Microsegmentation
Search documents
Asimily Advances Complete Cyber Asset and Exposure Management Platform with New Microsegmentation Capabilities
Globenewswire· 2026-01-15 09:00
Core Insights - Asimily has announced enhanced microsegmentation capabilities, integrating Security Group Access Control Lists (SGACL) with Cisco Identity Services Engine (ISE) to improve risk reduction strategies for organizations [1][2] Group 1: Product Features and Capabilities - The SGACL integration allows Cisco ISE customers to automatically apply security group policies based on Asimily's device classification, behavioral analysis, and risk prioritization [2] - Asimily's platform provides deep device inventory and classification across IT, IoT, OT, and IoMT environments, along with AI-driven vulnerability prioritization based on actual exploitability and environmental context [7] - The platform offers multiple remediation pathways, including segmentation, patching, and targeted attack prevention, as well as packet capture for incident response readiness [7] Group 2: Market Trends and Customer Needs - Organizations are shifting focus from device visibility to measurable risk reduction, as highlighted by a KLAS Research report that recognized Asimily for delivering the highest score for ROI among vendors in healthcare IoT security [3][5] - The report indicates that healthcare leaders prioritize AI-driven automation and microsegmentation, both of which Asimily provides [3] - The trend of needing actionable risk reduction extends beyond healthcare to sectors like manufacturing, energy, financial services, and government, where connected devices are rapidly scaling [3] Group 3: Company Positioning and Strategy - Asimily's CEO emphasized the need for platforms that go beyond visibility to include comprehensive capabilities for inventory, vulnerability prioritization, and remediation [4] - The company is committed to evolving its risk mitigation capabilities in response to customer needs, rather than aligning with a parent company's platform strategy amid market consolidation [6] - Asimily is trusted by leading organizations across various sectors, including healthcare, manufacturing, and financial services, facing complex connected device environments [6]
Extortion Evolves: Akamai SOTI Report Examines the Increasing Complexity of Ransomware Attacks
Prnewswire· 2025-07-29 10:30
Core Insights - The Akamai report highlights the emergence of a new quadruple extortion tactic in ransomware campaigns, alongside the continued prevalence of double extortion methods [1][2] - Quadruple extortion involves using distributed denial-of-service (DDoS) attacks and harassing third parties to increase pressure on victims, building on the existing double extortion strategy [2][3] - The report emphasizes that ransomware threats have evolved beyond mere data encryption, now incorporating stolen data, public exposure, and service outages to create significant business crises for organizations [3] Industry Trends - The report discusses the current state of legal and regulatory frameworks affecting organizational responses to ransomware, noting that while existing laws apply, specific regulations aim to discourage ransom payments [3] - Akamai stresses the importance of robust cybersecurity measures, incident reporting, and risk management strategies, such as Zero Trust and microsegmentation, to enhance resilience against ransomware threats [3] Emerging Threats - The report identifies that generative AI and large language models (LLMs) are facilitating the rise in frequency and scale of ransomware attacks, enabling less technically skilled individuals to launch sophisticated campaigns [6] - Hacktivist groups are increasingly utilizing ransomware as a service (RaaS) platforms, with a shift in focus from major corporations to smaller organizations with weaker security [6] - Cryptomining attacks are also on the rise, with nearly half targeting nonprofit and educational organizations due to their limited resources [6] - The TrickBot malware family has extorted over US$724 million in cryptocurrency from victims since 2016, indicating the ongoing threat posed by established malware families [6]
Illumio Simplifies Zero Trust in Critical Infrastructure with NVIDIA Accelerated Computing
GlobeNewswire News Room· 2025-06-02 08:00
Core Insights - Illumio Inc. has announced a strategic integration with NVIDIA to enhance security for critical infrastructure organizations and advance their Zero Trust posture [1][3] - The collaboration integrates NVIDIA BlueField networking platform with Illumio's breach containment platform, providing comprehensive security and operational efficiency across IT and Operational Technology (OT) environments [1][2] Integration Benefits - Organizations can deploy Illumio directly on NVIDIA BlueField, gaining visibility into network dependencies and precise security controls at both host and network levels [2][5] - The integration simplifies the protection of critical systems, ensuring operational continuity while meeting compliance requirements [2][3] - Future capabilities will include AI-driven insights from Illumio to identify risks and attacker patterns, enabling rapid threat detection in ICS and OT environments [2][3] Industry Context - The collaboration addresses rising threats and increased regulatory pressure globally to strengthen cyber resilience and reduce operational risk to OT infrastructure [3] - Illumio is recognized as a leader in The Forrester Wave™: Microsegmentation Solutions, Q3 2024, highlighting its role as a trusted vendor in the NVIDIA partner ecosystem [3][6] Key Features - Enhanced visibility and policy enforcement for traffic within and between IT and OT layers, allowing organizations to visualize all traffic to and from OT systems [5] - Rapid deployment of Zero Trust for critical infrastructure, reducing complexity and accelerating time to value while containing breaches [5] - Improved compliance and operational resilience through consistent microsegmentation across diverse environments without impacting system performance [5]