ConnX and DefensX Partner to Bring Next Level Protection on Every Enterprise Endpoint

16
June, 2022
Author: Arti Loftus

The age of technology has, so far, brought an unprecedented amount of benefits and advantages to the business world. For the first time, organizations can confidently and efficiently add applications like automation, machine learning, and data analytics to repertoires, to optimize their daily processes. However, along with the plethora of benefits, has also come a newly invigorated thorn in the side of enterprises, that being the new wave of cybercriminals that have populated the digital age.

Innovative technology has, unfortunately, allowed cybercriminals to launch more sophisticated attacks, growing in volume and speed, using every form of cyberattack at their disposal. The number of cyber attack data breaches publicly reported so far this year has already exceeded the total for 2020, putting 2021 on track for a record year, according to the Identity Theft Resource Center (ITRC). Unsurprisingly, ransomware remained very common, as 1,097 organizations were hit by ransomware attacks in the first half of 2021, as compared to 1,112 in all of 2020, with studies finding that one ransomware attack happens every 11 seconds in 2022.

On top of this, the explosion of technology has increased the amount of endpoints available for cyber attackers to take advantage of, giving them more target points than ever. Users and endpoints are now the main attack vectors being exploited by cybercriminals today. According to various sources (Verizon 2021 DBIR, Gartner and SANS):

  • 80% percent of all breaches in 2021 involved web browsers on mobile/desktop,
  • 85% of breaches involved a human element,
  • 68% of attacks targeted endpoints, and
  • 61% percent of breaches involved credentials.

The cost of a successful endpoint attack in 2021 was nearly $ 9 million – up from $7.1 million the previous year, while new or unknown zero-day attacks are expected to more than double in 2022.

In order to combat these numbers and would-be cyber criminals, organizations are now heavily investing in cyber-security applications, looking for the right solution that fits their unique needs.

Recently, ConnX, an innovative multiservice communication platform integrator and managed service provider, announced it has been working with DefensX, developer of a zero-trust, transformational application to content protection technology that protects users from sophisticated cybersecurity attacks by isolating threats before reaching end-point devices including desktops, laptops, smartphones, and tablets, to bring a new layer of cybersecurity to large enterprises.

“DefensX is a perfect fit for ConnX,” said Indrajit ‘I.G.’ Ghosh, CEO of ConnX, one of the world’s most successful and advanced IT platform and managed services provider to Fortune 500 companies across industries including financial services, healthcare, retail, medical sciences, sports and entertainment, and others. “We are living in the era of the borderless workforce and ensuring our customers can support their teams and grow their business, even in the face of fast-moving threats, is a very important part of our mission.”

“With so much work being done on desktop and mobile browsers, which will only grow as 5G networks make it possible to do work on smartphones and tablets, attackers have discovered new vulnerabilities including social engineering to lure workers into clicking on links that can open the entire network to attacks in just seconds,” Indrajit continued. “We must protect every endpoint – every device – every employee – and do so automatically and intelligently, which is why we are so thrilled to be working with the innovators at DefensX.”

DefensX next-generation solutions eradicate risk from web-borne threats ensuring users are safe working anywhere on any network or device including desktops, laptops, and iOS & Android. While DefensX started out as a browser isolation technology pioneer, its offering has grown to include DNS Security, Zero-Trust Web Protection, Zero-Trust Credentials, Zero-Trust File Protection, and Cyber Security Training (embedded into the app, intuitively warning end-users when dangers arise, and keeping them from clicking on nefarious sites, or sharing their credentials).

ConnX offers the complete range of modern IT services and solutions, orchestrated via their Maestro platform. ConnX Security as a Service is a comprehensive offering designed to simplify management, reduce expense, and ensure consistency and compliance. ConnX SECaaS offers a blended approach to data and voice security, ranging from stateful inspection, protocol anomaly detection, and intrusion prevention, to sophisticated application and user-aware learning and correlation techniques.

ConnX Unified Security Management (USM), powered by AT&T Cybersecurity, simplifies operations, and ConnX Unified Communications Threat Management (UCTM), powered by Red Shift, is a subset specialized for voice.

  • Asset Discovery – Know who and what is always connected to your environment ?
  • Vulnerability Assessment – Know where vulnerabilities are on your assets to avoid compromise?
  • Intrusion Detection – Know when suspicious activities happen in your environment?
  • Endpoint Detection and Response – Continuously monitor your endpoints in the cloud and on-premises to detect threats and changes to critical files?
  • Behavioral Monitoring – Identify suspicious behavior and potentially compromised systems?
  • SIEM Log Management – Correlate and analyze security event data from across your network and respond?
  • Security and Compliance Reporting – Pre-built, customizable reports for regulation standards and compliance framework?

“ConnX is an incredibly successful MSP for all the right reasons,” said Halis Erkan Osman, founder, and CEO of DefensX. “Not only do they have highly experienced leaders in place, and extremely well-trained professionals, they have consistently invested in their own software and platform development, which is bringing next-level intelligence and automation to service assurance.”

“They are experts at keeping their customers’ digital operations running without fail across the network, clouds, applications, and collaboration – up and down the entire modern tech stack. They understand risk and compliance because they serve the most demanding enterprises in the most regulated industries,” continued Osman. “We are honored and excited to bring DefensX offerings into their cyber security portfolio, integrated with their Maestro platform which makes it even easier to deploy and manage with zero-trust and zero-touch automation and AI.”

Among the capabilities and benefits ConnX, working with DefensX, will bring to market are:

  • Social Engineering Protection
  • Foolproof Credential Exposure Protection on Mobile and Desktop
  • Zero-trust Security Embedded into Browsers
  • Enterprise Grade Web Threat Prevention Deployed at the Endpoints in Seconds

For those who wish to learn more, ConnX CEO Indrajit Ghosh will be speaking on a panel at ITEXPO as an expert on Secure Access Service Edge (SASE). MSP Expo and Future of Work Expo are part of the #TECHSUPERSHOW, being held June 21-24, 2022 at the Greater Fort Lauderdale/Broward County Convention Center in Fort Lauderdale, Florida. ConnX is a Platinum Sponsor of both expos, and DefensX is a Silver Sponsor of both as well.

When Edge-to-Edge Quality Matters, End-to-End Network Observability is Mission Critical

When Edge-to-Edge Quality Matters, End-to-End Network Observability is Mission Critical

You cannot manage what you cannot measure. It’s a phrase that is especially true when it comes to enterprise networking. The ability to understand what is happening at the edge of the network, down to the device and application level, with great granularity and confidence, is no longer a nice-to-have, but a must-have. That’s especially true with the growing popularity of WFH workforce models.

Clean Energy Industry Counts on Connectivity with AI at the Edge to Get to Net-Zero

Clean Energy Industry Counts on Connectivity with AI at the Edge to Get to Net-Zero

Driven by the urgent need to address climate change, the adoption of the UN’s Sustainable Development Goals (SDGs), and the rapid rise of Environmental, Environmental Social and Governance (ESG) standards for measurement, companies in the clean energy industry are some of the most prominent players in the sustainability world and are growing as they continue to replace fossil fuels, traditional nuclear reactors and other legacy sources of electricity.

The Key to Retail Multi-Cloud Management is AI in the Network, All the Way to the Edge

The Key to Retail Multi-Cloud Management is AI in the Network, All the Way to the Edge

The use of cloud technologies in the retail industry has never been more dynamic and promising. Very few enterprises today rely on a single cloud and instead choose cloud consumption based on the applications they are using and how their digitally transformed networks are designed. This is especially true for highly distributed retail companies with hundreds or thousands of physical locations and for those who are increasingly blending the online and in-store customer experience.

Mastering the Edge of Cloud Telco

Mastering the Edge of Cloud Telco

For employees working from home, whether customer-facing or internal, the only reliable and guaranteed media path has been a landline for decades. Phone and video calls over a home Internet link and average Wi-Fi network have been nearly impossible when it comes to a high-quality user experience. Why?