Contactless Technology Attacks Threaten Individuals, Businesses
… hiring and development. The company previously raised $25 million from its seed investor Spring Ventures, and Series A investors SonicWall and Toba Capital.
The company partners with MSPs and MSSPs.
Jim Finnerty, is Perimeter 81’s channel partner manager.
“This funding will absolutely benefit our MSP and MSSP partners as it will enable Perimeter 81 to accelerate the development of our holistic SASE platform,” he said. “The unification of networking and security tools within one cloud-native, multi-tenant solution eliminates the major pains hardware management and legacy tool sprawl has created for MSPs and MSSPs in the past, and allows them to manage their client’s networks all in one place.”
Partner relationships are a major part of Perimeter 81’s growth plans, Finnerty said.
“Currently, we have 60 partners, including global technology reseller Ingram Micro,” he said. “In the coming year, we plan to increase our number of partners by 400% and expand our partner base worldwide. [The funding] will allow us to rapidly accelerate our product development so that we can quickly develop new features and resources based on our partners’ valuable product feedback.”
In February, Perimeter 81 unveiled a new SASE platform that combines its network-as-a-service offering with SonicWall’s cloud security capabilities.
Perimeter 81 has close to 1,000 customers. That includes Fortune 500 companies and prominent organizations in government, entertainment, technology and AI.
Positive Technologies: Hackers Moving Faster than Ever
Got 30 minutes? That could be all it takes to hack a company.
That’s according to new research by Positive Technologies. It’s based on the results of external penetration testing of corporate information systems performed by the company in 2019.
Companies tested included finance, IT, fuel and energy, government agencies, hospitality and entertainment, industrial and telecoms.
Findings include:
- Criminals can hack a company in as little as 30 minutes.
- For 93% of companies, the pen testers succeeded in breaching the network perimeter and accessing the local network.
- At three-quarters of companies, there was at least one easy penetration vector.
- Researchers found traces of previous attacks in one out of every six tested companies.
- Pen testers were able to brute-force web applications at 68% of companies and obtain log-in credentials. At one tested organization, they got more than 9,000 email addresses using this method.
- Seventy-seven percent of attack vectors were related to insufficient protection of web applications.
Ekaterina Kilyusheva is head of Positive Technologies‘ information security analytics research group.
“Our research found that the level of security of even large organizations remains very low,” she said. “And low-skilled hackers can penetrate the local networks of such companies. This is mainly due to known security flaws, and the use of vulnerable software versions and dictionary passwords.”
In 68% of companies tested, an attacker can gain access to the internal network in no more than two steps.
“For example, an attacker can quickly gain access to an internal network if a web application contains a known vulnerability for which a public exploit exists,” Kilyusheva said. “And at one quarter of organizations, a hack of the local network was possible in just one step.”
The average time for penetrating a local network was …