George Wainblat

Israel Contact Info
11K followers 500+ connections

Join to view profile

About

- Over 20 years of technical and business leadership in cyber security, software and…

Activity

Join now to see all activity

Experience & Education

  • Frontegg

View George’s full experience

See their title, tenure and more.

or

By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.

Licenses & Certifications

Volunteer Experience

Publications

  • Simplifying Multivendor Management with Risk & Fraud Orchestration

    Transmit Security

    When it comes to fighting fraud, businesses need to use every tool in their arsenal to accurately assess risks in today’s rapidly changing threat landscape. But as more and more solutions and data sources are needed to manage risk, the complexities of managing a multitude of data sources can actually harm — not help — teams’ efforts to accurately measure risk and quickly respond to changing threats.
    Fortunately, risk orchestration provides a solution to these challenges. This blog post will…

    When it comes to fighting fraud, businesses need to use every tool in their arsenal to accurately assess risks in today’s rapidly changing threat landscape. But as more and more solutions and data sources are needed to manage risk, the complexities of managing a multitude of data sources can actually harm — not help — teams’ efforts to accurately measure risk and quickly respond to changing threats.
    Fortunately, risk orchestration provides a solution to these challenges. This blog post will explain what risk orchestration is, how it benefits businesses, and how it works on the Transmit Security Platform.

    See publication
  • How Synthetic Identities Circumvent Security and What’s Needed to Secure Onboarding

    Transmit Security

    How do you know who is registering an online account with your business? The answer is complicated by the rise of ‘Frankenstein fraud,’ also known as synthetic identity fraud, which combines stolen data belonging to a real person with fake information to create a new, fraudulent identity. For example, the criminal might use a stolen Social Security Number (SSN), the victim’s real name and date of birth (DoB) along with a fake address plus a phone number that’s in their control.

    By using…

    How do you know who is registering an online account with your business? The answer is complicated by the rise of ‘Frankenstein fraud,’ also known as synthetic identity fraud, which combines stolen data belonging to a real person with fake information to create a new, fraudulent identity. For example, the criminal might use a stolen Social Security Number (SSN), the victim’s real name and date of birth (DoB) along with a fake address plus a phone number that’s in their control.

    By using some real identity data, they’re more likely to appear legitimate and evade detection by legacy and DIY data validation methods. In some cases, they’ll use their own phone number to receive one-time passcodes during the account creation or authentication process. It’s unlikely this phone is tied to their identity, however. Instead, they use prepaid phones, virtual phone numbers (voice over internet protocol) or spoofed phone numbers so they can’t be linked to the illegal activity.

    With high-quality fake IDs (easily purchased online), they present ‘proof’ of their synthetic identities to slip past initial screenings. Once enrolled, bad actors can use fraudulent accounts to make purchases with stolen credit cards, open new lines of credit, launder money or conduct other financial schemes.

    See publication
  • 5 Ways Data Validation Boosts Profitability in a Slowing Economy

    Transmit Security

    With a sluggish US economy, rising just 1.1% last quarter, global companies are looking for new ways to increase profitability — areas within their control. Preventing fraud is exactly that, and if done right, it’s an ideal strategy for businesses to cut their financial losses and attract more customers.
    Increase overall sales and shave fewer expenses off that total revenue number with Transmit Security Data Validation. With an easy-to-implement service, you can meet those KPIs faster than…

    With a sluggish US economy, rising just 1.1% last quarter, global companies are looking for new ways to increase profitability — areas within their control. Preventing fraud is exactly that, and if done right, it’s an ideal strategy for businesses to cut their financial losses and attract more customers.
    Increase overall sales and shave fewer expenses off that total revenue number with Transmit Security Data Validation. With an easy-to-implement service, you can meet those KPIs faster than you’d think.
    We’ve integrated the leading data sources to give you global & regional coverage.
    Our service validates the user’s email address, physical address, phone number, date of birth, SSN, background or credit history — any personal data you require. It runs all of these checks and performs knowledge-based authentication simultaneously, so you don’t need to worry about speed and aggregation.

    See publication
  • Secure Account Opening with Passive Validation

    Transmit Security

    In both real life and in online business, first impressions count. With steep competition for new users, providing a frictionless experience during the first moments of user interaction plays a key role in enabling rapid growth. Customer surveys from leading analysts have revealed that over 70% of consumers buy on customer experiences alone, and for over two-thirds of consumers, customer experience is more important to brand loyalty than price and brand combined.
    Diverse business needs…

    In both real life and in online business, first impressions count. With steep competition for new users, providing a frictionless experience during the first moments of user interaction plays a key role in enabling rapid growth. Customer surveys from leading analysts have revealed that over 70% of consumers buy on customer experiences alone, and for over two-thirds of consumers, customer experience is more important to brand loyalty than price and brand combined.
    Diverse business needs require a range of services that can evaluate risk and trust in new account opening and beyond. Ultimately, experienced business owners must decide if these additional steps are needed in order to securely onboard new users. To evaluate the right level of assurance for your business, check out our Identity Validation, RTFBB and Identity Verification service pages or schedule a demo with one of our experts.

    See publication
  • Identity Validation

    Transmit Security

    Instantly validate customer identity details. Automate background checks for accurate results in a split second. Transmit Security’s Identity Validation API easily connects to external data sources as well as your own internal data to validate identities and build a comprehensive customer profile. The service simplifies and expedites account registration to comply with global regulations, stop fraud and protect your business.

    See publication
  • How Identity Orchestration Solves Identity Security Challenges

    Transmit Security

    Identity orchestration allows organizations to manage a user identity across their various apps and cloud-based services. While many traditional identity providers can offer a more convenient login experience, there are a few trade-offs to providing a single identity across all systems — mainly reduced threat detection and mitigation. In this article, we’ll explain how integrating a risk-aware identity orchestration platform can better improve your identity and access management (IAM).

    See publication
  • Identity Orchestration

    Transmit Security

    Identity orchestration allows you to offload identity logic and workflows from your application. Instead of writing code, you can graphically design workflows for authentication, identity proofing, and fraud detection.

    See publication
  • Changing The Cat and Mouse Game of Firmware Attacks

    Kameleon

    One of the noiseless yet foundational transitions in computing during the last decade has occurred in the firmware used to perform functions like hardware initialization during boot and runtime services during regular OS operation. As the usability and performance of generations of firmware raced ahead, their security often lagged, leaving the firmware world too slow for the threats it faces. Hackers have taken notice and escalated their attacks in both frequency and sophistication.
    To…

    One of the noiseless yet foundational transitions in computing during the last decade has occurred in the firmware used to perform functions like hardware initialization during boot and runtime services during regular OS operation. As the usability and performance of generations of firmware raced ahead, their security often lagged, leaving the firmware world too slow for the threats it faces. Hackers have taken notice and escalated their attacks in both frequency and sophistication.
    To secure firmware against ever more ambitious and creative attackers, a Root of Trust (RoT) is necessary as an entity against which to check every layer of the stack from hardware boot to firmware load, OS runtime up until the running applications. The only way for a computing component to be trustworthy in this way is for it to be immutable, a condition that eliminates any sort of software solution as an option. A hardware solution is therefore necessitated, often involving storing crypto keys that tie directly to the device owner who provisioned the keys in the silicon of a machine rather than in its software in an isolated implementation. Novel solutions take things a step further by offloading the RoT to a separate security processing unit (such as Kameleon ProSPU) chip entirely to enable remote attestation for all motherboard components but also any peripheral device connected to the system.

    See publication
  • Get Outta Here: Securing Computing Systems by Storing Security Elsewhere

    Electronic Design

    Cybersecurity has long been a game of cat and mouse between organizations looking to secure their networks, devices, and data with increasingly more sophisticated security solutions. Meanwhile, hackers look to poke and exploit whatever holes may exist in those defenses. The architecture of this conflict has disproportionately benefited hackers, as through trial and error they have been able to map a target’s defenses until the point where they identify a way in.
    The location of where…

    Cybersecurity has long been a game of cat and mouse between organizations looking to secure their networks, devices, and data with increasingly more sophisticated security solutions. Meanwhile, hackers look to poke and exploit whatever holes may exist in those defenses. The architecture of this conflict has disproportionately benefited hackers, as through trial and error they have been able to map a target’s defenses until the point where they identify a way in.
    The location of where security solutions are stored plays a pivotal role here, as hackers’ perpetual probing only serves its purpose if a target’s defenses are visible, or worse, accessible. Storing unprotected encryption keys, credentials, and sensitive data anywhere reachable is equally unadvisable.
    All told, what CIOs, CISOs, and IT decision-makers need to realize is that their systems are very much vulnerable, especially at the software and firmware levels. Storing security systems, let alone a RoT, at these levels is folly. Therefore, what’s needed is a hardware solution that can be used to store security beyond the hacker’s reach while also hosting a RoT that can authenticate and authorize any alteration of any stack level. In addition, it must be flexible enough to adapt to new vulnerabilities and enable security applications.

    See publication
  • Shedding Light on Shadowy Supply Chain Cyberthreats

    Kameleon

    With more eyes trained to the vulnerabilities of the changing global technology supply chain, developing ways to prevent future issues has become top of mind for manufacturers especially in this turbulent trade time. High-profile hacks originating from sources along the supply chain have dominated the cybersecurity landscape over the past year, most notably with the SolarWinds breach that eventually infected up to a quarter of North American electric utilities.
    Though organizations have…

    With more eyes trained to the vulnerabilities of the changing global technology supply chain, developing ways to prevent future issues has become top of mind for manufacturers especially in this turbulent trade time. High-profile hacks originating from sources along the supply chain have dominated the cybersecurity landscape over the past year, most notably with the SolarWinds breach that eventually infected up to a quarter of North American electric utilities.
    Though organizations have typically had to just hope and trust that supply chain vendors were delivering safe solutions, this approach is no longer viable, as multiple high-profile hacks from supply chain sources over the past year have proven. In order to protect themselves – and their customers and clients – CSPs and Server OEMs must introduce additional visibility and attestation into their supply chain product sourcing with a hardware RoT solution.

    See publication
  • Kameleon ProSPU Product Brief

    Kameleon

    Kameleon’s Proactive Security Processing Unit (ProSPU) is the world’s first processor designed to enforce system’s security throughout its lifecycle. The ProSPU is a Hardware Root of Trust (RoT), controlling the system boot and performing platform and peripheral attestation. Kameleon can extend the ROT role for HW based runtime security by dynamically protecting and securing the computing platform and applications on it.
    Integrating Kameleon’s ProSPU enables platform designers to implement…

    Kameleon’s Proactive Security Processing Unit (ProSPU) is the world’s first processor designed to enforce system’s security throughout its lifecycle. The ProSPU is a Hardware Root of Trust (RoT), controlling the system boot and performing platform and peripheral attestation. Kameleon can extend the ROT role for HW based runtime security by dynamically protecting and securing the computing platform and applications on it.
    Integrating Kameleon’s ProSPU enables platform designers to implement Platform Firmware Resiliency and comply with the NIST 800-193 and OCP requirements with minimal effort. In addition, when deployed on Linux-based systems, it makes the platforms resilient to a wide range of software attacks such as malware, ransomware, and rootkits.

    See publication
  • Introducing tags to Akeyless Vault

    Akeyless

    We’ve recently added the ability to assign tags to any type of secret, such as encryption keys, static and dynamic secrets, and PKI & SSH certificates issuers. Each tag consists of a user defined case-sensitive string of an unlimited length. You can add the same tag to multiple Akeyless resources, or you can add the same item to a number of tags.

    See publication
  • Using Akeyless Vault to Enable Zero Trust – Secure Remote Access

    AKEYLESS

    Implementing a Zero Trust security model requires that your organization isn't trusting anyone or anything automatically, from inside or outside of your organization. In this blog we'll delve into some of Zero Trust principles of Just-in-Time Access, Least Privileged Approach and Zero-Standing Permissions, discussing why Akeyless is in the best position to provide a comprehensive Zero-Trust solution.

    See publication
  • Protect your Ansible Secrets and Privileged Access

    AKEYLESS

    More and more organizations are counting on Ansible for their configuration management. In order to operate Ansible, you need a multitude of permissions on target machines, such as SSH keys and passwords - highly sensitive information that needs trustworthy protection.
    Akeyless automated, centralized Secrets management relieves you of the hassle associated with Secrets management while protecting your Secrets with Zero Trust encryption.

    See publication
  • Protect your CHEF Secrets and Privileged Access

    AKEYLESS

    A growing number of organizations are counting on CHEF for their configuration management. In order to operate CHEF, you need a multitude of permissions on target machines, such as SSH keys and passwords - highly sensitive information that needs trustworthy protection.
    For this exact reason, configuration management tools, such as CHEF, have become an attack target as gatekeepers and aggregators of access and permissions to your workload environments; an especially lucrative target…

    A growing number of organizations are counting on CHEF for their configuration management. In order to operate CHEF, you need a multitude of permissions on target machines, such as SSH keys and passwords - highly sensitive information that needs trustworthy protection.
    For this exact reason, configuration management tools, such as CHEF, have become an attack target as gatekeepers and aggregators of access and permissions to your workload environments; an especially lucrative target presenting a winner-takes-it-all prize.

    See publication
  • How to manage Kubernetes Secrets with Akeyless Vault

    Information Age

    This article will explore how the Akeyless Vault solution works, and how you can use it to manage Kubernetes Secrets

    See publication
  • Secrets Management “Done Right” Improves Your DevOps KPIs

    AKEYLESS

    An IT Ecosystem cloud technologies infrastructure is constantly changing and must scale to fit the needs of your organization. Cloud technologies require secrets management to manage an organization’s tokens, keys, and passwords. DevOps Engineers are tasked to manage the ever-increasing amount of secrets to automate deployments and build infrastructure in the cloud. There are several ways to manage your organization’s secrets, some better than others.

    See publication
  • Secrets Management for DevOps: Best Practices

    AKEYLESS

    The combination of proliferation and decentralization of secrets, widely familiar to any DevOps team, creates an operational burden, not to say a nightmare. Having the same passwords in your multiple Ansible jobs, your Kubernetes containers, or in the daily batch routine you’re coding, requires a considerable effort when these passwords need to be rotated.

    Since secrets are located in various environments (cloud, on-prem, hybrid) and managed by different administrators, such as Island of…

    The combination of proliferation and decentralization of secrets, widely familiar to any DevOps team, creates an operational burden, not to say a nightmare. Having the same passwords in your multiple Ansible jobs, your Kubernetes containers, or in the daily batch routine you’re coding, requires a considerable effort when these passwords need to be rotated.

    Since secrets are located in various environments (cloud, on-prem, hybrid) and managed by different administrators, such as Island of Secrets, Ansible Secrets, Docker Secrets and Kubernetes Secrets, to name a few, no unified control pane is available for the management of the multiple secrets repositories.

    For organizations that operate in both a cloud-native environment and a classic IT infrastructure, a duplication issue is created due to having their own secrets managed with different tools and a cloud-native solutions. Last but definitely not least, there is a security concern – how can cloud-native systems securely access resources that are external to their environment.

    See publication
  • Cryptographic Key Management Trends in 2019

    Unbound Tech

    In September 2019, Unbound Tech surveyed 500 members of the Cyber Security Competency Group
    (CSCG), a group of cybersecurity professionals (analysts, engineers, and architects) from different industries across North America. The survey addressed cryptographic key management and certificate management practices.
    Respondents hailed from a variety of industries, illustrated below. The top 3 industries represented in this report are Information Technology and Services (20%), Financial…

    In September 2019, Unbound Tech surveyed 500 members of the Cyber Security Competency Group
    (CSCG), a group of cybersecurity professionals (analysts, engineers, and architects) from different industries across North America. The survey addressed cryptographic key management and certificate management practices.
    Respondents hailed from a variety of industries, illustrated below. The top 3 industries represented in this report are Information Technology and Services (20%), Financial Services (11%), and Computer Software (11%). What they all had in common, however, is that their organizations manage cryptographic keys. How they do it - and how well -- will be addressed in this report.

    See publication
  • Controlling your Data and Keys In Google Cloud with Cloud EKM

    Unbound Tech

    Unbound Tech has partnered with Google Cloud Platform, integrating with the Google Cloud External Key
    Management (Cloud EKM) product, to allow Google Cloud users to control their data by having full control of their encryption keys. Currently in Beta, Cloud EKM is part of Google’s existing Cloud Key Management Service (Cloud KMS), which enables users to manage cryptographic keys for cloud services in the same manner they would on-premise.
    With Cloud EKM, it is now possible to use…

    Unbound Tech has partnered with Google Cloud Platform, integrating with the Google Cloud External Key
    Management (Cloud EKM) product, to allow Google Cloud users to control their data by having full control of their encryption keys. Currently in Beta, Cloud EKM is part of Google’s existing Cloud Key Management Service (Cloud KMS), which enables users to manage cryptographic keys for cloud services in the same manner they would on-premise.
    With Cloud EKM, it is now possible to use cryptographic keys outside of Google Cloud Platform to protect data at rest for customers using Google’s Cloud Key Management Service (KMS). Unbound Key Control (UKC), the first and only software-based virtual HSM solution that is FIPS-140-2 Level 2 certified by NIST, leverages secure multiparty computation (MPC) to protect cryptographic keys by ensuring they never exist in complete form throughout their lifecycle. Through the integration of these two products, Google Cloud customers now have unprecedented levels of security and control over cryptographic keys while maintaining access to critical data sets.

    See publication
  • How to Hack an Hardware Security Module (HSM)

    Unbound Tech

    Ever wondered how it’s possible to hack a hardware security module (HSM)? ​We recently had the opportunity to chat with Dr. Fotis Loukos, researcher at the Aristotle University of Thessaloniki and Director of Security Architecture at SSL Corp. We also spoke to him about standardization testing for HSMs, and how all of us in the security community could benefit from independent testing of HSMs.

    See publication
  • DevSecOps: Looking at Code Signing Holistically

    Unbound Tech

    Code signing proves the identity of the source vendor of a software (only the private code signing key holder can create the signature) and verifies that the code has not been tampered with since being published. Code signing can be done in two phases, at the first once binary files (library/executables) are signed, and in the latter packages containing collections of such (e.g. RPM, docker, NuGet) are signed in order to provide means to validate the released packaged code.
    It is essential…

    Code signing proves the identity of the source vendor of a software (only the private code signing key holder can create the signature) and verifies that the code has not been tampered with since being published. Code signing can be done in two phases, at the first once binary files (library/executables) are signed, and in the latter packages containing collections of such (e.g. RPM, docker, NuGet) are signed in order to provide means to validate the released packaged code.
    It is essential for all the relevant stakeholders in the enterprise that are involved in code signing operations (such as CIO, VP R&D, CISO, Head of DevOps) to have a holistic overview of the code signing process – what is signed, on which platforms, what type of certificates are used (OV/EV), how the certificates are managed, how the code signing keys are protected, how the entire solution is managed and automated, who have permissions to do what, how the users are authenticated, etc., and come up with the most suitable course for the organization.

    See publication
  • When Traditional High Availability Is Not Good Enough

    Unbound Tech

    In this blog, we will explore how one can provide a highly available key management and vHSM service, for the relevant cryptographic use cases, comparing Unbound pure-software technology to the legacy HSMs.
    It is essential to create a coherent design for the required services availability which is appropriate to the particular business processes, and to match them to the how critical each of these processes is to the overall business mission of the organization. Based on this information a…

    In this blog, we will explore how one can provide a highly available key management and vHSM service, for the relevant cryptographic use cases, comparing Unbound pure-software technology to the legacy HSMs.
    It is essential to create a coherent design for the required services availability which is appropriate to the particular business processes, and to match them to the how critical each of these processes is to the overall business mission of the organization. Based on this information a proper arrangement for high availability should be made, preventing downtime of crucial components of the service, such as key management and protection.

    See publication
  • FIPS 140-2 Certification Levels: Security And Compliance Considerations

    Unbound Tech

    The FIPS 140-2 certification provides vital assurance that cryptographic modules meet industry-accepted standards for protecting keys. Alongside with compliance with FIPS requirements, organizations deploying cryptographic products should evaluate their practical security capabilities and alignment with a modern IT architecture. The IT revolution has greatly impacted the threat landscape across all networks and devices, and mandates a new approach to security, with implications for…

    The FIPS 140-2 certification provides vital assurance that cryptographic modules meet industry-accepted standards for protecting keys. Alongside with compliance with FIPS requirements, organizations deploying cryptographic products should evaluate their practical security capabilities and alignment with a modern IT architecture. The IT revolution has greatly impacted the threat landscape across all networks and devices, and mandates a new approach to security, with implications for cryptographic modules as well. Protection of keys in untrusted environments, crypto-agility, and real-time detection and response to potential key misuse are examples of emerging security needs that require consideration. Leveraging secure multi-party computation (MPC) technology, Unbound Key Control serves as a first-ever pure-software cryptographic module that delivers security on par with FIPS 140-2 level 3, as well as additional unique security benefits.

    See publication
  • Breaking The Boundary - Cryptographic Module Built For The Digital Age

    Unbound Tech

    FIPS (Federal Information Processing Standards) are a set of standards developed by the US National
    Institute of Standards and Technology (NIST), defining federal government requirements for
    cybersecurity. FIPS 140-2 is the standard used to validate the security of cryptographic modules.
    Since its first publication in 2001, it has been widely adopted in the industry as a practical security
    benchmark and realistic best practice by governmental and private sector…

    FIPS (Federal Information Processing Standards) are a set of standards developed by the US National
    Institute of Standards and Technology (NIST), defining federal government requirements for
    cybersecurity. FIPS 140-2 is the standard used to validate the security of cryptographic modules.
    Since its first publication in 2001, it has been widely adopted in the industry as a practical security
    benchmark and realistic best practice by governmental and private sector organizations
    globally.

    FIPS 140-2 validation requirements are based on a fundamental premise that has held true for all
    cryptographic modules in the past two decades: keys are stored and key operations are performed in
    a single machine; hence the keys are a single point of compromise.

    With the recent achievement of FIPS 140-2 certification for Unbound Key Control, Unbound is
    the first to break this underlying premise, opening new possibilities with highly secure pure-software
    technology designed for the modern digital IT era. Unbound is the first and only vendor to get FIPS
    140-2 validation for a cryptographic module that spans multiple separate machines and uses secure
    multiparty computation (MPC) rather than relying on physical security measures to protect keys.
    Organizations can now benefit from the elasticity, manageability, automation and crypto-agility
    capabilities that Unbound products deliver, with the assurance that they meet the industry-accepted
    security standard for cryptographic modules issued by NIST.

    See publication
  • Unbound Tech Integrates with CyberArk to Greatly Reduce Privileged Access Security Risk through MPC-Based Encryption Key Protection

    Unbound Tech

    Unbound Tech is partnering with CyberArk to integrate its Multi-Party Computation (MPC)-based virtual HSM and encryption key management offering into the CyberArk Privileged Access Security Solution. The joint solution, available now to CyberArk customers, delivers one of the first enterprise-grade applications of MPC to ensure superior secret protection at a level once only possible with hardware.

    See publication
  • Securing data at every stage : Unbound Tech and Enveil

    Unbound Tech

    Sensitive data requires protection and companies must ensure their approach to data security is both thorough and functional. Critical data, including cryptographic keys and other sensitive data, must be protected throughout the processing lifecycle, including the often-overlooked security gap that occurs when data must be decrypted in order to be used or processed.
    Unbound Tech and Enveil have partnered to deliver a powerful combination of Software-Defined Cryptographic capabilities to…

    Sensitive data requires protection and companies must ensure their approach to data security is both thorough and functional. Critical data, including cryptographic keys and other sensitive data, must be protected throughout the processing lifecycle, including the often-overlooked security gap that occurs when data must be decrypted in order to be used or processed.
    Unbound Tech and Enveil have partnered to deliver a powerful combination of Software-Defined Cryptographic capabilities to seamlessly secure sensitive data at all points during their lifecycle. Enveil advances the boundaries of data security by eliminating the Data in Use exposure gap, which companies face when sensitive data must be decrypted in order to be used or processed. Unbound fortifies security protections by ensuring cryptographic keys, credentials, or other private data never exist anywhere in complete form. Customers can quickly and easily employ multiparty computation-based encryption key protection and homomorphic data security technologies to configure or support separate strategies for encryption of at rest, in transit and in use. An added bonus to this joint solution is less administrative and resource overhead due to the ability to work with existing systems.

    See publication
  • Secure Privelleged Keys - a Joint Solution by Unbound and CyberArk

    Unbound Tech

    Encryption keys are considered the keys to the digital kingdom, as they are used to secure enterprises’ most valuable information. With CyberArk Privileged Access Security, if attackers are able to compromise keys, the result would be unauthorized access to thousands of privileged user accounts, thus allowing malicious attackers to perform unsanctioned operations and exfiltrate an organization’s most sensitive data.

    CyberArk Privileged Access Security, together with Unbound Key Control…

    Encryption keys are considered the keys to the digital kingdom, as they are used to secure enterprises’ most valuable information. With CyberArk Privileged Access Security, if attackers are able to compromise keys, the result would be unauthorized access to thousands of privileged user accounts, thus allowing malicious attackers to perform unsanctioned operations and exfiltrate an organization’s most sensitive data.

    CyberArk Privileged Access Security, together with Unbound Key Control, discovers and onboards privileged accounts while ensuring that the keys that protect user credentials are never kept whole
    anywhere. Unbound implements multi-party computation (MPC) to create and use the fragmented keys without ever unifying them in a method mathematically proven to be impossible to a breach or hack
    by compromising any single location.

    See publication
  • BYOK with Unbound Key Control

    Unbound Tech

    Enterprises are moving more data into the cloud than ever before (with astonishing 96% adoption rate), in all different types of service models. As the sensitivity of data moving into the cloud increases, security professionals comprehend that there’s no longer a question about whether data should be encrypted. The question today is, who should manage and control the encryption keys?

    The primary difference between key management in an enterprise’s data center versus key management in the…

    Enterprises are moving more data into the cloud than ever before (with astonishing 96% adoption rate), in all different types of service models. As the sensitivity of data moving into the cloud increases, security professionals comprehend that there’s no longer a question about whether data should be encrypted. The question today is, who should manage and control the encryption keys?

    The primary difference between key management in an enterprise’s data center versus key management in the cloud is ownership and management of the keys. In a traditional data center, all key management functions and tools can be configured and maintained by the enterprise IT team. In cloud environments, there will likely be a shared model or one wholly managed and maintained by the service providers.

    See publication
  • Foreshadow: When To Not Rely on Hardware

    Unbound Tech

    Since the publication of the Spectre and Meltdown attacks in January this year, security researchers have been taking a close look at speculative execution and it’s security implications.

    Recently, research independently conducted by two groups of researchers (a first team from KU Leuven in Belgium, and a second team from the University of Michigan, University of Adelaide, and Technion) lead to the discovery of the Foreshadow vulnerability.

    Foreshadow is a speculative execution…

    Since the publication of the Spectre and Meltdown attacks in January this year, security researchers have been taking a close look at speculative execution and it’s security implications.

    Recently, research independently conducted by two groups of researchers (a first team from KU Leuven in Belgium, and a second team from the University of Michigan, University of Adelaide, and Technion) lead to the discovery of the Foreshadow vulnerability.

    Foreshadow is a speculative execution attack on Intel processors which allows an attacker to steal sensitive information stored inside personal computers or third party clouds. Foreshadow has two versions, the original attack designed to extract data from SGX enclaves and a Next-Generation version which affects virtual machines, hypervisors, operating system kernel memory, and System Management Mode memory.

    Relying on hardware for critical trust-root components always puts you at risk of falling into the “recovery from hardware design flaw” antipattern for a system you can’t afford to leave vulnerable for any significant period of time. The conservative (and safe) approach would thus be not to rely on hardware for critical security properties of root-of-trust components.

    As a result, it is prudent to switch from the reliance on hardware as the exclusive root of trust, to a reliance on software solutions that provide mathematically proven guarantees of security, along with the capability of quickly and easily patching any discovered flaw. One primary example is secure multi-party computation (MPC), which due to recent breakthroughs in computer science research, is now a viable and appealing alternative to hardware solutions.

    See publication
  • Encryption & Regulation

    Unbound Tech

    Encryption is an intricate topic, as there are multiple ways to analyze various encryption methods and their applicability to different use cases within financial institutions. In this blog post, we’ll analyze contrasting encryption types and approaches, coupled with considerations for key management and regulatory compliance.
    The financial industry today faces the double challenge of securing larger and larger volumes of sensitive information, and addressing a growing range of security and…

    Encryption is an intricate topic, as there are multiple ways to analyze various encryption methods and their applicability to different use cases within financial institutions. In this blog post, we’ll analyze contrasting encryption types and approaches, coupled with considerations for key management and regulatory compliance.
    The financial industry today faces the double challenge of securing larger and larger volumes of sensitive information, and addressing a growing range of security and privacy regulations. With an obvious need to adhere to these regulations, in order to protect from data breaches and preserve a reputation for trustworthiness, comes a large dose of complexity when it comes to implementing encryption. An expert view is required for institutions to implement the optimal encryption schemes that address their particular environment and operations.

    See publication
  • Software Crypto-Anchors: Not An Oxymoron

    Unbound Tech

    Applying software crypto-anchors approach allows to couple the security of the data with the security of the cryptographic keys. As the protection of the data shifts from safeguarding the data itself to the security of the encryption keys, key protection and management become the highest priority task. SDC technology ensures that the keys are never exposed, while allowing strict policy enforcement on keys usage, enables the protection of your enterprise from making tomorrow’s headlines in this…

    Applying software crypto-anchors approach allows to couple the security of the data with the security of the cryptographic keys. As the protection of the data shifts from safeguarding the data itself to the security of the encryption keys, key protection and management become the highest priority task. SDC technology ensures that the keys are never exposed, while allowing strict policy enforcement on keys usage, enables the protection of your enterprise from making tomorrow’s headlines in this negative context.

    See publication
  • Introduction to Cloud-Native Secrets Management

    Medium

    Cloud-Native is transforming application development and allow us to achieve the true benefits of the cloud. But without building a strong security foundation that matches the level of security we’ve achieved in traditional IT environments, we are putting our core business assets at risk. With applications now broken down into small fast-moving and highly distributed parts, the attack surface grows significantly, and it’s essential to assure identity of each of these parts and protect the…

    Cloud-Native is transforming application development and allow us to achieve the true benefits of the cloud. But without building a strong security foundation that matches the level of security we’ve achieved in traditional IT environments, we are putting our core business assets at risk. With applications now broken down into small fast-moving and highly distributed parts, the attack surface grows significantly, and it’s essential to assure identity of each of these parts and protect the secrets they contain to prevent future attacks.

    See publication
  • GDPR & Encryption: What You Need to Know

    Unbound Tech

    The GDPR is arguably the most stringent data privacy mandate ever imposed on organizations and may well represent the future of privacy regulations across the globe. With its focus on protecting the personal data of any EU citizen, regardless of where the controller or processor does business, the impact of the GDPR reaches far beyond the EU’s boundaries. It is essential for organizations to master the benefits of encryption while creating a GDPR compliance strategy. With fines that could reach…

    The GDPR is arguably the most stringent data privacy mandate ever imposed on organizations and may well represent the future of privacy regulations across the globe. With its focus on protecting the personal data of any EU citizen, regardless of where the controller or processor does business, the impact of the GDPR reaches far beyond the EU’s boundaries. It is essential for organizations to master the benefits of encryption while creating a GDPR compliance strategy. With fines that could reach tens of millions of euros and beyond, it is incumbent upon organizations to take the regulation seriously, and utilize this tool set when addressing the GDPR regulation.

    See publication
  • Unbound Key Control is now available on Azure Marketplace

    Unbound Tech

    Unbound UKC is the first software-only key management and key protection system that delivers hardware level security guarantees. Unlike traditional software approaches that rely on obfuscation algorithms, whitebox cryptography, or security-by-obscurity techniques, Unbound UKC draws its strength from the Unbound vHSM (Virtual Hardware Security Module) technology, which is backed by a rigorous security proof made possible by mathematically proven multiparty computation (MPC) algorithms. Unbound…

    Unbound UKC is the first software-only key management and key protection system that delivers hardware level security guarantees. Unlike traditional software approaches that rely on obfuscation algorithms, whitebox cryptography, or security-by-obscurity techniques, Unbound UKC draws its strength from the Unbound vHSM (Virtual Hardware Security Module) technology, which is backed by a rigorous security proof made possible by mathematically proven multiparty computation (MPC) algorithms. Unbound UKC combines the high-level security once only attainable with hardware, with software’s innate agility, scalability and efficiency crucial for today’s digital businesses.

    Today we are excited to announce the launch of Unbound Key Control (UKC) on the Microsoft Azure™ Marketplace.

    With Unbound UKC, organizations can control their own keys in the cloud, and eliminate the risk of cryptographic keys exposure, protecting their customers and stakeholders from a wide range of cyber security risks. Unbound’s UKC is open for use for any cloud and on-premise application. Leading fortune 500 organizations are already using Unbound UKC to protect keys in cloud and hybrid deployments, on AWS, Azure and other cloud service providers.

    See publication
  • Unbound Technology’s Unbound Key Control Now Available in the Microsoft Azure Marketplace

    Business Wire

    Unbound Technology, a world leader in Software-Defined Cryptography (SDC), today announced its Unbound Key Control (UKC) is available in the Microsoft Azure Marketplace. Now customers can purchase UKC directly from the Marketplace in a pay-as-you-go model to manage and control keys for their applications on Azure, providing a complete solution for the biggest pain points of protecting, controlling and managing cryptographic keys in the public cloud and in hybrid cloud environments. Unbound…

    Unbound Technology, a world leader in Software-Defined Cryptography (SDC), today announced its Unbound Key Control (UKC) is available in the Microsoft Azure Marketplace. Now customers can purchase UKC directly from the Marketplace in a pay-as-you-go model to manage and control keys for their applications on Azure, providing a complete solution for the biggest pain points of protecting, controlling and managing cryptographic keys in the public cloud and in hybrid cloud environments. Unbound breaks the boundaries of traditional key management with a unique pure-software solution that combines both hardware-level security guarantees with the agility, scalability and efficiency of software.

    See publication
  • Introduction to Cloud-Native Secrets Management: Part III

    Unbound Tech

    We discuss the importance of container identity to cloud-native application security, the challenges and available solutions.
    Containers are transforming application development and allow us to achieve the benefits of the cloud. But without building a strong security foundation that matches the level of security we’ve achieved in traditional IT environments, we are putting core business assets at risk. With applications now broken down into small fast-moving and highly distributed parts, the…

    We discuss the importance of container identity to cloud-native application security, the challenges and available solutions.
    Containers are transforming application development and allow us to achieve the benefits of the cloud. But without building a strong security foundation that matches the level of security we’ve achieved in traditional IT environments, we are putting core business assets at risk. With applications now broken down into small fast-moving and highly distributed parts, the attack surface grows significantly, and it’s essential to assure identity of each of these parts to prevent future attacks.

    See publication
  • Protecting Your Company's Secrets in the Cloud-Native Age

    DevOps Digest

    Modern businesses are migrating to a cloud-based model for hosting sensitive data to reap the benefits of agility and cost savings as well as to keep pace with customer demand. Cloud-Native methodologies such as DevSecOps, continuous delivery, containers and micro-services are essential building blocks in the digital business revolution. However, moving information and technologies from hardware to software poses a security concern – translating to a top challenge for both IT and the C-level…

    Modern businesses are migrating to a cloud-based model for hosting sensitive data to reap the benefits of agility and cost savings as well as to keep pace with customer demand. Cloud-Native methodologies such as DevSecOps, continuous delivery, containers and micro-services are essential building blocks in the digital business revolution. However, moving information and technologies from hardware to software poses a security concern – translating to a top challenge for both IT and the C-level, as applications built on top of micro-services and containers in a Cloud-Native environment utilize a wide variety of secrets for their proper functioning.

    See publication
  • AWS S3 Buckets Security Boost – and How to Be Secure in the Cloud

    Unbound Tech

    Last Monday, Amazon Web Services (AWS) published a new set of security enhancements in a blog.

    These newly added features enlarges the number of controls available for system administrators to know when they are exposing their S3 buckets. It seems that this action made by AWS was a result to address several data breaches resulting from unencrypted S3 buckets, adding protections to its cloud storage service.

    AWS made a clear step in the right direction, tightening the storage…

    Last Monday, Amazon Web Services (AWS) published a new set of security enhancements in a blog.

    These newly added features enlarges the number of controls available for system administrators to know when they are exposing their S3 buckets. It seems that this action made by AWS was a result to address several data breaches resulting from unencrypted S3 buckets, adding protections to its cloud storage service.

    AWS made a clear step in the right direction, tightening the storage controls by adding inherent encryption. Yet, there is much more to do to obtain a higher level of security for a risk averse enterprise.

    Following the regular best practices described above, in parallel with a full encryption of all services in transit and at rest, there is a need to achieve control of the encryption keys. The need to control the encryption keys once migrating to the cloud should become industry best practice (i.e. part of Gartner’s recommendations), as a comprehensive security measure that should be adopted by organizations striving to avoid security risks in the cloud.

    See publication
  • Protecting Critical Infrastructure from Cyber Threats

    Unbound Tech

    The importance of protecting infrastructures has dramatically increased in recent years. Critical infrastructures (CIs) include those physical resources, services, and information technology facilities, networks, and infrastructure assets which, if disrupted or destroyed, would have a severe impact on the health, safety, security, or economic well-being of citizens or the efficient functioning of governments and/or economies. These categories comprise utility infrastructure (water, gas, fuel…

    The importance of protecting infrastructures has dramatically increased in recent years. Critical infrastructures (CIs) include those physical resources, services, and information technology facilities, networks, and infrastructure assets which, if disrupted or destroyed, would have a severe impact on the health, safety, security, or economic well-being of citizens or the efficient functioning of governments and/or economies. These categories comprise utility infrastructure (water, gas, fuel, electricity, transportation, communication), banking and financial services, and food supply, etc. With the advent of the digital age and the IoT, these CIs become interrelated, interconnected, and even more accessible, both for legitimate users and for adversaries. Protecting the digital access to these CIs now has a special focus: cyber security.

    Since cyber-attacks on various types of critical infrastructure pose a national threat, the state is responsible to regulate their protection. We see a major increase in the regulation on these bodies, and a positive shift to an industry wide threat sharing which improves the work of the response teams and the overall cyber security posture of critical infrastructure.

    See publication
  • Cloud-Native Secrets Management: Part II (Protecting Secrets in Use)

    Unbound Tech

    As many start to realize the damaging potential of a major security breach, different set of vault-like tools begin to emerge in the Cloud-Native eco-system. Logical vaults, as their physical predecessors, securely store the secrets while within the vault. They encrypt the data while at rest within the vault as well as using TLS for encrypting the secret while being transferred from the vault to the application.

    Once the access request is authenticated by the vault it reads the secret…

    As many start to realize the damaging potential of a major security breach, different set of vault-like tools begin to emerge in the Cloud-Native eco-system. Logical vaults, as their physical predecessors, securely store the secrets while within the vault. They encrypt the data while at rest within the vault as well as using TLS for encrypting the secret while being transferred from the vault to the application.

    Once the access request is authenticated by the vault it reads the secret data from its storage and decrypts it with a key stored on the same storage, or rarely in an external HSM. For the experienced security professional, this already raises a red flag, as this opens a possibility to compromise the key to the vault and obtain access for its whole content. Obfuscation methods that may be used to protect this key, can only slow down an attacker, but cannot prevent the breach.

    After decrypting the secret (either using an HSM or a local key), the vault provides it to the application in a secure manner via TLS, so it can be decrypted only be the application. However, the TLS-secured communication is decrypted at the application, the secret that we worked so hard to protect suddenly becomes available in clear text, and can be harvested, opening an easy and lucrative attack surface for the potential adversary.

    This is a major security issue, with a broad effect on Cloud-Native applications, as cryptographic keys, credentials and secrets are not strongly secured and exposed while in-use. It strongly contrasts with private keys and credentials in traditional environments that are typically secured in hardware like HSM/TPM, especially in medium to high trust use cases.

    This broadly practiced modus operandi opens a possibility for a skilled intruder to intercept secrets used by Cloud-Native applications.

    See publication
  • Cloud-Native Secrets Management: Part I (Discover the Challenges of Secrets Management)

    Unbound Tech

    ver the last several years, a massive transition from on-premises to the cloud is taking place, resulting in a significant increase in the adoption of Cloud-Native practices and technologies by many enterprises across various market verticals.

    The cloud-native eco-system encompasses domains such as scheduling & orchestration (i.e. Kubernetes, Docker Swarm and Mesos), coordination & service discovery (i.e. etcd, Consul), host management (i.e. Chef, Puppet), security images (i.e. Aqua…

    ver the last several years, a massive transition from on-premises to the cloud is taking place, resulting in a significant increase in the adoption of Cloud-Native practices and technologies by many enterprises across various market verticals.

    The cloud-native eco-system encompasses domains such as scheduling & orchestration (i.e. Kubernetes, Docker Swarm and Mesos), coordination & service discovery (i.e. etcd, Consul), host management (i.e. Chef, Puppet), security images (i.e. Aqua, Twistlock) and vaults (i.e. Hashicorp and Conjur).

    Cloud-Native methodologies such as DevSecOps, continuous delivery, containers and micro-services are widely adopted and pushed by developers globally, as they are an essential building block in the digital business revolution – enterprises to deliver applications rapidly in response to customer needs, with Cloud-Native solutions fueling a new engine of business growth.

    As cloud-native methodologies are adopted by more and more leading enterprises globally, this has tremendous enterprise-wide business implications, from inhibiting production deployment of cloud-native applications due to insufficient security controls or lack of regulatory compliance, to potential cyber-attacks resulting in major losses.

    See publication
  • ECI Wins 2017 IMPACT Award for LightSEC™ Cybersecurity Solution from Utilities Technology Council

    Market Wired

    PETACH TIKVA, ISRAEL--(Marketwired - May 22, 2017) - ECI, a global provider of ELASTIC Network® solutions, for service providers, critical infrastructures, and data centers operators, announced today it has won the Utilities Technology Council 2017 IMPACT award, software category, for its LightSEC™ cybersecurity solution for critical infrastructures. The award honors UTC Associate Member Organizations that are changing the industry through innovative and proven solutions, and recognizes that…

    PETACH TIKVA, ISRAEL--(Marketwired - May 22, 2017) - ECI, a global provider of ELASTIC Network® solutions, for service providers, critical infrastructures, and data centers operators, announced today it has won the Utilities Technology Council 2017 IMPACT award, software category, for its LightSEC™ cybersecurity solution for critical infrastructures. The award honors UTC Associate Member Organizations that are changing the industry through innovative and proven solutions, and recognizes that utility communications technology saves lives, protects property, speeds restoration, and puts communities on the path to recover.

    See publication
  • UTC Announces 2017 Award Winners

    PR Newswire

    IMPACT Awards - To honor the UTC Associate Member Organizations making a great impact on our industry through an innovative and proven solution.
    WINNER: ECI Telecom (Software category)

    See publication
  • MANAGED CYBER SECURITY INNOVATION

    ECI Telecom

    Cyber security systems have two principal goals – to detect threats and to mitigate attacks. But for the most part, current systems fall short of achieving these goals. They generate an unmanageable number of event alerts instead of focusing on identifying actual threats. Moreover, to avoid missing true threats, they generate too many false positives.
    Current systems also rely heavily on cyber analysts to validate threats, and once validated, the analysts manually adjust attack mitigation…

    Cyber security systems have two principal goals – to detect threats and to mitigate attacks. But for the most part, current systems fall short of achieving these goals. They generate an unmanageable number of event alerts instead of focusing on identifying actual threats. Moreover, to avoid missing true threats, they generate too many false positives.
    Current systems also rely heavily on cyber analysts to validate threats, and once validated, the analysts manually adjust attack mitigation systems and take other attack/defense measures. Such human actions are often incorrect or simply too late.
    ECI’s LightSEC Managed Cyber Security addresses these challenges. It uses three steps to provide highly effective threat detection and attack mitigation, enabling service providers to provide business customers with superior hassle-free protection.

    See publication
  • MANAGED CYBER SECURITY PLATFORM

    ECI Telecom

    As a service provider, you have a golden opportunity to sell cyber security services to your business customers. They desperately need such services, but lack the resources to improve upon their current point solutions, which require constant updating and deliver inferior protection. ECI’s LightSECTM Managed Cyber Security Platform is exactly what you were looking for. It’s based on an innovative architecture that detects cyber attacks with high precision, and is designed from the ground up to…

    As a service provider, you have a golden opportunity to sell cyber security services to your business customers. They desperately need such services, but lack the resources to improve upon their current point solutions, which require constant updating and deliver inferior protection. ECI’s LightSECTM Managed Cyber Security Platform is exactly what you were looking for. It’s based on an innovative architecture that detects cyber attacks with high precision, and is designed from the ground up to meet SP deployment and operations requirements. The result is your capability to
    deliver affordable worry-free protection – as a service – to your business customers.

    See publication
  • MANAGED CYBER SECURITY SERVICE

    ECI Telecom

    The cyber security defenses for your business are falling short. Hackers keep finding ways to penetrate your existing security measures. You spend too much time trying to keep up, investing in new security solutions and acquiring security expertise, rather than investing your efforts in business growth. You have other concerns too. “To what extent is my business being targeted? How do I respond to a major attack? Am I managing my cyber security optimally?”

    See publication
  • LightSEC CRITICAL INFRASTRUCTURES ON THE CROSSHAIRS

    ECI Telecom

    Until recently, Cyber attacks were aimed at Service Providers and Enterprises. The agenda was mostly economic – to hurt customers and ruin reputations. An infrastructure with such vulnerability also places their customers’ valuable data at risk. Today, the situation is even more severe. Critical infrastructures are now the preferred target for cyber terrorists who want to wage war within the comfort of their homes. If not addressed properly, the massive increase in such attacks will reach new…

    Until recently, Cyber attacks were aimed at Service Providers and Enterprises. The agenda was mostly economic – to hurt customers and ruin reputations. An infrastructure with such vulnerability also places their customers’ valuable data at risk. Today, the situation is even more severe. Critical infrastructures are now the preferred target for cyber terrorists who want to wage war within the comfort of their homes. If not addressed properly, the massive increase in such attacks will reach new peaks, with catastrophic consequences.

    See publication
  • ECI TAKES LEADING LIGHTS 2016 AWARD FOR MOST INNOVATIVE SECURITY STRATEGY (VENDOR)

    ECI Telecom

    ECI, a global provider of ELASTIC Network® solutions for service providers, utilities and data center operators, announced today that its LightSEC™ security solution has won Light Reading’s, Leading Lights 2016 award for most innovative security strategy (vendor).
    “Security is at the top of service provider agendas as they deal with ever increasing cyber security
    threats. In winning this Leading Lights award, ECI has shown it has the technology to help
    communications service providers…

    ECI, a global provider of ELASTIC Network® solutions for service providers, utilities and data center operators, announced today that its LightSEC™ security solution has won Light Reading’s, Leading Lights 2016 award for most innovative security strategy (vendor).
    “Security is at the top of service provider agendas as they deal with ever increasing cyber security
    threats. In winning this Leading Lights award, ECI has shown it has the technology to help
    communications service providers counter those threats,” said Mr. Ray Le Maistre, Editor-in Chief,
    Light Reading.

    See publication
  • LightSEC for Utilities and Critical Infrastructure

    ECI Telecom

    CYBER SECURITY ISSUES UNIQUE TO THE UTILITIES AND CI SECTOR
    The utilities and Critical Infrastructure (CI) sectors face multiple cyber security challenges.
    Aging infrastructure - Utilities and many CI networks operate legacy equipment filled with well- known security vulnerabilities. The hardware and proprietary protocols often do not address security at all. These protocols are easily corrupted, whether by malicious intent or by accident. Old systems, aging technology, and limited…

    CYBER SECURITY ISSUES UNIQUE TO THE UTILITIES AND CI SECTOR
    The utilities and Critical Infrastructure (CI) sectors face multiple cyber security challenges.
    Aging infrastructure - Utilities and many CI networks operate legacy equipment filled with well- known security vulnerabilities. The hardware and proprietary protocols often do not address security at all. These protocols are easily corrupted, whether by malicious intent or by accident. Old systems, aging technology, and limited awareness of basic enterprise cyber-security leave these networks in a particularly vulnerable state.
    Inefficient Segmentation - The equipment is interconnected via IP networks with Internet access, making it open to cyber security attacks. Failure to segment the enterprise network from the operational network effectively allows cyber threats to reach the operational networks via the enterprise. For utilities, the smart grid is replacing legacy SDH and internal classified networks, requiring network modernization to interoperate with IP. Customers using solar panels are pushing power and communications back into the grid, and this connectivity must also be secured.
    Cyber Security Regulation Compliance - NERC CIP V6 and the Cybersecurity National Action Plan (CNAP) are setting regulations to enhance utility and CI security and resilience. Soon, all of the relevant players will have to comply. The EU Cybersecurity plan to protect open Internet and online freedom and opportunity, was included in the regulations of the European Cybersecurity Directive.
    The Council of European Energy Regulators (CEER) is the voice of Europe’s national regulators of electricity and gas at EU and international level. CEER is facilitating a single, competitive, efficient, and sustainable EU internal energy market that works in the public interest. Utilities are of great concern in particular, and are now being highly regulated.

    See publication
  • LightSEC for Service Providers

    ECI Telecom

    The Cloud and Mobility revolution, intensified by the quickly evolving threat landscape, heightens the
    challenge for businesses to secure their IT infrastructure. Now they must fight security threats that target their employees, applications, and other assets - not just on-premises, but throughout all of cyberspace.
    The Internet has become the new IT.
    Enterprises and SMBs are migrating to off-premise data centers and most are already on the cloud.
    Their remote-access employees have…

    The Cloud and Mobility revolution, intensified by the quickly evolving threat landscape, heightens the
    challenge for businesses to secure their IT infrastructure. Now they must fight security threats that target their employees, applications, and other assets - not just on-premises, but throughout all of cyberspace.
    The Internet has become the new IT.
    Enterprises and SMBs are migrating to off-premise data centers and most are already on the cloud.
    Their remote-access employees have no offices, nor the resources for superior protection. So, businesses are left with no other choice, but to outsource their IT security, just as they did for their IT data centers and applications. This creates a unique opportunity for service providers to provide managed security services, which supplement the communication services that they already provide.
    ECI’s LightSEC solution enables service providers to become managed security service providers.

    See publication
  • ECI® Announces LightSEC™ Cyber Security Solution for Smart Grid -Protects Utilities From Current and Future Cyber Security Threats

    Market Watch

    ECI, a global provider of ELASTIC network solutions for service providers, utilities and data center operators, introduced today its new LightSEC™ cyber security solution for Smart Grid, designed to significantly bolster the safety and reliability of utility infrastructures and guarantee success in the fight against today's increasingly sophisticated cyber-attacks. The utility tailored LightSEC is an integral part of ElastiGRID™, ECI's complete solution for utilities and strategic industries…

    ECI, a global provider of ELASTIC network solutions for service providers, utilities and data center operators, introduced today its new LightSEC™ cyber security solution for Smart Grid, designed to significantly bolster the safety and reliability of utility infrastructures and guarantee success in the fight against today's increasingly sophisticated cyber-attacks. The utility tailored LightSEC is an integral part of ElastiGRID™, ECI's complete solution for utilities and strategic industries which also includes various packet-optical transport systems, a user-friendly network management system, various SDN applications (LightAPPS™) and more.

    See publication
  • פתרון סקריוריטי מקיף וכולל

    TheMarker

    בשנים האחרונות, עם התעצמות ושכלול תקיפות הסייבר, הפכו רשתות הטלקום ליעד מובהק למתקפות מאסיביות מצד מדינות אויב, התקפות מתואמות ע"י ארגוני האקרים כגון "אנונימוס" וארגוני פשיעה. לא רק ספקיות הטלקום והאינטרנט והענן הופכות למטרה להתקפות בפני עצמן, אלא גם לקוחות הקצה שלהן. יעד נוסף שהפך להיות מושא למתקפות הן רשתות חשמל וחברות התשתית הגדולות. תהליך זה התעצם במקביל להפיכתן של רשתות החשמל לרשתות חכמות וככל שמערכות הצנרת והתשתית מפוקחות ומנוטרות ומבוקרות מחשב. מדינות וארגוני טרור ופשיעה, כולל ברמה…

    בשנים האחרונות, עם התעצמות ושכלול תקיפות הסייבר, הפכו רשתות הטלקום ליעד מובהק למתקפות מאסיביות מצד מדינות אויב, התקפות מתואמות ע"י ארגוני האקרים כגון "אנונימוס" וארגוני פשיעה. לא רק ספקיות הטלקום והאינטרנט והענן הופכות למטרה להתקפות בפני עצמן, אלא גם לקוחות הקצה שלהן. יעד נוסף שהפך להיות מושא למתקפות הן רשתות חשמל וחברות התשתית הגדולות. תהליך זה התעצם במקביל להפיכתן של רשתות החשמל לרשתות חכמות וככל שמערכות הצנרת והתשתית מפוקחות ומנוטרות ומבוקרות מחשב. מדינות וארגוני טרור ופשיעה, כולל ברמה המדינתית, גילו את היכולת לייצר פגיעה אסטרטגית במדינת היעד, באמצעות התקפת סייבר על תשתיות החשמל, המים והאנרגיה שלה. חשבו, למשל, על פגיעה בסכר, שהשלכותיו הרסניות הן לסביבה והן לצרכני החשמל, תוך השבתת מערכות חיים שלמות. לאחרונה התקפות על מערכות יצור וההולכה של חברת החשמל באוקרינה הביאו למודעות האחראים על הגנת הסייבר שסיכונים אלו אינם רק מיתוס אלא אמיתיים ודורשים תגובה מידית.

    שינויים אלה במפת איומי הסייבר והפיכת לקוחותיה של ECI ליעדי מתקפות סיבר, הביאו את החברה לפתח פתרון הגנה כולל ומקיף שיאפשר להבטיח את תשתיות לקוחותיה וכן את לקוחות הקצה של ספקי השרות השפיעו מאוד על היערכותה של חברת אי סי איי טלקום (ECI), המספקת פלטפורמות תקשורת לספקיות תקשורת ושירות בכל רחבי העולם, כנגד איומי הסיבר המתעצמים. שינויים אלה במפת איומי הסייבר והפיכת לקוחותיה של ECI ליעדי מתקפות סייבר, הביאו אותה לפתח פתרון סייבר כולל ומקיף, שיאפשר ללקוחות הגנה מלאה, כוללת ומקיפה אל מול איומי הסייבר המתעצמים.

    Other authors
    See publication
  • NFV Cyber Security Appliance

    ECI Telecom

    Until recently, network customers have been purchasing assorted services, each running on a dedicated appliance, and connected to the organizational network. ETSI recognized the complexity and cost consequences of this trend, and the need to provide quick and time to market network solutions. So, they defined the Network Function Virtualization (NFV) standard to address and simplify it. NFV allows these customers to use a single platform to run all of these applications and services. This…

    Until recently, network customers have been purchasing assorted services, each running on a dedicated appliance, and connected to the organizational network. ETSI recognized the complexity and cost consequences of this trend, and the need to provide quick and time to market network solutions. So, they defined the Network Function Virtualization (NFV) standard to address and simplify it. NFV allows these customers to use a single platform to run all of these applications and services. This significantly reduces the associated Capex and Opex of the hardware mix, energy consumption, labor, and more.

    See publication
  • תחזיות סייבר 2015-16. מה אומרים המומחים?

    Globes IT

    בימים אלו, עולה באופן משמעותי, הצורך להגן על הארגון והמידע העסקי מפני תקיפות Zero-day, אשר אינן ניתנות לזיהוי ע"י פתרונות אבטחה מבוססי חתימות. היום, נדרש כוח עיבוד חישובי גדול מאוד ע"מ לבצע השוואה מול בסיס הנתונים העצום וההיסטורי והתנהגויות התקיפות נעשות פתוחות יותר לווריאציות. ע"מ להתמודד בהצלחה עם שינויים אלו, נדרש עולם ה-Big Data Cyber Analytics, המבוסס על אלגוריתמים של Machine Learning להיות באבולוציה תמידית. היכולות לבצע קורלציה של מידע גולמי המגיע ממקורות רבים ומגוונים, בעלי אופי שונה…

    בימים אלו, עולה באופן משמעותי, הצורך להגן על הארגון והמידע העסקי מפני תקיפות Zero-day, אשר אינן ניתנות לזיהוי ע"י פתרונות אבטחה מבוססי חתימות. היום, נדרש כוח עיבוד חישובי גדול מאוד ע"מ לבצע השוואה מול בסיס הנתונים העצום וההיסטורי והתנהגויות התקיפות נעשות פתוחות יותר לווריאציות. ע"מ להתמודד בהצלחה עם שינויים אלו, נדרש עולם ה-Big Data Cyber Analytics, המבוסס על אלגוריתמים של Machine Learning להיות באבולוציה תמידית. היכולות לבצע קורלציה של מידע גולמי המגיע ממקורות רבים ומגוונים, בעלי אופי שונה, הינה קרדינלית. למשל משלל המידע המגיע מרשת התקשורת, תוך ביצוע היתוך וכרייה לאיתור תקיפות באמצעות אלגוריתמים לומדים. בניגוד לעבר, שזיהוי אנומליות נשען באופן בלעדי על Layer 3 ומעלה עד לשכבה האפליקטיבית, כיום אנחנו מזהים צורך גדל ועולה בזיהוי אנומליות בעולמות non IP, שיכולים לקבל מענה ע"י יכולות של L2 Anomaly Detection המפותחות ב-ECI.

    See publication
  • NFV-based Cyber Security solution for Service Providers

    ECI

    As a service provider you face increasingly diverse and complex security challenges. Threats to critical systems exist in your IT, operational support and network environments. You likely have already invested in first tier of security systems and now you need to upgrade and expand these. You need an optimal solution which addresses your current needs yet maintains the flexibility to deal with inevitable future challenges. ECI’s cyber security Network Function Virtualization (NFV) platform is…

    As a service provider you face increasingly diverse and complex security challenges. Threats to critical systems exist in your IT, operational support and network environments. You likely have already invested in first tier of security systems and now you need to upgrade and expand these. You need an optimal solution which addresses your current needs yet maintains the flexibility to deal with inevitable future challenges. ECI’s cyber security Network Function Virtualization (NFV) platform is that solution.
    The NFV’s modular architecture and powerful x86 engine enables you to deploy multiple security Virtualized Network Functions (VNFs) to create a customized and expandable security environment, focused on your particular requirements. Best of all, based on ECI’s strategic relationship with Check Point Software Technologies, you can now deploy Check Point software on LightSEC’s NFV platform. This provides you ideal combination of running Check Point solutions along with flexibility of running additional security modules on the same platform.

    See publication
  • NFV-based Cyber Security solution for Utilities

    ECI

    As a critical infrastructure provider you face increasingly diverse and complex security challenges. Threats to systems exist in your IT, operational support and network environments. You have already invested in a first tier of security systems, and now you need to upgrade and expand these. You need an optimal solution which addresses your current needs yet maintains the flexibility to deal with inevitable, future challenges. ECI’s cyber security Network Function Virtualization (NFV) platform…

    As a critical infrastructure provider you face increasingly diverse and complex security challenges. Threats to systems exist in your IT, operational support and network environments. You have already invested in a first tier of security systems, and now you need to upgrade and expand these. You need an optimal solution which addresses your current needs yet maintains the flexibility to deal with inevitable, future challenges. ECI’s cyber security Network Function Virtualization (NFV) platform is that solution.
    The NFV’s modular architecture and powerful x86 engine enables you to deploy multiple security Virtualized Network Functions (VNFs) to create a customized and expandable security environment, focused on your particular requirements. Best of all, based on ECI’s strategic relationship with Check Point Software Technologies®, you can now deploy Check Point software on LightSEC’s NFV platform. This provides you the ideal combination of running Check (Point solutions along with the flexibility of running additional security modules on the same platform.

    See publication
  • CYBER SECURITY TRENDS FOR FUTURE SMART GRID SYSTEMS

    CIGRE

    SUMMARY - Current power grids increasingly emerging into smart networked grids and are
    more accessible from the public internet which poses new cyber threats in the grid. More computer based systems are introduced into power networks in order to monitor and control the network. Future model smart grid and micro grid systems will be based on data flows for communication of system status, usage and control throughout the network infrastructure in addition to the power flow. This creates new…

    SUMMARY - Current power grids increasingly emerging into smart networked grids and are
    more accessible from the public internet which poses new cyber threats in the grid. More computer based systems are introduced into power networks in order to monitor and control the network. Future model smart grid and micro grid systems will be based on data flows for communication of system status, usage and control throughout the network infrastructure in addition to the power flow. This creates new security threats on the power grid. Instead of relying mainly on power plants for power generation, there will be a combination of multiple generation sources and at the same time wider use of electrical computer based equipment by consumers. Both increase the amount of data flows in the network as well as introduce additional vulnerable spots. Vulnerability of the power grid to cyber-attacks increases even more because of the wide use of SCADA networks. SCADA networks are more accessible to the internet and lack authentication and authorization mechanisms therefore expose the grid to threats such as DDOS, Data interception, Data alteration and additional hacking threats.
    The transition from present to future model has already begun and rapidly growing while it already poses new security challenges which must be attended immediately. It is essential to introduce immediately a single comprehensive security solution which will provide
    fast detection and prevention tools to cope with a variety of threats with different nature and from multiple sources. The solution should not be tightly coupled with each device in the network so it won’t require upgrade of the devices inside the grid.
    The Cyber defense solution should be versatile using variety of cyber technologies such as Firewalls, anomaly detection, Big Data analytics, machine learning and more in a network wise combination.

    See publication
  • Leading Lights Finalists 2015: Most Innovative Security Strategy

    LightReading

    ECI Telecom -- LightSec Comprehensive Cyber Security Suite
    ECI Telecom Ltd. gets credit not only for being one of the first to push optical transport platform security but also for having a comprehensive security strategy that encompasses layers one through seven and works in NFV-driven distributed network models.

    The vendor's LightSec Hexagon strategy has six pillars: data with machine-learning algorithms to profile malicious users on-demand; communication to prevent malicious users…

    ECI Telecom -- LightSec Comprehensive Cyber Security Suite
    ECI Telecom Ltd. gets credit not only for being one of the first to push optical transport platform security but also for having a comprehensive security strategy that encompasses layers one through seven and works in NFV-driven distributed network models.

    The vendor's LightSec Hexagon strategy has six pillars: data with machine-learning algorithms to profile malicious users on-demand; communication to prevent malicious users from exploiting a data transmission; people for account password management and policy enforcement; insight for network and endpoint anomaly detection; platform with an NFV card that plugs into ECI's transport equipment or standalone appliances; and a management system to display and manage security threats.

    The lynchpin of ECI's strategy is its NFV-based security engine, which remotely configures and provides various security capabilities based on its location in the network. The vendor says this same engine can be configured to provide SCADA (supervisory control and data acquisition) DPI in one location and encryption in another.

    See publication
  • CYBERSECURITY 2015, LA SICUREZZA FA IL PIENO

    Information Technology Intellegent Software

    Nel pomeriggio, una sessione parallela è stata dedicata alle “Advanced future technologies for the Enterprise Resilience” con gli interventi di George Wainblat, Director, Cyber Solutions LoB Business Manager di ECI Telecom su ECI Hexagon Cyber Security Solutions, ossia, un modello per fornire protezione complete a service providers, utilities, Difesa e IT network.

    See publication
  • ECI TELECOM ANNOUNCES PARTNERSHIP WITH CHECK POINT SOFTWARE TECHNOLOGIES

    ECI Telecom

    ECI Telecom, a global provider of next-generation network solutions, announced today that its new cyber-security suite LightSec, which provides holistic protection for service providers' operational and IT networks, features technology from strategic partner Check Point Software Technologies. ECI's Native Packet Transport (NPT) stand-alone security engine runs Check Point’s Next Generation Threat Prevention solution.

    See publication
  • Cyber Threats - round table

    Globes IT

    האם יש מקום להסדיר את האחריות על נושא הסייבר? איך מדינת ישראל יכולה לסייע בכך? האם יש מקום לגוף מרכזי מטעם המדינה שיגן על חברות וארגונים פרטיים?

    See publication
  • Cybridge Secure Content Filter for SCADA Networks

    Bynet Data Communications

    Industrial infrastructures are growing in size and complexity. And it’s all too clear that
    traditional enterprise IT solutions have not been successful in safeguarding them from
    cyber-attack.
    They do not meet the best-practice deep-packet inspection capability in the field,
    nor do they place an emphasis on zone protection network segmentation.
    As well, they tend to focus on preventing loss of confidential information, rather than
    what really matters in the industrial…

    Industrial infrastructures are growing in size and complexity. And it’s all too clear that
    traditional enterprise IT solutions have not been successful in safeguarding them from
    cyber-attack.
    They do not meet the best-practice deep-packet inspection capability in the field,
    nor do they place an emphasis on zone protection network segmentation.
    As well, they tend to focus on preventing loss of confidential information, rather than
    what really matters in the industrial world – reliability and integrity of the system.
    In this architecture, a Cybridge is used as a one way content filter gateway which
    enables the extraction and export of protocol data and information from within
    the industrial networks, carried upon industrial protocols, to enterprise networks.
    This allows safe and easy integration of the machine data coming from the SCADA
    network in enterprise reporting and statistical services, within external or public
    networks without any Cyber-attacks apprehension.

    Other authors
    See publication
  • לוקהיד מרטין ובינת בפרויקט בישראל במיליארד שקל

    גלובס

    ענקית הנשק האמריקנית תשתף פעולה עם בינת תקשורת בהקמת הקמפוס הטכנולוגי של יחידות המודיעין של צה"ל בנגב

    See publication
  • До чего дойдет прогресс? Bynet Expo 2013

    Channel 9

    Сегодня в Ганей та-аруха собралась добрая сотня израильских хай-тек компаний, чья специализация – информационные технологии. Это международная выставка Бинат Экспо (Bynet Expo) – 2013. По сути – смотр последних хай-тек достижений и возможность заглянуть в будущее.

    Георгий Вайнблат, директор технического отдела, выставка Bynet Expo - 2013): "Оно будет очень интересное, в нем будет много видео, все приборы будут связаны - от холодильника до мобильного телефона".

    Other authors
    • Евгений Эрлих
    See publication
  • Enhanced Video Solution for Level Crossings

    Bynet Data Communications

    Level crossings can pose a significant risk to rolling stock in the event of an obstruction, or from the unexpected crossing of a variety of elements. Ensuring the safety of both those attempting to cross and the individuals onboard is primary concern for all transportation operators.
    This means that trains must be given sufficient notice to allow for breaking, which is enabled by control room connectivity to isolated junctions.
    Bynet’s enhanced video solution for level crossings is a…

    Level crossings can pose a significant risk to rolling stock in the event of an obstruction, or from the unexpected crossing of a variety of elements. Ensuring the safety of both those attempting to cross and the individuals onboard is primary concern for all transportation operators.
    This means that trains must be given sufficient notice to allow for breaking, which is enabled by control room connectivity to isolated junctions.
    Bynet’s enhanced video solution for level crossings is a value-added service for public and operational safety. The solution provides real-time video and video analytics (VA) delivered directly to train operators and command control centers (CCC) by using Bynet’s advanced mobility solution. With it, both operators onboard and in the CCC have full visibility into what is happening at level crossings.

    Other authors
    See publication
  • Onboard Internet & Cellular Services

    Bynet Data Communications

    Bynet’s unique mobility solution provides robust, wireless broadband connectivity for trains that travel at speeds of up to 300 km/hour. The solution enables broadband quad- play services to commuters aboard any kind of mobile transportation – metro, rail, BRT and maritime.
    The ever-increasing demand for bandwidth and online service can influence a commuter’s decision about which transport operator to use. Passengers, especially those traveling for business, would like the option to convert…

    Bynet’s unique mobility solution provides robust, wireless broadband connectivity for trains that travel at speeds of up to 300 km/hour. The solution enables broadband quad- play services to commuters aboard any kind of mobile transportation – metro, rail, BRT and maritime.
    The ever-increasing demand for bandwidth and online service can influence a commuter’s decision about which transport operator to use. Passengers, especially those traveling for business, would like the option to convert their commute into productive time. As such, they prefer transit operators who offer broadband connectivity and continuous cellular coverage.

    Other authors
    See publication
  • Real-Time Passenger Infotainment System

    Bynet Data Communications

    With passengers and commuters having more transportation options than ever, differentiating the experience they have has become a necessity for transit operators. One way to do this is through the improvement of the onboard experience by providing passengers the benefit of relevant information and entertainment. Up until now though, it proved challenging to find a solution that combined real-time live content, recorded content; information specific to current location, date and time; route…

    With passengers and commuters having more transportation options than ever, differentiating the experience they have has become a necessity for transit operators. One way to do this is through the improvement of the onboard experience by providing passengers the benefit of relevant information and entertainment. Up until now though, it proved challenging to find a solution that combined real-time live content, recorded content; information specific to current location, date and time; route updates and have it all delivered with an excellent user experience. Bynet addresses these challenges and more with a comprehensive infotainment solution that will enhance your passenger’s experience so that you’ll be their first and only transportation choice.

    Other authors
    See publication
  • Video Management System for Transportation

    Bynet Data Communications

    In today’s public transportation environments, advanced, real-time information sharing systems is a key element required for total situational awareness. Mobile and live-streaming video surveillance has emerged as a critical system component that helps ensure continuous operations and public safety.

    Other authors
    See publication
  • Channel 9 Interview - Masa for Information and Communication Technology

    Channel 9

    Masa (Israel Journey) connects Jewish young adults (ages 18-30) to gap year, study abroad, post-college, and volunteer programs. The Jewish Agency makes it easier for young adults to have exciting, life-changing experiences in Israel. Masa Israel Journey offers over 200 study, internship, and volunteer opportunities all over Israel lasting between five and twelve months.

    See publication
  • בינת תקשורת מעודדת עלייה: מכשירה סטודנטים מהתפוצות במסגרת קורס טכנולוגי מקצועי

    אנשים ומחשבים

    הקורס, שנערך בשיתוף הסוכנות היהודית וקבוצת טללים, מתקיים במסגרת פרויקט "מסע לטכנולוגיית המידע", שמטרתו יצירת זיקה לישראל ולעם היהודי, באמצעות הכשרה טכנולוגית והתנסות מעשית.
    אלון בן צור, מנכ"ל בינת תקשורת מחשבים: "העלייה מברית המועצות בשנות ה-80' וה-90' סייעה רבות לישראל בהקמת תעשיית טכנולוגיה חובקת עולם"

    See publication
  • בינת תקשורת מחשבים בשיתוף הסוכנות היהודית וקבוצת טללים מכשירה סטודנטים מהתפוצות במסגרת קורס טכנולוגי מקצועי

    Scooper

    חברת בינת תקשורת מחשבים, מקבוצת רד בינת, בשיתוף הסוכנות היהודית וקבוצת טללים, פתחה קורס מקצועי ייחודי בתחומי הטכנולוגיה והתקשורת (ICT), המיועד לסטודנטים מהתפוצות. הקורס הראשון, אשר נפתח באוקטובר 2012 ויסתיים בסוף מרץ 2013, מכשיר סטודנטים יהודים ממדינות ברה"מ לשעבר למקצועות בתחום ה- ICT, על ידי הקניית תכנים מקצועיים עיוניים, סיורים בתעשיית הטכנולוגיה הישראלית וביצוע פרויקט גמר באמצעות התנסות מעשית בחברות מקומיות.

    See publication
  • פרויקט "שחף" לטלפוניית IP בשב"ס יוצא לדרך

    www.thecom.co.il

    למרות התנגדות גורמים רבים כמו חברי כנסת וארגוני זכויות למיניהם, הטלפוניה לאסירים בשב"ס עוברת מבזק לבינת בפרויקט ענק וחדשני, שיוצא כעת לדרך.

    See publication
  • Tactical Mobile Communication Unit

    Bynet Data Communications

    Bynet’s Tactical Mobile Communication Unit (TMCU) combines Long Distance Radio Backhaul with Wi-Fi AP in a single portable unit.
    The combined unit answers various communication needs. The TMCU allows two-way communication for Data, Video and Voice traffic from the first responders back to control center.
    TMCU enables personnel equipped with PDA or Laptops to be connected to C4I applications.
    The TMCU’s portable capabilities can serve first responders while in the vehicle and/or up to…

    Bynet’s Tactical Mobile Communication Unit (TMCU) combines Long Distance Radio Backhaul with Wi-Fi AP in a single portable unit.
    The combined unit answers various communication needs. The TMCU allows two-way communication for Data, Video and Voice traffic from the first responders back to control center.
    TMCU enables personnel equipped with PDA or Laptops to be connected to C4I applications.
    The TMCU’s portable capabilities can serve first responders while in the vehicle and/or up to 1km away from it. Dual Charge and Operate-while-driving, support 8 hours of replaceable battery life time should answer all the needs for HLS, Emergency, Mobile Video, Network Extensions, Front C&C HQ and additional sites.

    See publication
  • ההצגה של רד

    אנשים ומחשבים

    בינת תקשורת מחשבים מקבוצת רד-בינת השתתפה בכנס השנתי של מפיציה בעולם של רד תקשורת, RAD Group Partners Meeting 2012, שהתקיים בשבוע החולף במלונות הנסיכה ורויאל גארדן באילת. משתתפי הכנס גילו עניין רב בפתרונות שהציגה בינת, פרי פיתוח משותף עם חברות רד, ובעיקר בשני פתרונות מובילים שהותקנו באחרונה – האינטרנט האלחוטי לתחבורה ציבורית, ופתרון טלפוניה חכם למערך בתי הסוהר.

    See publication
  • השחף מגביה עוף

    ביטאון שב"ס

    טלפוניה ציבורית מנוטרת לאסירים - מערכת ממוחשבת, חדשנית ומתוחכמת תחליף את מערך הטלפונים הציבוריים שהיו מוצבים כל השנים במתקני שירות בתי הסוהר.

    Other authors
    See publication
  • בינת תקשורת הקימה תשתית אינטרנט מהיר עבור רכבת אוקראינה

    Scooper

    החברות בינת תקשורת ו- Radwin מקבוצת רד-בינת, סיימו לאחרונה פרויקט הקמת תשתית אינטרנט מהיר עבור רכבת אוקראינה. היקף הפרויקט כחמישה מיליון דולר.
    הפרויקט, שהחל בינואר 2012 , מספק כיסוי אינטרנט מקסימלי הנפרש על פני 1,600 ק"מ , וכלל שימוש בפתרון Mobility של חברת RADWIN , תכנון הקמה והטמעה בוצע ע"י בינת תקשורת. הפרויקט הסתיים בזמן שיא של חמישה חודשים, על מנת לתת מענה לאלפי הנוסעים שהגיעו לאוקראינה ופולין לרגל משחקי היורו שמדינות אלו אירחו במשותף, שהחלו ב-8 ביוני והסתיימו ב-1 ביולי.

    Other authors
    See publication
  • Видео и голосовая система для заключенных

    Bynet Data Communications

    Управление коммуникациями является основой большинства операций учреждения. Это влияет на уровень доходов, на уровень безопасности, перенаселенность и оказывает
    непосредственное влияние на благополучие заключенных, их друзей, членов их семьи и персонала. IV ² S система управления вызовами является сердцем системы управления операциями компании Bynet. Система предоставляет клиентам компании преимущества использования централизованной цифровой сети, сети, которая обладает
    такими…

    Управление коммуникациями является основой большинства операций учреждения. Это влияет на уровень доходов, на уровень безопасности, перенаселенность и оказывает
    непосредственное влияние на благополучие заключенных, их друзей, членов их семьи и персонала. IV ² S система управления вызовами является сердцем системы управления операциями компании Bynet. Система предоставляет клиентам компании преимущества использования централизованной цифровой сети, сети, которая обладает
    такими достоинствами как: повышенная гибкость, более жесткий контроль, эффективность и удобство, высокая доступность, повышение способности борьбы с преступностью, aварийное восстановление.

    See publication
  • Bynet will establish an Inmate Telephony System for the Israeli Prison Service worth tens of millions of dollars

    www.pc.co.il

    מטרות הפרויקט הן להגדיל את מספר מכשירי הטלפון בבתי הסוהר, לעשות את הגישה נוחה יותר ולהוזיל את עלויות השיחות ● ספק התקשורת לפרויקט הוא HOT - ובכך נשבר המונופול בן עשרות השנים של בזק לאספקת שירותי טלפוניה לבתי הכלא ברחבי הארץ ● בבינת צופים, כי מספר השיחות שיבוצעו על ידי האסירים יגדל מדי שנה, כתוצאה מהפרויקט, ב-6%

    See publication
  • פרוייקט שחף - מערך טלפוניה חדש

    שירות בתי הסוהר

    פרויקט "שחף" הוא פרויקט של מערכת טלפוניה חדישה, המותקנת בימים אלו בכלל בתי הסוהר לשרותם של האסירים.
    המערכת החדשה אמורה להחליף את מערכת הטלפוניה הקיימת אשר הותקנה ומתוחזקת ע"י חברת בזק.

    See publication
  • מנרב זכתה במכרז עיר הבה"דים בהיקף של 9 מיליארד שקל

    TheMarker

    קבוצת מנרב -רד בינת - היא הזוכה במכרז הענק להקמת פרויקט עיר הבה"דים בנגב, כך הודיעה הערב ועדת המכרזים של משרד הביטחון. הקבוצה גברה על שפיר הנדסה שבבעלות האחים שפירא. מנרב, שבבעלות אברהם קוזניצקי, ורד בינת שבבעלות משפחת זיסאפל, לוותה בידי בנק הפועלים אשר גיבש קונסורציום מממנים עם בנק מזרחי ועמיתים. בשלב הבא תחבור אליהן קבוצת אלקטרה של גרשון זלקינד בכפוף לאישור ועדת המכרזים.

    See publication
  • Inmate Intelligence Telephony System

    Bynet Data Communications

    Communications Management is core to most facility operations. It effects revenues, safety, overcrowding and has a direct impact on inmates, friends and family members and staff well-being. I²TSS call management system is the heart of Bynet Communications Management solution. The system provides Bynet clients with the benefit of operating on a centralized digital network that offers a multitude of advantages: Secure Telephone Platform, Fraud prevention, Investigation Features, Voice Biometrics…

    Communications Management is core to most facility operations. It effects revenues, safety, overcrowding and has a direct impact on inmates, friends and family members and staff well-being. I²TSS call management system is the heart of Bynet Communications Management solution. The system provides Bynet clients with the benefit of operating on a centralized digital network that offers a multitude of advantages: Secure Telephone Platform, Fraud prevention, Investigation Features, Voice Biometrics and Video Visitation System.

    See publication
  • בינת זכתה במכרז שרות בתי הסוהר

    TheCom

    בתום עשרות שנים, תפסיק בזק להיות ספק שירותי הטלפוניה לעשרות אלפי אסירים במתקני שרות בתי הסוהר (שב"ס), ומאות קווי הטלפון יטופלו במודל חדש ע"י בינת תקשורת.

    See publication
  • Browsing the web from a train

    Haaretz

    פתרון ייחודי אשר מספק קישוריות אלחוטית אמינה ורחבת סרט לרכבות הנעות במהירויות עד 150 קמ"ש, יאפשר להנגיש את האינטרנט גם לנוסעי הרכבת. הפתרון נותן מענה גם לטלוויזיה במעגל סגור, טלמטריה ואפליקציות מולטימדיה אשר דורשים תעבורת וידיאו, קול ונתונים

    See publication
  • Border Protection

    Bynet Data Communications

    Bynet has a long history of supporting a wide range of perimeter and border security installations. Our wide range of solutions provides flexibility to accommodate an array of new and legacy sensors and communications equipment. Bynet advanced solutions are mobile and rapidly deployable with seamless networking capability to support the common operation picture.
    Several clients had chosen Bynet as the leading provider of various Border Protection Solutions. In particular, Bynet met Ministry…

    Bynet has a long history of supporting a wide range of perimeter and border security installations. Our wide range of solutions provides flexibility to accommodate an array of new and legacy sensors and communications equipment. Bynet advanced solutions are mobile and rapidly deployable with seamless networking capability to support the common operation picture.
    Several clients had chosen Bynet as the leading provider of various Border Protection Solutions. In particular, Bynet met Ministry of Defense (MoD) requirements for creating national level Border Protections suite.

    See publication
  • Successful Pilot for Metro Mobility at Rome Metro

    Bynet Data Communications

    Following a number of successful deployments of our mobility system, Bynet has been chosen by a leading metro operator as a supplier for the wireless mobility system used for surveillance cameras backhauling at the metro's rolling stock.

    See publication
  • Critical Assets Protection

    Bynet Data Communications

    Bynet has a long history of supporting a wide range of perimeter security installations. Our wide range of solutions is deployed in many Critical Assets, and provides flexibility to accommodate an array of new and legacy sensors and communications equipment. These solutions are utilized daily with proven results. Bynet advanced solutions are mobile and rapidly deployable with seamless networking capability to support the common operation picture.
    We understand that many countries are dealing…

    Bynet has a long history of supporting a wide range of perimeter security installations. Our wide range of solutions is deployed in many Critical Assets, and provides flexibility to accommodate an array of new and legacy sensors and communications equipment. These solutions are utilized daily with proven results. Bynet advanced solutions are mobile and rapidly deployable with seamless networking capability to support the common operation picture.
    We understand that many countries are dealing with new and emerging threats that require an extremely broad set of tools. Such a scenario can strain resources and impact schedules. Bynet customers can be assured of low-risk availability of field-proven technology that has been accepted,
    and is already preferred by front-line officials and users on the border.
    Several clients had chosen Bynet as the leading provider of various Critical Assets Solutions. In particular, Bynet was chosen by leading Security Agency requirements for creating wireless infrastructure for Unmanned Ground Vehicles (UGV).

    See publication
  • WiFi MESH Mobile Broadband Wireless Solution - AG-101 Datasheet

    Bynet Data Communication

    The AG-101 WiFi mesh provides carrier-class Mobile Broadband Wireless solution to service providers, transportation operators, municipalities, cellular operators and utilities looking to deploy high-performance wireless infrastructure. The AG-101 combines unique Wi-Fi architecture and MESH backhauling system that was designed to cost-effectively support bandwidth intensive mobile broadband services such as high-speed data, video surveillance, VoIP and smart grid applications. The AG-101…

    The AG-101 WiFi mesh provides carrier-class Mobile Broadband Wireless solution to service providers, transportation operators, municipalities, cellular operators and utilities looking to deploy high-performance wireless infrastructure. The AG-101 combines unique Wi-Fi architecture and MESH backhauling system that was designed to cost-effectively support bandwidth intensive mobile broadband services such as high-speed data, video surveillance, VoIP and smart grid applications. The AG-101 solution provides cost-effective operators with reliable means, to tap into a huge install base of Wi-Fi clients; and therfore designed to support the future emerging growth.
    Breakthrough wireless technology combined with innovative mesh Wi-Fi architecture, takes Wi-Fi networks to the next level of performance, scale and quality. For any size deployment, Bynet Data Communications solutions can reduce networking equipment requirements to deliver immediate upfront CAPEX savings and recurring OPEX savings.

    See publication
  • Connected Urban Transportation Solutions

    Bynet Data Communications

    The availability of a citywide broadband infrastructure is the basis for the successful implementation of Connected Urban Transportation (CUT). Initially, this will support the development of data, voice, video and mobile communication platforms that will be used with local policy and other efforts to increase enablement of work anywhere/anytime.
    Our goal is to propose concepts which make public transportation an attractive, convincing alternative to private cars.
    Bynet’s connected Urban…

    The availability of a citywide broadband infrastructure is the basis for the successful implementation of Connected Urban Transportation (CUT). Initially, this will support the development of data, voice, video and mobile communication platforms that will be used with local policy and other efforts to increase enablement of work anywhere/anytime.
    Our goal is to propose concepts which make public transportation an attractive, convincing alternative to private cars.
    Bynet’s connected Urban Transportation Solutions intended to make public transportation convenient, comfortable, efficient, and reliable.

    See publication
  • Healthcare Assets Management Solution

    Bynet Data Communications

    Healthcare organizations face a wide spectrum of challenges, including constantly-rising financial pressure, regulatory restrictions, the need for continual improvement in staff time efficiency, and patient/staff safety concerns. Many of the problems contributing to these challenges share a common cause – a lack of ”visibility” of the real-time location, status
    and condition of patients, staff, medical equipment and other mobile assets. An infusion pump that isn’t regularly maintained, an…

    Healthcare organizations face a wide spectrum of challenges, including constantly-rising financial pressure, regulatory restrictions, the need for continual improvement in staff time efficiency, and patient/staff safety concerns. Many of the problems contributing to these challenges share a common cause – a lack of ”visibility” of the real-time location, status
    and condition of patients, staff, medical equipment and other mobile assets. An infusion pump that isn’t regularly maintained, an open refrigerator with temperature-sensitive goods,
    suboptimal patient flow within and between departments, or a wandering patient - can all have a major impact on a hospital’s overall quality of care and business. Bynet addresses
    and provides solutions to meet these challenges, increasing visibility within hospitals and delivering tools that stimulate operational efficiency.

    See publication
  • Metro & Railway Mobility Solutions

    Bynet Data Communications

    Onboard broadband communication services has been a recent emerging trend. Various trials in different countries has the feasibility of offering Internet access to train commuters. To date though, none of the trails combined broadband connectivity, system scalability, effective fast handover and quality-of-service guarantees a single solution – until now. Bynet’s innovative and proven architecture addresses these needs and more. It is the solution of choice for broadband communication services,…

    Onboard broadband communication services has been a recent emerging trend. Various trials in different countries has the feasibility of offering Internet access to train commuters. To date though, none of the trails combined broadband connectivity, system scalability, effective fast handover and quality-of-service guarantees a single solution – until now. Bynet’s innovative and proven architecture addresses these needs and more. It is the solution of choice for broadband communication services, with continuous service along the entire route.

    See publication
  • Advanced Wireless Mesh Solutions for Security Forces

    Bynet Data Communications

    פתרונות המאפשרים ליהנות משילוב של טכנולוגיות תקשורת IP עם ניידות
    ומוקשחות בכל טוואי שטח, כבר אינם בגדר חלום רחוק, בזכות ההתקדמות האחרונה במערכות תקשורת אלחוטיות

    See publication
  • Interactions between two-dimensional solitons in the diffractive-diffusive Ginzburg-Landau equation with the cubic-quintic nonlinearity

    Physica D

    We report the results of systematic numerical analysis of collisions between two and three stable dissipative solitons in the two-dimensional (2D) complex Ginzburg-Landau equation (CGLE) with the cubic-quintic (CQ) combination of gain and loss terms. The equation may be realized as a model of a laser cavity which includes the spatial diffraction, together with the anomalous group-velocity dispersion (GVD) and spectral filtering acting in the temporal direction. Collisions between solitons are…

    We report the results of systematic numerical analysis of collisions between two and three stable dissipative solitons in the two-dimensional (2D) complex Ginzburg-Landau equation (CGLE) with the cubic-quintic (CQ) combination of gain and loss terms. The equation may be realized as a model of a laser cavity which includes the spatial diffraction, together with the anomalous group-velocity dispersion (GVD) and spectral filtering acting in the temporal direction. Collisions between solitons are possible due to the Galilean invariance along the spatial axis. Outcomes of the collisions are identified by varying the GVD coefficient, beta, and the collision ``velocity'' (actually, it is the spatial slope of the soliton's trajectory).
    At small velocities, two or three in-phase solitons merge into a single standing one. At larger velocities, both in-phase soliton pairs and pairs of solitons with opposite signs suffer a transition into a delocalized chaotic state. At still larger velocities, all collisions become quasi-elastic. A new outcome is revealed by collisions between slow solitons with opposite signs: they self-trap into persistent wobbling dipoles, which are found in two modifications - horizontal at smaller beta, and vertical if beta is larger (the horizontal ones resemble ``zigzag'' bound states of two solitons known in the 1D CGL equation of the CQ type). Collisions between solitons with a finite mismatch between their trajectories are studied too.

    Other authors
    See publication
  • Protect your Kubernetes Secrets and Privileged Access

    AKEYLESS

    A growing number of organizations are counting on Kubernetes for their container orchestration.
    In order to operate Kubernetes, you need to repeatedly gain access to target machines using
    keys and certificates - highly sensitive information that needs trustworthy protection.
    For this exact reason, container orchestration tools, such as Kubernetes, have become an
    attack target for malicious attackers that can obtain access and permissions to your workload
    environments; an…

    A growing number of organizations are counting on Kubernetes for their container orchestration.
    In order to operate Kubernetes, you need to repeatedly gain access to target machines using
    keys and certificates - highly sensitive information that needs trustworthy protection.
    For this exact reason, container orchestration tools, such as Kubernetes, have become an
    attack target for malicious attackers that can obtain access and permissions to your workload
    environments; an especially lucrative target presenting a winner-takes-it-all prize.

    See publication
  • Protecting Your Company's Secrets in the Cloud-Native Age

    DevOps Digest

    Modern businesses are migrating to a cloud-based model for hosting sensitive data to reap the benefits of agility and cost savings as well as to keep pace with customer demand. Cloud-Native methodologies such as DevSecOps, continuous delivery, containers and micro-services are essential building blocks in the digital business revolution. However, moving information and technologies from hardware to software poses a security concern – translating to a top challenge for both IT and the C-level…

    Modern businesses are migrating to a cloud-based model for hosting sensitive data to reap the benefits of agility and cost savings as well as to keep pace with customer demand. Cloud-Native methodologies such as DevSecOps, continuous delivery, containers and micro-services are essential building blocks in the digital business revolution. However, moving information and technologies from hardware to software poses a security concern – translating to a top challenge for both IT and the C-level, as applications built on top of micro-services and containers in a Cloud-Native environment utilize a wide variety of secrets for their proper functioning.

    See publication

Patents

  • System and method for controlling usage of cryptographic keys

    Issued US US20190222414A1

    The subject matter discloses a computerized system for securing data, comprising a first node, comprising a first memory storage configured to store a first share of a cryptographic key and a communication module, a second node, in communication with the first node, comprising a second memory storage configured to store a second share of the cryptographic key, wherein the first share and the second share of the cryptographic key are required to perform a cryptographic operation using a…

    The subject matter discloses a computerized system for securing data, comprising a first node, comprising a first memory storage configured to store a first share of a cryptographic key and a communication module, a second node, in communication with the first node, comprising a second memory storage configured to store a second share of the cryptographic key, wherein the first share and the second share of the cryptographic key are required to perform a cryptographic operation using a multi-party computation (MPC) process, wherein the second node further comprises a control unit configured to change an operation mode of the second share from enable to disable, wherein the disable operation mode prevents performing the cryptographic operation using the MPC process.

    See patent
  • Method for digital signing with multiple devices operating multiparty computation with a split key

    Issued US US20200169410A1

    The present invention disclosed a method operable on a multiparty signing system for performing a multiparty signing act on a digital content. The multiparty signing system disclosed in the present invention comprises at least two multiparty signing servers configured with methods to perform the multiparty signing act of a digital content to sign. The multiparty signing system can be configured to perform the multiparty signing act by a private signing key split to at least two key shares…

    The present invention disclosed a method operable on a multiparty signing system for performing a multiparty signing act on a digital content. The multiparty signing system disclosed in the present invention comprises at least two multiparty signing servers configured with methods to perform the multiparty signing act of a digital content to sign. The multiparty signing system can be configured to perform the multiparty signing act by a private signing key split to at least two key shares, wherein each key share is held by each of the at least two multiparty signing servers. The multiparty signing system is also configured to communicate with at least one computerized node employed to conduct an approval process for approving the multiparty signing act. The approval process can be configured to conduct the approval process by employing a secure multiparty computation, wherein the approval process is configured to utilize secret shares held by the at least one computerized node. In such cases, the multiparty signing act is approved in case the approval process ended successfully.

    See patent
  • System, product and method for maintaining secured Universal Identity

    Filed US 62/706,012

    Solving secret zero problem by securely authenticating client requests without the need to introduce additional credentials to the service itself

  • System and method for controlling operations performed on personal information

    Issued US US20200110897A1

    The subject matter discloses a method for securing personal information, comprising securing the personal information stored on a data server using a cryptographic secret, said cryptographic secret is unique to a user, storing a first share of the cryptographic secret on a secret storage server communicating with the data server and a second share of the cryptographic secret on a computerized device controlled by the user, detecting a request from the data server to perform an action on the…

    The subject matter discloses a method for securing personal information, comprising securing the personal information stored on a data server using a cryptographic secret, said cryptographic secret is unique to a user, storing a first share of the cryptographic secret on a secret storage server communicating with the data server and a second share of the cryptographic secret on a computerized device controlled by the user, detecting a request from the data server to perform an action on the personal information, transmitting the request to the computerized device controlled by the user to use the second share of the cryptographic secret to decrypt the personal information, decrypting the personal information using the first share and the second share, without storing both the first share and the second share in a single device concurrently and performing the action on the personal information on the data server

    See patent
  • System and method for secure manufacturing of articles

    Filed US US20200213135A1

    The claimed subject matter discloses system for securing a process of manufacturing an article, comprising a facility security node located in a manufacturing facility where the article is manufactured , a security server located remotely from the manufacturing facility , said security server communicates with the facility security node and comprises a key generation module configured to generate a certificate authority (CA) private key in a split manner, one share of the CA private key is…

    The claimed subject matter discloses system for securing a process of manufacturing an article, comprising a facility security node located in a manufacturing facility where the article is manufactured , a security server located remotely from the manufacturing facility , said security server communicates with the facility security node and comprises a key generation module configured to generate a certificate authority (CA) private key in a split manner, one share of the CA private key is stored at the security server and another share of the CA private key is stored at the manufacturing facility. The server also comprises a server Multi - Party Computation (MPC) module configured to perform an MPC process with an article MPC module stored at the article, the output of the MPC process is signing the certificate without reconstructing the entire CA private key.

    See patent
  • Method for securing access by software modules

    Filed US US20190245857A1

    The subject matter discloses a method for providing identity to a software module, comprising splitting a secret key using a split multi-party computation (MPC) process between the software module and a security server and storing one share of the secret key in the software module and another share of the secret in the security server, the security server receiving a request from the software module to access a resource, in response to the request, the security server encrypts a message, said…

    The subject matter discloses a method for providing identity to a software module, comprising splitting a secret key using a split multi-party computation (MPC) process between the software module and a security server and storing one share of the secret key in the software module and another share of the secret in the security server, the security server receiving a request from the software module to access a resource, in response to the request, the security server encrypts a message, said encrypted message is obtained by the software module, the software module initiates a decryption multi-party computation (MPC) process to decrypt the message encrypted by the security server using according to the shares of the secret key, the security server receives the decrypted secret and the public key and the security server signs a certificate associated with the requested resource and the software module and sends the certificate to the software module.

    See patent
  • Method, system and mediums for provision of communication and entertainment services onboard the moving platforms

    Filed IL WO2012004786A2

    Exemplary embodiments of method, system and mediums for provision of various communication and entertainment services onboard the moving platforms are described. The service can be provided but not limited to C-Band communication satellites that are positioned on geostationary orbit and cover large earth areas. Such services can consist but not limited to data transfer (e.g. Internet access), telephone (PSTN and VoIP) and cell phone services (calls and messages), fax services, radio and…

    Exemplary embodiments of method, system and mediums for provision of various communication and entertainment services onboard the moving platforms are described. The service can be provided but not limited to C-Band communication satellites that are positioned on geostationary orbit and cover large earth areas. Such services can consist but not limited to data transfer (e.g. Internet access), telephone (PSTN and VoIP) and cell phone services (calls and messages), fax services, radio and television broadcasting, video on demand (VOD) and other services. Service access can be performed but not limited to laptops, personal computers, portable devices, LCD screens and other one or two way communication and visualization devices. Moving platforms may consist of flying aircraft, cruising ships and ground moving transportation devices. The desired service data is transmitted from the moving platform to the satellite and from the satellite to the ground station, using combined mechanical and optional phased array multi channel antenna and associated electronic devices. Antenna steering is done using navigation and GPS/GALILEO/GLONASS data. The ground station can be connected to more than one C-Band satellite simultaneously. The service data is transmitted from the ground station to the desired destinations. Access to the communication services onboard the moving platform is done using the front end of the billing software which is integrated in the Web interface (Captive portal).

    See patent

Projects

  • Baadim City

    - Present

    Bahadim City (the Israeli Army training campus), which is currently being built in the sand dunes of the Negev, is one of the main projects expected to contribute towards Negev development

    Other creators
    See project

Honors & Awards

  • Gold Globee Awards winner for Startup of the Year in Security Hardware

    Globee Awards

  • AKEYLESS is a Market Leader for Keys Management & Protection

    InfoSec Awards | Cyber Defense Magazine

  • AKEYLESS is a Winner of Next Generation Solution for Secrets Management and Protection

    InfoSec Awards | Cyber Defense Magazine

  • Unbound Key Control is a Bronze Winner of Cybersecurity Excellence Awards for Data-centric Security

    Cybersecurity Excellence Awards

  • UKC v2.0 is a Gold Winner of Global Excellence Awards for Encryption/ Smart Cards

    Info Security Products Guide

  • Gold winner - Technical Innovation of the Year

    Stevie Awards

  • Innovation Award

    Israeli Prime Minister

  • Next Gen Cryptography Winner

    Cyber Defense Global Awards

  • UKC v2.0 is a Bronze Winner of Global Excellence Awards for Security Products and Solutions for Finance and Banking

    Info Security Products Guide

  • UTC Impact Award (Software) for LightSEC Cyber Security product line

    UTC

  • Leading Lights Award for most Innovative Security Strategy

    Light Reading

  • Commendation by ECI EVP Portfolio

    ECI

  • Award of Excellence by Bynet CEO

    Bynet

  • Award of Excellence by Bynet CEO

    Bynet

  • Outstanding Project Award by Bynet VP Sales

    Bynet

  • Award of Excellence by Bynet VP of Technology

    Bynet

  • Optimization Initiative Citation by IAF Head of Materials Directorate

    IAF

  • Award of Excellence by IAF Head of Networking Division

    IAF

  • IDF Officer's School - Graduated with honor

    IDF

Languages

  • English

    -

  • Hebrew

    -

  • Russian

    -

Recommendations received

More activity by George

View George’s full profile

  • See who you know in common
  • Get introduced
  • Contact George directly
Join to view full profile

People also viewed

Explore collaborative articles

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

Explore More