<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Promisec Team, Author at Promisec</title>
	<atom:link href="https://promisec.com/author/promisec_admin/feed/" rel="self" type="application/rss+xml" />
	<link>https://promisec.com/author/promisec_admin/</link>
	<description>Actionable Endpoint Intelligence</description>
	<lastBuildDate>Wed, 14 Jun 2023 14:00:54 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://promisec.com/wp-content/uploads/2021/08/favicon-32x32-1.png</url>
	<title>Promisec Team, Author at Promisec</title>
	<link>https://promisec.com/author/promisec_admin/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Maximize your Security Posture with PEM  Holistic EndPoint Security for Vulnerability Management and compliance enforcement – Data Sheet</title>
		<link>https://promisec.com/maximize-your-security-posture-with-pem-holistic-endpoint-security-for-vulnerability-management-and-compliance-enforcement-data-sheet/</link>
		
		<dc:creator><![CDATA[Promisec Team]]></dc:creator>
		<pubDate>Wed, 14 Jun 2023 13:15:10 +0000</pubDate>
				<category><![CDATA[All]]></category>
		<category><![CDATA[Data Sheet]]></category>
		<category><![CDATA[Resources]]></category>
		<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://promisec.com/?p=3851</guid>

					<description><![CDATA[<p>The Challenge- Ensuring your Security Posture in Complex Organizations’ Networks Organizations face numerous challenges when it comes to their security posture management. Despite increased investments in cutting-edge security tools, the reality is that companies are struggling with intricate IT environments and fragmented technologies resulting critical gap in monitoring and enforcing security policies across all endpoints.</p>
<p>The post <a href="https://promisec.com/maximize-your-security-posture-with-pem-holistic-endpoint-security-for-vulnerability-management-and-compliance-enforcement-data-sheet/">Maximize your Security Posture with PEM  Holistic EndPoint Security for Vulnerability Management and compliance enforcement – Data Sheet</a> appeared first on <a href="https://promisec.com">Promisec</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<h3 class="wp-block-heading">The Challenge- Ensuring your Security Posture in Complex Organizations’ Networks</h3>



<p>Organizations face numerous challenges when it comes to their security posture management. Despite increased investments in cutting-edge security tools, the reality is that companies are struggling with intricate IT environments and fragmented technologies resulting critical gap in monitoring and enforcing security policies across all endpoints.</p>



<p> </p><p>The post <a href="https://promisec.com/maximize-your-security-posture-with-pem-holistic-endpoint-security-for-vulnerability-management-and-compliance-enforcement-data-sheet/">Maximize your Security Posture with PEM  Holistic EndPoint Security for Vulnerability Management and compliance enforcement – Data Sheet</a> appeared first on <a href="https://promisec.com">Promisec</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Promisec announces its new PEM for MSSPs solution launch</title>
		<link>https://promisec.com/promisec-announces-its-new-pem-for-mssps-solution-launch/</link>
		
		<dc:creator><![CDATA[Promisec Team]]></dc:creator>
		<pubDate>Tue, 21 Jun 2022 11:01:37 +0000</pubDate>
				<category><![CDATA[Announcements]]></category>
		<category><![CDATA[News]]></category>
		<guid isPermaLink="false">https://promisec.com/?p=3231</guid>

					<description><![CDATA[<p>Tel Aviv, 21 June 2022  – Promisec, an Israeli based provider of endpoint cyber management solutions, has announced the launch of Promisec Endpoint Management (PEM) solution for Managed Security Service Provides (MSSPs). The new PEM for MSSPs enables IT and security service providers to expand their portfolio with a unique and high value security compliance [&#8230;]</p>
<p>The post <a href="https://promisec.com/promisec-announces-its-new-pem-for-mssps-solution-launch/">Promisec announces its new PEM for MSSPs solution launch</a> appeared first on <a href="https://promisec.com">Promisec</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Tel Aviv, 21 June 2022  – <a href="https://promisec.com/" target="_blank" rel="noopener">Promisec</a>, an Israeli based provider of endpoint cyber management solutions, has announced the launch of Promisec Endpoint Management (PEM) solution for Managed Security Service Provides (MSSPs).</p>
<p>The new PEM for MSSPs enables IT and security service providers to expand their portfolio with a unique and high value security compliance management service.</p>
<p>PEM monitors MSSPs customers’ workstations and environments and seamlessly ensures that they are all up to date. More importantly, PEM provides assurance that customer endpoints are not exposed to vulnerabilities and can meet security standards defined in organizational policy.</p>
<p>Where PEM for MSSPs shows its true worth is in its ability to provide comprehensive, real-time visibility across all endpoints and servers connected to the solution. The endpoints are managed with a specially designed user interface, built from the ground up to meet the management requirement needs of MSSPs.</p>
<p>This solution was tailored to the specific needs of MSSPs, striving to deliver premium value to their customers. Effectively managing numerous, diverse customers, with different characteristics and requirements, is extremely challenging. MSSP teams require flexible solutions allowing visibility, with ease of use and minimal friction.</p>
<p>PEM for MSSPs solution allows MSSPs to easily add new customers, defining tailored policies, focus points and reports. The solution allows each covered organization to provide clear and concise reports to their stakeholders, while increasing engagement and value added to customers.</p>
<p>Additional functionality for PEM for MSSPs include; a web-based and user-friendly dashboard curated for the MSSPs’ customers. The dashboard can be externally accessed to enable customers to gain enhanced visibility throughout their specific domain.</p>
<p>According to Promisec CEO Ori Shahar: “Endpoint monitoring and management solutions are not new to the market. However, until very recently only large enterprises could effectively benefit from highly dedicated automated solutions, ensuring all their endpoints and servers met the company security compliance policy. At Promisec, we believe that comprehensive endpoint management solutions should be within reach for every company, regardless of size or security budget.”</p>
<p>Promisec currently serves dozens of enterprise customers with its PEM solution, who use PEM to optimize their endpoint management posture. PEM for MSSPs is ideally suited for smaller companies who consume their IT and security services via IT service providers.</p>
<p>Promisec Chief Business Officer Haim Levy commented “The official launch of PEM for MSSPs enables us to increase our footprint in the market with a truly unique solution to endpoint threat management. PEM brings customers’ security visibility to a new level, enabling MSSPs to better define security policy for each customer’s specific pain points and enforce requirements. We are excited to invite the MSSP community to experience PEM&#8217;s advanced endpoint management capabilities, as it will surely prove to be a valuable element for any MSSP.”</p>
<p>About Promisec:</p>
<p>Promisec provides high-end endpoint management solutions designed to meet enterprises’ security and compliance requirements.  Promisec’s patented agentless technology enables companies to get 360° visibility, as well as advanced real-time inspection, reporting and remediation capabilities across all endpoints within the organization.</p>
<p>Promisec solutions are trusted by leading enterprises in diverse sectors, including Euler Hermes, Nayara Energy, Israel Police, City of New York Human Resources, Kotak Bank, Elbit Systems, Clal Ins., Bank Poalim, Tnuva and Jefferson Uni.</p>
<p>Promisec is a <a href="https://www.cydero.com/" target="_blank" rel="noopener">CYDERO</a> company since November 2019 and includes an elite team of cyber experts from 8200 alumni. The company operates from its headquarters in Israel and collaborates with local partners in the USA, EMEA and APAC.</p>
<p>Visit us at <a href="http://www.promisec.com/" target="_blank" rel="noopener">www.promisec.com</a> and follow us on <a href="https://www.linkedin.com/company/promisec" target="_blank" rel="noopener">LinkedIn</a> and <a href="https://twitter.com/promisec_it" target="_blank" rel="noopener">Twitter</a>.</p>
<p>For all media inquiries, please contact Haim Levy, CBO, Promisec: <a href="mailto:haim@promisec.com">haim@promisec.com</a>.</p>
<p>The post <a href="https://promisec.com/promisec-announces-its-new-pem-for-mssps-solution-launch/">Promisec announces its new PEM for MSSPs solution launch</a> appeared first on <a href="https://promisec.com">Promisec</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>When new cyber solutions implementations still leave security gaps</title>
		<link>https://promisec.com/when-new-cyber-solutions-implementations-still-leave-security-gaps/</link>
		
		<dc:creator><![CDATA[Promisec Team]]></dc:creator>
		<pubDate>Mon, 04 Apr 2022 06:29:59 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[EDR]]></category>
		<category><![CDATA[Endpoint Management]]></category>
		<category><![CDATA[Endpoint security]]></category>
		<category><![CDATA[XDR]]></category>
		<guid isPermaLink="false">https://promisec.com/?p=2898</guid>

					<description><![CDATA[<p>Every company invests in cyber solutions, but when are you certain that the deployment was actually completed and your organization is safe? We’ve all heard the conversation, we’ve listened to the pitches and sat through deck after deck explaining how this newest technology and that innovative platform will change how organizations mitigate cyber risks. When implementing [&#8230;]</p>
<p>The post <a href="https://promisec.com/when-new-cyber-solutions-implementations-still-leave-security-gaps/">When new cyber solutions implementations still leave security gaps</a> appeared first on <a href="https://promisec.com">Promisec</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><em>Every company invests in cyber solutions, but when are you certain that the deployment was actually completed and your organization is safe?</em></p>
<p>We’ve all heard the conversation, we’ve listened to the pitches and sat through deck after deck explaining how this newest technology and that innovative platform will change how organizations mitigate cyber risks. When implementing the cure all, high expectations are set and rarely can the system admin or IT have comprehensive insight into what is actually protected and, moreso when the various platforms have been updated or patched.</p>
<p>In a time with nearly infinite opinions and almost as many security solutions to go along with them, we want to highlight some of the most common mistakes, false perceptions and misconceptions preventing you from gaining complete security within your company.  From debunking lofty promises to getting greater visibility into your actual system vulnerabilities, understanding cybersecurity requires time and the tools to dig deep into your cyber risk.</p>
<p><strong>New Integration, Same Problem: how to ensure your company is secured</strong></p>
<p>Experience guides the best choices and in the case of endpoint protection many face the same complex problems on a daily basis. Recently, a scenario played out which reflects a common perception of protection in the world of endpoint security. Bringing this to light, we feel, can give better context to resolving common problems to industry wide stresses and enable our customers to make the best implementation decisions for endpoint security.</p>
<p>A client switched their protection configuration and the tools which they use to secure their endpoints. While the new service providers promised comprehensive security across all endpoints, in practice they came up short.</p>
<p>The reality proved that while new solutions may provide key strategic value where they are installed, they don’t ensure that all of your endpoints are secure, up to date and optimized for your data protection needs. Just because a solution is deployed I.e. EDR or XDR on an organizational level does not ensure that it has been effectively implemented through all endpoints and servers within a business.</p>
<p>While some solution providers feel they can effectively guard and protect all endpoints, our practical experience has shown that even with new implantations between them the rate of unprotected elements remains concerningly high.</p>
<p><strong>Who audits the auditors? </strong></p>
<p>A vast and inclusive array of PEM (Promisec Endpoint Management) deployments have shown that, even with the implantation of many best in class endpoint protection solutions (such as EDR, XDR), at least 15-30% of end points remain at risk.</p>
<p>To mitigate the risk and give system admins greater visibility of their endpoint vulnerabilities Companies must adapt monitoring, management and compliance solutions that will enable them to control their attack surface.</p>
<p>Innovative endpoint management process can enable you to easily see if your endpoints are up to date with the latest security tools you purchased recently. This way, you can ensure ALL your company assets are protected against viruses and malware and have optimized endpoint security.</p>
<p>With the use of advanced tools, such as PEM, your organization can defend its data from illicit players and out of date OS. To learn more contact us <a href="https://promisec.com/contact-us/" target="_blank" rel="noopener">here</a>.</p>
<p>The post <a href="https://promisec.com/when-new-cyber-solutions-implementations-still-leave-security-gaps/">When new cyber solutions implementations still leave security gaps</a> appeared first on <a href="https://promisec.com">Promisec</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Cybersecurity Trends to Look Out for in 2022</title>
		<link>https://promisec.com/cybersecurity-trends-to-look-out-for-in-2022/</link>
		
		<dc:creator><![CDATA[Promisec Team]]></dc:creator>
		<pubDate>Thu, 06 Jan 2022 12:30:28 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Business email compromise]]></category>
		<category><![CDATA[cyber trends 2022]]></category>
		<category><![CDATA[Hybrid work from home]]></category>
		<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[Remote Working Models]]></category>
		<guid isPermaLink="false">https://promisec.com/?p=2330</guid>

					<description><![CDATA[<p>Congratulations – you’ve made it through another year! Give yourself a quick pat on the back, because last year was a challenging one for the information security in any sector, and we can assume that this new year will bring its own new and unique challenges. As we prepare for them, it’s worth looking at [&#8230;]</p>
<p>The post <a href="https://promisec.com/cybersecurity-trends-to-look-out-for-in-2022/">Cybersecurity Trends to Look Out for in 2022</a> appeared first on <a href="https://promisec.com">Promisec</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Congratulations – you’ve made it through another year! Give yourself a quick pat on the back, because last year was a challenging one for the information security in any sector, and we can assume that this new year will bring its own new and unique challenges. As we prepare for them, it’s worth looking at some of the trends we’ve seen over the past year, in order to better understand how to prepare for 2022.</p>
<p>To help you get in shape, we’ll be putting out a short series of blogs detailing the trends and changes in the threats we contend with, as well as shifts that are occurring in parallel to work and organizational paradigms.</p>
<p>In this blog post, we’ll highlight some continuing trends which are worth keeping an eye on.</p>
<ul>
<li class="list-bottom-space"><strong>Remote Working Models – Hybrid as the New Normal</strong><br />
As Covid-19 continues to rage, the remote work model has become predominant and permanently changed how we address cyber security. Out-of-boundaries access to organizational networks has become common and legitimate, cloud-based infrastructures have transitioned from recommended to almost mandatory, and more and more work is becoming integrated with collaboration tools such as Slack and Zoom.<br />With all of these changes, the simple reality is that VPNs, firewalls, IDSs and other perimeter-based solutions are no longer enough to secure networks and companies.</p>
</li>
<li class="list-bottom-space"><strong>The Growing Ransomware Economy</strong><br />Following the dramatic upswing in ransomware success in 2020, 2021 has seen a continued meteoric rise in ransomware prevalence.<br />In addition to the rising prevalence, ransomware attack methods have also progressed by leaps and bounds – both in technological complexity and in terms of leveraging affected companies, with double and triple extortions becoming ever more popular.<br />Another angle to consider is the rise of the Ransomware-as-a-service model:<br />As payouts increased, the market has adjusted itself accordingly, allowing cyber criminals to rent infrastructures, tools and abilities rather than having to create them from scratch. Entire ecosystems have been built, enabling technological advancement and scaling opportunities for attackers. This has led to a greater variety of victims, as well as enabling unskilled malicious actors to deploy advanced tools.
</p>
</li>
<li class="list-bottom-space"><strong>Supply Chain Attacks</strong><strong> On the Rise</strong><br />Most companies do not work in isolation, and communication with other companies is vital. This opens a very convenient window for potential attackers: why attack the highly secured mothership when you can target small vendors and third-party service suppliers – and breach through there?<br />At the end of the day, a chain is only as strong as its weakest link, and with chains becoming longer, the threat increases. With the increase of remote communication, 2021 saw a commensurate rise in malicious actors taking advantage of this concept, with ENISA (European cybersecurity agency) <a href="https://www.cybertalk.org/2021/08/16/4x-increase-in-supply-chain-attacks-experts-worried/" target="_blank" rel="nofollow noopener">experts estimating</a> a 400% increase in supply chain attacks in 2021.
</p>
</li>
<li class="list-bottom-space"><strong>Artificial Intelligence and Machine Learning Coming Into Play</strong><br />AI in the cybersecurity field has long seemed a futuristic concept, and even five years ago was completely unheard of. However, in the last few years this field has become one of the fastest evolving fields, and with it came real-world use cases for machine learning.<br />In the current paradigm, AI is now being used on both sides. In the hands of malicious actors, it’s being used to automate attacks, to identify vulnerabilities in systems and to create more accurate phishing, just to name a few examples. At the same time, we’re seeing security benefits as well, through behavioral firewalls and more advanced anti-virus software.
</p>
</li>
<li class="list-bottom-space"><strong>The Hacker Community and Response Time</strong><br />Once upon a time, a zero-day released to the public would have taken a few weeks to kick into use – allowing time for companies to respond in a timely manner.<br />However, as time goes on, we see more and more immediate exploitation of such vulnerabilities. One example of this is the recent log4j vulnerability – which was exploited very fast, successfully being leveraged to damage several companies.<br />In general we’ve seen more activity and cooperation on dark web security forums, enabling hacking groups and individuals to respond faster and faster to new vulnerabilities and changes.
</p>
</li>
<li class="list-bottom-space"><strong>BEC (Business email compromise, also sometimes CEO fraud)</strong><br />The process from initial attack to profit end to end is a long and tiring process – for both victims and attackers. BECs are small, targeted attacks, where a mailbox (usually of an executive / high ranking employee) is compromised and taken advantage of – usually through impersonation and for quick monetary gain. There are many methods, but some popular ones are for the attacker to reach out to investors from the executive email account and request for funds to be directed to a different account, or telling financial staff in the company to put through an emergency bank transfer to the attacker’s account.</li>
</ul>
<p>The post <a href="https://promisec.com/cybersecurity-trends-to-look-out-for-in-2022/">Cybersecurity Trends to Look Out for in 2022</a> appeared first on <a href="https://promisec.com">Promisec</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>101 Windows 11: aiming for better security and hybrid work model &#8211; features review</title>
		<link>https://promisec.com/101-windows-11-aiming-for-better-security-and-hybrid-work-model-features-review/</link>
		
		<dc:creator><![CDATA[Promisec Team]]></dc:creator>
		<pubDate>Thu, 14 Oct 2021 07:51:34 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[News]]></category>
		<guid isPermaLink="false">https://promisec.com/?p=1900</guid>

					<description><![CDATA[<p>6 years after the previous major version of Windows 10, referred to as “The last version of Windows”, Windows 11 was launched on October 5th as a free upgrade for systems running Windows 10. Windows 11 takes on the security challenges of the hybrid work model, as well as greatly improving user experience. Being a [&#8230;]</p>
<p>The post <a href="https://promisec.com/101-windows-11-aiming-for-better-security-and-hybrid-work-model-features-review/">101 Windows 11: aiming for better security and hybrid work model &#8211; features review</a> appeared first on <a href="https://promisec.com">Promisec</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>6 years after the previous major version of Windows 10, referred to as “The last version of Windows”, Windows 11 was launched on October 5th as a free upgrade for systems running Windows 10.</p>
<p>Windows 11 takes on the security challenges of the hybrid work model, as well as greatly improving user experience. Being a “young” operating system, Windows 11 borrows many of its features from Windows 10, but takes them from an optional level to a default. Together with some of the newly added features, this creates a smoother and modern user experience.</p>
<h2><strong>Windows 11 Features- new interface is included</strong></h2>
<p>Here are some of the basic changes and features included in Windows 11:</p>
<ul>
<li><strong>Interface changes</strong></li>
</ul>
<p>Perhaps the most immediate noticeable change is the centered start menu and taskbar over their legacy bottom left position. This change, along with some of the corners being rounded, pastel shading and other subtle color and menu differences create a smoother “futuristic” feel to Windows 11.</p>
<ul>
<li><strong>Windows and Desktops</strong></li>
</ul>
<p>Multitasking is a key characteristic of modern working environments, Therefore it comes as no surprise that Windows 11 highlights work over many Windows and even Desktops, revamping windows snapping with snap groups and snap layouts, which enable you to arrange multiple windows in many configurations (depending on your screen size and resolution), making switching between windows groups much easier, and allowing for easier monitor to laptop and vice-versa transitions.</p>
<p>Another feature serving that purpose is the virtual desktop support &#8211; which allows you to work with multiple desktops, and easily snap back and forth between them from its new location at the taskbar.</p>
<ul>
<li><strong>Integrated Android apps</strong></li>
</ul>
<p>Previously accessible only for Samsung Galaxy phones or through the Your Phone app, Android applications will be fully integrated in Windows 11, accessible in the new redesigned Microsoft Store via Amazon appstore. This feature however is not yet available, and will be coming to Windows 11 in future versions.</p>
<ul>
<li><strong>Widgets</strong></li>
</ul>
<p>Previously spotted in Windows Vista, widgets make a comeback in Windows 11. Accessible directly from the taskbar, personalized and configurable and presented in a user-friendly widget panel, it seems Window 11 widgets are here to stay.</p>
<ul>
<li><strong>Microsoft Teams integration</strong></li>
</ul>
<p>Acknowledging the giant leap online meeting application, Microsoft Teams has got a serious redesign and will now be integrated directly into the Windows 11 Taskbar, aimed at fluent use.</p>
<ul>
<li><strong>XBox tech</strong></li>
</ul>
<p>DirectStorage, improving on I/O storage operations and Auto HDR improving on display in XBox will be adopted in Windows 11, further integrating Xbox consoles with PCs.</p>
<p>Another big leap in Windows 11 is security.</p>
<p>The way Windows 10 and previous distributions view security is no longer enough in 2021, with many zero-day unpatched, or yet worse &#8211; unpatchable &#8211; vulnerabilities existing in older hardware (processors emphasized).</p>
<p>To handle this, Microsoft’s new approach is “Chip-to-cloud” protection.</p>
<p>To create this kind of coverage, Windows 11 exports much of the security process to the hardware, ramping up the <a href="https://support.microsoft.com/en-us/topic/windows-11-system-requirements-86c11283-ea52-4782-9efd-7674389a7ba3" target="_blank" rel="noopener">hardware requirements </a>to install the OS.</p>
<h2><strong>Windows 11 Security enhancements in a nutshell</strong></h2>
<p>Security changes in Windows 11 include:</p>
<ul>
<li><strong>TPM 2.0 and Secure Boot</strong></li>
</ul>
<p>TPM (Trusted Platform Module) is a technology that supports cryptography by having cryptographic keys, key generators and functions built into the processor.</p>
<p>This allows for much more secure communication to begin with, as well as supporting and enabling Secure Boot, which ensures the integrity of boot code and operating system components.</p>
<ul>
<li><strong>Virtualization</strong></li>
</ul>
<p>When it comes to security solutions, virtualization can come in handy by providing a sandbox environment to work in, either in a user-accessible manner &#8211; virtual machines and internet browsers or internally &#8211; memory isolation.</p>
<p>Windows 11 uses both VBS (Virtualization-based Security) and HVCI, which together provide an isolated (i.e. secure from the OS) memory slab, protecting apps from loading unsigned code and from code running out of order.</p>
<ul>
<li><strong>Passwordless Sign-in</strong></li>
</ul>
<p>Passwords are one of the most important and vulnerable aspects of securing a network, service or device. Derived from the above hardware requirements, Windows 11 fully supports Windows Hello (Passwordless authentication), potentially eliminating the need for passwords in the future.</p>
<h2><strong>Implementing Windows 11 &#8211; things to keep in mind</strong></h2>
<p>Here are some factors that can impact the decision whether to upgrade to Windows 11:</p>
<ul>
<li><strong>Hardware Compatibility</strong></li>
</ul>
<p>As mentioned before, certain hardware is required to support Windows Hello (Passwordless FIDO standard in general), virtualization through VBS and HVCI, Secure boot and a CPU with embedded TPM, along with general requirements such as 4GB RAM, 64GB of storage, and a graphic card compatible with DirectX 12 or later with WDDM 2.0 driver.</p>
<p>This is the first obstacle. While most systems manufactured after 2015 should include the mentioned hardware, upgrading whole networks will continue to be a problem.</p>
<ul>
<li><strong>Software Compatibility<br />
</strong>As with every new OS, some softwares will take time to be compatible with Windows 11, meaning you might not be able to use some of them. This usually resolves itself within the first few months, but is a factor to take into consideration when planning when to upgrade.</li>
<li><strong>Bugs and Updates<br />
</strong>While Windows Insider (Microsoft’s beta-tester/early access version) has tens of millions of users, they are but a grain in the sand next to the monstrous mass of billions of users who in the following months will most likely uncover hundreds of bugs to fix.</li>
<li><strong>Microsoft Account</strong><br />
Windows 11 Home edition requires you to login to a Microsoft Account to complete device setup. Local-only account will not be enough.</li>
</ul>
<p>In summary : Windows 11 with its new security standard and inviting user experience truly feels like a step in the right direction to become a secure, modern and common operating system, just like Windows 7 and 10 before. However, from an enterprise point of view the demanding hardware requirements and fairly early release are factors worth considering in the delay of Windows 11 adoption, especially considering that for those who are unwilling or unable to upgrade just yet &#8211; many of the features presented in Windows 11 can be enabled in Windows 10 with some effort.</p>
<p>The post <a href="https://promisec.com/101-windows-11-aiming-for-better-security-and-hybrid-work-model-features-review/">101 Windows 11: aiming for better security and hybrid work model &#8211; features review</a> appeared first on <a href="https://promisec.com">Promisec</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>How to #BeCyberSmart in a World of Hybrid Endpoints</title>
		<link>https://promisec.com/how-to-becybersmart-in-a-world-of-hybrid-endpoints/</link>
		
		<dc:creator><![CDATA[Promisec Team]]></dc:creator>
		<pubDate>Tue, 12 Oct 2021 06:55:12 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[News]]></category>
		<guid isPermaLink="false">https://promisec.com/?p=1893</guid>

					<description><![CDATA[<p>For those of us in charge of cybersecurity, every month is cybersecurity awareness month. Every month, we educate ourselves a little more and improve our technological capabilities as best as possible.  But once a year, it feels like maybe we’re not doing this alone.  Once a year, for 18 years now, industry and government join [&#8230;]</p>
<p>The post <a href="https://promisec.com/how-to-becybersmart-in-a-world-of-hybrid-endpoints/">How to #BeCyberSmart in a World of Hybrid Endpoints</a> appeared first on <a href="https://promisec.com">Promisec</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><span data-contrast="none">For those of us in charge of cybersecurity, every month is cybersecurity awareness month. Every month, we educate ourselves a little more and improve our technological capabilities as best as possible.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p><span data-contrast="none">But once a year, it feels like maybe we’re not doing this alone.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p><span data-contrast="none">Once a year, for 18 years now, industry and government join forces “to ensure every American has the resources they need to stay safer and more secure online,” reports the </span><a href="https://staysafeonline.org/cybersecurity-awareness-month/about-the-month/#:~:text=Cybersecurity%20Awareness%20Month%20%E2%80%93%20observed%20every,safer%20and%20more%20secure%20online." target="_blank" rel="noopener"><span data-contrast="none">National Cybersecurity Alliance (NCSA)</span></a><span data-contrast="none">. Leading the Cybersecurity Awareness Month every October, NCSA and the Cybersecurity &amp; Infrastructure Security Agency (CISA) determined that this year’s overarching theme will be </span><a href="https://www.cisa.gov/cybersecurity-awareness-month" target="_blank" rel="noopener"><span data-contrast="none">“Do your part. #BeCyberSmart.”</span></a><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span><br />
<b><span data-contrast="none">Do Your Part &#8211; #BeCyberSmart</span></b><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p><span data-contrast="none">We’ve heard “do your part” a lot over the past year or two, since the pandemic changed our world. Usually, this phrase referred to wearing a mask, keeping social distance, and getting vaccinated if we’re privileged enough to have access to vaccines.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p><span data-contrast="none">But simultaneously, we’ve had to keep our companies, employees and customers figuratively vaccinated to the growing threat of hackers, who wasted no time at taking advantage of this global crisis.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p><span data-contrast="none">Hackers’ work seemed to have gotten easier, as we sent our teams to work from home, to protect their health, and lost control over our endpoints.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p><span data-contrast="none">That’s why here, at Promisec, we’ve decided to dedicate our efforts during Cybersecurity Awareness Month to securing the hybrid work model. We plan on doing our part by bringing you expert panels (for free) to teach you how to do yours in this new cybersecurity frontier.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p><span data-contrast="none">Let’s expand this idea a bit, and then give you all the information you need to attend the virtual panels.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p><b><span data-contrast="none">Securing the Hybrid Endpoint is Possible</span></b><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p><span data-contrast="none">Securing your endpoints has always been a challenging job, especially if you have hundreds or thousands of endpoints, each with its own vulnerabilities, patch requirements and downright breaches. Now, with employees working from home, you have even less visibility, even less control.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p><span data-contrast="none">True, part of doing our part is enrolling employees to do theirs. But go explain every possible scenario to employees, or to their kids who share their parents’ work from home computers.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p><span data-contrast="none">Employee education is critical and doable, yet the most impactful solution is to monitor all endpoints, regardless if in-office or remote, are up-to-date on a regular basis (By the way, that’s exactly what Promisec’s agent-based </span><span data-contrast="none">PEM work from home module does &#8211; regardless of network connectivity. </span><a href="https://promisec.com/pem/" target="_blank" rel="noopener"><span data-contrast="none">Click here for more information</span></a><span data-contrast="none">).</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p><b><span data-contrast="none">Learn from the Best (for Free)</span></b><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p><span data-contrast="none">We’re excited to bring you leading thought leaders from </span><a href="https://mailchi.mp/promisec/promisec_altisec_webinar_awareness_month" target="_blank" rel="noopener"><span data-contrast="none">Altisec</span></a><span data-contrast="none">, </span><a href="https://mailchi.mp/promisec/promisec_emi_webinar_awareness_month" target="_blank" rel="noopener"><span data-contrast="none">EMI</span></a><span data-contrast="none"> and </span><a href="https://mailchi.mp/promisec/promisec_efimatica_webinar_awareness_month" target="_blank" rel="noopener"><span data-contrast="none">efimatica</span></a><span data-contrast="none"> &#8211; and have deep conversations about what it really means to secure the hybrid endpoint.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p><span data-contrast="none">You’ll get practical tips that will help your company weather this storm successfully, and might even get your question answered directly on one of the panels. Sign up to watch the panels for free, and let’s create a much more secure 2022. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p><span data-contrast="none">Save your spot for </span><a href="https://mailchi.mp/promisec/promisec_altisec_webinar_awareness_month" target="_blank" rel="noopener"><span data-contrast="none">October 20 panel</span></a><span data-contrast="none">, </span><a href="https://mailchi.mp/promisec/promisec_efimatica_webinar_awareness_month" target="_blank" rel="noopener"><span data-contrast="none">October 27</span></a><span data-contrast="none"> or </span><a href="https://mailchi.mp/promisec/promisec_emi_webinar_awareness_month" target="_blank" rel="noopener"><span data-contrast="none">October 28 panel</span></a><span data-contrast="none"> closing panel.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p>The post <a href="https://promisec.com/how-to-becybersmart-in-a-world-of-hybrid-endpoints/">How to #BeCyberSmart in a World of Hybrid Endpoints</a> appeared first on <a href="https://promisec.com">Promisec</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Reducing cyber risk &#8211; Putting theory into practice.</title>
		<link>https://promisec.com/reducing-cyber-risk-putting-theory-into-practice/</link>
		
		<dc:creator><![CDATA[Promisec Team]]></dc:creator>
		<pubDate>Wed, 11 Aug 2021 12:03:44 +0000</pubDate>
				<category><![CDATA[Webinar Post]]></category>
		<guid isPermaLink="false">https://promisec.com/?p=1548</guid>

					<description><![CDATA[<p>The post <a href="https://promisec.com/reducing-cyber-risk-putting-theory-into-practice/">Reducing cyber risk &#8211; Putting theory into practice.</a> appeared first on <a href="https://promisec.com">Promisec</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The post <a href="https://promisec.com/reducing-cyber-risk-putting-theory-into-practice/">Reducing cyber risk &#8211; Putting theory into practice.</a> appeared first on <a href="https://promisec.com">Promisec</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Securing a Hybrid Environment: In Office &#038;  Remote Endpoints</title>
		<link>https://promisec.com/securing-a-hybrid-environment-in-office-remote-endpoints/</link>
		
		<dc:creator><![CDATA[Promisec Team]]></dc:creator>
		<pubDate>Wed, 04 Aug 2021 13:29:24 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[News]]></category>
		<guid isPermaLink="false">https://promisec.com/?p=1488</guid>

					<description><![CDATA[<p>Last year, we were all caught by surprise. After years and years of building and refining our secure networks, keeping our employees safe meant sending them home. Whether we gave them devices to use at home or relied on whatever technology they already had, there was little time to strategize, execute and adjust. A deadly [&#8230;]</p>
<p>The post <a href="https://promisec.com/securing-a-hybrid-environment-in-office-remote-endpoints/">Securing a Hybrid Environment: In Office &#038;  Remote Endpoints</a> appeared first on <a href="https://promisec.com">Promisec</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Last year, we were all caught by surprise. After years and years of building and refining our secure networks, keeping our employees safe meant sending them home.</p>



<p> Whether we gave them devices to use at home or relied on whatever technology they already had, there was little time to strategize, execute and adjust. A deadly pandemic took over the world, and we had to act fast. </p>



<p>For some of us, it meant using band-aid solutions, relinquishing endpoint visibility and control, and hoping to stay ahead of malicious actors anyway.</p>



<p>Our network felt more exposed and vulnerable than it had in a long time. </p>



<p>Now, a year and a half later, as we catch our breath, as we navigate through changing COVID restrictions, as employees switch from WFH to in-office and back home again. </p>



<p>WFH is clearly not just a passing episode. COVID taught us that the hybrid work model is here to stay. Therefore, we need to ensure we have visibility to all endpoints, whether on-premise or remote. </p>



<p>How do we maintain our security standards in this hybrid model? How do we control endpoint patches and access? </p>



<p><strong>How to Secure the Hybrid Endpoint</strong> </p>



<p>As we previously shared, 60% of cyber incidents could have been prevented by installing existing patches. But monitoring and managing endpoints is more complex now than ever. It’s hard to keep track of which endpoints have been patched, which are vulnerable, and which have already given access to malicious programs. </p>



<p>Anyone who works in cybersecurity has heard the horror stories. An employee – whether in an entry-level or VP position – opens an email or downloads an innocent looking app, and unintentionally opens wide the door for malicious actors. </p>



<p>Employee education has always been key, but it’s more necessary than ever in today’s hybrid work model. </p>



<p>Of course, a one-time training isn’t enough. Even the best-intentioned employees can’t remember everything throughout the daily grind of their own work and home life. Changing mindsets and habits takes time. This needs to be part of your company culture, in combination with greater control for the security team. </p>



<p>In other words, your team still needs deep visibility into the entire network, even if some or all of it is remote. </p>



<p><strong>Ensure Endpoint Visibility, Whether On-premise or Remote</strong> </p>



<p>Helping cybersecurity professionals protect their companies and teams from hackers’ malicious attempts has always been at the forefront of everything we do here at Promisec.</p>



<p>After hearing from many of you about your struggles with this new hybrid work model, we got our own team together and developed a PEM work from home module. </p>



<p>It’s an agent-based solution that allows you to scan remote endpoints and ensure compliance regardless of network connectivity. The system seamlessly integrates remote and on-premise endpoints, to allow you to manage and monitor your assets as if they were all on the company network. Scan results are delivered to the PEM system and processed the same way you process standard scan results.</p>



<p> All scan results are encrypted and secured through HTTPS connections, and we support all current PEM security and cyber configurations. </p>



<p><a href="https://promisec.com/contact-us/">Click here to get a free consultation</a>, and stay as secure in the new paradigm as you were before. </p>
<p>The post <a href="https://promisec.com/securing-a-hybrid-environment-in-office-remote-endpoints/">Securing a Hybrid Environment: In Office &#038;  Remote Endpoints</a> appeared first on <a href="https://promisec.com">Promisec</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Reducing cyber risk- putting theory into practice. See everything. React in real-time. Stay secure.</title>
		<link>https://promisec.com/reducing-cyber-risk-putting-theory-into-practice-see-everything-react-in-real-time-stay-secure/</link>
		
		<dc:creator><![CDATA[Promisec Team]]></dc:creator>
		<pubDate>Fri, 30 Jul 2021 11:28:23 +0000</pubDate>
				<category><![CDATA[All]]></category>
		<category><![CDATA[Resources]]></category>
		<category><![CDATA[Webinar]]></category>
		<guid isPermaLink="false">https://promisec.com/?p=1407</guid>

					<description><![CDATA[<p>In this webinar you will learn best practices how to effectively manage multiple endpoints and servers in order to reduce cyber risks within your company.  The keynote speaker for this webinar, Mr. Ori Shahar, founder and CEO of CYDERO shares real use-cases scenarios in planning and executing security programs for enterprises complex environments and endpoints [&#8230;]</p>
<p>The post <a href="https://promisec.com/reducing-cyber-risk-putting-theory-into-practice-see-everything-react-in-real-time-stay-secure/">Reducing cyber risk- putting theory into practice. See everything. React in real-time. Stay secure.</a> appeared first on <a href="https://promisec.com">Promisec</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>In this webinar you will learn best practices how to effectively manage multiple endpoints and servers in order to reduce cyber risks within your company.  The keynote speaker for this webinar, Mr. Ori Shahar, founder and CEO of CYDERO shares real use-cases scenarios in planning and executing security programs for enterprises complex environments and endpoints on a mass scale.</p>



<h3>Key takeaways:</h3>



<ul class="wp-block-list">
<li>Explore what can be learned from Colonial Pipeline Breach </li>
<li>Learn the fundamentals for keeping endpoints up-to-date. </li>
<li>Discover the new PEM dashboard for complete endpoint visibility</li>
</ul>



<p>Who should watch the webinar: <br />CIOs, CISOs, Cybersecurity Professionals, Network Engineers, and IT Ops.</p>
<p>The post <a href="https://promisec.com/reducing-cyber-risk-putting-theory-into-practice-see-everything-react-in-real-time-stay-secure/">Reducing cyber risk- putting theory into practice. See everything. React in real-time. Stay secure.</a> appeared first on <a href="https://promisec.com">Promisec</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Quick guide for endpoint monitoring and management</title>
		<link>https://promisec.com/quick-guide-for-endpoint-monitoring-and-management/</link>
		
		<dc:creator><![CDATA[Promisec Team]]></dc:creator>
		<pubDate>Fri, 30 Jul 2021 11:22:12 +0000</pubDate>
				<category><![CDATA[All]]></category>
		<category><![CDATA[Resources]]></category>
		<category><![CDATA[White paper]]></category>
		<guid isPermaLink="false">https://promisec.com/?p=1396</guid>

					<description><![CDATA[<p>Achieving complete endpoint visibility with PEM for reducing cyber risk With 60% of cyber breaches involving vulnerabilities for which a security patch was available but not applied, it’s clear that any information security executive must ensure such failure will not happen during their shift. In this white paper, you will learn:  How to get complete [&#8230;]</p>
<p>The post <a href="https://promisec.com/quick-guide-for-endpoint-monitoring-and-management/">Quick guide for endpoint monitoring and management</a> appeared first on <a href="https://promisec.com">Promisec</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<h3 class="wp-block-heading">Achieving complete endpoint visibility with PEM for reducing cyber risk</h3>



<p id="block-bdbf0bbb-06be-4771-b968-711826117080">With 60% of <a href="https://www.csoonline.com/article/3153707/top-cybersecurity-facts-figures-and-statistics.html">cyber breaches</a> involving vulnerabilities for which a security patch was available but not applied, it’s clear that any information security executive must ensure such failure will not happen during their shift. </p>



<p id="block-0c9214f7-a204-47c8-808b-e0a758d5d228"><strong>In this white paper, you will learn: </strong></p>



<ul class="wp-block-list" id="block-ecac0f80-9e1d-4cde-8457-14b89444e42c"><li>How to get complete visibility across all endpoints within your organization</li><li>How to identify security issues or noncompliance to your specified company standards</li><li>Best practices in monitoring, managing, and analyzing endpoints’ related data.</li><li>Tactics to remediate security gaps with PEM.</li></ul>



<p></p>
<p>The post <a href="https://promisec.com/quick-guide-for-endpoint-monitoring-and-management/">Quick guide for endpoint monitoring and management</a> appeared first on <a href="https://promisec.com">Promisec</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
