Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Cloud

11/13/2017
04:00 PM
Jai Vijayan
Jai Vijayan
Slideshows
Connect Directly
Twitter
LinkedIn
RSS
E-Mail

Emerging IT Security Technologies: 13 Categories, 26 Vendors

A rundown of some of the hottest security product areas, and vendors helping to shape them.
12 of 14

SOC-as-a-Service

Helping organizations detect and respond to security threats and incidents via hosted monitoring and analysis of activity on enterprise networks and systems. 

Vendor: Arctic Wolf

Managed detection, response, crisis-support service for enterprises.
	
Factors to Watch

- Combines machine intelligence and human expertise
- Public cloud infrastructure and SaaS application monitoring
- Direct Access to Concierge Security Engineers



Key Executives: Co-founder and CEO Brian NeSmith is an industry veteran with more than 30 years of experience in cybersecurity. He was previously CEO of Blue Coat Systems and Ipsilon Networks.

Founded: 2012

Vendor: StratoZen

Cloud-delivered SIEM and SOC-as-a-service for managed service providers and enterprises.
	
Factors to Watch

- Customized MSP services
- Entirely self-funded
- 100% US staff



Key Executives: Founder and CEO Kevin Prince was Chief Technology Officer and principal technology strategist at Compushare before he launched StratoZen.

Founded: 2014

Image Source: Ton Snoei via Shutterstock

SOC-as-a-Service

Helping organizations detect and respond to security threats and incidents via hosted monitoring and analysis of activity on enterprise networks and systems.

Vendor: Arctic Wolf

Managed detection, response, crisis-support service for enterprises.

Factors to Watch

  • Combines machine intelligence and human expertise
  • Public cloud infrastructure and SaaS application monitoring
  • Direct Access to Concierge Security Engineers

Key Executives: Co-founder and CEO Brian NeSmith is an industry veteran with more than 30 years of experience in cybersecurity. He was previously CEO of Blue Coat Systems and Ipsilon Networks.

Founded: 2012

Vendor: StratoZen

Cloud-delivered SIEM and SOC-as-a-service for managed service providers and enterprises.

Factors to Watch

  • Customized MSP services
  • Entirely self-funded
  • 100% US staff

Key Executives: Founder and CEO Kevin Prince was Chief Technology Officer and principal technology strategist at Compushare before he launched StratoZen.

Founded: 2014

Image Source: Ton Snoei via Shutterstock

12 of 14
Comment  | 
Print  | 
Comments
Oldest First  |  Newest First  |  Threaded View
MarkS94105
100%
0%
MarkS94105,
User Rank: Apprentice
12/8/2017 | 2:28:08 PM
Story -> Potentially Valuable; Site -> Problematic Viewing and Printing
This topic and story is presented as a white paper.  To read the story, we must click the next arrow 13 times to see all 14 pages.  This is time consuming as the site loads so many advertisements.  There is no simple way to print the story, as the print function show only 1 of 14, 2 of 14, etc.  This may be by design, but I find it a serious barrier and will seek other sources for this material.  
Navigating Security in the Cloud
Diya Jolly, Chief Product Officer, Okta,  12/4/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Navigating the Deluge of Security Data
In this Tech Digest, Dark Reading shares the experiences of some top security practitioners as they navigate volumes of security data. We examine some examples of how enterprises can cull this data to find the clues they need.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-19551
PUBLISHED: 2019-12-06
In userman 13.0.76.43 through 15.0.20 in Sangoma FreePBX, XSS exists in the User Management screen of the Administrator web site. An attacker with access to the User Control Panel application can submit malicious values in some of the time/date formatting and time-zone fields. These fields are not b...
CVE-2019-19552
PUBLISHED: 2019-12-06
In userman 13.0.76.43 through 15.0.20 in Sangoma FreePBX, XSS exists in the user management screen of the Administrator web site, i.e., the/admin/config.php?display=userman URI. An attacker with sufficient privileges can edit the Display Name of a user and embed malicious XSS code. When another user...
CVE-2019-19620
PUBLISHED: 2019-12-06
In SecureWorks Red Cloak Windows Agent before 2.0.7.9, a local user can bypass the generation of telemetry alerts by removing NT AUTHORITY\SYSTEM permissions from a malicious file.
CVE-2019-19625
PUBLISHED: 2019-12-06
SROS 2 0.8.1 (which provides the tools that generate and distribute keys for Robot Operating System 2 and uses the underlying security plugins of DDS from ROS 2) leaks node information due to a leaky default configuration as indicated in the policy/defaults/dds/governance.xml document.
CVE-2019-19627
PUBLISHED: 2019-12-06
SROS 2 0.8.1 (after CVE-2019-19625 is mitigated) leaks ROS 2 node-related information regardless of the rtps_protection_kind configuration. (SROS2 provides the tools to generate and distribute keys for Robot Operating System 2 and uses the underlying security plugins of DDS from ROS 2.)