<?xml version="1.0" encoding="UTF-8" ?><!-- generator=Zoho Sites --><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><atom:link href="https://www.cloud9advisers.com/News/tag/endpoint-protection/feed" rel="self" type="application/rss+xml"/><title>Cloud 9 Advisers - News #endpoint protection</title><description>Cloud 9 Advisers - News #endpoint protection</description><link>https://www.cloud9advisers.com/News/tag/endpoint-protection</link><lastBuildDate>Wed, 25 Feb 2026 18:45:30 -0800</lastBuildDate><generator>http://zoho.com/sites/</generator><item><title><![CDATA[Always-On Endpoint Management]]></title><link>https://www.cloud9advisers.com/News/post/always-on-endpoint-management</link><description><![CDATA[In a world where employees are increasingly working from anywhere and on any device, it's more important than ever to have a solution in place that can manage and protect all endpoints at all times.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_ySVH76efQ62VB_veNkwGVg" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_dX0DToqGSlGiEMcXZkj3UA" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_l_YWXfYJTp-sZL1YyjsiGA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_Dr6nyHGHQuW-MT-OFu01Pg" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_Dr6nyHGHQuW-MT-OFu01Pg"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true"><div style="color:inherit;"><div>Always-on endpoint management is a must-have</div></div></h2></div>
<div data-element-id="elm_Rz8W-V3rGYLpyLYll5lOAA" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_Rz8W-V3rGYLpyLYll5lOAA"].zprow{ border-radius:1px; } </style><div data-element-id="elm_LdAUsiXlVWQjCA1wfGIbfA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-8 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_LdAUsiXlVWQjCA1wfGIbfA"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_wzK-_ZLqwDaqF0KJDqxN6Q" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_wzK-_ZLqwDaqF0KJDqxN6Q"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div><span style="font-size:16px;color:inherit;">Always-on endpoint management is a must-have for enterprises today.</span><br></div><div><br></div><div><p style="margin-bottom:24px;font-size:16px;">In a world where employees are increasingly working from anywhere and on any device, it's more important than ever to have a solution in place that can manage and protect all endpoints at all times.</p><p style="margin-bottom:24px;font-size:16px;">Here are just a few of the benefits of always-on endpoint management:</p><ul><li style="margin-bottom:10px;"><span style="font-weight:bold;">Improved security</span>:&nbsp;Always-on endpoint management can help to protect your organization from cyber threats by providing real-time visibility and control over all endpoints.</li><li style="margin-bottom:10px;"><span style="font-weight:bold;">Reduced downtime</span>:&nbsp;By proactively monitoring and managing endpoints, always-on endpoint management can help to reduce downtime and keep your employees productive.</li><li style="margin-bottom:10px;"><span style="font-weight:bold;">Increased compliance</span>:&nbsp;Always-on endpoint management can help you to comply with industry regulations by ensuring that all endpoints are configured and patched correctly.</li></ul><p style="margin-bottom:24px;font-size:16px;"><span style="color:inherit;">If you're not already using an always-on endpoint management solution, here are a few things to consider when choosing one:</span><br></p><ul><li style="margin-bottom:10px;"><span style="font-weight:bold;">Comprehensive endpoint visibility</span>:&nbsp;Make sure that the solution you choose provides comprehensive visibility into all endpoints, including laptops, desktops, mobile devices, and IoT devices.</li><li style="margin-bottom:10px;"><span style="font-weight:bold;">Real-time monitoring and control</span>:&nbsp;The solution should also be able to monitor and control endpoints in real time, so that you can quickly respond to threats and incidents.</li><li style="margin-bottom:10px;"><span style="font-weight:bold;">Security automation</span>:&nbsp;The solution should be able to automate many common security tasks, such as patch management and vulnerability scanning.</li><li style="margin-bottom:10px;"><span style="font-weight:bold;">Compliance reporting</span>:&nbsp;The solution should also be able to generate reports that can help you to comply with industry regulations.</li></ul></div><div><div style="color:inherit;"><br><div><div><span style="font-size:16px;">Read more from our friends at Spiceworks:&nbsp;<a href="https://www.spiceworks.com/it-security/endpoint-security/guest-article/why-enterprise-needs-always-on-endpoint-management/">https://www.spiceworks.com/it-security/endpoint-security/guest-article/why-enterprise-needs-always-on-endpoint-management/</a></span></div><br><div><br></div><br></div></div></div></div></div>
</div></div><div data-element-id="elm_JWf4ErFCYxwBGPzOhVpnTw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg zpsticky-enabled"><style type="text/css"> [data-element-id="elm_JWf4ErFCYxwBGPzOhVpnTw"].zpelem-col{ border-radius:1px; } @media (min-width:992px) { [data-element-id="elm_JWf4ErFCYxwBGPzOhVpnTw"].zpelem-col{ top:0px;z-index:1; } } </style><div data-element-id="elm_F1PH6uHK7-vh0RToDenqjg" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_F1PH6uHK7-vh0RToDenqjg"] .zpimage-container figure img { width: 333px !important ; height: 151px !important ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_F1PH6uHK7-vh0RToDenqjg"] .zpimage-container figure img { width:333px ; height:151px ; } } @media (max-width: 767px) { [data-element-id="elm_F1PH6uHK7-vh0RToDenqjg"] .zpimage-container figure img { width:333px ; height:151px ; } } [data-element-id="elm_F1PH6uHK7-vh0RToDenqjg"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20images/EPSec.jpg" width="333" height="151" loading="lazy" size="original" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_bCZ-B98r91F6sf7v4mnIiA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_bCZ-B98r91F6sf7v4mnIiA"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true">Cyber Readiness</h2></div>
<div data-element-id="elm_IGwDPez9rt7JL7nAnHk5tg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_IGwDPez9rt7JL7nAnHk5tg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p>Click the button below to schedule your appointment and learn more about our Cybersecurity Readiness Report - custom tailored recommendations and roadmap for your business and your needs</p></div>
</div><div data-element-id="elm_pOCBkhdUWC-I6CusHlFDkA" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_pOCBkhdUWC-I6CusHlFDkA"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-roundcorner " href="https://appts.cloud9advisers.com/#/customer/cybersurvey" target="_blank"><span class="zpbutton-content">Book now</span></a></div>
</div></div></div><div data-element-id="elm_FFcgyMHOpEcdMrLTmUQ3Tw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_FFcgyMHOpEcdMrLTmUQ3Tw"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true">Technology Sourcing</h2></div>
<div data-element-id="elm_NbNpljBLQ6CwgJVj0sb0ZA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_NbNpljBLQ6CwgJVj0sb0ZA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="font-size:11pt;">Cybersecurity can be complex, but getting the right strategy and solutions in place doesn’t have to be.&nbsp; Cloud 9 Advisers&nbsp;</span><span style="font-size:11pt;">will provide you clarity so you can make quick and confident IT buying decisions.&nbsp;</span><span style="font-size:11pt;">We help decision-makers make smart IT investments.&nbsp;</span></p></div>
</div><div data-element-id="elm_igc090WjSkS6FsDE8rs8Sg" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_igc090WjSkS6FsDE8rs8Sg"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none " href="/cyber-threats"><span class="zpbutton-content">Get Started Now</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Tue, 14 Nov 2023 13:06:11 -0500</pubDate></item><item><title><![CDATA[EDR, XDR, and MDR]]></title><link>https://www.cloud9advisers.com/News/post/edr-xdr-and-mdr</link><description><![CDATA[Back in the old days the name of the cybersecurity game was prevention - if you had a strong perimeter, then you're good! That thought process has shifted rather dramatically, because we know they'll get it regardless.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_xi8EiLn9TIW0uATsv_GPPg" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_s-rvUTpkR62m2FRCBDHQTg" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_tDT5eudNTdWvm6byINTgDA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"> [data-element-id="elm_tDT5eudNTdWvm6byINTgDA"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_jWrAiBL2Seuoz3VziRLVsQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_jWrAiBL2Seuoz3VziRLVsQ"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><div>EDR, XDR, and MDR: What are they and why are they important?</div></div></div></h2></div>
<div data-element-id="elm_13Kq9Tyg8H0jV4QIZucjwg" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_13Kq9Tyg8H0jV4QIZucjwg"].zprow{ border-radius:1px; } </style><div data-element-id="elm_DjM1Njwb2lljQkqTcgryuw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-8 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_DjM1Njwb2lljQkqTcgryuw"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_kOSll6w1qazWgnXNw_s9Xw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_kOSll6w1qazWgnXNw_s9Xw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><p style="margin-bottom:24px;font-size:16px;">As one piece to a larger cybersecurity puzzle (strategy, plan, and ultimately, framework), EDR, XDR, and MDR are all cybersecurity <span style="font-style:italic;">solutions</span> that help organizations detect and respond to threats. However, they have different features and capabilities.</p><div style="color:inherit;"><p style="margin-bottom:24px;font-size:16px;"><span style="font-weight:bold;">Importance of EDR, XDR, and MDR</span></p><p style="margin-bottom:24px;font-size:16px;">EDR, XDR, and MDR are all important cybersecurity solutions, but the best solution for an organization will depend on its specific needs and budget.</p><p style="margin-bottom:24px;font-size:16px;">Organizations with limited resources may want to consider EDR. EDR solutions can be effective at detecting and responding to threats, and they are typically more affordable than XDR and MDR solutions.</p><p style="margin-bottom:24px;font-size:16px;">Organizations with more complex needs may want to consider XDR or MDR. XDR solutions can provide a more complete view of threats and can automate threat detection and response. MDR solutions can provide organizations with 24/7 monitoring and threat response, which can be helpful for organizations with limited security resources.</p><div><div><span style="font-weight:bold;">What are they?</span></div>
</div><div><span style="font-weight:bold;"><br></span></div></div><p style="margin-bottom:24px;font-size:16px;"><span style="font-weight:bold;">EDR</span> (Endpoint Detection and Response) is a software solution that collects and analyzes endpoint data to detect and respond to threats. EDR solutions typically collect data from endpoints such as Windows Event Logs, Sysmon logs, and file system changes. They use this data to identify suspicious activity, such as malware infections, unauthorized access, and data exfiltration. EDR solutions can also be used to block threats and remediate incidents.</p><p style="margin-bottom:24px;font-size:16px;"><span style="font-weight:bold;">XDR</span> (Extended Detection and Response) is a more comprehensive approach to EDR that collects data from a wider range of sources, including endpoints, networks, cloud, and user behavior. This allows XDR solutions to provide a more complete view of threats and to respond more effectively. XDR solutions typically integrate with other security tools, such as SIEM (Security Information and Event Management) and SOAR (Security Orchestration, Automation, and Response), to automate threat detection and response.</p><p style="margin-bottom:24px;font-size:16px;"><span style="font-weight:bold;">MDR</span> (Managed Detection and Response) is a service that provides organizations with 24/7 monitoring and threat response for their endpoints. MDR providers typically use EDR or XDR solutions to collect and analyze endpoint data. They then use this data to identify and respond to threats on behalf of their customers. MDR providers can also provide additional services, such as threat hunting, incident response, and compliance reporting.</p><p style="margin-bottom:24px;font-size:16px;">In summary, the key differences between EDR, XDR, and MDR are:</p><ul><li style="margin-bottom:10px;">Scope:&nbsp;EDR focuses on endpoints, while XDR collects data from a wider range of sources. MDR is a service that provides 24/7 monitoring and threat response for endpoints and other key components of the network.</li><li style="margin-bottom:10px;">Capabilities:&nbsp;EDR can detect and respond to threats, but XDR has more comprehensive capabilities, such as threat hunting and incident response. MDR providers can also provide additional services, such as threat hunting and compliance reporting.</li><li style="margin-bottom:10px;">Pricing:&nbsp;EDR solutions are typically priced per endpoint, while XDR and MDR solutions are typically priced per organization.</li></ul><p style="margin-bottom:24px;font-size:16px;">The best solution for an organization will depend on its specific needs and budget. Organizations with limited resources may want to consider EDR. Organizations with more complex needs may want to consider XDR or MDR.</p><p style="margin-bottom:24px;font-size:16px;">Here is a table that summarizes the key differences between EDR, XDR, and MDR</p></div>
</div></div><div data-element-id="elm_gyRIFGoh65EFx0q6svaIVQ" data-element-type="table" class="zpelement zpelem-table "><style type="text/css"> [data-element-id="elm_gyRIFGoh65EFx0q6svaIVQ"].zpelem-table{ border-radius:1px; } [data-element-id="elm_gyRIFGoh65EFx0q6svaIVQ"] .zptable{ width:100% !important; } </style><div class="zptable zptable-align-left zptable-header- zptable-header-none zptable-cell-outline-on zptable-outline-on zptable-style- " data-width="100" data-editor="true"><table style="width:100%;"><tbody><tr><td style="width:25%;" class="zp-selected-cell"><span style="font-weight:bold;"><span style="color:inherit;"><span style="font-size:14px;">Feature</span></span> </span></td><td style="width:25%;"><span style="font-weight:bold;">EDR</span></td><td style="width:25%;"><span style="font-weight:bold;">XDR</span></td><td style="width:25%;"><span style="font-weight:bold;">MDR</span></td></tr><tr><td style="width:25%;"><span style="color:inherit;"><span style="font-size:14px;">Scope</span></span><br></td><td style="width:25%;"><span style="color:inherit;"><span style="font-size:14px;">Endpoints</span></span><br></td><td style="width:25%;"> Endpoints, networks, cloud, user behavior</td><td style="width:25%;"><span style="color:inherit;"><span style="font-size:14px;">Endpoints</span></span><br></td></tr><tr><td style="width:25%;"><span style="color:inherit;"><span style="font-size:14px;">Capabilities</span></span><br></td><td style="width:25%;"><span style="color:inherit;">Detect and respond to threats</span><br></td><td style="width:25%;"><span style="color:inherit;">Detect, respond, and hunt for threats</span><br></td><td style="width:25%;"><div style="color:inherit;"><div>Detect, respond, hunt for threats, and provide 24/7 monitoring</div><br><div><br></div></div></td></tr><tr><td style="width:25%;"><span style="color:inherit;"><span style="font-size:14px;">Pricing</span></span><br></td><td style="width:25%;"><span style="color:inherit;">Per endpoint</span><br></td><td style="width:25%;"><span style="color:inherit;">Per organization</span><br></td><td style="width:25%;"><span style="color:inherit;">Per organization</span><br></td></tr></tbody></table></div>
</div><div data-element-id="elm_2pLXKWWkKP0xFH9UhNZ6oQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_2pLXKWWkKP0xFH9UhNZ6oQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div><div><span style="font-weight:bold;">Why should&nbsp;<span style="font-style:italic;">every</span> company have either one, two, or all three solutions in place?</span></div>
</div><div><br></div><div><div> No matter what size or industry, every company should have well-thought-out cybersecurity solutions in place to protect against threats. Back in &quot;the old days&quot; the name of the cybersecurity game was prevention (only) - if you had a strong perimeter, then you're good! That thought process has shifted rather dramatically, because we know they'll get it&nbsp;regardless. Today, to protect yourself, you must first be able to <span style="font-style:italic;">detect</span>&nbsp;those threats first in order to respond. EDR, XDR, and MDR can all help companies to detect and respond to threats effectively.&nbsp; </div>
</div><div><br></div><div><div> EDR is a great foundation for any cybersecurity strategy. Many will argue that EDR should be the <span style="font-style:italic;">first</span>&nbsp;step. It can help to detect and respond to threats on endpoints, which are often the first target of attackers - especially considering so many remote/hybrid staff with access to company data.&nbsp; </div>
</div><div><br></div><div> XDR can provide a more complete view of threats and can automate threat detection and response. This can be helpful for companies with complex IT environments. </div>
<div><br></div><div> MDR can provide companies with 24/7 monitoring and threat response, which can be helpful for companies with limited security resources. </div>
<div><br></div><div> A typical company should have one, two, or all three of these solutions in place depending on its specific needs and budget. For example, a small company with limited resources may only need EDR. A large company with a complex IT environment may want to have all three solutions in place. </div>
</div></div></div><div data-element-id="elm_zp13fDFmZGlc7cBg8d7IqQ" data-element-type="table" class="zpelement zpelem-table "><style type="text/css"> [data-element-id="elm_zp13fDFmZGlc7cBg8d7IqQ"].zpelem-table{ border-radius:1px; } [data-element-id="elm_zp13fDFmZGlc7cBg8d7IqQ"] .zptable{ width:100% !important; } </style><div class="zptable zptable-align-left zptable-header- zptable-header-none zptable-cell-outline-on zptable-outline-on zptable-style- " data-width="100" data-editor="true"><table style="width:100%;"><tbody><tr><td style="width:50%;"><span style="color:inherit;">Company type</span> </td><td style="width:50%;"><div style="color:inherit;"><div>Best solution</div></div></td></tr><tr><td style="width:50%;"><span style="color:inherit;">Small company with limited resources</span><br></td><td style="width:50%;">EDR</td></tr><tr><td style="width:50%;"><span style="color:inherit;">Medium-sized company with moderate resources</span><br></td><td style="width:50%;">EDR and/or XDR</td></tr><tr><td style="width:50%;"><span style="color:inherit;">Large company with complex IT environment</span><br></td><td style="width:50%;" class="zp-selected-cell">EDR + XDR and/or MDR</td></tr></tbody></table></div>
</div><div data-element-id="elm_2-QsG4go9CYs7RMcMBfA8Q" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_2-QsG4go9CYs7RMcMBfA8Q"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div>It is important to note that this is just a general guide. The best way to determine which solution is right for your company is to consult with a vendor-neutral, unbiased cybersecurity expert.</div><br><div><span style="font-style:italic;font-weight:bold;">Remember: if your company can only afford one cybersecurity solution, make it EDR</span></div></div><div style="color:inherit;"><div style="width:948px;"><div><div></div></div></div><div style="width:948px;"></div></div></div>
</div></div><div data-element-id="elm_fHtwhbUv4Ei7bJ7CZgJNYg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg zpsticky-enabled"><style type="text/css"> [data-element-id="elm_fHtwhbUv4Ei7bJ7CZgJNYg"].zpelem-col{ border-radius:1px; } @media (min-width:992px) { [data-element-id="elm_fHtwhbUv4Ei7bJ7CZgJNYg"].zpelem-col{ top:0px;z-index:1; } } </style><div data-element-id="elm_HeVyzUP7UgPW-pafKN8J3g" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_HeVyzUP7UgPW-pafKN8J3g"] .zpimage-container figure img { width: 350px ; height: 254.92px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_HeVyzUP7UgPW-pafKN8J3g"] .zpimage-container figure img { width:723px ; height:526.59px ; } } @media (max-width: 767px) { [data-element-id="elm_HeVyzUP7UgPW-pafKN8J3g"] .zpimage-container figure img { width:415px ; height:302.26px ; } } [data-element-id="elm_HeVyzUP7UgPW-pafKN8J3g"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/images/TPS-Report-Meme.jpg" width="415" height="302.26" loading="lazy" size="fit" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_Uj2bEWxJE05ghFSbibOy1g" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_Uj2bEWxJE05ghFSbibOy1g"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:rgb(48, 4, 234);">Readiness Report</span></h2></div>
<div data-element-id="elm_azldy0VBAu7gRgLjB6TkDw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_azldy0VBAu7gRgLjB6TkDw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div><p><span style="color:rgb(48, 4, 234);">Schedule a security interview with one of our experts, then in a few days, we'll generate a custom, 50 to 100 page Cybersecurity Readiness Report you can use&nbsp; as a playbook for your security strategy.&nbsp;<br></span></p><p><span style="color:rgb(48, 4, 234);"><br></span></p><p><span style="color:rgb(48, 4, 234);">You can even use the report as ammunition for your case to get your security budget passed.&nbsp;</span></p></div></div>
</div><div data-element-id="elm_hj4rUfdaxsD5ZteiO_PN9w" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_hj4rUfdaxsD5ZteiO_PN9w"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-roundcorner " href="/aboutus" target="_blank"><span class="zpbutton-content">Book now</span></a></div>
</div></div></div><div data-element-id="elm_uPz45HKcReKZhhdLR5m6sw" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_uPz45HKcReKZhhdLR5m6sw"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-left "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-roundcorner " href="/cybersecurity" target="_blank"><span class="zpbutton-content">Security Experts</span></a></div>
</div><div data-element-id="elm_4a5p1d_2uL6Vbm39-egz8Q" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_4a5p1d_2uL6Vbm39-egz8Q"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true">About Cloud 9</h2></div>
<div data-element-id="elm_jcH2LiwKlaBzMqIn95Yayg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_jcH2LiwKlaBzMqIn95Yayg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;">Cloud 9 Advisers, LLC was formed as a client-facing, </span>business<span style="color:inherit;">-to-</span>business<span style="color:inherit;">&nbsp;agency/firm in 2017 with the goal of forever changing the way businesses buy AI, cybersecurity, contact center, and other important IT-related services and solutions: faster, better, less formal, and with the high-quality due diligence and integrity that all companies expect.&nbsp;</span><br></p><p><span style="color:inherit;"><br></span></p><p><span style="color:inherit;font-weight:bold;">Technology Sourcing Experts</span></p></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Tue, 17 Oct 2023 17:49:19 -0500</pubDate></item><item><title><![CDATA[Supplier Spotlight: Vigilant Technology Solutions]]></title><link>https://www.cloud9advisers.com/News/post/supplier-spotlight-vigilant5</link><description><![CDATA[Contact Cloud 9 to learn how Vigilant helps avoid catastrophe by giving you full network visibility to see threats 98-days sooner than the industry average!]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_S2bu05bgTouOYfLEkFqhVw" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_14CUUbX4QtitSFNVn4n8rg" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_MZTvZw0ZR_aD0KJjDyhIEg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_-ihGIFdVTHaiXv3Ug0k6PA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_-ihGIFdVTHaiXv3Ug0k6PA"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true"><span style="color:inherit;">Malware Found on Patient Medical Monitoring Devices</span></h2></div>
<div data-element-id="elm_pN8_GphHuFecAjxakhSuIw" data-element-type="image" class="zpelement zpelem-image "><style> [data-element-id="elm_pN8_GphHuFecAjxakhSuIw"].zpelem-image { border-radius:1px; margin-block-start:37px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/images/57e8d4414a5bae14f6da8c7dda79367f103cd9ed55536c4870277bdd944fc551b1_1280.jpg" size="fit" data-lightbox="true" style="width:100%;padding:0px;margin:0px;"/></picture></span></figure></div>
</div><div data-element-id="elm_w2zTz4e4RxeE2KxioUzhVQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_w2zTz4e4RxeE2KxioUzhVQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><p><span style="font-size:12px;">by: Vigilant Technologies and David Dickmeyer</span></p></div>
</div><div data-element-id="elm_DvWKLft1bV3hKLY1UpBgJA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_DvWKLft1bV3hKLY1UpBgJA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p>Cloud 9 Supplier Spotlight:&nbsp; <a href="https://vigilantnow.com/" title="Vigilant&nbsp;Technology Solutions" target="_blank">Vigilant</a><a href="https://vigilantnow.com/" title="Vigilant&nbsp;Technology Solutions" target="_blank">&nbsp;Technology Solutions</a></p></div>
</div><div data-element-id="elm_ry0gTuWgn_MDxHSnnBrnAA" data-element-type="image" class="zpelement zpelem-image "><style> [data-element-id="elm_ry0gTuWgn_MDxHSnnBrnAA"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-center zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Supplier%20Logos/Sec%20Vigilant1.jfif" size="original" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_F1h_Qvhu8QbTIJlF-JbtnQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_F1h_Qvhu8QbTIJlF-JbtnQ"].zpelem-text { border-radius:1px; margin-block-start:52px; } </style><div class="zptext zptext-align-center " data-editor="true"><p><span style="color:inherit;font-weight:bold;">Vigilant helps you avoid catastrophe by giving you full network visibility to see threats 98-days sooner than the industry average!&nbsp;</span><br></p></div>
</div><div data-element-id="elm_CIjwIvnHZ8ytl1QlF5gICw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_CIjwIvnHZ8ytl1QlF5gICw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div>Why, does it seem that companies are falling victim to hackers left and right? To add insult to injury, these are not ordinary companies we are talking about. They are companies ranging from Fortune 500s and major retailers to banking institutions, all with very large security budgets intended to maintain the security of their customer’s data. These incidents lead organizations to ask themselves three important questions</div><div><ol><ol><ol><li>If all of these companies are compliant with industry regulations, how is it they are still so successfully attacked?</li><li>With security budgets of giant companies in the millions, how will I ever be able to afford protecting myself?</li><li>If Firewalls, logging, and AV are getting better all the time, how do these attacks go undetected?</li></ol></ol></ol></div><p><br></p><p>CyberDNA is a managed network security monitoring service from Vigilant LLC. and successfully reduces the overall cyber risk to an organization by proactively monitoring the customer’s network for signs of anomalous activity that could be indicative of an active compromise, misconfigurations, or other notable security risks. To allow customers to see the added value of CyberDNA over and above industry leaders, Vigilant offers a proof-of-value, free trial period, which produces a detailed threat report of our findings. This written report contains the findings from that free trial and highlights the value of having a fully managed continuous network security monitoring service.</p><p><span style="color:inherit;"><br></span></p><div><span style="font-weight:bold;">Why your Network Loves Ebola</span></div><p>The headline might seem a bit dramatic, but there really is a correlation between diseases, how (and when) they are treated, and how your network and company data are protected – specifically, how antivirus works.<br></p><p><br></p><div>Modern medicine is amazing. It seems like every other week another news story comes out about some major breakthrough, some miracle treatment for a disease once thought to be incurable. It has become so commonplace, in fact, that we often find ourselves scratching our heads, impatiently wondering why all disease can’t simply be cured.&nbsp;</div><div><br></div><div>We’ve become so accustomed to miraculous breakthroughs that it takes something extraordinary – a disease of incomparable fear - to make us take notice. In the 1940s and 50s, it was Polio. In the 1980s, it was HIV and AIDS. Today’s scariest threat is Ebola.</div><div><br></div><div><span style="color:inherit;"><div>More recently, we’ve observed the spread of Ebola throughout sub-Saharan Africa. What started as a&nbsp;<span style="color:inherit;">couple isolated cases quickly spread to dozens, dozens begat hundreds, and hundreds were quickly morphed into thousands.</span></div><br><div>But this is the where the cold, hard truth of modern medicine comes into play. While seemingly miraculous to the yet uninfected, the discovery and synthesis of treatments for some of our most troublesome and problematic medical disorders comes at the ultimate sacrifice of those unlucky enough to have been exposed before us. How many thousands died of HIV and AIDs before a cocktail of drugs was identified to control its symptoms? How many children were left stricken with Polio before Jonas Saulk synthesized his vaccine?</div><div><br></div><div>Ebola is no different. In order for people to be protected from Ebola, other people, unfortunately, need to get sick and often times die from it. It’s in this critical mass of early sufferers that treatment will be found. As more people get sick, more opportunities for study arise – more opportunities for testing treatments.</div><div><br></div><div>This phenomenon is the same with most modern-day “cyber-diseases&quot;. And the “cures”, like antivirus, next-generation firewalls, or intrusion detection and prevention solutions, all come from a method called signature-based detection. Signature-based detection at its core is the data security equivalent of antibiotics and vaccines. It is a treatment for an illness that has already infected many others – hopefully before you<span style="color:inherit;">. But, like many vaccines, it isn’t necessarily responsive. Other networks had to be infected with the disease first before any of the technologies had the ability to detect it. Therefore, widespread detection capabilities are merely reactive. They are only designed to discover <span style="font-style:italic;">known</span> threats and if it doesn’t know about them, it can’t detect them.</span></div><br><div><span style="color:inherit;"><div>Our largest challenge as defenders and cybersecurity professionals is that threats are constantly changing. Hackers are targeting companies with <span style="font-style:italic;">specific</span> tactics – tactics designed for exploiting an individual system, organization, or end user&nbsp;<span style="color:inherit;">– not just widespread threats</span><span style="color:inherit;">. It’s like a disease designed specifically to make you and only you sick. There’s no way to benefit from others prior illness. Signature based detection, which gives many network administrators a sense of security, is certainly good to have, but it’s only one layer of security – and not a terribly effective one on targeted attacks.&nbsp;</span></div></span><span style="color:inherit;"><br><div><span style="font-weight:bold;">Targeted tactics are why hackers can infiltrate and remain inside organizations undetected for up to 215 days on average and why big organizations are struggling to defend against them.</span></div><div><br></div><div>Protecting your network and data today requires multiple layers of security and the ability to identify <span style="font-style:italic;">any</span> abnormality – often the symptoms before a diagnosis. Network visibility is the essential prerequisite to effective security.</div></span></div></span></div></div>
</div><div data-element-id="elm_p8iaY-GUBL_mWR9sB0bubw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_p8iaY-GUBL_mWR9sB0bubw"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">Case Study: Malware Found on Patient Medical Monitoring Devices</span></h2></div>
<div data-element-id="elm_KdtHnziCSk4nv2EhPjyDuA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_KdtHnziCSk4nv2EhPjyDuA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div>Vigilant was engaged by a Healthcare Provider who was experiencing a sudden and extreme drop in bandwidth within their infrastructure. Their IT staff had been working on the problem for two weeks without any detection or artifacts of the problem visible in their existing IDS/IPS or logs. Something was eating up their bandwidth and bringing them to a grinding halt. Upon starting the engagement, Vigilant installed its CyberDNA sensors that would give the best ability to collect all traffic traversing the customer network.&nbsp;</div><div>CyberDNA is agentless, meaning there is no software loaded on any customer devices, which also ensures that the attacker is not aware of the monitoring device/service. This further reduces the risk of any potential attacker’s countermeasures. We strategically placed our sensors in a manner that will not alert the attacker of our presence while still allowing full visibility. The remote attacker has to travel across the network at some point on their way out to the internet. This allows for an interesting vantage point of our detection and monitoring tools as no matter how the attacker tries to conceal themselves they still have to travel on the network and are detectable by the CyberDNA sensors and the Vigilant analyst team. Vigilant’s approach gives immediate visibility and can inform a customer in real-time about what is happening in the deepest parts of their network. It’s like turning on the lights late at night to see if there is a monster in the room, although you hope there isn’t one. If there is, however, now you know and can take appropriate actions. Within minutes of turning on Vigilant’s CyberDNA service, our analysts were able to detect that multiple heart monitor devices at one of the hospital’s remote locations were running an embedded operating system infected with a botnet known as Conficker. They may never have known what was going on or that they were on heart monitors hooked up to patients however the attackers were using these devices to attack other locations on the internet and brought down the hospital’s network in the crossfire. There were two problems here, first, the Conficker worm was bringing their network down, and second, the devices were running outdated and non-compliant operating systems that were connected to patients.&nbsp;</div><div>While the Conflicker worm, sometimes referred to as Downad, was first discovered over 12 years ago in November of 2008, many recent reports show that it is still highly active and is the worm that just won’t die. At its peak Conflicker managed to infect over 9 million systems worldwide, making it one of the most prolific malware of its day.&nbsp;</div><div>When using third-party software or devices like Point-of-Sale (POS) systems in retail, medical devices in healthcare, door-entry and other “smart” sensor systems in buildings, etc. businesses are at the mercy of the vendor’s level of security--or, the weakest link in the chain. If the vendor makes a mistake it can cost you. Vigilant CyberDNA gives you visibility into these devices without needing to have additional agents installed. By doing this we can show you all software and operating systems running on your network. We keep your vendors honest about security and greatly reduce your risk and exposure.</div><div>This attack was carried out by tactics that Vigilant detects every day. Without the visibility that Vigilant brings it would have likely gone undetected in this victimized organization because their other advanced detection tools simply couldn’t see it.</div><div><span style="font-weight:bold;">Summary:</span></div><p><span style="color:inherit;"></span></p><blockquote style="margin-left:40px;"><ul><li>The patient medical devices running an embedded operating system were first infected with Conficker behind the hospital firewall and were later activated.</li><li>The effects of the infected devices caused a sharp decrease in bandwidth across the hospital's network resulting in applications being rendered unusable.</li><li>All previously installed and active IDS/IPS and detection methods available within the hospital network did not see or know about the outdated operating system nor the Conficker infection.</li><li>CyberDNA was placed, agentless, within the environment and immediately detected both the non- compliant OS and that Conficker was the source of the bandwidth draw.</li><li>Vigilant’s analyst team notified the customer of the infected systems. The customer removed the systems from the patients, cleaned them and notified the manufacturer of the vulnerability.</li></ul></blockquote></div>
</div><div data-element-id="elm_7v4f9DNiQHopemalL4o3uw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_7v4f9DNiQHopemalL4o3uw"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true">About Vigilant<br></h2></div>
<div data-element-id="elm_kTnX42qYQtKdOxlR4sCVMw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_kTnX42qYQtKdOxlR4sCVMw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div>Vigilant Technology Solutions is a cybersecurity firm based out of Cincinnati, Ohio providing security detection and prevention solutions. Vigilant is strict in it methodology of separating threat detection from threat prevention, using two tools: CyberDNA and MEP (Managed Endpoint Protection). Remarkably affordable and extremely effective, we work with businesses of all sizes in all industries. Vigilant is particularly effective with businesses in heavily regulated industries like finance and healthcare and we actively work with numerous Fortune 500 companies around the world, Vigilant has been operating since 2009, is privately held (and will remain so) with no outside investment funding.</div><p><span style="color:inherit;"><br></span></p><div><span style="color:inherit;font-weight:bold;">Vigilant helps you avoid catastrophe by giving you full network visibility to see threats 98-days sooner than the industry average.&nbsp;</span></div></div>
</div><div data-element-id="elm_LHxvoS-MQw2pdIP9r6_exA" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_LHxvoS-MQw2pdIP9r6_exA"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-oval " href="mailto:consulting@Cloud9Advisers.com?subject=I'd like to learn more about how Cloud 9 can help me" title="email us: consulting@Cloud9Advisers.com"><span class="zpbutton-content">Learn More</span></a></div>
</div><div data-element-id="elm_PomgFAGDp-Up9Fzn4OQG2w" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_PomgFAGDp-Up9Fzn4OQG2w"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p>Contact Cloud 9 Advisers to see if Vigilant and their CyberDNA (detection) or MEP (protection) security solutions are right for your business. Cloud 9 Advisers is 100% vendor-agnostic. If Vigilant is not right for you we'll help steer you to the right company and solution from over 200 service providers in our<a href="/solution-portfolio" title="Supplier Portfolio.&nbsp;">&nbsp;</a>curated Supplier Portfolio</p></div>
</div><div data-element-id="elm_jW1nOZ3tH3a4CrmhB9UyLQ" data-element-type="divider" class="zpelement zpelem-divider "><style type="text/css"> [data-element-id="elm_jW1nOZ3tH3a4CrmhB9UyLQ"].zpelem-divider{ border-radius:1px; } </style><style></style><div class="zpdivider-container zpdivider-line zpdivider-align-center zpdivider-width100 zpdivider-line-style-solid "><div class="zpdivider-common"></div>
</div></div><div data-element-id="elm_hDnQK4BBYoOgNHQUmcSNQg" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> [data-element-id="elm_hDnQK4BBYoOgNHQUmcSNQg"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="right" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimagetext-container zpimage-with-text-container zpimage-align-right zpimage-size-small zpimage-tablet-fallback-small zpimage-mobile-fallback-small hb-lightbox " data-lightbox-options="
            type:fullscreen,
            theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/files/C9-Logo1.1.150.t.png" size="small" alt="Cloud 9 Advisers" data-lightbox="true" style="width:1800px;padding:0px;margin:0px;"/></picture></span></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><blockquote style="margin:0px 0px 0px 40px;border:none;padding:0px;"><p><span style="font-size:11pt;">Every company wants to be your partner, but let’s face it, if they are selling you something, they’re not your partner, they’re just another vendor. Cloud 9 is different. We don’t actually sell anything and we don't charge our clients. We become a complementary extension of your team and help manage the often overwhelming process of finding, evaluating, and selecting the right technologies and competitive providers. Cloud 9, together with our distributors, is made up of more than two-hundred and fifty staff, all devoted to helping you save time and money. Our curated Supplier Portfolio contains nearly two-hundred of the best service provider companies. We are one of the largest buyers of technology in the country. Through us, you’ll get the collective buying power of thousands of other clients. Consider us your informed buyers, strategic partners, and technology advisers. We are impartial, unbiased, and vendor-agnostic. We sit on your side of the table to help you find, evaluate, and negotiate with service provider companies. We’ll help you design the right solution and identify the best technologies. We’ll get pricing from multiple competing companies, then guide you through the evaluation and procurement process. Use our evaluation tools for documentation and due diligence. Plus, have our entire team at your disposal before, during, and after the acquisition of your new services, for as long as you’re in business.</span></p></blockquote><p><span style="color:inherit;"><span><br></span></span></p><p style="text-align:center;"><span style="font-size:11pt;font-weight:700;">Technology Partners. Strategic Advisers.</span></p></div>
</div></div><div data-element-id="elm_YYEmrDOumyDxgM4CteEdrg" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_YYEmrDOumyDxgM4CteEdrg"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-oval " href="mailto:consulting@Cloud9Advisers.com?subject=I'd like to learn more about how Cloud 9 can help me" title="email us: consulting@Cloud9Advisers.com"><span class="zpbutton-content">Contact Cloud 9</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Wed, 19 Feb 2020 12:13:14 -0500</pubDate></item><item><title><![CDATA[Supplier Spotlight: Vigilant]]></title><link>https://www.cloud9advisers.com/News/post/supplier-spotlight-vigilant</link><description><![CDATA[Contact Cloud 9 to learn how Vigilant helps avoid catastrophe by giving you full network visibility to see threats 98-days sooner than the industry average!]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_e_s9PZKLSe-uV4WiMXQrbg" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_wpyqluCAQ9Ki2o8pCtgp7w" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm__I7yhPQASHOGnyw2P2QI6A" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_6LhbOhygRMyoJcYExgJalg" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_6LhbOhygRMyoJcYExgJalg"].zpelem-heading { border-radius:1px; } </style><h1
 class="zpheading zpheading-align-center " data-editor="true"><span style="color:inherit;">Malware Found on Patient Medical Monitoring Devices</span></h1></div>
<div data-element-id="elm_d4W116dS0Ui3TWj9NwBlDQ" data-element-type="image" class="zpelement zpelem-image "><style> [data-element-id="elm_d4W116dS0Ui3TWj9NwBlDQ"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-center zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20images/virus.jpg" size="original" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_4GnYdGkKRkCWGU0bVz8DFw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_4GnYdGkKRkCWGU0bVz8DFw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><p><span style="color:inherit;"><span style="font-size:12px;">by: Vigilant Technologies and David Dickmeyer</span></span><br></p></div>
</div><div data-element-id="elm_5H8uqwNaXM1_QDG24LlExA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_5H8uqwNaXM1_QDG24LlExA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;">Cloud 9 Supplier Spotlight:&nbsp;<a href="https://vigilantnow.com/" title="Vigilant&nbsp;Technology Solutions" target="_blank">Vigilant</a><a href="https://vigilantnow.com/" title="Vigilant&nbsp;Technology Solutions" target="_blank">&nbsp;Technology Solutions</a></span><br></p></div>
</div><div data-element-id="elm_NyXSq--9jssX3fBAC2iciQ" data-element-type="image" class="zpelement zpelem-image "><style> [data-element-id="elm_NyXSq--9jssX3fBAC2iciQ"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-center zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Supplier%20Logos/Sec%20Vigilant1.jfif" size="original" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_ZO9v_P4pvrEVgX8maEDGxw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_ZO9v_P4pvrEVgX8maEDGxw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p style="text-align:center;"><span style="color:inherit;"><span style="font-weight:700;">Vigilant helps you avoid catastrophe by giving you full network visibility to see threats 98-days sooner than the industry average!&nbsp;</span></span><br></p><p style="text-align:center;"><span style="color:inherit;"><span style="font-weight:700;"><br></span></span></p><div>Why, does it seem that companies are falling victim to hackers left and right? To add insult to injury, these are not ordinary companies we are talking about. They are companies ranging from Fortune 500s and major retailers to banking institutions, all with very large security budgets intended to maintain the security of their customer’s data. These incidents lead organizations to ask themselves three important questions</div><div><ol><ol><ol><li>If all of these companies are compliant with industry regulations, how is it they still successfully attacked?</li><li>With security budgets of giant companies in the millions, how will I ever be able to afford protecting myself?</li><li>If Firewalls, logging, and AV are getting better all the time, how do these attacks go undetected?</li></ol></ol></ol></div><p><span style="color:inherit;"><br></span></p><p>CyberDNA is a managed network security monitoring service from Vigilant LLC. and successfully reduces the overall cyber risk to an organization by proactively monitoring the customer’s network for signs of anomalous activity that could be indicative of an active compromise, misconfigurations, or other notable security risks. To allow customers to see the added value of CyberDNA over and above industry leaders, Vigilant offers a proof-of-value, free trial period, which produces a detailed threat report of our findings. This written report contains the findings from that free trial and highlights the value of having a fully managed continuous network security monitoring service.</p><p><span><br></span></p><div><span style="font-weight:bold;">Why your Network Loves Ebola</span></div><p>The headline might seem a bit dramatic, but there really is a correlation between diseases, how (and when) they are treated, and how your network and company data are protected – specifically, how antivirus works.<br></p><div>Modern medicine is amazing. It seems like every other week another news story comes out about some major breakthrough, some miracle treatment for a disease once thought to be incurable. It has become so commonplace, in fact, that we often find ourselves scratching our heads, impatiently wondering why all disease can’t simply be cured.&nbsp;</div><p><br></p><div>We’ve become so accustomed to miraculous breakthroughs that it takes something extraordinary – a disease of incomparable fear - to make us take notice. In the 1940s and 50s, it was Polio. In the 1980s, it was HIV and AIDS. Today’s scariest threat is Ebola.</div><p><br></p><div><span><div>More recently, we’ve observed the spread of Ebola throughout sub-Saharan Africa. What started as a&nbsp;<span>couple isolated cases quickly spread to dozens, dozens begat hundreds, and hundreds were quickly morphed into thousands.</span></div><div><br></div><div>But this is the where the cold, hard truth of modern medicine comes into play. While seemingly miraculous to the yet uninfected, the discovery and synthesis of treatments for some of our most troublesome and problematic medical disorders comes at the ultimate sacrifice of those unlucky enough to have been exposed before us. How many thousands died of HIV and AIDs before a cocktail of drugs was identified to control its symptoms? How many children were left stricken with Polio before Jonas Saulk synthesized his vaccine?</div><div><br></div><div>Ebola is no different. In order for people to be protected from Ebola, other people, unfortunately, need to get sick and often times die from it. It’s in this critical mass of early sufferers that treatment will be found. As more people get sick, more opportunities for study arise – more opportunities for testing treatments.</div><div><br></div><div>This phenomenon is the same with most modern-day “cyber-diseases&quot;. And the “cures”, like antivirus, next-generation firewalls, or intrusion detection and prevention solutions, all come from a method called signature-based detection. Signature-based detection at its core is the data security equivalent of antibiotics and vaccines. It is a treatment for an illness that has already infected many others – hopefully before you<span>. But, like many vaccines, it isn’t necessarily responsive. Other networks had to be infected with the disease first before any of the technologies had the ability to detect it. Therefore, widespread detection capabilities are merely reactive. They are only designed to discover&nbsp;<span style="font-style:italic;">known</span>&nbsp;threats and if it doesn’t know about them, it can’t detect them.</span></div><div><span><br></span></div><div><span>Our largest challenge as defenders and cybersecurity professionals is that threats are constantly changing. Hackers are targeting companies with&nbsp;<span style="font-style:italic;">specific</span>&nbsp;tactics – tactics designed for exploiting an individual system, organization, or end user&nbsp;<br><div><span style="font-weight:bold;"><br></span></div><div><span style="font-weight:bold;">Targeted tactics are why hackers can infiltrate and remain inside organizations undetected for up to 215 days on average and why big organizations are struggling to defend against them.</span></div><div><br></div><div>Protecting your network and data today requires multiple layers of security and the ability to identify&nbsp;<span style="font-style:italic;">any</span>&nbsp;abnormality – often the symptoms before a diagnosis. Network visibility is the essential prerequisite to effective security.</div></span></div></span></div></div>
</div><div data-element-id="elm_NakJBdbr6SRKSwsbfJbtvg" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_NakJBdbr6SRKSwsbfJbtvg"].zpelem-heading { border-radius:1px; } </style><h3
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">Case Study: Malware Found on Patient Medical Monitoring Devices</span></h3></div>
<div data-element-id="elm_MYQq5SSVnVNswQB0ajuLsg" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> [data-element-id="elm_MYQq5SSVnVNswQB0ajuLsg"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="right" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimagetext-container zpimage-with-text-container zpimage-align-right zpimage-size-medium zpimage-tablet-fallback-medium zpimage-mobile-fallback-medium hb-lightbox " data-lightbox-options="
            type:fullscreen,
            theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="https://images.unsplash.com/photo-1513224502586-d1e602410265?ixlib=rb-1.2.1&amp;q=80&amp;fm=jpg&amp;crop=entropy&amp;cs=tinysrgb&amp;w=1080&amp;fit=max&amp;ixid=eyJhcHBfaWQiOjQ1Nzk3fQ" size="medium" data-lightbox="true" style="width:1080px;"/></picture></span></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><div>Vigilant was engaged by a Healthcare Provider who was experiencing a sudden and extreme drop in bandwidth within their infrastructure. Their IT staff had been working on the problem for two weeks without any detection or artifacts of the problem visible in their existing IDS/IPS or logs. Something was eating up their bandwidth and bringing them to a grinding halt. Upon starting the engagement, Vigilant installed its CyberDNA sensors that would give the best ability to collect all traffic traversing the customer network.&nbsp;</div><p><span style="color:inherit;"><br></span></p><div>CyberDNA is agentless, meaning there is no software loaded on any customer devices, which also ensures that the attacker is not aware of the monitoring device/service. This further reduces the risk of any potential attacker’s countermeasures. We strategically placed our sensors in a manner that will not alert the attacker of our presence while still allowing full visibility. The remote attacker has to travel across the network at some point on their way out to the internet. This allows for an interesting vantage point of our detection and monitoring tools as no matter how the attacker tries to conceal themselves they still have to travel on the network and are detectable by the CyberDNA sensors and the Vigilant analyst team. Vigilant’s approach gives immediate visibility and can inform a customer in real-time about what is happening in the deepest parts of their network. It’s like turning on the lights late at night to see if there is a monster in the room, although you hope there isn’t one. If there is, however, now you know and can take appropriate actions. Within minutes of turning on Vigilant’s CyberDNA service, our analysts were able to detect that multiple heart monitor devices at one of the hospital’s remote locations were running an embedded operating system infected with a botnet known as Conficker. They may never have known what was going on or that they were on heart monitors hooked up to patients however the attackers were using these devices to attack other locations on the internet and brought down the hospital’s network in the crossfire. There were two problems here, first, the Conficker worm was bringing their network down, and second, the devices were running outdated and non-compliant operating systems that were connected to patients.&nbsp;</div><p><span style="color:inherit;"><br></span></p><div>While the Conflicker worm, sometimes referred to as Downad, was first discovered over 12 years ago in November of 2008, many recent reports show that it is still highly active and is the worm that just won’t die. At its peak Conflicker managed to infect over 9 million systems worldwide, making it one of the most prolific malware of its day.&nbsp;</div><p><span style="color:inherit;"><br></span></p><div>When using third-party software or devices like Point-of-Sale (POS) systems in retail, medical devices in healthcare, door-entry and other “smart” sensor systems in buildings, etc. businesses are at the mercy of the vendor’s level of security--or, the weakest link in the chain. If the vendor makes a mistake it can cost you. Vigilant CyberDNA gives you visibility into these devices without needing to have additional agents installed. By doing this we can show you all software and operating systems running on your network. We keep your vendors honest about security and greatly reduce your risk and exposure.</div><p><span style="color:inherit;"><br></span></p><div>This attack was carried out by tactics that Vigilant detects every day. Without the visibility that Vigilant brings it would have likely gone undetected in this victimized organization because their other advanced detection tools simply couldn’t see it.</div><p><span style="color:inherit;"><br></span></p><div><span style="font-weight:bold;">Summary:</span></div><blockquote style="margin-left:40px;"><ul><li>The patient medical devices running an embedded operating system were first infected with Conficker behind the hospital firewall and were later activated.</li><li>The effects of the infected devices caused a sharp decrease in bandwidth across the hospital's network resulting in applications being rendered unusable.</li><li>All previously installed and active IDS/IPS and detection methods available within the hospital network did not see or know about the outdated operating system nor the Conficker infection.</li><li>CyberDNA was placed, agentless, within the environment and immediately detected both the non- compliant OS and that Conficker was the source of the bandwidth draw.</li><li>Vigilant’s analyst team notified the customer of the infected systems. The customer removed the systems from the patients, cleaned them and notified the manufacturer of the vulnerability.</li></ul></blockquote></div>
</div></div><div data-element-id="elm_CriwNj-ywh4neRJyior0IQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_CriwNj-ywh4neRJyior0IQ"].zpelem-heading { border-radius:1px; } </style><h3
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true">About Vigilant Technology Solutions</h3></div>
<div data-element-id="elm_nDmwD9Padrelszo84gOXMA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_nDmwD9Padrelszo84gOXMA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div>Vigilant Technology Solutions is a cybersecurity firm based out of Cincinnati, Ohio providing security detection and prevention solutions. Vigilant is strict in it methodology of separating threat detection from threat prevention, using two tools: CyberDNA and MEP (Managed Endpoint Protection). Remarkably affordable and extremely effective, we work with businesses of all sizes in all industries. Vigilant is particularly effective with businesses in heavily regulated industries like finance and healthcare and we actively work with numerous Fortune 500 companies around the world, Vigilant has been operating since 2009, is privately held (and will remain so) with no outside investment funding.</div><p><span><br></span></p><p><span style="color:inherit;"></span></p><div><span style="font-weight:bold;">Vigilant helps you avoid catastrophe by giving you full network visibility to see threats 98-days sooner than the industry average.&nbsp;</span></div></div>
</div><div data-element-id="elm_lSW3lUApRxyEkHxk1z48SA" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_lSW3lUApRxyEkHxk1z48SA"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-oval " href="mailto:consulting@Cloud9Advisers.com?subject=I need help with cybersecurity, can Cloud 9 help?" title="email us: consulting@Cloud9Advisers.com"><span class="zpbutton-content">Is Vigilant Right for You?</span></a></div>
</div><div data-element-id="elm_w4uUL-ucAd91gGhsa8YvkQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_w4uUL-ucAd91gGhsa8YvkQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;">Contact Cloud 9 Advisers to see if Vigilant and their CyberDNA (detection) or MEP (protection) security solutions are right for your business. Cloud 9 Advisers is 100% vendor-agnostic. If Vigilant is not right for you we'll help steer you to the right company and solution from over 200 service providers in our<a href="https://sitebuilder-662896043.zohositescontent.com/solution-portfolio">&nbsp;</a>curated Supplier Portfolio</span><br></p></div>
</div><div data-element-id="elm_mfxvYp9MmRN3NCYimfShIQ" data-element-type="image" class="zpelement zpelem-image "><style> [data-element-id="elm_mfxvYp9MmRN3NCYimfShIQ"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-center zpimage-size-small zpimage-tablet-fallback-small zpimage-mobile-fallback-small hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/files/C9-Logo1.1.150.t.png" size="small" data-lightbox="true" style="width:1800px;padding:0px;margin:0px;"/></picture></span></figure></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Wed, 19 Feb 2020 12:11:15 -0500</pubDate></item></channel></rss>