theDocumentId => 1341429 ISARA Corp. Introduces Advance Crypto Agility Suite

Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

6/29/2021
11:30 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

ISARA Corp. Introduces Advance Crypto Agility Suite

WATERLOO, Ontario, June 29, 2021 — ISARA Corp., the world’s leading provider of quantum-safe security solutions, today announced the launch of the ISARA Advance® Crypto Agility Suite, a first-of-its-kind enterprise solution that allows organizations to discover their cryptographic blind spots and equip them to take action against the looming threat of encryption-breaking quantum computers. Cryptography is located throughout today’s enterprises and government organizations. Yet, because it is so deeply embedded, it is almost always overlooked, exposing vulnerabilities and risks. 

Cryptography that secures data in motion is the foundation of identification, authentication, confidentiality, and verification. To secure enterprises today, keep them secure tomorrow, and comply with increasingly stringent regulations and audits, the cryptography used by organizations needs to be visible, managed, and upgraded without business disruption. 

Revealing what lurks within organizations’ information security infrastructures forms the foundation of cryptographic agility and risk management. The challenge of building and maintaining cryptographic systems has created an immense information security black hole with costly consequences. Expensive, prolonged, and ineffective upgrades are notoriously complicated — and they are even more challenging when cryptographic assets are unknown or poorly understood. The National Institute of Standards and Technology (NIST) and the National Cybersecurity Center of Excellence (NCCoE, part of the United States Department of Homeland Security) recently issued a document outlining migration recommendations: Migration to Post-Quantum Cryptography

ISARA Advance: Cryptographic Management from a Single Pane of Glass

“Cryptography is a key element of enterprise security and prioritizing cryptographic management is a critical success factor,” said Alan Panezic, chief product officer at ISARA. “We created ISARA Advance to enable the discovery, management, and remediation of cryptographic infrastructure from a central dashboard, to help organizations account for cryptography, save time, and reduce upgrade disruptions.”

ISARA Advance increases organizations’ cryptographic agility, mitigates cryptographic risk, and ensures organizations are optimally positioned and prepared for upgrades — whether as part of a large-scale generational migration or simply to manage risks in the shorter term. ISARA Advance integrates into and ingests data from already-deployed network and end-point detection and response solutions (NDR & EDR), creating an elegant dashboard for customers to properly view and manage their cryptography. It provides all of the tools to manage cryptography, with the flexibility to quickly and cost-effectively modify them as new threats emerge. For more information, download the ISARA Advance® Crypto Agility Suite product sheet.

“Our customers were clear about not wanting to implement yet another network probe or agent, so our design was deliberate to utilize already-deployed solutions to pull the data required to build our management control from a single pane of glass,” said ISARA CEO and co-founder, Scott Totzke. “ISARA Advance brings clarity to a complex domain by discovering and cataloging cryptographic assets and generating a list of prioritized actions.” 

About ISARA Corporation

ISARA is a Canadian-based company, founded in 2015, whose mission is to help customers on their journey to transition to quantum-safe security and enable cryptographic agility, with crypto-agile and quantum-safe cryptography tools and solutions for today’s information technology ecosystems. Our mission is to enable seamless cryptography upgrades to clear the path to quantum-safe security for enterprises and government agencies. For more information, please visit isara.com.

 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-23416
PUBLISHED: 2021-07-28
This affects all versions of package curly-bracket-parser. When used as a template library, it does not properly sanitize the user input.
CVE-2021-23417
PUBLISHED: 2021-07-28
All versions of package deepmergefn are vulnerable to Prototype Pollution via deepMerge function.
CVE-2021-23415
PUBLISHED: 2021-07-28
This affects the package elFinder.AspNet before 1.1.1. The user-controlled file name is not properly sanitized before it is used to create a file system path.
CVE-2020-4974
PUBLISHED: 2021-07-28
IBM Jazz Foundation products are vulnerable to server side request forgery (SSRF). This may allow an authenticated attacker to send unauthorized requests from the system, potentially leading to network enumeration or facilitating other attacks. IBM X-Force ID: 192434.
CVE-2020-5004
PUBLISHED: 2021-07-28
IBM Jazz Foundation products are vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 192957.