CIOApplications
static-image
  • Home
  • Applications
      • Auction Software
      • Bioinformatics
      • Business Continuity
      • Business Intelligence
      • Chatbot
      • Club Management
      • Collaboration
      • Custom Software Development
      • CRM
      • Digital Experience
      • EAM
      • Enterprise Mobility
      • Enterprise Reporting Software
      • GRC
      • Human Resource
      • Indoor Positioning
      • InsurTech
      • Intellectual Property
      • IT Infrastructure
      • IT Operations Management
      • IT Service Management
      • License Management
      • Low Code Platform
      • Maintenance Management
      • Managed IT Services
      • MarTech
      • Mobile Application
      • Order Management
      • Parking Management
      • Personalization
      • Procurement Tech
      • Publishing Software
      • Remote Monitoring
      • RFID
      • Sales Tech
      • SAS
      • Software Asset Management
      • Software Testing
      • Task Management
      • Unified Communications
      • Visitor Management
      • Voice Recognition
      • Workflow
      • Workplace Management
  • Verticals
      • BioTechnology
      • Casino
      • Construction
      • Contact Center
      • Education
      • Field Service
      • Fintech
      • Food and Beverages
      • Government
      • Healthcare
      • Legal
      • Life Sciences
      • Logistics
      • Manufacturing
      • Travel and Hospitality
      • Utilities
  • Technologies
      • Agile
      • API
      • Artificial Intelligence
      • Augmented Reality
      • Blockchain
      • CAD/CAM
      • Cloud
      • Cyber Security
      • Data Analytics
      • Data Center
      • DevOps
      • Digital Transformation
      • Drone
      • Graphics
      • Hyper Converged Infrastructure
      • IoT
      • Machine Learning
      • Machine Vision and Imaging
      • Predictive Analytics
      • RF and Microwave
      • Robotic Process Automation
      • Simulation
      • Smart Labelling
      • Space Tech
      • Virtual Assistant
  • Eco System
      • Adobe
      • Amazon
      • Esri
      • Google
      • IBM
      • Infor
      • Kubernetes Partner
      • Microsoft
      • NetSuite
      • Oracle
      • PTC Partners
      • Qlik Partner
      • Salesforce
      • SAP
      • ServiceNow
      • SiteCore
      • VMware
  • Vendors
  • News
  • Newsletter
  • Whitepaper
  • conferences
  • About Us
  • Specials

  • Menu
      • Business Continuity
      • Cloud
      • Cyber Security
      • Esri
      • Human Resource
      • IT Service Management
      • Machine Learning
      • Parking Management
      • Robotic Process Automation
  • Business Continuity
  • Parking Management
  • Cyber Security
  • Esri
  • Human Resource
  • IT Service Management
  • Machine Learning
Specials
  • Specials

  • Business Continuity
  • Cloud
  • Cyber Security
  • Esri
  • Human Resource
  • IT Service Management
  • Machine Learning
  • Parking Management
  • Robotic Process Automation
×
#

CIO Applications Weekly Brief

Be first to read the latest tech news, Industry Leader's Insights, and CIO interviews of medium and large enterprises exclusively from CIO Applications

Subscribe

loading

Thank you for Subscribing to CIO Applications Weekly Brief

  • Home
  • Enterprise Communications
  • Top Companies
  • Enabling Technologies

Enabling Technologies: The New Generation of Cloud Security

Enabling Technologies

CIO VendorChris Stegh, CTO & VP of Strategy
Every day countless phishing emails make way to the inboxes of unsuspecting victims across the world. According to Verizon’s 2017 data breach investigations report (DBIR), manufacturing companies are the most likely target to receive and click email messages that are phishing attacks. When companies transfer emails to the widely used cloud solution—Office365, Microsoft harnesses the potential of advanced security solutions for filtering out the known attacks and blocks them from showing up in the inbox. However, times have changed and attackers are wiser now. “Today, attackers send realistic looking emails with a link to webpage that has no virus and no malware,” explains Chris Stegh, CTO and VP of Strategy, Enabling Technologies. “No antivirus or scanning services can determine these benign web pages are risky. But when the user clicks and is duped into logging into the attacker’s page, the attacker captures the credentials and now owns the account. That’s why 13 percent of manufacturing phishing messages are successful.”Set against this backdrop is Florida-based Enabling Technologies. The company aims to empower clients with advanced security solutions in manufacturing— one of the highest phished industries.

After a risky email is received, Enabling Technologies’ solution collects complete information about the end user— who received it, where the user logged in from, what tasks they are performing in the account, and other activities that identify behavior of an attacker.

Offered as a hosted managed service, Enabling Technologies’ security solution relies on a few logging capabilities of Office 365. Customers can point their Office 365 logs to the Enabling Technologies' system via standard APIs, much in the way a SIEM works. Enabling’s service is hosted in Azure and provided to the customer at a yearly service fee. Instead of customers relying on individual configurations in their tenant, Enabling’s service improves each customers’ outcome by learning from attacks reported in other customers’ tenants. What is found with one customer immediately applies to others as well. With its breadth of experience, Enabling Technologies alleviates the administrative burden and lets clients focus on what’s important. “We help customers do their share of responsibility in the cloud’s shared responsibility model, which involves setting up the right protection like multi-factor authentication and single sign-on and detection of shadow IT,” adds Stegh.

When it comes to sensing cyberattacks and automatically remediating them, companies either don’t know they have been compromised or it takes them an awfully long time to identify it. What makes Enabling Technologies unique is its ability to sense a compromised account and then to immediately remediate the issue by shutting down the account and directing the real user to reset their password and take back control.

Drawing a complete picture of Enabling’s capabilities, Stegh recalls an instance when the company assisted the IT team at Viewpoint, a global construction software developer. Viewpoint was facing frequent phishing scams targeting credential theft and business email compromise, which made Office 365 accounts vulnerable. Viewpoint today uses Enabling Technologies’ PhishHunter service to take immediate action based on the logs created by Microsoft Cloud App Security (MCAS) and Advanced Threat Protection, identifying and mitigating attempted attacks. "With Enabling, we're being proactive, and are much more scalable. Now, we’re dealing with email security only 5 percent of the time," said Chris Gielow, IT Director, Viewpoint.

Enabling Technologies recently introduced its latest solution, PhishHunter 2.0 —a solution that automatically detects and remediates attacks. The company’s next big step is to improve the security of the customer data in Azure.“We’ll do that by collecting data about various application behaviors while they are running in the cloud, like how we alert and auto-remediate phishing attacks. We will perform the same sensing, detection, and remediation methods for breaches that could take over servers or data in Azure,” concludes Stegh.


Read Also

Institutional Cash Distributors: Flexible, Efficient and Secure Trading

Tory Hazard, CEO, Institutional Cash Distributors

1787fp: Working toward Financial Independence

Jean Jacques Borno, CFP®, Founder & CEO, 1787fp

Advisor Software: Enabling Financial Institutions Revamp Digitally

Andrew Rudd, CEO, Advisor Software

NETSOL Technologies [NASDAQ:NTWK]: How Netsol Technologies Helps Companies Transform Their Asset Financing And Leasing Operations

Douglas Jones, Vice President Operations, NETSOL Technologies

Share this Article:
Tweet
Top 25 Companies Providing Enterprise Communications Solution  - 2018
ON THE DECK

Enterprise Communications 2018

Top Vendors

Tweets by CIOApplications

I agree We use cookies on this website to enhance your user experience. By clicking any link on this page you are giving your consent for us to set cookies. More info

Copyright © 2021 CIOApplications. All rights reserved. Registration on or use of this site constitutes acceptance of our Terms of Use and Privacy Policy |  Sitemap  |  Subscribe |  About Us

follow on linkedin follow on twitter follow on rss
This content is copyright protected close

However, if you would like to share the information in this article, you may use the link below:

https://enterprise-communications.cioapplications.com/vendor/enabling-technologies-the-new-generation-of-cloud-security-cid-2404-mid-130.html