ElevenPaths announced its new strategic alliances in the third Security Day

Florence Broderick    27 May, 2016

In the third Security Day the new alliance with Fortinet and ElevenPaths’s new product integrations with Check Point and Spamina solutions to evolve their technologies were presented.

Madrid, 26th May. The Security Day, celebrated on 26th May, 2016 in Madrid under the theme Security Evolution, is the stage where every year ElevenPaths, Telefonica cybersecurity subsidiary, presents its new technological integrations together with its experts and partners. During the last three years the event has become a reference in cybersecurity and ICT sector at the national level.

Chema Alonso, ElevenPaths’ CEO, presented the new partnership signed with Fortinet to integrate the Faast tool with WAF systems, allowing to hot patch vulnerabilities and, for the first time, show the joint functioning of RSA and PaloAlto technologies with SandaS platform to automate the response to security incidents. Besides, as a result of our collaboration with ICC (Industrial Cybersecurity Center), SandaS GRC now offers tools to satisfy compliance with the latest safety regulations in the control of industrial systems and SCADA.

ElevenPaths made reference to its recent agreement with Check Point to offer the latest generation mobile security thanks to the integration of Tacyt, a cyber-intelligence tool against mobile threats, with the Mobile Threat Protection solution; and the new integration of Latch with Clean Email platform by Spamina, thanks to which its users will get an extra safety layer in their digital identities management.

Telefonica’s Cybersecurity brand expanded its portfolio of preventive solutions against sensitive information leakage in digital files with solutions for Exchange Server and Office 365. It has also presented VAMPS powered by Faast for IoT, its security audit system for the Internet of things.

» Donwload Press Release

More information www.elevenpaths.com

ElevenPaths Talks: The ISF Standard of Good Practice for Information Security

Florence Broderick    17 May, 2016

 

On Thursday, 19 May, our colleague Sebastian will give a speech about The ISF Standard of Good Practice for Information Security. The standard of good practice is fundamental in the world of information security. Improve resilience, validate information security awareness of employees, Form a basis for policies, standards and procedures, is essential for a correct information security management. We also recommend you the speech of our partner, Gabriel Bergel, on testing methodologies.

Sebastian’s speech will take 20 – 25 minutes, plus 5 – 10 minutes will be devoted to questions and answers. It will be held on Hangouts at 15:30 (GMT+1) and once finished, will become available on our YouTube channel. The session will be held in English.
We are looking forward to showing you everything you need to know about the good practice according to ISF in the information security environment. See the calendar of our next talks. Remember that you have an appointment with us on 19 May, at 15:30 (GMT+1)! To sign up use the ElevenPaths Talks form.

Today in the ITW (Chicago) we will be talking about Network Security

Florence Broderick    10 May, 2016

We are taking part in the International Telecoms Week that is going to take place in Chicago, where Pedro Pablo Pérez (Product and Services VP) will give a speech: “THE PATH TO NETWORK SECURITY IN THE WHOLESALE WORLD” this afternoon, at 4:00 p.m (Chicago time)

Cyberattacks on networks have been a daily threat for years and carriers are investing heavily in solutions to avoid network downtime and to keep customers’ data safe. Yet, the threat persists. Hackers never seem short of new ways to breach security barriers.

This session will look at the latest security issues, how carriers have been combating the attacks and will discuss how, if at all, carriers can stay one step ahead of attackers. It will also look at the wholesale world and the holes in protection that can occur when data is running over a number of different networks to reach the end-user.

  • How quickly are the nature of attacks on networks changing and how easy or difficult is it to keep up with them?
  • What are the latest severe threats and which solutions have proved most effective?
  • Is Network Virtualisation solving security problems or creating greater threats than before? What consequences can be drawn from this?
  • Is it enough for every carrier to do their own best, or does the wholesale world require combined efforts and universal standards to really provide end-to-end security?

ITW is the world’s largest meeting for the global wholesale telecommunications community. In its 9th year, Pedro Pablo Pérez will give his speech. Don’t miss it out! This afternoon, at 4:00 p.m (Chicago time).

Security Day 2016_Security Evolution

Florence Broderick    4 May, 2016

The digital revolution moves forward unstoppably, and the current business ecosystem requires adjustment. At ElevenPaths, we believe that adjustment comes together with evolution and that security is the means to evolve. Therefore, the motto of the third edition of our Security Day is Security Evolution.

It is our third anniversary and we want to celebrate it with you. Come join us in the third edition of our Security Day. We hope to see you on May 26, at 9:30 a.m. in the Auditorium Rafael del Pino, Calle Rafael Calvo 39A, Madrid (at the corner of Paseo de la Castellana).

Also, this year we give away t-shirts with “Global Security” logo. They are so easy to get! Follow us on Twitter @ElevenPaths and let us know about it on your arrival to the event. If this is not enough, we raffle off 2 double tickets for our day of security. Yes, you got it right. Don´t miss out anything on our Blog and Twitter!

Agenda
Among all our news, we will tell you about Virtual Patching and how to use Faast with WAF systems to hot patch vulnerabilities. Besides that, we’ll tell you about how we deployed digital signature services with digital certificates, set up with manual digital certificate and protected with Latch; as well as how we used SandaS GRC and Vamps in industrial systems and SCADA control.

Metashield Protector comes back with the product innovation for Exchange Server and Office 365. For the first time we will present our strategic alliances made with Fortinet and the integrations with CheckPoint. We’ll allot a session to tell you about the new implementations with Sinfonier and Latch that have been created during our talent contests and some other surprises.

Here is the agenda that we have prepared:

09:30: Guest list

10:00: Global Security Keynote

  • United we are stronger. Integration of security solutions to combat the complexity.
  • Industrial cyber security to protect critical infrastructures with SandaS GRC.
  • Digital signature in your organization: simple, innovative and user-friendly.
  • Hack Your Future: Latch & Sinfonier Contests.
  • Data Loss Detection: How to fight against Panamá Papers.

13:30: Farewell cocktails

For further details: securityday.elevenpaths.com

Seating is limited! Thus, we recommend you to register as soon as possible.

Register Now!

All this and even more at:
elevenpaths.com

Follow us on our social networks to stay updated on our news:
LinkedIn
Twitter
Facebook
Youtube

[New report] “Cyber-insurance: cyber risk transfer in Spain”

Florence Broderick    29 April, 2016

Yesterday we presented to the media and industry analysts the first report on the cyber risks transfer through cyber policies in Spain, prepared in conjunction with THIBER. It took place in the IE University’s Aula Magna, Madrid. Some of the most important companies in technology, insurance and consulting sectors such as AIG, AON, K2 INTELLIGENCE, MARSH, MINSAIT and TELEFÓNICA in collaboration with the IE University, took part in its production.

This document study was conducted with the aim of meeting a market need to manage cybersecurity risk through insurance protection.

» Download now the full report from our web ElevenPaths

The new threats related to the digital environment, the interconnectivity and the digitization of the Spanish business network prove the need for paradigm shift. The cyber security and risk consultancy providers, the public administration, the insurance sector itself, as well as the rest of the business sector should advocate the cyber incidents integral management, which according to data from INCIBE, increased 180 percent in Spain in 2015 alone.

Thus, there must be a continuous collaboration between the emergency departments of insurance companies, specialized technology companies and ICT departments of insured companies. For that, it will be essential to have a document that would serve as a based on analysis up-to-date tool, and, at the same time, would gather up common work proposals. This is where this new report will become the reference document for the immediate future.

The overall message of the event pointed at Spanish cybersecurity market as a booming market, offering products that improve cybersecurity both at corporate and the administrational level and, there is no doubt that it will give plenty to talk about in the short and medium term. It is the responsibility of all stakeholders to ensure its consolidation.

» Download now the full report “Cyber-insurance: cyber risk transfer in Spain″

More information:
elevenpaths.com

Mobile Threat Protection

Florence Broderick    28 April, 2016
The agreement between Eleven Paths and Check Point on commercialization and technological integration allows Telefonica to complement its Enterprise Mobility Management (EMM) solution with the most advanced mobile protection service.

At ElevenPaths we strongly believe that the only viable Information Security is one that protects all breaches of the corporate perimeter. When criminal organizations attack a corporation, they try to make their way successively to all entry-points in order to break any possible barrier. Hence, the security of the whole system is equal to the security of its weakest front. The security strategies that don´t shield against all possible attack vectors are completely useless versus advanced attacks.

This is the principle that guided us when developing our mobile security service product during the last months. We have implemented two confluent lines of work: on one hand, the capabilities improvement of our product Tacyt; on the other hand a thorough market research looking for the most forward-looking security technology which would meet all and each one of our demanding requirements (depicted in the diagram below) and which would naturally adjust itself to our products and services ecosystem.

We are convinced that the Mobile Threat Protection Service of Telefonica integrated into our Enterprise Mobility Management (EMM) suite is the best and the most comprehensive protection in the world. This service is disruptive for the following reasons:

  • It protects against the three mobile vectors attack. Most of the mobile security solutions are incomplete since they are only able to detect malicious applications, being ineffective against device or network attacks.
  • Behavioural Adaptive Security Analysis. In mobile context, the speed of attacks is almost instantaneous and malware mutation is fast. This has made it undetectable for traditional signature-based antivirus. Therefore MTP includes patented algorithms of behavioural analysis that, in combination with the advanced correlation from Tacyt, allows to detect zero-day attacks
  • Automatic triggering of quarantine policies. The answer to an attack can´t wait. For that reason MTP is integrated with the Telefonica MDM service to immediately trigger quarantine actions in order to isolate all at-risk devices and prevent information theft and lateral movements.
  • A built-in user-friendly service which ensures enterprise productivity. MTP is one more component of the Enterprise Mobility Management (EMM) suite of Telefonica. Thanks to the suite, the Telefonica clients have a single access point for corporate mobility services: connectivity, telecom expenses management, mobilization and productivity processes, mobile device management, and, of course, advanced security. It is also possible to hire some efficient professional services to which delegate the aforementioned services management.

To conclude, we strongly believe that our clients benefit from the best mobile security service available on the market.

*It may be of your interest:


Francisco Oteiza Lacalle

ElevenPaths and Check Point Software Technologies provide joint Mobile Protection Services Globally

Florence Broderick    22 April, 2016

Joint offering protects iOS® and Android® smartphones and tablets used in businesses of any size from the cyberthreats that proliferate the worldwide mobile ecosystem.

Madrid, April 22, 2016.ElevenPaths, a Telefónica company specializing in development of innovative security solutions and Check Point® Software Technologies Ltd. (NASDAQ: CHKP), the largest network cyber security vendor globally, today announced will be a provider of Check Point mobile security technologies for Telefónica corporate customers worldwide.

The agreement between Check Point and ElevenPaths provides Telefónica customers with a suite of mobile security services including Check Point Mobile Threat Prevention and complementary security products developed by ElevenPaths. This new offering will be part of the corporate mobility services Telefónica provides globally today, offering:

  • Protection against the three main vectors of mobile attacks including malicious applications, network attacks and attacks to devices’ operating systems.
  • Visibility and intelligence into the threat landscape of an organization’s entire mobile deployment.
  • Simple and transparent management of enterprise mobile security, while ensuring privacy.

“The Telefónica mobile security and mobility management solution facilitates day-to-day in business communications, guaranteeing productivity and protecting employee devices at all times,” said Pedro Pablo Pérez, vice president of products and services, ElevenPaths. “This agreement provides our customers with unparalleled mobile security with a joint product that combines Check Point Mobile Threat Prevention with Tacyt, a cyber-intelligence mobile threat tool developed by ElevenPaths.”

Check Point researchers continue to see a dramatic escalation in the number and sophistication of targeted attacks on mobile devices worldwide. Attacks like these can make business use of smartphones and tablets a significant risk to the security of sensitive enterprise data accessed on mobile devices.

“We believe mobile devices are the weakest link in corporate security today, leaving businesses susceptible to data leakage and network attacks,” said Amnon Bar-Lev, president, Check Point. “This agreement is a key part of protecting today’s businesses, and we’re looking forward to working with Telefonica and Eleven Paths to protect businesses around the world from these threats.”

Availability
With this offering, Check Point and ElevenPaths will deliver cutting-edge security for Telefonica customers through integration with ElevenPaths technology, which make it possible for security analysts to identify behavioral patterns displayed by criminal organizations.

» Download press release

For further information:
elevenpaths.com

ElevenPaths y Check Point Software Technologies ofrecemos servicios conjuntos de seguridad móvil

Florence Broderick    22 April, 2016

La oferta protegerá smartphones y tabletas iOS® y Android® utilizados en negocios de cualquier tamaño de las ciberamenazas que proliferan en el ecosistema móvil mundial.

Madrid, 22 de abril de 2016.ElevenPaths, la empresa especializada en el desarrollo de soluciones innovadoras de seguridad de Telefónica y Check Point® Software Technologies Ltd. (NASDAQ: CHKP), el mayor proveedor mundial especializado en seguridad, anunciamos hoy que ElevenPaths será proveedor de las tecnologías de seguridad móvil de Check Point para los clientes corporativos de Telefónica en todo el mundo.

El acuerdo entre Check Point y ElevenPaths ofrece a los clientes de Telefónica un conjunto de servicios de seguridad móvil que incluyen la solución Mobile Threat Prevention de la primera, así como productos complementarios desarrollados por la segunda. Esta nueva oferta será parte de los servicios de movilidad corporativa que Telefónica ofrece actualmente a nivel mundial hoy en día, y ofrecerá:

  • Protección contra los tres vectores principales de ataques móviles: aplicaciones maliciosas, ataques a nivel de red y ataques a los sistemas operativos de los dispositivos.
  • Visibilidad e inteligencia sobre el panorama de amenazas para la totalidad de la infraestructura móvil de la organización.
  • Gestión sencilla y transparente de la seguridad móvil de la empresa, garantizando al mismo tiempo la privacidad.

“La solución de seguridad móvil y gestión de la movilidad de Telefónica facilita el día a día en las comunicaciones del negocio, garantizando la productividad y protegiendo los dispositivos de los empleados en todo momento”, ha afirmado Pedro Pablo Pérez, Vicepresidente de Productos y Servicios de ElevenPaths. “Este acuerdo proporciona a nuestros clientes una seguridad móvil sin precedentes a través de una solución conjunta que combina Check Point Mobile Threat Prevention con Tacyt, herramienta de ciberinteligencia contra amenazas móviles desarrollada por ElevenPaths.”

Los investigadores de Check Point continúan apreciando una drástica escalada en el número y en la sofisticación de los ataques dirigidos en los dispositivos móviles en todo el mundo. Ataques como estos pueden hacer que el uso de teléfonos inteligentes y tabletas en los negocios entrañe un importante riesgo para la seguridad de los datos empresariales sensibles a los que se accede desde estos dispositivos.

“Creemos que los dispositivos móviles son actualmente el eslabón más débil de la seguridad corporativa, haciendo a las empresas vulnerables ante ataques fugas de datos y ataques a la red”, asegura Amnón Bar-Lev, presidente de Check Point. “Este acuerdo es un paso clave para la protección de las empresas de hoy en día, y estamos deseando trabajar con Telefónica y ElevenPaths para proteger a las empresas de todo el mundo de estas amenazas.”

Con esta oferta, Check Point y ElevenPaths ofrecerán seguridad de última generación para los clientes de Telefónica a través de la integración de la tecnología de ElevenPaths, que permite a los analistas de seguridad identificar los patrones de conducta que muestran las organizaciones criminales.

» Descargar nota de prensa

Más información en:
elevenpaths.com

Social engineering is more active than ever

Florence Broderick    22 April, 2016
The fact that Social Engineering has been the easiest method used by the scammers is not new. What we are going to describe in this blog today has been mentioned in some relevant Security reviews and newspapers, but at Elevenpaths, we are still surprised how easy this is happening.
A few months ago, our customers in the Middle East asked us how to overcome the so-called C-level scam (or Business E-Mail Scams as baptised by the FBI or also known as the “Fake President” fraud).
For the most basic scam, the “bad guy” should need to know the following information:  
  • If a company (let’s call it acme.com) is going through a merger or it has in mind acquiring a company (information obtained over the news, twitter comment insight, general gossip …). Let’s call this company Muntaleyxp.
  • C-level members and associated domains of the company (not mandatory). Let’s assume [email protected].
  • Financial controllers or under C-level people in the company. Information can be gathered through Linkedin for example. Let’s assume [email protected].
  • If the merger or acquisition process is done through a third company, find out one of the most relevant person in this company (let’s call it Kmiop). Let’s assume [email protected].
 
With this information the scam occurs as described below:  
  • If the scammer has accessed Miky’s email account though a Trojan for example, it is even easier. But let’s assume it is not the case. If the domain of the company has a letter you can trick such an “l” or “m” … then register a new domain and use it to send the main email. If not, then he/she can use a Gmail account. For example: [email protected]. [email protected].
  • Send the email to [email protected] and put [email protected] in CC (it can even be the real domain but ensuring Dan does not receive the email [misspell it] avoiding he will trigger the alarm and hoping Tom will not contact Dan).

  • Many variants can be used (such as Dan is also part of the scam [this time do not misspell it] and he will provide the bank account details) to perform the scam, but the general idea is there. The receiver (Tom) will be surprised with such message that he may act and do the transfer!
From Elevenpaths we have five suggestions to overcome this problem:  
  • Easiest and obvious one: Pick up the phone and ask the C-Level executive about his/her e-mail.
  • A technical one with its limitations: Try to set-up incoming email rules trying to cover as many misspelling options with C-Level executive names & surnames (with any associated domain), and blocking them. C-Level executive: Miky Wunderbalr (authorised e-mail: [email protected]). niky.wunderbalr, miky.wunderba1r, miky_wunderbalr, miky-wunderbalr, wunderbalr.niky. Along with an e-mail filtering system against identity theft in the Company (acme) properly configured with its associated SPF, DKIM y DMARC registers.
  • A second technical option related to a second/simultaneous factor of authentication: Our Latch product will provide the same concept we used to watch in those Hollywood movies such as Crimson Tide (with Denzel Washington and Gene Hackman) where two keys are needed from different people in order to launch a missile. If we assume “the missile” is the bank transfer itself, then Tom can authorise the transfer and Miky, with his latched account active is also required to do the transfer. Miky will ensure that his latched account is never active during “strange” hours.  
  • The costly one: Have a “powerful” cybersecurity insurance covering social Engineering attacks.
  • Any C-level manager should avoid sharing any news about possible company merger or acquisitions.  
Just remember: The weakest link is always us!
 

eSIM cards are here to boost the IoT

Cascajo Sastre María    14 April, 2016

SIM cards are much more than what they appear to be. Within an apparently simple rectangular metal chip encased in a plastic carrier is a miniature computer! SIM stands for Subscriber Identity Module. It is basically an integrated chip that has memory space, a microprocessor, an OS, a runtime environment, communication protocols, input/output capabilities, etc.

A SIM interacts with the mobile network in order to ensure two features that both customers and operators require:

  • Identity Management – authenticates the subscription – this is, the customer – in order to grant the device access to the communication network
  • Security – stores secret keys and information to secure communication and provides tamper proof protection so the information inside the SIM cannot be accessed without the proper credentials

SIM cards have evolved over time. In the hardware front there has been a continuous effort to increase capabilities, reduce the form factor and move towards more versatile formats. From the initial credit card size, the form factor has shrunk over years to Mini, Micro and Nano SIM card sizes. Soldered and removable SIMs allow special use cases. The software has also evolved to provide services such as payment applets or mobile connectivity.

eSIM, the evolution of the SIM paradigm

The industry has addressed the shortcomings of traditional SIM cards. The result is the eSIM paradigm, the evolution of SIM cards. These are some of the main reasons for the change:

  • sometimes SIM cards cannot be easily inserted
  • the devices might not be accessible
  • the conditions of temperature, humidity, vibration, etc. might affect operability
  • country issues – the destination or route of the device might be unknown
  • operator issues – the operator might need to be changed during the lifecycle of the device

IoT devices needed a new paradigm for all these stated reasons. New SIM cards in the future will not have a card format at all. They will be embedded in devices and known as eSIM cards. Their use will surpass the current scope of mobile and IoT devices. From the moment they are definitely deployed, they will become available for endless (many estimate that close to a billion) devices.

The UICC (Universal Integrated Circuit Card) will be included at factory/production time. The subscription to a mobile network is downloaded remotely and not embedded. The industry has working together in order to develop a fully GSMA compliant standard. Following these specifications ensures that users must have the freedom to choose any device, and that it will be fully operational regardless of the eSIM provider, device manufacturer or mobile operator.  Operators must also be able to select and deploy any remote server to manage any eSIM independently of the supplier. The key aspect is that the entire ecosystem complies with GSMA specifications.

Proof of concept of the eSIM paradigm was showcased at the 2016 Mobile World Congress. Telefónica is one of the key partners that are currently developing eSIM. Other key industry partners are Sony, LG, Samsung, Alcatel, Verizon, Huawei, Qualcomm, and China Unicom, among others.

Leave a Comment on eSIM cards are here to boost the IoT