SureShield Tech Update April 2024

Tech Updates
April 15, 2024

Stay ahead of cyber threats with SureShield’s innovative solutions. Explore our latest updates today:

Enhancements:

1. Ignore Vulnerabilities Enhancement: Users can now select tasks and choose to ignore vulnerabilities associated with the selected tasks. This action will ignore vulnerabilities across multiple assets that can be addressed by the selected tasks. Users can also ignore vulnerabilities from the Vulnerabilities grid. Selected Vulnerabilities across all assets. Ignoring vulnerabilities now lets users set a date when the selected vulnerabilities have to be ignored. After the due date, the vulnerabilities will come live if they are still found in the most recent scan.

2. Configuration of Preferred Remediation Tasks Creation Rules: When a partner is setting up preferred remediation tasks creation rules for a customer, the wizard now provides a check-box above the SAVE button to select and save the settings as preferred configurations for all customers of the partner. Upon saving the settings with the checkbox selected, the settings are saved for the partner account. Also, the settings at each customer level for the customers managed by the partner are cleared so that the partner settings apply to all customers.

3. Remediations List Page: A new menu has been added to open a page that lists all the remedial solutions required along with the scanned assets requiring them. Each row in this table represents a remedial solution and an asset combination.

ComplyShield

Enhancements:

1. The FTC Safeguards Rule: ComplyShield now includes a compliance management framework for “The FTC Safeguards Rule”.

The FTC Safeguards Rule, officially known as the Safeguards Rule under the Gramm-Leach-Bliley Act (GLBA), is a regulation implemented by the Federal Trade Commission (FTC) in the United States. The primary objective of the Safeguards Rule is to ensure the protection of nonpublic personal information (NPI) held by financial institutions. Entities that need to comply with the FTC Safeguards Rule include Financial Institutions, Mortgage Brokers and Lenders, Non-Bank Financial Institutions, and so on.

Key components of the Safeguards Rule include Security Program, Risk Assessment, Employee Training, Oversight of Service Providers, and Regular Monitoring and Adjustment Compliance with the Safeguards Rule is essential to protect the confidentiality and security of customer information, preventing unauthorized access and potential misuse. Compliance with the Safeguards Rule helps maintain trust and confidence in financial institutions, as customers expect their sensitive information to be handled securely. Covered entities are also legally obligated to adhere to the Safeguards Rule, and failure to comply can result in regulatory actions, fines, and damage to the institution’s reputation.

2. ComplyShield module onboarding setup can now be done at each site level and the preferences chosen such as compliance-scans policies-setup are now enforced.

3. Compliant control responses are now marked as expired if the next assessment due date is reached and the control owners are notified of the same.

Enhancements:

Every month, a staggering number of access credentials and sensitive data records fall victim to breaches, ending up in the hands of cybercriminals who make them available for purchase on the Dark Web. The knowledge of whether your data is exposed plays a crucial role in reducing your liability and overall risk.

SureShield’s Dark Web Surveillance (DWS) is a comprehensive solution designed to detect and address various security threats. This includes identifying botnets, malware, and compromised credentials associated with email IDs, IP addresses, and credit cards that have either been exposed or are being traded on the Dark Web. DWS also monitors for certain text phrases such as your organization name in the Dark Web forums and discussions.

Here’s how DWS operates: it automatically extracts your primary domain from your email ID (e.g., abc.com from user1@abc.com) and incorporates it into Dark Web surveillance. This ensures continuous monitoring for credential breaches. For instance, if the login ID tom@abc.com is compromised on LinkedIn and the credentials end up on the Dark Web, DWS promptly identifies and reports this. The potential risk to the organization lies in the fact that if Tom is using the same or a similar predictable password to access organizational resources, attackers can easily exploit it.

Credential breaches typically occur due to two main reasons:

  1. Attackers gain access to application databases through vulnerable applications, operating systems, or networks, subsequently selling the acquired credentials and sensitive data on the Dark Web.
  2. Attackers infect end-user devices with Botnets or Keyloggers through vulnerabilities. These malicious entities then send captured sensitive data, including accessed applications and credentials, to their Command & Control centers.

DWS not only identifies compromised credentials but also provides insights into how these credentials were breached. Whether it’s a result of a specific application, like LinkedIn, being compromised or the user’s machine being infected with a Botnet or Keylogger, DWS offers a detailed analysis.

Moreover, DWS extends its monitoring to public IP addresses, checking for botnet infections. It alerts users if servers or applications hosted by these IP addresses are found to be infected with botnets, leading to potentially sensitive data breaches on the Dark Web.

Users have the flexibility to configure DWS by adding multiple domains, IP addresses, and individual email IDs to the watchlist, ensuring daily monitoring for potential breaches. This proactive approach helps organizations stay ahead of cyber threats and protect their sensitive information effectively.

REMEDIATION PROJECTS MANAGER (RPM)

The Remediation Projects Manager (RPM) is a specialized automation module designed to enhance the efficiency of project proposal creation and lifecycle management for partners such as Managed Service Providers (MSP) and Managed Security Service Providers (MSSP). Once activated for a partner, the RPM seamlessly integrates with SureShield applications to streamline the process of generating comprehensive and customer-ready Scope of Work (SOW) project proposals.

Key Features:

1. Digital Workflow Integration: The RPM works in tandem with SureShield applications, leveraging digital workflow components to facilitate the entire lifecycle management of remediation projects. This integration ensures a smooth and automated process from proposal creation to project completion.

2. Comprehensive SOW Project Proposals: The primary function of RPM is to enable the efficient creation of detailed and customer-ready Scope of Work project proposals. By automating this process, it reduces the time and effort required to develop comprehensive documents that outline the specifics of the remediation projects.

3. Internal Review and Approvals: RPM includes a feature for internal review of project proposals. This allows stakeholders within the organization to assess and approve the proposed projects before submitting them to the customers for their approval. This internal review step ensures that the proposals align with organizational standards and objectives.

4. Customer Approval Workflow: After the internal review, RPM facilitates the submission of project proposals to customers for their approval. The digital workflow ensures a streamlined and transparent process for customer engagement and approval, enhancing communication and collaboration between the organization and its clients.

5. Project Cost Benefits Analysis Module: RPM incorporates a built-in Project Cost Benefits Analysis module. This feature empowers users to quickly assess the potential returns on investment for each project. This analysis is crucial for making informed decisions about the feasibility and profitability of proposed remediation projects.

6. Organization-Specific Reference Data: To effectively operate, RPM relies on specific reference data items that are unique to each organization. These reference data items are essential when creating project-related proposals and documents. This customization ensures that the generated proposals align with the specific needs and requirements of the organization, enhancing the relevance and accuracy of the project documentation.

The Remediation Projects Manager (RPM) not only simplifies the creation of SOW project proposals but also ensures a well-structured digital workflow for internal reviews, customer approvals, and ongoing lifecycle management. The inclusion of a Project Cost Benefits Analysis module and organization-specific reference data further enhances its utility and adaptability to the unique requirements of each partnering organization.

RAINMAKER (Beta)

The Rainmaker addon module serves as a comprehensive tool tailored for partners and Managed Service Providers (MSPs) are designed to streamline prospect management processes while enhancing customer engagement. Its functionality extends to nurturing prospects through automated checks and facilitating the seamless sharing of reports, thereby augmenting the likelihood of converting prospects into clients.

In addition to prospect management, Rainmaker empowers partners to capitalize on upselling opportunities by offering additional modules or services to their existing customer base.

This initial release of Rainmaker introduces a prospect management feature tailored for Threat and Vulnerability management by utilizing the Attack Surface Management (ASM) nurturing tool.

ATTACK SURFACE MANAGEMENT (ASM) is a comprehensive cybersecurity nurturing tool designed to empower customers in monitoring, assessing, and remediating security risks associated with their externally facing digital footprint. This includes hardware, software, and cloud assets that are accessible from the Internet. The ASM tool serves as a crucial component of an organization’s overall cybersecurity strategy, providing continuous visibility into potential attack vectors and security threats. ASM also performs a Dark Web scan to report on any credential breaches where the login IDs include the prospect’s domain name.

Here’s a detailed breakdown of the process involved in winning a prospect using Rainmaker:

1. Add a Prospect: The sales manager initiates the prospecting process by adding a new prospect or identifying an upselling opportunity with an existing customer. This is done by providing the website URL of the prospect or the customer, and assigning Threats & Vulnerability Management service along with the Attack Surface Management (ASM) nurturing tool.

2. ASM Nurturing Tool: Upon receiving the website URL, the Rainmaker system automatically triggers the Attack Surface Management (ASM) nurturing tool. This tool utilizes the organization’s public domain name extracted from the provided website URL.

3. Assessment: The ASM tool meticulously monitors and assesses the prospect’s externally facing digital footprint. It scrutinizes various aspects such as identifying other subdomains associated with the organization, determining which applications are accessible to the public, and the technologies being used. It also identifies open ports on publicly accessible assets. Additionally, it conducts a threat & vulnerability scan on all these assets to identify potential weaknesses.

4. Completion of Assessment: Once the comprehensive assessment is completed, Rainmaker promptly notifies the sales manager. At this stage, the sales manager gains access to the assessment results.

5. Report Generation and Customization: Using Rainmaker’s intuitive interface, the sales manager has the option to generate a detailed report based on the assessment findings. This report can be extensively reviewed, edited, and customized according to the specific needs and preferences of the prospect by using the IRIS reporting module.

6. Sharing the Report: After customizing the report, the sales manager can seamlessly share it with the prospect. This serves as a valuable tool for demonstrating the MSP’s capabilities, addressing potential concerns, and showcasing the tailored solutions that can address the prospect’s needs effectively.

By following these steps meticulously, Rainmaker empowers sales managers to effectively engage with prospects, showcase their strengths, and ultimately increase the likelihood of successfully converting prospects into satisfied clients.

Please email us at support@sure-shield.com with questions, suggestions, or feedback. Thank you for being a part of our tech community.

Best regards,
Thomas Leahy
SVP, SureShield Inc.

Leave a comment

Your email address will not be published. Required fields are marked *