CIO Influence
CIO Influence News Networking Security

Eclypsium Enhances Platform to Extend Deep Visibility and Security to Network and Unmanaged Devices

Eclypsium Enhances Platform to Extend Deep Visibility and Security to Network and Unmanaged Devices

Eclypsium announced a major new extension to their enterprise device integrity platform, which lets organizations easily extend visibility and security beyond their traditional endpoints to now include network and unmanaged devices that can impact overall security posture. These include traditional network gear like switches, routers, VPNs, application delivery controllers, and network-attached storage devices, as well as personal and unmanaged devices on the same network. This enhancement is now available to beta customers to help them secure their ever-expanding attack surfaces.

Recommendedย ITechย News: Sectigo PKI Risk Assessment Tool Identifies Application Development, Cloud Key Management, and Networked Devices

โ€œExtending Visibility and Security to Network and Unmanaged Devices.โ€

While this level of visibility has been difficult, at best, to achieve in the recent past, Eclypsium has introduced a unique distributed approach to device discovery and risk analysis with this release. By leveraging the presence of the Eclypsium platform in the enterprise, the solution grants truly agentless visibility into all corners of the network, including identifying previously unseen risks when device users are working remote or traveling. With this expanded visibility and insight, organizations achieve faster risk prioritization, rapidly mitigate threats, and discover known risks and potential threats across their entire IT infrastructure.

Recommendedย ITechย News: 7SIGNAL Expands Digital Experience Monitoring Market Reach, Adds Distributor in Southern Europe

Modern organizations are no longer defined simply by corporate laptops and servers but must navigate an ever-evolving landscape of networking equipment, unmanaged devices, and devices in remote work environments – many of which canโ€™t be managed using traditional security tools. This unmanaged attack surface is being actively targeted. A recent Microsoft study found thatย 83% of businessesย experienced a firmware attack in the past year. A highย number of attacksย on firmware include those targeting VPN gateways and networking infrastructure devices.

The recentย Executive Order on Improving the Nationโ€™s Cybersecurityย makes it clear thereโ€™s little distinction, in terms of the required level of assurance, between computing devices and network devices: โ€œ… software that performs functions critical to trust (such as affording or requiring elevated system privileges or direct access to networking and computing resources) โ€” is a particular concern.โ€

As the EO makes clear, protection of software extends beyond the โ€œcompute and processing functionsโ€ of endpoints that run the code to the dense patchwork of networks and network devices that support it. Eclypsiumโ€™s enhanced offering addresses this problem by viewing network and unmanaged devices as important peers to endpoints and compute devices, which together paint a complete and previously unavailable picture of organizational risk.

Recommendedย ITechย News: DISH Wireless Selects Oracle for 5G Core Service-Based Architecture

โ€œA holistic understanding of an enterpriseโ€™s security posture starts with a single view that spans endpoints and networks and includes both managed and unmanaged devices,โ€ said Yuriy Bulygin, CEO and Co-Founder of Eclypsium. โ€œWith our enhanced discovery and analysis capabilities, Eclypsium now offers security, and IT teams a comprehensive view and inventory of all the devices in their environment, along with a rapid assessment of the risks posed by those devices. This dramatically shifts the purview of security teams, enabling them to prioritize activities based on a much more complete picture of the overall risk to their environment.โ€

The latest release of Eclypsiumโ€™s enterprise platform for device integrity brings network and unmanaged devices into its sphere of protection with new capabilities that include:

  1. Distributed discovery of network and unmanaged devices by Eclypsium-managed endpoints removes the blind spots represented by connected but unchecked devices.
  2. Automatic risk analysis of network infrastructure devices down to the firmware layer: switches, routers, and VPN gateways are assessed to identify critical vulnerabilities exploited in the wild.
  3. Authenticated firmware integrity analysis of supported network devices assures that firmware has not been compromised.
  4. Comprehensive dashboard of endpoints, servers, and unmanaged enterprise devices: see the entire estate and associated risks.
  5. Automatically differentiate between corporate and external networks.
  6. Converged view of overall risk: combine endpoint risk posture with the additional risk from connected devices, so security analysts understand the sum of combined endpoint + connected device risks.

With these enhancements, Eclypsiumโ€™s enterprise platform now addresses deep device integrity for โ€œthe other halfโ€ of the estate: not only firmware- and hardware-level insight for endpoints, but into the threats and risks of critical network devices as well.

Recommendedย ITechย News: Synopsys Extends Verification Hardware Market Leadership with Breakthrough Emulation Performance

Related posts

Lone Wolf Introduces Real-Time Buyer Tours to Cloud CMA

PR Newswire

Vodafone and Ericsson Help Irish Rugby Team Implement 5G Technology

Cision PRWeb

TD SYNNEX Launches Channel Leading Independent Software Vendor Experience