CORPORATE NEWS: Privacy Bureaux today announced a strategic expansion of its enterprise protection suite aimed at protecting the middle market by including core components of Comodo’s active cybersecurity breach protection technology.

The addition of Comodo’s Privacy and Cybersecurity Solutions provides breakthrough protection for Privacy Bureaux’s mid-market and SMB customers, who receive cybersecurity solutions that are simple, secure and affordable.

Many companies looking to choose endpoint cybersecurity protection face a daunting process with a myriad of products to choose from, all with the same or very similar features. Although they may use different terminologies, they are basically all based on the same basic concept of detecting malware or detecting malicious activity after a breach.

“Unfortunately, in today’s regulated environment, that’s just not enough. By the time a company detects an intruder, some data may have been stolen. Detection is no longer the best solution,” said Ronnie Rajendra, Member of the Privacy Offices Advisory Board.

In Australia alone, approximately $5 billion was spent on cybersecurity-related products in 2021. Globally in 2022, an estimated $170 billion will be spent on security products, but breaches continue to be reported daily. Companies need to stop spending more money on the problem to understand the root cause and prevent breaches from happening.

“At Privacy Bureaux, we have recognized that a very simple process is needed to prevent hackers from infecting endpoints – if you prevent all unknown malicious files from writing to disk, the COM interface or the registry, you stop the breach before it happens,” Rajendra says.

“No breach equals no damage. The challenge is that this process also halts productivity, disrupts users, and creates chaos for internal IT teams. It was not sustainable.”

Privacy Bureaux’s partnership with Comodo allows the organization to prevent all unknown files from being written to disk, the COM interface and the registry by isolating these writes in a secure virtual environment (patented).

The combined technology is able to analyze an unknown file in real time to determine whether it is safe or malicious, while the user continues to interact with the application normally, without impacting productivity or risking infection.

All writes are contained within a single secure virtual environment, so the machine is fully protected while the rest of the entire network is protected. No hackers. No malware. No ransomware.

“After extensive market evaluation and aggressive security testing, we are ready to include Comodo’s breakthrough technology in our Enterprise Protection Suite,” said Rajendra.

He added: “Privacy Bureaux is dedicated to providing simple, secure and affordable solutions to medium and midsize businesses and we are unique in that we work at the intersection of privacy, security and data governance. to protect our customers’ reputations and maintain their customers’ trust.”

The pandemic has forced employees to work from home, resulting in a huge amount of sensitive data residing on remote endpoints, which are the easiest breach point for hackers. For Privacy Bureau customers, the endpoint is the new perimeter and if the organization can tighten endpoint security, that removes a major pain point. Enterprise Protection Suite was specifically designed for this.

Privacy Bureaux publishes a weekly figure of the infection rate of its customers, and since October 5, 2020, this has been zero.

“While you can never guarantee that in the future you will never be breached, a past track record is a strong indicator of future performance. Does any other cybersecurity vendor publish their infection rate – we couldn’t find any,” said Greg WymanVice President of Australia and New Zealand at Comodo.

Ronnie Rajendra concluded: “The challenge for most service providers and organizations is that there is no ‘one size fits all’ solution. At Privacy Bureaux, we take a holistic, pragmatic and methodical approach to help ensure maximum security and compliance with minimum disruption to business processes at an affordable cost.

Previous

5 Common Cybersecurity Mistakes Startups Should Avoid

Next

A one-of-a-kind public service audio stream for urgent threat advisories.

Check Also