SMB Nation Blog

SMB Nation has been serving the Bainbridge Island area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

KnowBe4 Releases Email Exposure Check Pro to Help Organizations Identify At-Risk Users

KnowBe4 Releases Email Exposure Check Pro to Help Organizations Identify At-Risk Users
Revamped tool identifies at-risk users through deep web searches and hundreds of breach databases for no-charge.
Tampa Bay, FL – September 6, 2017KnowBe4, provider of the most popular security awareness training and simulated-phishing platform, today announced the release of the new version of its Email Exposure Check (EEC). knowbe4The new version is called the EEC Pro, has powerful additional features and is still provided at no cost.
While employees give out their corporate email for various reasons, IT is hard-pressed to keep track and manage the risk. EEC Pro helps IT by identifying an organization’s at-risk users by crawling social media information and scouring hundreds of breach databases to identify risk associated with user emails and identities. The more at-risk email addresses a company has, the bigger its attack surface, and the higher its risk.
EEC Pro only requires filling out a form, and works in two stages. The first stage performs deep web searches to find publicly available organization data provided on sites such as LinkedIn and Facebook. This allows the EEC Pro to show what organizational structure an attacker would be able to easily pull together and use to craft targeted attacks.
The second stage of EEC Pro utilizes the Have I Been Pwned data breach service to find users that have had their account information released in any of several hundred breaches. These users are particularly at-risk because an attacker knows more about them, potentially including their actual passwords. As the final step, EEC Pro provides a detailed summary report to the IT team, including an overview of the data found, a summary of organizational risk levels, and a link to a web report that contains a full list of all users found, the breaches the users were found in, and an overview of the data included in the breach. This allows IT managers to ensure exposed emails or exposed passwords are modified.
“Since 91% of data breaches start with a successful phishing attack, an organization must act reasonably or do what is necessary or appropriate to protect its data and take steps to identify weaknesses that expose their employees,” said Stu Sjouwerman, Founder and CEO of KnowBe4. “Employees are the last line of defense within an organization. We want to make it as easy as possible for IT professionals to reduce their attack surface and strengthen their weakest links.You need to create a ‘Human Firewall’”
Exposed emails and passwords can lead to recent data breaches such as those experienced by security companiesMandiant and Enigma where compromised passwords were not changed.
More information about EEC Pro is available here.
 
 
 
About KnowBe4
KnowBe4, the provider of the world’s most popular integrated new school security awareness training and simulated phishing platform, is used by more than 12,500 organizations worldwide. Founded by data and IT security expert Stu Sjouwerman, KnowBe4 helps organizations address the human element of security by raising awareness of ransomware, CEO Fraud and other social engineering tactics through a new school approach to security awareness training. Kevin Mitnick, internationally recognized computer security expert and KnowBe4’s Chief Hacking Officer, helped design KnowBe4’s trainings based on his well-documented social engineering tactics. Thousands of organizations trust KnowBe4 to mobilize their end-users as the last line of corporate IT defense.
Number 231 on the 2017 Inc 500 list, #50 on 2016 Deloitte’s Technology Fast 500 and #6 in Cybersecurity Ventures Cybersecurity 500. KnowBe4 is based in Tampa Bay, Florida. For more information, visit www.knowbe4.com and follow Stu on Twitter at @StuAllard.
 
Continue reading

Buying managed security services is a growing trend with companies

Buying managed security services is a growing trend with companies, as they seek to implement market-leading security solutions while dealing with a shortage of trained security personnel and a limited CAPEX budget. IDC predicts double-digit growth for this market and is expecting the MSSP market to hit $27 billion by 2020 (WW). While telcos and system integrators (SIs) play a large role in this space, trusted channel partners are finding customers seeking help with their security needs.

Providing managed services can be an attractive and highly profitable revenue stream for channel partners alreadyBrand Aware Digital IoT and Cloud 220x150 providing configuration and setup services. Utilizing cloud-based capabilities and automated reporting, partners are able to deliver peace of mind to their customer base without significant effort or expense.

With our latest release, Fortinet’s FortiCloud now has the ability to manage the world’s most popular UTM from the cloud (Fortinet’s FortiGate UTM appliances were recently named a leader in the 2017 Gartner Magic Quadrant for the eighth consecutive time). Channel partners can access customers’ FortiGate Firewalls from any browser, from anywhere, and at any time, simplifying the effort to service customer networks. Automated reports remind the customer of the value of the service, showing what protection the partner has provided each month via Fortinet’s UTM, switches, and wireless access points.

Compared to other vendors with cloud-managed offerings, Fortinet provides best-in-class protection throughout the product range and multiple third-party certifications have validated that the protection provided by Fortinet consistently leads the market. Learn more about our FortiCloud solutions or become a partner today!

Continue reading

Webroot/Ninja Integration

Expanded Security Service Offering to include DNS Protection and Integrated Console Allows NinjaRMM Clients to Reduce Complexity of Cybersecurity Management While Growing their Revenue Stream

About the Partnership:

  • NinjaRMM has been partnering with Webroot since May 2016.
  • NinjaRMM’s addition of Webroot’s SecureAnywhere® DNS Protection to its portfolio will provide customers protection against malicious websites with minimal complexity for the service provider and the end consumer. The product is controlled via the Webroot Global Site Manager used by the endpoint solution, offering a single console to set company-wide browsing controls and internet-use tracking.
  • In addition to SecureAnywhere DNS Protection, NinjaRMM offers its customers Webroot’s SecureAnywhere Business Endpoint Protection, providing MSPs the ability to offer multiple layers of protection and increase revenue.
  • The integration of Webroot’s industry-leading solutions into Ninja’s RMM platform provides one location for management and reporting, saving time and reducing the overall cost of administration.

Ninja is now HIPPA Compliant – Ninja’s focus on Healthcare will give the ability for agency’s to be sure of compliance standards from its platform.

Release 2.14 – Just completed

Third-Party Patching (beta): Fully managed patching of 100+ applications. Includes common office applications like Adobe products, browsers, Java, and more. For more information on how to access the beta, please refer to the Ninja Support Community.

Splashtop for Windows and Mac: Remote access your Win/Mac devices through a single-pane integration with NinjaRMM. Easily deploy Splashtop to your desired organizations.

NEW Mac Scripting: New out-of-box scripts for Macs. You can now enable SSH, re-apply user permissions and more directly from NinjaRMM console.

  • Enable/Disable Firewall
  • Disable Firewall
  • Reset printing
  • Empty trash
  • Flush DNS
  • Kill core audio
  • Auto updates off
  • Purge disk cache
  • Reapply user permissions
  • Reset launcher service
  • Repair disk permissions
  • Repair SSH
  • Repair TeamViewer
    • Reinitializes Teamviewer, kills the service and restarts it

Windows OS Keys Report: New reporting section for Windows OS keys to make software asset management easier.

Remote Command Line: Ability to run commands as currently logged-in user.For full release notes, please refer to our community page here.

 

Ninja

Continue reading

Q&A: How Fortinet’s Security Fabric Creates New Opportunity for Channel Partners

Joe Sykora, Fortinet’s Vice President of Americas Channels and Enhanced Technologies, gives his perspective on how an integrated security architecture like Fortinet’s Security Fabric creates new opportunities for solution providers. Joe Sykora, Fortinet’s Vice President of Americas Channels and Enhanced Technologies, gives his perspective on how an integrated security architecture like Fortinet’s Security Fabric creates new opportunities for solution providers. 


Why is the idea of a security fabric so important to network security in this current environment?

Organizations can’t just keep adding new, siloed security solutions that don’t talk to other devices on their network, banner ad security fabric 220x150 002and that require separate management and collaboration tools. What organizations need today is a collaborative system of tools that work together to monitor their network, share information, and respond to threats no matter where they occur.

The Fortinet Security Fabric allows us to take all of our tools and integrate them into a single, interactive security framework. This collaborative ecosystem also includes third-party partners in cloud, software-defined networking, sandboxing, testing, security information and event management (SIEM), and Single Sign On technologies, as well as support for the services provided by our worldwide family of channel partners.

How does Fortinet’s Security Fabric benefit Fortinet’s global partner network of distributors and solution providers?

Because of its critical and complex nature, security continues to be one of the largest opportunities for the channel. Partners that can plan, design, deploy, and optimize an integrated security offering are finding a growing demand for their skills. 

By tying traditional security appliances and emerging technologies together into an integrated security fabric, partners can help their customers collect and respond to more actionable intelligence, synchronize threat responses, and centralize the creation, distribution, and orchestration of their security management and analysis. This broad visibility and open-standards approach provided by the Fortinet Security Fabric allows solution providers to implement more automation to focus on the alerts that really matter.

How is Fortinet’s Fabric Ready Partner program different from the alliance partner programs we see other vendors promoting?

Like many partner programs, Fortinet’s Fabric Ready Partner Program brings together best-in-class technology alliance partners. But unlike those other approaches, Fortinet’s approach actually allows our channel partners to deliver pre-integrated, end-to-end security offerings ready for deployment.

And for our channel partners, extending the functionality and intelligence of the Fortinet Security Fabric vision with an open and cooperative ecosystem of partner solutions means they can more easily:

  • Deliver more effective, more responsive security solutions that leverage the collaborative power of the Fortinet Security Fabric
  • Speed business outcomes with integrated ecosystem solutions that address customers’ needs.  Leverage Fortinet’s Fabric-Ready seal of approval to build trust with customers and instill confidence that the solutions work
  • Deliver solutions with faster time-to-deployment to customers, with reduced technical support burden & costs due to pre-validation.

Download our eBook, How the Fortinet Security Fabric Addresses Today’s Top Security Concerns.

Tags:
Continue reading

The Importance of Performance and Protection – The Fortinet UTM Solution

John Maddison, Fortinet Senior Vice President of Products and Solutions

Fortinet’s UTM solutions have been positioned in the leader’s quadrant of Gartner’s annual Magic Quadrant for Unified Threat Management for the 8th time in a row.

Fortinet has maintained its position as the leader in this market by delivering the banner ad SMB gartner mq utm 220x150 1broadest, most powerful, and highly-automated UTM security solution available, designed to protect all points in the network – from the IoT to the cloud, physical and virtual networks, and wired and wireless environments with a wide range of powerful security and networking tools.

We believe your customers should never have to choose between performance and protection.  Which is why Fortinet’s UTM solution consistently provides the best price to performance ratio in the industry. Our UTM devices are built using our patented series of security processors, and by offloading CPU-intensive security inspection and decryption functions to specialized silicon, our latest SOC3 (System on a Chip) processor is able to provide the most cost-effective, high-performance solution on the market.

The Leading Solution for Small to Medium Businesses and Distributed Enterprises

The Fortinet UTM solution enables you to protect your customers across the entire threat spectrum with integrated high performance next generation firewalls, web and email filtering, data loss prevention, and more. And unlike others in this market, Fortinet’s UTM solutions also enable you to address networking needs with extensive routing, switching, access control, Wi-Fi, LAN, and WAN capabilities.

These capabilities are all administered through FortiManager’s unified, single-pane-of-glass management console. It automates the provisioning and management of devices, centralizes policy distribution and orchestration, and helps maintain regulatory compliance to reduce operational burdens, so you can operate efficiently while providing superior service to your customers.

Learn more about our SMB security solutions on www.fortinet.com. If you’re interested in going to market with the industry leader, become a partner today!

Continue reading