Cloud

12/5/2017
12:00 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Coronet Announces SecureCloud - A New Approach to Cloud Security

Democratizes Enterprise-Grade Security for SMEs and Drives TCO Down to One-Tenth the Cost of Traditional Cloud Security Infrastructure.

Tel Aviv, Israel – Coronet, an award-winning cloud security company, announced Coronet SecureCloud, a major release of its security platform. Coronet SecureCloud is the first end-to-end platform that provides everything needed to completely secure any cloud application. SecureCloud also mitigates any of the cloud risks, eliminating the need to buy and integrate multiple products and delivering huge savings in purchasing, installation, and operations.

SecureCloud leverages Coronet’s patented security technology which includes a first of kind autonomous threat detection and mitigation engine across all four pillars: The user behavior, devices they use, networks they connect to, and their actions in cloud applications.

‘Set-It and Forget It” Security Functionality

Coronet SecureCloud is the simplest way for any sized company to benefit from enterprise-grade security - at a fraction of the cost. SecureCloud provides “set-it and forget” functionality that comes pre-integrated with most SaaS and IT tools. Configurable in minutes, it secures a company’s cloud infrastructure, SaaS applications, and in-house cloud-based applications.

Coronet SecureCloud minimizes the need for IT security operators or analysts. The platform identifies threats, risks and issues remediation actions, without the need for human involvement. This first-of-a-kind autonomous security reduces cloud security total cost of ownership (TCO) to one-tenth the cost of traditional cloud security infrastructure.

Coronet SecureCloud is available via leading IT resellers and system integrators across the U.S., including MicroAge, SecureNation, Comware and more, as well as by leading resellers in Asia, such as Asgent and Quantic among others.

Coronet SecureCloud provides first-of-a-kind functionality, including:

  • Allowing all users to securely use any cloud application from any device (BYOD, corporate-owned, etc.) with no impact on the user experience
  • Ensuring the organization will be safe from malware and ransomware while using the cloud
  • Preventing advanced cloud-to-cloud attacks on the infrastructure and applications
  • Giving Visibility to the security posture of users, devices and networks that are accessing the organization’s cloud applications
  • Identifying threats and risks in real time and automatically remediate those risks, with no human intervention.
  • Ensuring SOX, HIPAA, GDPR compliance of the cloud infrastructure

Breaking the Haves and HaveNots for Security
With SecureCloud, Coronet aims to address the growing security divide that has created a condition of ‘the haves’ and ‘have nots.” Traditional enterprise-grade, cloud security requires a myriad of different platforms that must be deployed and customized. Managing the complex array of different systems typically involves heavy integration, expensive maintenance, and labor-intensive operations from highly skilled IT security staff. Thus, enterprise-grade security is accessible to only the very biggest corporations, which have few restrictions on budget or an expanded workforce. Small to medium enterprises (SMEs) and SMBs, on the other hand, cannot afford entry to this caliber of fortified security. 

“SecureCloud forges a new innovative path for cloud security derived from the correlation of user, device, network and service postures,” stated Guy Moskowitz, Coronet’s co-founder and CEO. “SecureCloud changes the economics of security, for the first time making enterprise-grade security within reach and available to any size business.”

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Veterans Find New Roles in Enterprise Cybersecurity
Kelly Sheridan, Staff Editor, Dark Reading,  11/12/2018
Empathy: The Next Killer App for Cybersecurity?
Shay Colson, CISSP, Senior Manager, CyberClarity360,  11/13/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Post a Comment
Current Issue
Flash Poll
Online Malware and Threats: A Profile of Today's Security Posture
Online Malware and Threats: A Profile of Today's Security Posture
This report offers insight on how security professionals plan to invest in cybersecurity, and how they are prioritizing their resources. Find out what your peers have planned today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-15759
PUBLISHED: 2018-11-19
Pivotal Cloud Foundry On Demand Services SDK, versions prior to 0.24 contain an insecure method of verifying credentials. A remote unauthenticated malicious user may make many requests to the service broker with different credentials, allowing them to infer valid credentials and gain access to perfo...
CVE-2018-15761
PUBLISHED: 2018-11-19
Cloud Foundry UAA release, versions prior to v64.0, and UAA, versions prior to 4.23.0, contains a validation error which allows for privilege escalation. A remote authenticated user may modify the url and content of a consent page to gain a token with arbitrary scopes that escalates their privileges...
CVE-2018-17190
PUBLISHED: 2018-11-19
In all versions of Apache Spark, its standalone resource manager accepts code to execute on a 'master' host, that then runs that code on 'worker' hosts. The master itself does not, by design, execute user code. A specially-crafted request to the master can, however, cause the master to execute code ...
CVE-2018-1841
PUBLISHED: 2018-11-19
IBM Cloud Private 2.1.0 could allow a local user to obtain the CA Private Key due to it being world readable in boot/master node. IBM X-Force ID: 150901.
CVE-2018-18519
PUBLISHED: 2018-11-19
BestXsoftware Best Free Keylogger 5.2.9 allows local users to gain privileges via a Trojan horse "%PROGRAMFILES%\BFK 5.2.9\syscrb.exe" file because of insecure permissions for the BUILTIN\Users group.