CloudAccess News

Unified security from the cloud recognized as Product of the Year

CloudAccess’ REACT secures top honor with Business Intelligence Group (BIG) Award

LOS ANGELES, CA – September 25, 2013 – CloudAccess’ patented practice of integrated security capabilities managed in real time within centralized (REACT) control was selected as the winner of this year’s BIG Award by the technology consultancy Business Intelligence Group.

REACT (Realtime Event and Access Correlation Technology) is the only fully integrated technology security solution developed and managed from the multi-tenant cloud. The award-winning offering promotes a unified security deployment that leverages SIEM (security incident and event management), log archiving, identity management and access control in a comprehensive security-as-a-service bundle.

“The lives on on-site network security equipment are numbered for sure,” said Dawn Fordyce, managing director for the Business Intelligence Group. “All too often malicious code, hackers and other threats are making their way into local networks so stopping them in the cloud with the REACT Security Platform from Cloud Access makes total logical sense.”

READ THE REST OF THE ARTICLE HERE .

.

.

NetworkWorld tabs CloudAccess IDaaS / SSO Product of the Week

IT Media leader recognizes integrated and cloud-based  Identity Management and access management offering

LOS ANGELES, CA – September 16, 2013 – CloudAccess is honored to be included in NetworkWorld‘s list of products of the week. CloudIAM was included as part of the September 16, 2013 presentation. The only cloud-managed multi-tenant enterprise-class security offering currently on the market that promotes seamless out-of-the-box integration between identity management, access management and single-sign-on. Provides functionality to securely administer identity creation, maintain real-time
See the NETWORKWORLD article

READ THE REST OF THE ARTICLE HERE .

.

.

Federated Office365 connector added to CloudAccess security library

Cloud security firm adds connector to facilitate secure access Microsoft’s popular end user SaaS offering

LOS ANGELES, CA – September 10, 2013 – Microsoft’s Office365 is one of the most ubiquitous and essential tools for millions of end users and now leading security-as-a-service firm CloudAccess ensures organizations deploying this SaaS offering can securely manage access with its recently upgraded identity management (IDaaS) adapter from the cloud.

This federated connector (application programming interface also known as API) for Office365 received an upgrade to seamlessly improve integration to various information databases such as Active Directory. According to CloudAccess, it facilitates and protects the essential communication between the SaaS and the identity source database used for account authentication.

“This solution acts as a trusted administrator by supporting tasks as creating accounts, managing permissions, profiles, and resetting passwords,” said CloudAccess CEO Kevin Nikkhoo. “The result is the right people get to see the right application in a secure and compliant environment.”

The connector is a key part of an identity management deployment which when integrated with access management (single sign on), creates channeled access control. In this configuration, the connector supports the key function of automatic bi-directional user provisioning/deprovisioning.

READ THE REST OF THE ARTICLE HERE

.

.

CloudAccess Identity and Access Management packages updated with new application and platform connectors

Cloud security firm adds salesforce.com, SAP ECC, AS400, GoogleApps and to its growing advanced adapter library

LOS ANGELES, CA – July 29, 2013 — CloudAccess, the only IT security firm to currently offer a fully integrated cloud-based identity management (IDaaS) and single sign on (SSO) package, announced the addition and update of several critical application connectors.

Part of the recently launched “Advanced Adapter Series,” connectors (application programming interface also known as API) for salesforce.comSAP ECC, AS400 iSeries RACF and GoogleApps received an upgrade to better facilitate automatic provisioning, reconciliation and password management combined with a seamless integration CloudAccess’ enterprise access control solution.

“What we have done is close the loop on security management for various key applications,” said CloudAccess CEO Kevin Nikkhoo, “Clients with these apps or platforms can now better control who accesses what data.”

The connectors facilitate important security functions such as the assigning of certain privileges to certain applications and data based on corporate role or need-to-know policies. Using these cloud-based functions, the typically laborious process is automatic and instantaneous throughout an enterprise. This includes the on-demand creation and removal of user accounts, maintenance of passwords (including user self-service) and reporting for compliance audits.

READ THE REST OF THE ARTICLE HERE

.

.

Making Compliance Easier: a new CloudAccess White paper

CloudAccess presents a brand new white paper that explores the strategic advantages of applying integrated (unified and collaborative) cloud security tools to cost-effectively and efficiently manage the complex labyrinth of compliance.

It also shares specific best practices in terms of associating a broad swath of requirements with tactics that help you maneuver through the evolving IT threat-scape. If your organization is obligated to any of the 300 worldwide compliance agencies.

As compliance is typically an compulsory bureaucratic construct, being compliant doesn’t necessarily make your network and other IP assets secure. However, being secure, does make one compliant. The best practices contained in the white paper go well beyond the need to collect and review logs (a necessity for most compliance regulations)–it looks at the holistic need to actually create security policies. These include 24/7/365 real-time monitoring that includes intrusion detection and alerting, identity provisioning, enterprise access control, application management and identity credentialing. In that the solutions discussed are maintained and managed in the cloud, the issues of expense, time to market, TCO and scope are mitigated…as is risk.

This white paper is a strong road map to reducing the burden and creating better visibility across an enterprise.

Please download this free white paper: MAKING COMPLIANCE EASIER: MAPPING REQUIREMENTS TO AN INTEGRATED CLOUD SECURITY PLATFORM

.

.

5 Things You Don’t Know Because You Weren’t At CU InfoSecurity 2013

From the Credit Union Times:

CloudAccess Kevin Nikkhoo recently presented a technical primer on maneuvering through an evolving IT threat-scape and implementing best practices towards regulatory compliance at the 2013 Credit Union InfoSecurity Conference in Las Vegas. The presentation included the implementation of layered cloud security. This unified concept includes the integrated collaboration of such independent solutions as SIEM, log management identity management and web and application access control.

“Get alerts to suspicious activity in real time, urged Kevin Nikkhoo, CEO of CloudAccess, a security-as-a-service startup. Getting them later could be catastrophic. Even when the activity occurs at 3 a.m. on a Saturday.”

Read the rest of the article HERE:

.

.

American Business Awards bestow a “Stevie” on CloudAccess

Los Angeles, CA, May 14, 2013 –In recognition of advancements in cloud-based security, the American Business Awards named CloudAccess as a Finalist for the 2013 Stevie® Award

CloudAccess, a leader in unified security as a service from the cloud, was selected in the New Product or Service of the Year – Software – Security Solution category for its unified REACT offering. REACT (Realtime Event and Access Correlation Technology) is a centralized, cloud-based security platform that leverages the cooperative functionality of key deployed solutions including SIEM (security information and event management), Log Management, SSO (single sign on), IDaaS (Identity Management) and access management.

“This award is about the recognition of the paradigm-changing value of a unified security initiative deployed and managed from the cloud. It’s about changing the conversation from what can I afford or internally manage, to what can I do best to prevent unwanted access while protecting online and digital data,” said CloudAccess CEO Kevin Nikkhoo. READ THE REST HERE

.

.

Revealing Cloud-Driven Best Practices for Fully Integrated Identity and Access Management

CloudAccess is hosting a free webinar titled: “One Click…From Directory to Cloud” on May 22 and May 28th at 11:00am to address best practices associated with user provisioning, password management, multi-factor authentication, application gateways and single sign on.Los Angeles, CA, May 11, 2013 — Effectively managing individual online user identities while controlling their specific application and data access privileges continue to be a challenge for IT administrators. CloudAccess, a leader in cloud-based security solutions is hosting a complimentary webinar that address best practices to overcome the issues of complexity, expense and available resources.The 45-minute presentation, titled “One Click…From Directory to Cloud,” and scheduled for May 22nd and 28 at 11:00am PDT, boldly asks the question, “What if you could add a user from any directory or database and it shows up automatically in Google Apps, salesforce.com, any SaaS or legacy application?” Accomplishing this has long been a difficult, but necessary goal for companies needing to protect assets using identity and access management….READ MORE AT: http://bit.ly/100EhJw
.
.


CloudAccess unveils integrated version of identity and access management

Los Angeles, CA, April 26, 2013 -CloudAccess announced the release of the latest version of CloudIDM/AM which features a unique and seamless integration between identity management and access control (single-sign-on/access management) from the cloud…We are the first to the cloud-based market with a fully-featured enterprise security solution that combines the key capabilities of user credentialing and authentication with single-sign on for both SaaS (SAML) and legacy (non-SAML) applications READ MORE AT: http://bit.ly/13ydDqJ

.

.

CloudCon Expo 2013 adds CloudAccess CEO to security panel

Los Angeles, CA, March 20, 2013 -Cloud-security expert and CloudAccess CEO Kevin Nikkhoo accepted a place on the key panel Challenges of Cloud Computing in Highly Scalable and Secure Enterprises at the upcoming CloudCon Expo in San Francisco on May 14.

Nikkhoo joins Saran Mandair, senior director of infrastructure at PayPal, in discussing how to maximize advantages in cloud computing while still ensuring and maintaining  the protection of proprietary assets.

“Security is an on-going issue with regards to cloud computing. However, many don’t recognize that the cloud also provides a unique advantage in terms of scalability, flexibility and capability that directly address those concerns,” Nikkhoo said.

According to Nikkhoo, the answer lies in the ability to adopt a unified cloud-based security initiative that integrates and leverages information from multiple solutions to create more effective activity visibility. He notes that the flexibility of the deploying and managing from the cloud shifts the question from one of cost and limited scope, to one of solving a business need.

Based on his 32 years as a developer, security expert, serial entrepreneur and chief executive, Nikkhoo plans to share several best practices with regard to security and offer easily applicable cloud-computing strategies.

The 2nd annual conference, sponsored by a number of “players” in the cloud computing space is geared to help companies evaluate cloud platforms and better understand how to utilize and incorporate cloud-based solutions as part of a go-forward IT strategy. This year’s event is being held at the South San Francisco Conference Center. The specifics regarding Nikkhoo’s panel can be found on the CloudCon Expo agenda page or here.

“This is a strong platform to forward the concept of cloud-based security and to challenge existing paradigms of how to best protect the assets of the enterprise,” Nikkhoo added.

Earlier this year, Nikkhoo was honored with a Lifetime Achievement Award in IT from the leading IT consultancy Cloud Silver Lining in recognition of his forward-thinking career, innovative accomplishments and community involvement.

Interested attendees need to register: http://cloudconexpo.com or call 510-825-6132. Several conference, expo and workshop packages are available.

.

.

CloudAccess CEO to present ‘Beyond SIEM: Unified Security from the Cloud’ at Credit Union InfoSec Conference

Los Angeles, CA, March 14, 2013 –Credit unions and regional financial institutions attending the upcoming Credit Union Information Security Conference will have the opportunity to challenge existing security paradigms during a keynote session led by cloud-security expert and CloudAccess CEO Kevin Nikkhoo entitled “Beyond SIEM: Unified Security from the Cloud.”

Sponsored by CU News (publisher of Credit Union tech-talk), the June 5-6 conference in Las Vegas will showcase several security-centric themes, but Nikkhoo’s presentation on holistic security best practices is one of the most anticipated of the event.

“More than practically any other market, the modest financial institution is at substantial risk. With the burdens of unrelenting compliance regulations combined with the threat of hacks, careless users and internal challenges, the benefits of intrusion detection solutions like SIEM may not be enough,” Nikkhoo said. “Like the largest banks, a credit union needs multiple layers of security, but they don’t have the budget or resources to make it happen.”

According to Nikkhoo, the answer lies in the ability to adopt cloud-based security initiatives that incorporate more than SIEM or log management, work collaboratively in real time and provide the necessary visibility to meet strict compliance needs.

“At the end of the day, every credit union needs to know who is logging in, what are they looking at, where are they, when was information changed, and how are they authorized? All that feeds into understanding the overall impact on the network and beyond,” Nikkhoo added. “The challenge is that breaches happened ‘in the now’ and looking at logs days or weeks later does not serve the need of institutions with sensitive data. The real time aspect is just one way the cloud is the great equalizer.”

The hour-long presentation, currently scheduled for June 6 at 1:30pm, will address several key needs for credit unions including achieving FFIEC compliance best practices, solving BYOD and other persistent threats, enhancing visibility, reducing costs through holistic, unified security platform and audit readiness.

The 11th annual conference, described as the “original and premier conference dedicated solely to credit union security” is aimed at security officers, compliance officers, IT department managers, Operations VP and CEOs. This year’s event is being held at the Platinum Hotel.

Interested attendees need to register: https://www.cunews.com/infosecurity-conference.html or call 800 808 2188. Those that mention this CloudAccess press release are entitled to a 25% discount off the registration fee, according to organizers.

.

.

CloudAccess, Adintech team up to make enterprises more secure

Cloud-based security leader CloudAccess has announced a new partnership with Costa Rica-based consulting firm Adintech.

As an official CloudAccess partner in Latin America, Adintech provides professional services related to CloudAccess’ unified security REACT platform (Realtime Event and Access Correlation Technologies).  This affiliation includes helping clients more easily deploy, integrate and manage security from the cloud.  Adintech is one of the leading managed service providers specializing in security in Latin America.

“Our partnership with Adintech adds a considerable amount of knowledge in the security realm, and provides us a significant voice in Latin America,” said CloudAccess CEO Kevin Nikkhoo. “We are extremely pleased and proud to launch this new relationship. We look forward to a long and successful partnership providing CloudAccess’ cloud-based security offering through Adintech’s management.

Adintech, whose noted customers include Citibank Costa Rica Siemens Mexico, the University of Costa Rica, National Power and Light and many others, is currently the only managed service provider partner in Latin America offering CloudAccess solutions.

“We recognize the importance cloud-based security plays in an enterprise’s overall strategy and CloudAccess’ comprehensive package certainly delivers many operational and tactical advantages,” said Adintech CEO Rigoberto Mora. “It absolutely compliments what Adintech is trying to achieve as a trusted provider of security options.”

Mora also noted that many of his clients carry significant regulatory compliance and information privacy needs, but do not necessarily have the budget or resources to launch a full-scale on premise security initiative. “This is one of the key advantages I saw in CloudAccess; its ability to cost-effectively and comprehensively perform robust intrusion detection (SIEM), log archiving, identity credentialing and access management from a centralized and virtualized environment makes their enterprise-class deployment attractive to any company.”

.

.

CloudAccess forges new partnership with Europe’s CloudIdentity

Cloud-based security leader CloudAccess has announced a new partnership with UK-based technology firm Cloud Identity.

As an official CloudAccess partner in Europe, Cloud Identity provides professional services related to the unified security suite known as REACT (Realtime Event and Access Correlation Technologies) with an emphasis on the identity and access management capabilities.  This association includes helping European clients more easily deploy, integrate and manage security from the cloud.  Cloud Identity will not just be an integration partner, but also licensed to resell the suite and related services as a managed service provider.

“The ability to work with Cloud Identity allows us to better promote the unique value of cloud-based security,” said CloudAccess CEO Kevin Nikkhoo. “We are extremely pleased and proud to forge this new partnership. Not only does it provide a strong foothold in European markets, but expand our wealth of expertise for our identity and access management development.”

According to Nikkhoo, Cloud Identity has already been instrumental in improving the integration of several key applications into the identity and access management stand-alone solutions.

“Cloud-based security is the future and through this partnership with CloudAccess, we can deliver a more complete, robust security offering that provides tremendous operational advantages for our clients and meets the asset protection goals of many of Europe’s emerging companies,” said Maciej Machulak, CEO of Cloud Identity.

CloudAccess specializes in a unique unified security platform that leverages the capabilities of intrusion detection, log archiving, user credentialing, provisioning, application authorization, automations and compliance reporting. In that this is 100% deployed and managed from the cloud creates better real time visibility, scalability, agility and affordability for any sized organization. REACT is the only cloud-managed offering on the market that incorporates all these key security capabilities (SIEM, Log Management, Identity Management and Access Management/Single Sign-on) from a multi-tenant configuration. CloudAccess, and partners like CloudIdentity, also provide each solution as a stand-alone cloud-based offering as well.

CloudIdentity’s announcement: HERE

.

.

ONLINE, MOBILE, NETWORK AND PHYSICAL-SECURING THE SPECTRUM

by Thomas Wright  www.cunews.com

From Credit Union Tech Talk: The full article is HERE

A layered approach to security is the time-tested best method for protecting the credit union’s critical assets. With breaches, data leakage and
theft an ever-looming threat, organizations must begin to think beyond the traditional stacks of firewalls and e-mail filtering. With compliance and
customer confidence top of mind, credit unions must deploy a variety of security controls such as identity and access management, single sign on,
etc. The problem is there are so many of these security blocks to stack and arrange that it can overwhelm credit unions.

With limited budgets, resources, expertise and time bandwidths, internal IT Departments simply can’t keep up. What is needed is a unified
approach anchored by a robust Security Information & Event Management platform. In action, SIEM provides for the continuous, thorough analysis
of an enormous number of ongoing events in real time. A well implemented SIEM system eliminates silos by combining data from a wide
range of sources and correlating this data to provide control and visibility. MORE

.

.

EVOLVING EYE OF NETWORK SECURITY

From Military Information Technology 2012 Volume: 16 Issue: 11 (By Peter Buxbaum)

Much has changed in the last few years to undermine network security postures. Run-of-the-mill hacking has given way to organized criminal activity, and many government agencies and corporations have been victimized by stealthy attacks that have exploited vulnerabilities, disrupted operations, and stolen information….

Read the article on the CloudAccess website

.

.

CLOUDACCESS’ NIKKHOO HONORED WITH CLOUD SILVER LINING LIFETIME ACHIEVEMENT AWARD

LOS ANGELES, CA–(Dec 30, 2012) – In recognition of a forward-thinking career, innovative accomplishments and community involvement, CloudAccess, CEO and serial entrepreneur Kevin Nikkhoo was honored with a Lifetime Achievement Award in IT from the leading IT consultancy Cloud Silver Lining.

The distinguished award and $5,000 donation in his name to UNICEF was presented to Nikkhoo for a series of conceptual and technological advances in IT ranging from his early successes as a leading developer at Xerox to his current pioneering venture in the emerging cloud computing field of virtualized and integrated enterprise-class security solutions, tagged “security-as-a-service.”

“I’d like to think every accomplishment and failure; every challenge and sleepless night; every step and stumble in my career, provided a significant piece of the puzzle that has positively impacted the way businesses, and more specifically IT, works,”

The award, according to Cloud Silver Lining, transcends technological achievements. A significant part of the acknowledgement is based on how Nikkhoo has given back to the community and how he has helped lift up the lives of those around him.

“I have been blessed with a great deal of success, but one thing is for certain. I did not do this alone,” Nikkhoo said. “Over the years I’ve worked with many extremely talented developers, sales people, partners, project managers, assistants; all who shared a vision, drive and commitment to changing the paradigms; to making things better. Without them I would be selling pencils on a street corner.”

The honor, in its second year, is awarded to the individual who has made the most significant innovative contributions to Information Technology, either through individual accomplishment or guidance of a group. Winners are chosen from leading IT executives whose professional contributions reflect leadership and mentorship. Candidates must have influenced the industry by demonstrating a commitment to diversity and service to their profession, industry, and community.

And, as the pioneering leader of CloudAccess, Nikkhoo has led the ground breaking charge to apply Open Stack development technologies against the huge need for all companies (SMB to Fortune 500) to protect their assets against hackers, streamline and improve security processes, and better control the quickly shifting landscape of enterprise online needs. This, according to Nikkhoo is “changing the game” by making security deployments more egalitarian and increasingly effective.

Nikkhoo’s paradigm challenging and changing career started more than 30 years ago. Earlier in his career, he helped develop a means for printers to talk to each other. Now an industry standard, Nikkhoo wrote the protocols for these units to seamlessly connect. He experienced further success as the CEO of Vertex which developed a new web-based communication model for ATMs to share information with a secure central database.

.

.

CLOUD COMPUTING EXPERTS REVEAL INDUSTRY OUTLOOK IN NEW WHITE PAPER

CLOUD ACCESS  featured on Panel of Thought Leaders to Offer Groundbreaking Perspective on Trends, Predictions and Topics Shaping the Industry

SAN DIEGO, CA–(Dec 3, 2012) – Fairway Technologies, a San Diego-based technology consulting and software development firm, today announced the release of a new white paper, Get Your Head Into The Clouds! Industry Experts Answer Today’s Cloud Computing Questions that reveals exclusive industry analysis from six of today’s most influential cloud computing experts including CloudAccess CEO Kevin Nikkhoo.

In an effort to help organizations sort through all of the cloud confusion, Fairway’s latest white paper offers a thorough examination of the cloud computing environment while addressing today’s most critical cloud-related questions. Featuring a diverse panel of thought leaders, this report also evaluates the accuracy of past cloud computing predictions, and delivers thought provoking perspective on trends that continue to influence this rapidly changing industry. The new white paper is available for download at http://www.fairwaytech.com/resources/white-papers.   Nikkhoo discusses several aspects in relation to both security of cloud computing and cloud-based security initiatives (security-as-a-service delivered from the cloud).

Although cloud computing is a multibillion-dollar industry, many organizations remain unclear on which technologies they need, integration requirements, security practices, and how to best implement cloud service technologies effectively. As cloud services continue to gain momentum, businesses rely on the specialized knowledge and experience of industry experts to help navigate future transitions, adoption decisions, and effectively leverage the transformative force of the cloud.

Fairway’s collaborative new report not only examines the cloud computing issues that are dominating the industry, but also identifies key challenges behind cloud adoption and implementation, and presents best practices for organizations looking to develop and implement a sound cloud strategy. Guidance on cloud service brokers, open source cloud, data destruction, cloud bursting, and other topical issues are also discussed.

.

.

CloudAccess asks for your vote for cloud computing UP-START Awards

VOTE HERE FOR BEST CLOUD SERVICE PROVIDER

VOTE HERE FOR BEST BIG DATA SOLUTION

VOTE HERE FOR BEST CLOUD AUTOMATION SOLUTION

CloudAccess named multi-category finalist for cloud computing UP-START Awards

 Los Angeles, CA- October 9, 2012CloudAccess, a security-as-a-service leader was recognized for its technological and industry-changing achievements in cloud-based security with a series of award nominations for the upcoming UP-START Awards sponsored by the UP 2012 Cloud Conference.

The year-old company is a finalist in four distinctive categories including Best Big Data Solution, Best Cloud Service Provider, Best Cloud Automation, Best Data Center Infrastructure Management Solution.  Final voting will happen October 12-19 ahead of the December conference.

“This award puts the CloudAccess brand next to other recognized major players in the cloud security space. That we are a finalist says a great deal about how far we have come in such a short time,” said CloudAccess CEO Kevin Nikkhoo.

CloudAccess was nominated for its scalable cloud-based security offerings which provide comprehensive and cost-effective IT asset protection for such enterprise needs as SIEM, Log Management, Single Sign On, WebSSO, Identity Management and Access Management. CloudAccess is one of a very elite few developers of such an inclusive integration of security tools deployed and managed from the cloud.

“Security-as-a-service is framing the next generation of security. As most IT professionals are comfortable with the concepts and practices of SaaS and other cloud computing methods, CloudAccess is proving there is a  safe, secure and benefit-laden means to deliver enterprise-scaled security from the cloud that is cost effective, regulation compliant and industrial strength,” Nikkhoo added.

The 2012 UP-START Cloud Awards are now established in the cloud community as the de-facto recognition platform to cultivate the understanding, appreciation and advancement of the contribution of cloud computing to the business and technology community.

.

.

Catch up on Cloud Security past blogs: Download Thoughts From the Cloud Volume 1

 Los Angeles, CA- September 28, 2012For those that enjoy reading Thoughts from the Cloud (this blog!!!) offline, the first five blogs have now been packaged together in a convenient PDF download on the CloudAccess website. This volume includes: •    Attacks from Within   •    Security Doesn’t Equal Compliance  •    *******: Your First Line of Defense   •    Smelling a RAT: Lessons Learned from Sophos   •    Threat Versus Risk. Interested readers can also access CloudAccess’ other white papers and solution abstracts from this page.

Readers can still read these entries online from this blogsite.

CloudAccess Named 2012 Start-Up of the Year by BIG Awards

 Los Angeles, CA- September 24, 2012CloudAccess, a security-as-a-service leader was named Start Up of the Year by the Business Intelligence Group “Big Awards.” The year-and-a-half old company was recognized for their advancements and paradigm-changing solutions in cloud based security.

“This award goes far in validating the viability of security managed from the clouds and the incredible hard work our team has put in to developing a comprehensive-yet scalable and game-changing solution in such a short time. It is truly a great honor,” said CloudAccess CEO Kevin Nikkhoo.

CloudAccess won the award for its scalable cloud-based security offerings which provide comprehensive and cost-effective IT asset protection for such enterprise needs as SIEM, Log Management, Single Sign On, WebSSO, Identity Management and Access Management. CloudAccess is one of a very elite few developers of such an inclusive integration of security tools deployed and managed from the cloud.

“Up until now, network and identity security has been performed and operated on an organizations premises, which in short means expensive and hard to manage but CloudAccess has taken this model to the cloud,” said Russ Fordyce, managing director of the Business Intelligence Group. “Cloud Access’ leadership and innovation in this new cloud-based security market is worthy of global recognition.”

CloudAccess SingleSource is unlike any other solution in its class.  Designed from the ground up as a highly scalable, high performance cloud-based multi-tenant system, CloudAccess products are based on the latest SOA technologies allowing for rapid development cycles. Every aspect of CloudAccess technology is thoroughly analyzed so that our customers can benefit from a significant ROI.

The BIG Awards specialize in recognizing top performing companies and organizations with a proprietary judging process scored by recognizable and experienced leaders and executives from across the globe.

“We, as IT professionals, already accept and embrace different cloud-based options. We support dozens of applications in the cloud—some are even of enterprise scale and proprietary in nature. Security-as-a-service is just part of that evolution,” Nikkhoo said. “And CloudAccess is proud to be recognized as an innovator in that space.”

About Business Intelligence Group

The Business Intelligence Group, creators of the BIG Awards, was founded with a mission of recognizing true talent and superior performance in the business world. Unlike other award programs, real business people, those with experience and knowledge, judge the BIG Awards. The organization’s proprietary and unique scoring system selectively measures performance across multiple business domains and then rewards those companies whose achievements stand above their peers.

The 2012 BIG Awards will be expanding in early 2013. For more information visit www.bigawards.org.

.

.

CloudAccess Releases White Paper on Holistic Situational Awareness for SIEM/Log Management

 Los Angeles, August 29, 2012Security-as-a-service leader CloudAccess released a comprehensive white paper detailing the best practice of holistic situational awareness from the cloud. The paper titled “Applying Security Holistically from the Cloud: A Paradigm Shift of Applying Situational Awareness in SIEM deployments is now available in PDF format on the CloudAccess website (www.cloudaccess.com/documentation) or clicking HERE

The 16-page paper outlines the strategic benefits and tactical administration of applying situational awareness (sometimes called data context) to data collected by a SIEM and Log Management deployment managed from the cloud. The paper explains how to reduce the complexity of SIEM, how to ensure ROI with its deployment and how to discover heightened insight and visibility across a network.

.

.

CloudAccess Recognized for Technology Innovation as an AlwaysOn Global 250 Winner

 Los Angeles, July 10, 2012Security-as-a-service leader CloudAccess was selected as an Always Global 250 winner by the technology media watchdog AlwaysOn for its unique technology and entrepreneurial approach to the cloud-based security market.

 Inclusion in the AlwaysOn Global 250 signifies leadership amongst its peers and game-changing approaches and technologies that are likely to disrupt existing markets and entrenched players in the Global Silicon Valley.  CloudAccess was singled out for its contributions to the fast- developing security-as-a-service space, and also for its long term vision in changing the way companies perceive and practice IT asset protection.

“This honor goes beyond the recognition of our scalable, SIEM and identity and access management solutions. It acknowledges the paradigm shift for businesses and validates that enterprise security can safely, efficiently and cost-effectively be managed from the cloud. It is a great honor and I am extraordinarily proud to share this award with the whole CloudAccess team,” said CloudAccess CEO Kevin Nikkhoo.

CloudAccess was specially selected by the AlwaysOn editorial team and industry experts spanning the globe based on a set of five criteria: innovation, market potential, commercialization, stakeholder value, and media buzz.

“This year’s AlwaysOn Global 250 winners are driving the technology market into new, uncharted territory, representing the highest-growth opportunities we’ve seen in the private company marketplace in the history of the Global Silicon Valley.” says Tony Perkins, founder and editor of AlwaysOn. “

The AlwaysOn Global 250 winners were selected from among thousands of domestic and international technology companies nominated by investors, bankers, journalists, and industry insiders.  The AlwaysOn editorial team conducted a rigorous three-month selection process to finalize the 2012 list.

CloudAccess and the AlwaysOn Global 250 companies will be honored at AlwaysOn’s tenth annual Innovation Summit at the Computer History Museum on July 23th, 2012.

CloudAccess was recognized for its scalable cloud-based security model which provides comprehensive, integrated and cost-effective IT asset protection for such needs as SIEM, Log Management, Single Sign On, WebSSO, Identity Management and Access Management.

“We, as IT professionals, already accept and embrace different cloud-based options. We support dozens of applications in the cloud—some are even of enterprise scale and proprietary in nature. Security-as-a-service is just part of that evolution,” Nikkhoo said. “And CloudAccess is proud to be recognized as an innovator in that space.”

A full list of all the AlwaysOn Global 250 winners can be found on the AlwaysOn website at: http://www.aonetwork.com/AOStory/Announcing-2012-AlwaysOn-Global-250-Top-Private-Companies

For more information about the CloudAccess or security-as-a-service managed from the cloud, please contact CloudAccess at 877-550-2568 or visit the website www.cloudaccess.com or blog site at https://cloudaccesssecurity.wordpress.com/

.

.

CloudAccess Advocates Cloud-based Security on “The Cloudcast”

LOS ANGELES, CA  June 28, 2012  Many articles have been written about the pros and cons of cloud security, however, CloudAccess CEO Kevin Nikkhoo articulated the overarching benefits of this changing paradigm during his guest appearance on the popular podcast program “The Cloudcast.”

The recorded podcast, titled “Evolving Security-As-A-Service” can be heard at http://www.thecloudcast.net/2012/06/cloudcast-eps45-evolving-security-as.html

Nikkhoo discussed the viability of security developed, deployed and managed from the cloud including the egalitarian costs, its integrated and immediate deployment and scalable configuration regarding public, private or hybrid clouds and legacy systems.

Sharing his three decades of network security experience with hosts Brian Gracely and Aaron Delp on their popular weekly broadcast of the Cloudcast, Nikkhoo also discussed several best practices, implementation strategies as well as compared security-as-a-service with more traditional on premise solutions.

“The idea behind CloudAccess is to provide enterprise-class security coverage for a fraction of the cost without sacrificing functionality,” Nikkhoo said. “So, in terms of capability, power and performance, it is as effective, or moreso, than on premise solutions. In the cloud, you don’t have implementation costs, you don’t capital expenditures; it’s op-ex; it’s day one, you turn it on today.”

For more information about the CloudAccess or security-as-a-service managed from the cloud, please contact CloudAccess at 877-550-2568 or visit the website www.cloudaccess.com or blog site at https://cloudaccesssecurity.wordpress.com/

.

.

CloudAccess CEO tonight’s Guest on The Cloudcast (June 28, 2012)

CloudAccess Kevin Nikkhoo is tonight’s guest on Cloudcast: He’ll be discussing the emergence and viability of cloud-managed security with host Brian Gracely and Aaron Delp. Listen to it live at 6:30 PDT or any time after on their website, iTunes, YouTube, etc.

Cloudcast is a weekly podcast discussing the evolution of IT towards cloud computing and all the issues, concepts and latest developments in cloud related technology.

Listeners can tune in HERE live or discover the program at a later date.

.

.

VIVA Concepts Selects CloudAccess to Bridge Security Gaps

LOS ANGELES, CA  June 26, 2012  Viva Concepts’ explosive growth over the past 12 months created a coverage gap in their security infrastructure that cloud-based security-as-a-service leader CloudAccess will now bridge. The leading healthcare referral marketing firm selected CloudAccess to integrate their SIEM and log management offerings to upgrade their current security architecture.

“Our expansion over the past year created an immediate need to bolster our security perimeters. With CloudAccess, Viva can now easily and effectively monitor our entire enterprise 24/7/365,” said Jacques Amar, Viva Concepts’ (formerly Performance Optimizer) Chief Technology Officer. “Because of such a fast deployment, we’re already seeing improvements in our ability to recognize issues in real time and immediately enforce protection protocols.”

Among Viva Concepts’ chief criteria in selecting CloudAccess were a cost-effective, scalable and vetted solution that would improve customer information protection and create a virtual shield around its intellectual property.

According to CloudAccess, the cloud-based SIEM/Log Management suite provides situational awareness threat assessment through a complex level of filters, rules and algorithmic correlations. The solution provides analytical context to the hundreds of millions of events, log-ons, data transactions that affect a network every month to determine if an incident is a threat requiring escalation or part of the recognized traffic pattern.

“The idea behind CloudAccess is to provide Fortune 500 enterprise-class security coverage for a fraction of the cost without sacrificing functionality,” Nikkhoo said. “We are privileged to provide Viva Concepts the scope of protection and best practice application to keep their proprietary information secure and let them sleep better at night.”

As a cloud-based solution, there is no software to install or hardware to buy. Users benefit from the scalable pay-as-you-go service in which many of the functions are administered by the solution’s automation functionality. SIEM and Log Management are part of an overall solution suite that also includes Identity Management, Access Management, SaaS Single Sign On and Web Single Sign On. CloudAccess is one of the only companies to provide such a comprehensive cloud-based suite.

For more information about the CloudAccess or security-as-a-service managed from the cloud, please contact CloudAccess at 877-550-2568 or visit the website www.cloudaccess.com or Facebook page.

.

.

DentalOne Partners Choose CloudAccess to Secure Their Enterprise

LOS ANGELES, CA  June 4, 2012  Faced with expanding IT requirements, compliance issues and a pressing need for real-time monitoring, DentalOne Partners, one of the largest dental management service companies, selected CloudAccess’ integrated security-as-a-service SIEM offering to upgrade their current security architecture.

As DentalOne Partners manages healthcare records, insurance information and other personal transactional data, ensuring HIPAA (Health Insurance Portability and Accountability Act) compliance was a paramount concern.  Additionally the company required a powerful intrusion detection/prevention system to create 24/7/365 coverage. CloudAccess will be providing its SIEM and Log Management solution and service to meet those goals.

“We vetted a variety of on-premise and cloud-based options, and we found CloudAccess’ overall strength, scalability, dependability, and overall ease of installation addressed these issues to meet our high standards,” said David Drzewiecki, DentalOne’s Vice President and Chief Information Officer. “By managing this portion of our security operation from the cloud, we will improve our ability to enforce our protection policies and prioritize proactive initiatives.”

According to CloudAccess, the cloud-based SIEM/Log Management suite provides situational awareness threat assessment through a complex level of filters, rules and algorithmic correlations. The solution provides analytical context to the hundreds of millions of events, log-ons, data transactions that affect a network every month to determine if an incident is a threat requiring escalation or part of the recognized traffic pattern.

“The idea behind CloudAccess is to provide Fortune 500 enterprise-class security coverage for a fraction of the cost without sacrificing functionality,” Nikkhoo said. “We are privileged to provide DentalOne Partners the scope of protection and best practice application to keep their proprietary information secure and let them sleep better at night.”

As a cloud-based solution, there is no software to install or hardware to buy. Users benefit from the scalable pay-as-you-go service in which many of the functions are administered by the solution’s automation functionality. SIEM and Log Management are part of an overall solution suite that also includes Identity Management, Access Management, SaaS Single Sign On and Web Single Sign On. CloudAccess is one of the only companies to provide such a comprehensive cloud-based suite.

For more information about the CloudAccess or security-as-a-service managed from the cloud, please contact CloudAccess at 877-550-2568 or visit the website www.cloudaccess.com or Facebook page.

Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s