Seguridad Mania.com - España y América Latina
Portal sobre tecnologías para la seguridad física
- Destacamos »
- software Anti Blanqueo
PR Newswire
MORRISVILLE, N.C., July 28, 2022
MORRISVILLE, N.C., July 28, 2022 /PRNewswire/ -- JupiterOne, the industry's leading provider of cyber asset attack surface management (CAASM) technology, today announced that it was named as a Sample Vendor for Gartner Hype Cycle for Workload and Network Security 2022.
According to Gartner, "the Hype Cycle reflects the fact that organizations must deliver effective security measures in any location (for instance, with the new hybrid mesh firewall platform category that provides network security regardless of the network's location) as well as an increasing trend toward converged platforms."
The Gartner report notes that "today's cloud breaches are overwhelmingly likely to be caused by customer misconfiguration, not cloud provider weakness, and the automation can offset the complexity and dynamism of cloud environments." One solution category that addresses these challenges is the cyber asset attack surface management (CAASM) space. The report explains that "CAASM aggregates assets from other products that collect a subset of assets, such as endpoints, servers, devices and applications. By consolidating internal and external cyberassets, users can make queries to find gaps in coverage for security tools such as vulnerability assessment and endpoint detection and response (EDR) tools." JupiterOne pioneered a graph-based approach to CAASM that allows customers to track and monitor IP addresses and analyze and map all intra-asset relationships.
As the Gartner analysts explained, "CAASM enables security teams to improve basic security hygiene by ensuring security controls, security posture, and asset exposure are understood and remediated. Organizations that deploy CAASM reduce dependencies on homegrown systems and manual collection processes, and remediate gaps either manually or via automated workflows. Organizations can visualize security tool coverage, support attack surface management (ASM) processes, and correct systems of record that may have stale or missing data."
The drivers of CAASM adoption according to Gartner include:
JupiterOne is also recognized as a Sample Vendor for CAASM in the newly released Gartner Hype Cycle for Security Operations, 2022.
The Gartner recent report on Top Trends in Cybersecurity 2022 cited "Attack Surface Expansion" as one of the year's top security trends resulting from the expanding digital footprint of modern organizations. The increase in the attack surface is driven by "changes in the use of digital systems, such as new hybrid work, accelerated use of public cloud, more tightly interconnected supply chains, expansion of public-facing digital assets and increased use of operational technology." In our opinion, security leaders who reinvent the cybersecurity function and technology architecture can better position their organizations to maintain and grow value in an increasingly agile, distributed, and decentralized environment.
In signs of its growing business momentum, JupiterOne experienced exponential growth in annual recurring revenue (ARR), customer base, and the number of employees over the last year. The company plans to maintain and exceed historical revenue growth, drive employee growth at its headquarters in the RDU Triangle region and actively support a remote-first work environment. JupiterOne also recently secured a $70 million Series C funding round, bringing the company's total raised to more than $119 million and its estimated valuation to over $1 billion.
Quotes
Erkang Zheng, Founder and CEO at JupiterOne
"Businesses are being forced to adapt quickly as work norms change. In my experience as a CISO, the first step to successfully defending against malicious actors is understanding what assets and asset relationships exist in an organization's environment that must be protected. This valuable security context from our data knowledge platform helps our customers focus their security initiatives on what matters most."
Related Links
Follow
Gartner Disclaimer
Gartner does not endorse any vendor, product, or service depicted in its research publications and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.
Gartner and Hype Cycle are registered trademarks of Gartner, Inc. and/or its affiliates in the U.S. and internationally and is used herein with permission. All rights reserved.
JupiterOne is a cyber asset attack surface management (CAASM) platform company providing visibility and security into your entire cyber asset universe. Using graphs and relationships, JupiterOne provides a contextual knowledge base for an organization's cyber asset operations. With JupiterOne, teams can discover, monitor, understand, and act on changes in their digital environments. Cloud resources, ephemeral devices, identities, access rights, code, pull requests, and much more are collected, graphed, and monitored automatically by JupiterOne.
Contact:
Nathaniel Hawthorne for JupiterOne
Lumina Communications
(661) 965-0407
JupiterOne@LuminaPR.com
Melissa Pereira
JupiterOne
(408) 656-4071
melissa.pereira@jupiterone.com
View original content to download multimedia:https://www.prnewswire.com/news-releases/jupiterone-recognized-as-a-sample-vendor-in-gartner-hype-cycle-for-workload-and-network-security-301595172.html
SOURCE JupiterOne
Publicamos interesante Informe de más de 48 págs y varios videos demostrativos sobre los posibles ataques a los robots de montaje de las fábricas. ... Leer más ►
Publicado el 22-Jun-2017 • 10.48hs
Publicado el 20-Jun-2017 • 20.22hs
Dirigido tanto a los principiantes, como a los expertos en seguridad informática y sistemas de control industrial (ICS), este libro ayudará a los lectores a comprender mejor la protección de normas de control interno de las amenazas electrónicas. ... Leer más ►
Publicado el 3-Ene-2012 • 20.16hs
Publicado el 25-Set-2009 • 01.26hs
Publicado el 17-Dic-2008 • 08.32hs