Ericom Software News
17 articles
Cradlepoint acquires cloud security platform Ericom Software
Cradlepoint, part of Ericsson, has acquired Ericom Software to enhance its enterprise security services for 5G. The acquisition will enable Cradlepoint to develop the Cradlepoint NetCloud Threat Defense cloud service, expanding its portfolio of solutions for various use cases. Ericoms zero trust and cloud-based security solutions will form the basis of the new service. The combination of Cradlepoints networking expertise and Ericoms security solutions will meet the increasing demand for cloud-based secure network solutions in the era of 5G. The financial details of the acquisition were not disclosed.
PartnersAcquisition
Ericom Software Announces Completion of SOC 2 Type 2 Certification
Ericom Software has earned SOC 2 Type 2 certification for its cloud-based cybersecurity solutions, demonstrating its commitment to providing high-quality solutions based on strict security standards. The certification assures customers that Ericoms solutions adhere to the highest independent standards of confidentiality, security, and safety. Ericoms ZTEdge platform offers a simple way for enterprises to adopt Zero Trust security principles and protect against evolving cyberthreats. SOC 2 certification indicates that Ericom has undergone a rigorous auditing process, and it also indicates that Ericom solutions comply with AICPA Trust Services Criteria. The article does not mention any specific customers, investors, or acquisition or investment amounts. The event described in the article occurred on May 24, 2022.
Customers
Ericom Software Opens New Tel Aviv R&D Center to Support Business Growth
Ericom Software has expanded its Israel Development Center with a new R&D Center in Tel Aviv to support its businesss momentum and strategic product development. The company has grown its R&D team by over 30% since 2021 and is known as a leading provider of cybersecurity solutions. Ericoms recent introduction of a unique RBI solution for isolating online meetings has been well-received, allowing organizations in defense, financial, and government sectors to conduct secure online meetings. Ericom is also experiencing growth in greenfield market segments and has partnered with managed security service providers to deliver its ZTEdge SASE platform to midsize enterprises. The companys expansion and innovative solutions have contributed to its positive growth.
Expand
Ericom Software's Zero Trust Browser and Network Access Solutions on Pace for Record 2020 Growth, Supported By New Staff, Partnerships, and Expanding Product Portfolio
Ericom Software has announced strong year-over-year sales for its security product portfolio, driven by the demand for secure work-from-home solutions and the adoption of Zero Trust Security and Secure Access Service Edge (SASE) frameworks. The company highlighted the growth of its Remote Browser Isolation (RBI) cloud service and the launch of its new Zero Trust Network Access (ZTNA) product as key contributors to its momentum. Ericom Shield, the RBI service, has gained traction among enterprises. Ericom also introduced Ericom Application Isolator to protect corporate applications and data. The company expanded its partner network and worked with technology partners to integrate its solutions. Ericom Global Cloud expanded its footprint, and the company added key cybersecurity leaders to its team. Ericom Shield received several industry awards. The article emphasizes the companys resilience during the COVID-19 pandemic.
Customers
New Ericom Application Isolator™ Gives Existing VPNs and Networks a Simple, Cost-Effective Zero Trust Security Boost - Journal of Cyber Policy
Ericom Software Announces Distribution Partnership with Softprom to Deliver Remote Browser Isolation Technology in Europe
Ericom Software has announced a partnership with Softprom, a value-added IT solutions distributor in Europe. The partnership aims to deliver Ericom Shield Zero Trust Remote Browser Isolation (RBI) to Softproms partners throughout the region. Ericom Shield is an award-winning solution that prevents ransomware, web-borne threats, and phishing attacks. Softprom, with its network of over 1,200 partners in 30 countries, will be a key component of Ericom Softwares growth in Europe. The partnership will provide trusted solutions and services to organizations in selecting, deploying, and using software solutions and cloud services for advanced security threats. Softproms expertise in IT and cybersecurity solutions makes them an excellent addition to Ericoms portfolio.
Partners
Dark Reading Security Protect The Business - Enable Access
The article discusses the importance of understanding DNS and the potential attacks against it. DNS is a critical part of an organizations digital infrastructure, but it is often misunderstood. Attackers are causing damage through various DNS attacks, such as denial of service, DNS cache poisoning, and DNS hijacking. To defend against these attacks, security teams need to improve the organizations security hygiene around DNS infrastructure, implement controls like DNSSEC, and monitor DNS traffic.
CustomersPartners
Ericom Shield Receives Three 2020 Cyber Defense InfoSec Awards at the RSA Conference in San Francisco
Ericom Software, a cybersecurity company, has been awarded three 2020 Cyber Defense InfoSec Awards for its innovative solutions in anti-phishing, anti-malware, and next-gen email security. The awards were announced at the RSA Conference, a leading cybersecurity event. Ericom Softwares zero trust remote browser isolation solution, Ericom Shield, was particularly recognized for its effectiveness in protecting customers from advanced cyber threats.
Customers
IGEL IGEL and Ericom Software Expand Partnership to Modernize the Endpoint in Terminal Emulation for Legacy Applications
IGEL, a provider of the next-gen edge OS for cloud workspaces, and Ericom Software, a leader in secure web and application access solutions, have announced an expanded partnership. The partnership is aimed at delivering modern and secure access to server-based applications and legacy host systems. As a result of the agreement, Ericom’s PowerTerm terminal emulation solution has been embedded into IGEL OS and integrated with IGEL software-defined endpoints. This will provide mutual customers with secure and seamless access to legacy applications through an easy-to-use, intuitive graphical user interface.
Partners
How to Safely Browse the Internet Without Worrying About Downloading Malware
The article discusses the cybersecurity threats faced by organizations and introduces Ericom Software as a leading provider of Zero Trust secure access solutions. The CEO explains how Ericom Shield works, adopting a zero-trust posture with websites and emails to isolate end-users from potential threats while preserving the native user experience. The article highlights the benefits of Ericom Shield in preventing malware downloads and protecting against phishing sites. The impact on the company is growth-positive as it offers innovative security solutions in an ever-changing security environment. The key theme of the article is cybersecurity. The key issues discussed include customers and partners. No specific customers or partners are mentioned in the article. The date of the event described in the article is not provided. The confidence level is 8.
CustomersPartners
Talking to Ericom's new CEO about Ericom Shield and cloud security
How to Contain Cryptojackers Attacking Enterprise Networks
Is antivirus still relevant for your organization?
The article discusses the limitations of traditional antivirus software and the need for a layered approach to endpoint protection. It highlights the shift in the threat landscape and the increasing sophistication of cybercriminals. The author introduces Remote Browser Isolation (RBI) as an innovative solution to address zero-day threats and mutating malware. RBI keeps web-borne code off endpoints and networks by rendering websites in an isolated container. The article suggests that while antivirus software remains on the list of essential tools for network security, its effectiveness is diminishing, and newer solutions like RBI may replace it in the future.
Customers
https://www.scmagazine.com/someones-stealing-your-cpu-now-whatcha-gonna-do-about-it/article/771645/
The article discusses the rise of cryptomining and cryptojacking attacks, with hackers targeting websites to mine digital currency. Symantec, a cybersecurity company, reports that detections of coinminers on endpoint computers increased by 8,500% in 2017. Cryptojacking involves the unauthorized use of someone elses machine to mine cryptocurrency. The implications for enterprises can be severe, including slower performance and increased costs. Traditional security solutions are largely ineffective in detecting and stopping cryptominer launch code. The article suggests that integrating remote browser isolation technology into existing IT security frameworks can protect users and computing resources from cryptojacking and other browser-borne malware attacks. The article does not mention any specific customers, partners, or investors.
Customers
The UK's Biggest Cyber Security Event Infosecurity Europe
The article promotes Infosecurity Europe, an event that connects professionals in the information security industry. The event aims to provide knowledge, tools, and solutions for complex threat environments. It offers a conference program, exhibition, and networking opportunities. The article includes testimonials from industry professionals who highlight the importance of the event for education, networking, and brand exposure. The event is described as essential for professionals in the industry and has a positive impact on the growth of Infosecurity Europe.
CustomersPartners
Cyber Defense Magazine Annual Print Edition 2018
Klepto Currency: Are Hackers Cryptojacking Your Processing Power?
Crypto-jacking, the illicit use of someone elses computer to mine cryptocurrency, is on the rise. Miners are using malware to gain access to computing resources, with no discrimination between enterprise organizations and personal computers. Mining software library providers, such as Coinhive, are being hacked for nonconsensual use. This code has been found on a range of websites, including Showtime and Papa Johns Pizza. The code slows down PCs, reducing productivity and potentially opening gateways for future malware or ransomware attacks. Remote Browser Isolation (RBI) is being used as a defense, separating the browsing session from the endpoint device and discarding any malicious content when the session ends.
Customers