Cloud

12/5/2017
12:00 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Coronet Announces SecureCloud - A New Approach to Cloud Security

Democratizes Enterprise-Grade Security for SMEs and Drives TCO Down to One-Tenth the Cost of Traditional Cloud Security Infrastructure.

Tel Aviv, Israel – Coronet, an award-winning cloud security company, announced Coronet SecureCloud, a major release of its security platform. Coronet SecureCloud is the first end-to-end platform that provides everything needed to completely secure any cloud application. SecureCloud also mitigates any of the cloud risks, eliminating the need to buy and integrate multiple products and delivering huge savings in purchasing, installation, and operations.

SecureCloud leverages Coronet’s patented security technology which includes a first of kind autonomous threat detection and mitigation engine across all four pillars: The user behavior, devices they use, networks they connect to, and their actions in cloud applications.

‘Set-It and Forget It” Security Functionality

Coronet SecureCloud is the simplest way for any sized company to benefit from enterprise-grade security - at a fraction of the cost. SecureCloud provides “set-it and forget” functionality that comes pre-integrated with most SaaS and IT tools. Configurable in minutes, it secures a company’s cloud infrastructure, SaaS applications, and in-house cloud-based applications.

Coronet SecureCloud minimizes the need for IT security operators or analysts. The platform identifies threats, risks and issues remediation actions, without the need for human involvement. This first-of-a-kind autonomous security reduces cloud security total cost of ownership (TCO) to one-tenth the cost of traditional cloud security infrastructure.

Coronet SecureCloud is available via leading IT resellers and system integrators across the U.S., including MicroAge, SecureNation, Comware and more, as well as by leading resellers in Asia, such as Asgent and Quantic among others.

Coronet SecureCloud provides first-of-a-kind functionality, including:

  • Allowing all users to securely use any cloud application from any device (BYOD, corporate-owned, etc.) with no impact on the user experience
  • Ensuring the organization will be safe from malware and ransomware while using the cloud
  • Preventing advanced cloud-to-cloud attacks on the infrastructure and applications
  • Giving Visibility to the security posture of users, devices and networks that are accessing the organization’s cloud applications
  • Identifying threats and risks in real time and automatically remediate those risks, with no human intervention.
  • Ensuring SOX, HIPAA, GDPR compliance of the cloud infrastructure

Breaking the Haves and HaveNots for Security
With SecureCloud, Coronet aims to address the growing security divide that has created a condition of ‘the haves’ and ‘have nots.” Traditional enterprise-grade, cloud security requires a myriad of different platforms that must be deployed and customized. Managing the complex array of different systems typically involves heavy integration, expensive maintenance, and labor-intensive operations from highly skilled IT security staff. Thus, enterprise-grade security is accessible to only the very biggest corporations, which have few restrictions on budget or an expanded workforce. Small to medium enterprises (SMEs) and SMBs, on the other hand, cannot afford entry to this caliber of fortified security. 

“SecureCloud forges a new innovative path for cloud security derived from the correlation of user, device, network and service postures,” stated Guy Moskowitz, Coronet’s co-founder and CEO. “SecureCloud changes the economics of security, for the first time making enterprise-grade security within reach and available to any size business.”

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
5 Reasons the Cybersecurity Labor Shortfall Won't End Soon
Steve Morgan, Founder & CEO, Cybersecurity Ventures,  12/11/2017
Oracle Product Rollout Underscores Need for Trust in the Cloud
Kelly Sheridan, Associate Editor, Dark Reading,  12/11/2017
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: Gee, these virtual reality goggles work great!!! 
Current Issue
The Year in Security: 2017
A look at the biggest news stories (so far) of 2017 that shaped the cybersecurity landscape -- from Russian hacking, ransomware's coming-out party, and voting machine vulnerabilities to the massive data breach of credit-monitoring firm Equifax.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.