Proud to Partner with Pax8 to Address Growing Browser Based Cyber Threats

Proud to Partner with Pax8 to Address Growing Browser Based Cyber Threats

On July 27th, 2021 we announced a global partnership with Pax8, a company that simplifies the way organizations buy, sell, and manage cloud solutions, empowering them to achieve more with cloud technology, to provide managed service providers (MSPs) endpoint security solutions for all devices.

Here's the backstory: 

When the Covid-19 pandemic began, IT and network professionals at nearly every enterprise were forced into action as remote work became the norm following the arrival of the COVID-19 pandemic. Organizations across all industries were forced to go digital, which unfortunately led to a boom-time for potential cyber criminals.

Reports of cybercrime shot up by almost 70 percent in the US compared to 2019, as the lockdown created an ideal environment for cyber criminals.

The RSA’s Quarterly Fraud Report found that during the Covid-19 pandemic, phishing and ransomware remained the most common approach, accounting for 33 percent of all cyberattacks. On top of this, with so many new devices in use due to remote work, account takeover attempts soared, and logins to a new account from a new device accounted for 31 percent of fraud activity. The multi factor authorization, which is claimed to be extremely safe and secure, was also easily breached.

One cybersecurity strategy many organizations are now turning to is a zero-trust architecture approach. Zero-trust is a security framework requiring all users, whether in or outside the organization’s network, to be authenticated, authorized, and continuously validated for security configuration and posture before being granted or keeping access to applications and data.

Zero-trust assumes that there is no traditional network edge; networks can be local, in the cloud, or a combination or hybrid with resources anywhere as well as workers in any location. This is a significant departure from traditional network security which followed the “trust but verify” method, but the old model became obsolete with the cloud migration of business transformation initiatives. 

The benefits related with zero-trust architecture are bountiful, such as reduced threat surface, maximized use and authority of authentication, limited possibility for data exfiltration, protection against both internal and external threats, as well as simply improving overall security posture both on-premises and in the cloud. 

On top of this, when endpoint security technology is incorporated with the core principles of the zero-trust architecture, data and networks can even be safely managed with employees spread out working remotely. Endpoint protection is the ability to protect the assets that are the last touch point of the network it is connected to.

With the growing number of endpoint devices inside of a business, it’s even more important to make sure endpoints are managed to help reduce the attack surface. Only once a device is managed, then we can begin to think about how to secure the device from today’s evolving threat landscape.

We are excited to work with Pax8 and offer our innovative solutions to their expansive partner ecosystem. The number and impact of cyber breaches targeting businesses of all sizes are growing exponentially.  Organizations need to re-think the trust relationship built over the years with the Internet, end-users, devices, and locations. Our advanced zero-trust end-point web threat protection technology can easily secure and manage Pax8 partners and their end-users across all devices, ensuring their clients work safely from anywhere, on any device, over any network.

DefensX offers MSPs the following benefits: 

● Zero-trust credential exposure & phishing protection

● MFA breach protection

● Zero-trust remote browser and file isolation

● URL/URI protection, a technology replacing legacy DNS based protection

A cyber-attack on any customer can be catastrophic, but by leveraging our solutions with zero-trust architecture and endpoint security, businesses can stay vigilant and prepared for whatever evil lurks in the digital shadows.