Cloud

12/5/2017
12:00 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Coronet Announces SecureCloud - A New Approach to Cloud Security

Democratizes Enterprise-Grade Security for SMEs and Drives TCO Down to One-Tenth the Cost of Traditional Cloud Security Infrastructure.

Tel Aviv, Israel – Coronet, an award-winning cloud security company, announced Coronet SecureCloud, a major release of its security platform. Coronet SecureCloud is the first end-to-end platform that provides everything needed to completely secure any cloud application. SecureCloud also mitigates any of the cloud risks, eliminating the need to buy and integrate multiple products and delivering huge savings in purchasing, installation, and operations.

SecureCloud leverages Coronet’s patented security technology which includes a first of kind autonomous threat detection and mitigation engine across all four pillars: The user behavior, devices they use, networks they connect to, and their actions in cloud applications.

‘Set-It and Forget It” Security Functionality

Coronet SecureCloud is the simplest way for any sized company to benefit from enterprise-grade security - at a fraction of the cost. SecureCloud provides “set-it and forget” functionality that comes pre-integrated with most SaaS and IT tools. Configurable in minutes, it secures a company’s cloud infrastructure, SaaS applications, and in-house cloud-based applications.

Coronet SecureCloud minimizes the need for IT security operators or analysts. The platform identifies threats, risks and issues remediation actions, without the need for human involvement. This first-of-a-kind autonomous security reduces cloud security total cost of ownership (TCO) to one-tenth the cost of traditional cloud security infrastructure.

Coronet SecureCloud is available via leading IT resellers and system integrators across the U.S., including MicroAge, SecureNation, Comware and more, as well as by leading resellers in Asia, such as Asgent and Quantic among others.

Coronet SecureCloud provides first-of-a-kind functionality, including:

  • Allowing all users to securely use any cloud application from any device (BYOD, corporate-owned, etc.) with no impact on the user experience
  • Ensuring the organization will be safe from malware and ransomware while using the cloud
  • Preventing advanced cloud-to-cloud attacks on the infrastructure and applications
  • Giving Visibility to the security posture of users, devices and networks that are accessing the organization’s cloud applications
  • Identifying threats and risks in real time and automatically remediate those risks, with no human intervention.
  • Ensuring SOX, HIPAA, GDPR compliance of the cloud infrastructure

Breaking the Haves and HaveNots for Security
With SecureCloud, Coronet aims to address the growing security divide that has created a condition of ‘the haves’ and ‘have nots.” Traditional enterprise-grade, cloud security requires a myriad of different platforms that must be deployed and customized. Managing the complex array of different systems typically involves heavy integration, expensive maintenance, and labor-intensive operations from highly skilled IT security staff. Thus, enterprise-grade security is accessible to only the very biggest corporations, which have few restrictions on budget or an expanded workforce. Small to medium enterprises (SMEs) and SMBs, on the other hand, cannot afford entry to this caliber of fortified security. 

“SecureCloud forges a new innovative path for cloud security derived from the correlation of user, device, network and service postures,” stated Guy Moskowitz, Coronet’s co-founder and CEO. “SecureCloud changes the economics of security, for the first time making enterprise-grade security within reach and available to any size business.”

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
12 Free, Ready-to-Use Security Tools
Steve Zurier, Freelance Writer,  10/12/2018
Most IT Security Pros Want to Change Jobs
Dark Reading Staff 10/12/2018
6 Security Trends for 2018/2019
Curtis Franklin Jr., Senior Editor at Dark Reading,  10/15/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Flash Poll
The Risk Management Struggle
The Risk Management Struggle
The majority of organizations are struggling to implement a risk-based approach to security even though risk reduction has become the primary metric for measuring the effectiveness of enterprise security strategies. Read the report and get more details today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-10839
PUBLISHED: 2018-10-16
Qemu emulator <= 3.0.0 built with the NE2000 NIC emulation support is vulnerable to an integer overflow, which could lead to buffer overflow issue. It could occur when receiving packets over the network. A user inside guest could use this flaw to crash the Qemu process resulting in DoS.
CVE-2018-13399
PUBLISHED: 2018-10-16
The Microsoft Windows Installer for Atlassian Fisheye and Crucible before version 4.6.1 allows local attackers to escalate privileges because of weak permissions on the installation directory.
CVE-2018-18381
PUBLISHED: 2018-10-16
Z-BlogPHP 1.5.2.1935 (Zero) has a stored XSS Vulnerability in zb_system/function/c_system_admin.php via the Content-Type header during the uploading of image attachments.
CVE-2018-18382
PUBLISHED: 2018-10-16
Advanced HRM 1.6 allows Remote Code Execution via PHP code in a .php file to the user/update-user-avatar URI, which can be accessed through an "Update Profile" "Change Picture" (aka user/edit-profile) action.
CVE-2018-18374
PUBLISHED: 2018-10-16
XSS exists in the MetInfo 6.1.2 admin/index.php page via the anyid parameter.