform also meets the needs of enterprise IT and security professionals.  It provides consistent, granular security controls to all mobile apps — native, hybrid and web — and makes it easy to ensure compliance with internal policies and external regulations without writing any security code, and with no data storage concerns.  Enterprises can move to a future-proof architecture that is ready to support next-generation endpoints like wearables and IoT, and be well positioned for securing access to data residing in public or private cloud-based storage. The new platform features innovative capabilities and enhancements to ensure it can meet the requirements of forward-thinking organizations’ architecture for enterprise mobility, including:
  • Distribution of secured apps via public app stores like Apple iTunes and Google Play, providing customers with alternatives to enterprise app stores and opening the door to future enhancements for securing enterprise consumer-facing apps;
  • Support for a broader range of development frameworks, including Microsoft Xamarin, and additional functionality to ensure compatibility with any native, hybrid or web-based enterprise mobile app;
  • Mobile app trust functionality that enables sharing of security policies across trusted apps on a device to streamline authentication and control data sharing among these apps, without the need for an EMM container; and
  • Support for encryption of Voice-over-IP (VoIP) traffic for mobile apps that enable real-time communications.
“This release marks a significant milestone for Blue Cedar as it represents the culmination of a remarkable year-long development effort to broaden the applicability of our platform. The result is that we are now able to offer the Blue Cedar platform to enterprise customers as a destination mobile security solution,” said Ford. “Additionally, our Blue Cedar platform continues to provide enterprises with an ideal solution for expanding their existing EMM footprint with the ability to incorporate support for additional use cases, such as secure apps on unmanaged devices, security and connectivity for VOIP-based apps and enforcement of granular controls for HTTP-based apps.” The new Blue Cedar platform will be featured in its first public demonstration at the NH-ISAC 2017 Masters of Deception Summit, May 8-10 in Orlando, Florida, booth number 13. Availability and Pricing The Blue Cedar platform, version 3.14, is available now. Please contact sales@bluecedar.com for additional product and pricing information.   About Blue Cedar Blue Cedar transforms enterprise mobile security with the industry’s most innovative mobile app security solution. Blue Cedar protects mobile apps and their data, with security following the app everywhere it is used. Enterprises gain robust, consistent protection across their employees’ and partners’ mobile devices—whether managed or unmanaged—without the cost, complexity or risk associated with securing individual devices. Users access apps and data without friction or impact to their private personal data. Blue Cedar sets the enterprise free to conduct business safely anywhere. The company is privately held and headquartered in San Francisco. For information about Blue Cedar, visit www.bluecedar.com.
Source: https://www.bluecedar.com/press-releases/blue-cedar-redefines-enterprise-mobility-management
0

Fintech Startups
FINTECH is on the rise this 2017. Fintech startups have created financial products that allow customers to enjoy easy payment processes, money transfers, and financial advice via a site or an app. The best part? Since transactions are done online, they can be processed and finished in mere minutes! Gone are the days when you had to go to the bank, talk to a financial advisor or wait a day to receive money. With fintech, all you need is to avail of the right tools to make your life easier. In fact, the numbers show that the industry’s growth is far from over. According to an Accenture study, the industry acquired $5.4 billion in investments in the first quarter of 2016. Another study by Statista estimates that banks in North America will spend about $19 billion in financial technologies. This level of growth is a huge leap, but it’s not surprising. In recent years, fintech startups have created services that can change the way you do business.
Best Fintech Startups
Interested to find out what these startups and services are? In this article, we’ll talk about Best Fintech Startups you need to watch out for this 2017.

Best Fintech Startups

The full article can be read here.

……

8. IdentityMind Global

IdentityMind Global is a fintech startup that serves financial service firms, fintech leaders, and bitcoin marketplaces. It’s best known for its eDNA technology that allows users to evaluate the digital identity of individuals who they’re transacting with. A digital identity is a set of attributes that consists of email, phone, passport, fingerprint, payment and IP geolocation. The digital identity evolves over time. As users transact with other users, their eDna grows in real-time. Users with a trusted digital identities have a clean behavior across their financial transaction. They have no ties to non-trusted identities. On the other hand, digital identities of fraudsters and criminals change quickly making them easy to identify. With the eDna technology, IdentityMind Global enables users to transact only with people they can trust. Last year, the company has raised $12 million. Since its the pioneer of eDNA technology, the startup is definitely a standout in the fintech industry.  
  Source: https://www.chipin.com/best-fintech-startups/
0

0

PREVIOUS POSTSPage 1 of 2NO NEW POSTS