Determining security posture, and how micro-segmentation can improve it

As the recent Quora breach that compromised 100 million user accounts demonstrates, the threat of a cyber attack is ever present in the modern IT environment. Cybercrime and data breaches continue to plague small businesses and enterprises alike, and network security teams are constantly working to stay one step ahead of an attack. This is no easy task since intrusion attempts occur daily and are constantly evolving to find the smallest weakness to exploit.

Attackers can employ direct attacks on data centers and clouds, enact crypto-jacking threats to mine cryptocurrency, devise advanced persistent threat (APT) attacks to extract data while remaining hidden within a network, or even add fileless malware to manipulate in-memory vulnerabilities and access sensitive system resources.

For these reasons, it’s more important than ever for IT teams to evaluate their current security posture to ensure the safety of their sensitive information and assets. This is particularly true in hybrid cloud environments where discrete platforms take siloed approaches to security that can make infrastructure-wide visibility and a holistic approach to security policies extremely difficult. In this piece, we’ll dive into the basics of security posture and explain how Guardicore Centra can help you improve yours.

Security posture defined

Security posture is the overall defensive capability a business has over its computing system infrastructure. Also referred to as cybersecurity posture, the term focuses not only on hardware and software resources, but also the people, policies, and processes in place to maintain security. It is then necessary to prioritize what areas require the most protection, managing the greatest risk, identify weaknesses, and have incident response and disaster recovery plans in place in the event a breach does occur. All of these factors determine the effectiveness, or lack thereof, of an organization’s security posture.

Identifying the areas that deserve attention

In order to determine an organization’s security posture, first it’s the responsibility of a security team to have complete and thorough understanding of the risks associated with the operation of their computing systems. Research must be conducted to quantify attack surfaces, determine risk tolerance, and identify areas within the infrastructure that require more focus.

This planning stage is particularly difficult when attempting to account for the complexities that come with a hybrid cloud infrastructure, as the dynamics of a hybrid cloud make it difficult to get a holistic view of enterprise information systems. Often different policies and controls are in place for different endpoints that exist in different clouds or on-premises.

All of this internal assessment and process scrutiny is essential to develop a foundation for a robust security posture. However, the right tools are required to enforce policies that support it. Modern integrated security techniques such as micro-segmentation and process-level visibility, which are enabled by solutions like Guardicore Centra, help enterprises ensure that they are effectively implementing their strategy and capable of meeting the security challenges of the modern hybrid cloud.

The impact of enhanced visibility on security posture

The heterogeneous nature of a hybrid cloud environment makes it difficult to scale security policies, since there usually is not an effective way to account for the entire infrastructure. Further, because you are dealing with multiple platforms and varying security controls, the possibility of blind spots and oversights increases.

The visualization features of Guardicore Centra were created with these challenges in mind. Using Centra, enterprises can drill down and rapidly discover specific applications and flows within a network, regardless of the particular platform a given node may be running on. Since Guardicore can provide visibility to the process level and enable inspection of systems down to the TCP/UDP port level, blind spots that may otherwise become exploit targets can be eliminated. In a hybrid cloud environment this means you are able to automatically and rapidly learn how applications behave within your network to build a baseline of expected behavior, and better understand how to harden your infrastructure.

The value of micro-segmentation

Given that the greater potential for lateral movement an attacker can perform after a breach, the more damage they can do, it is easy to conceptualize the value of micro-segmentation. We’re all familiar with the benefits of network segmentation using techniques such as access control lists, firewalls and VLANs, and micro-segmentation brings these down to the most granular levels and applies them across the entire hybrid cloud infrastructure. For users of Centra, this means least-access policies can be implemented that limit access to specific groups of users (e.g. database admins), restrict access to certain applications (e.g. a MySQL database server), and restrict access to specific ports (e.g. TCP 3306), with the flexibility of process-level context and cross-platform coverage.

As an added benefit, Centra suggests rules based on analysis of historical data, and development of robust policies becomes significantly easier. By removing complexity, enabling micro-segmentation, and providing process-level visibility, Centra reduces blind spots and limits exposed attack surfaces, two key components of improving security posture.

The importance of threat detection and proactive responses

In addition to enhanced visibility and micro-segmentation, identifying unrecognized and malicious intrusions and reducing dwell-time is an important part of improving security posture. A pragmatic, modern organization understands that despite the best laid plans, breaches may occur and if and when they do, they must be rapidly detected, contained, and remediated.

To this end, Centra is uniquely capable of meeting the breach detection and incident response challenges enterprises with hybrid cloud infrastructures face. Centra uses three different detection methods (Dynamic Deception, Reputation Analysis, and Policy-Based Detection) to rapidly identify and react to attacks. By doing so, Centra helps ensure that in the event a security breach does occur, you are able to reduce the damage and minimize dwell time. This proactive approach to threat detection and response rounds out the Centra offering and helps you ensure your hybrid cloud infrastructure is secure and flexible enough to meet the challenges of modern IT security without sacrificing the performance of your infrastructure or adding unnecessary complexity.

Interested in learning more?

Guardicore Centra can help you significantly enhance your security posture, particularly in complex, difficult-to-manage, hybrid cloud environments. The benefits of hybrid cloud infrastructure are clear from a capex and scalability standpoint, but the tech is not without inherent risk. Hybrid cloud suffers with a myriad of siloed approaches to security policies and controls for reducing attack surfaces in an environment.

Adopting a proactive approach to security and leveraging security solutions that enable micro-segmentation are important steps towards enhancing your security posture and protecting your systems from falling victim to the next data breach.

To learn more about how micro-segmentation can benefit your enterprise, check out the micro-segmentation hub, or set up a demo to see Guardicore Centra in action.

Want to learn more about securing your hybrid cloud environment and strengthening your security posture? Get our white paper on best practices for the technical champion.

Read More

You don’t have to be mature in order to be more secure – cloud, maturity, and micro-segmentation

Whether you’ve transitioned to the cloud, are still using on-prem servers, or are operating on a hybrid system, you need security services that are up to the task of protecting all your assets. Naturally, you want the best protection for your business assets. In the cybersecurity world, it’s generally agreed that micro-segmentation is the foundation for truly powerful, flexible, and complete cloud network security. The trouble is that conventional wisdom might tell you that you aren’t yet ready for it.

If you are using a public cloud or VMware NSX-V, you already have a limited set of basic micro-segmentation capabilities built-in with your cloud infrastructure, using security groups and DFW (NSX-V). But security requirements, the way that you have built your network, or your use of multiple vendors require more than a limited set of basic capabilities.

The greatest security benefits can be accessed by enterprises that can unleash the full potential of micro-segmentation beyond layers 3 and 4 of the OSI model, and use application-aware micro-segmentation. Generally, your cloud security choices will be based on the cloud maturity level of your organization. It’s assumed that enterprises that aren’t yet fully mature, according to typical cloud maturity models, won’t have the resources to implement the most advanced cloud security solutions.

But what if that’s not the case? Perhaps a different way of thinking about organizational maturity would show that you can enjoy at least some of the benefits of advanced cloud security systems. Take a closer look at a different way to assess your enterprise’s maturity.

A different way to think about your organizational maturity

Larger organizations already have a solid understanding of their maturity. They constantly monitor and reevaluate their maturity profile, so as to make the best decisions about cloud services and cloud security options. We like to compare an organization learning about the best cloud security services to people who are learning to ski.

When an adult learns how to ski, they’ll begin by buying ski equipment and signing up for ski lessons. Then they’ll spend some time learning how to use their skis and getting used to the feeling of wearing them, before they’re taught to actually ski. It could take a few lessons until an adult skis downhill. If they don’t have strong core muscles and a good sense of balance, they are likely to be sent away to improve their general fitness before trying something new. But when a child learns how to ski, they usually learn much faster than an adult, without taking as long to adjust to the new movements.

Just like an adult needs to be strong enough to learn to ski, an organization needs to be strong enough to implement cloud security services. While adults check their fitness with exercises and tests, organizations check their fitness using cloud maturity models. But typical cloud maturity models might not give an accurate picture of your maturity profile. They usually use 4, 5, or 6 levels of maturity to evaluate your organization in a number of different areas. If your enterprise hasn’t reached a particular level in enough areas, you’ll have to build up your maturity before you can implement an advanced cloud security solution.

At Guardicore, we take a different approach. We developed a solution that yields high security dividends, even if the security capabilities of your organization are not fully mature.

Assessing the maturity of ‘immature’ organizations

Most cloud security providers assume that a newer enterprise doesn’t have the maturity to use advanced cloud security systems. But we view newer enterprises like children who learn to ski. Children have less fear and more flexibility than an adult. They don’t worry about falling, and when they do fall, they simply get up and carry on. The consequences of falling can be a lot more serious for adults. In the same way, newer enterprises can be more agile, less risk-averse, and more able to try something new than an older enterprise that appears to be more mature.

Newer organizations often have these advantages:

  • Fewer silos between departments
  • Better visibility into a less complex environment
  • A much higher tolerance for risk that enables them to test new cloud services and structures, due to a lower investment in existing architecture and processes
  • A more agile and streamlined environment
  • A lighter burden of inherited infrastructure
  • A more unified environment that isn’t weakened by a patchwork of legacy items

While a newer enterprise might not be ready to run a full package of advanced cloud security solutions, it could be agile enough to implement many or most of the security features while it continues to mature. Guardicore allows young organizations to leapfrog the functions that they aren’t yet ready for, while still taking advantage of the superior protection offered by micro-segmentation. Like a child learning to ski, we’ll help you enjoy the blue runs sooner, even if you can’t yet head off-piste.

Organizational maturity in ‘mature’ organizations

Although an older, longer-established organization might seem more cloud mature, it may not be ready for advanced cloud security systems. Many older enterprises aren’t even sure what is within their own ecosystem. They face data silos, duplicate workflows, and cumbersome business processes. Factors holding them back can include:

  • Inefficient workflows
  • Long-winded work processes
  • Strange and divisive infrastructure
  • Awkward legacy environments
  • Business information that is siloed in various departments
  • Complex architectures

Here, Guardicore Centra will be instrumental in bridging the immaturity gap: It provides deep visibility through clear visualization of the entire environment, even those parts that are siloed. Guardicore Centra delivers benefits for multiple teams, and its policy engine supports (almost) any kind of organizational security policy.

What’s more, Guardicore supports phased deployment. It is not an all-or-nothing solution. An organization that can’t yet run a full set of advanced cloud security services still needs the best protection it can get for its business environment. In these situations, Guardicore helps implement only those features that your organization is ready for, while making alternative security arrangements for the rest of your enterprise. By taking it slowly, you can grow into your cloud capabilities and gradually implement the full functionality of micro-segmentation.

Flexible cloud security solutions for every organization

Guardicore’s advanced cloud security solutions provide the highest level of protection for your critical business assets. They are flexible enough to handle legacy infrastructure and complex environments, while allowing for varying levels of cloud maturity.

Whether you are a ‘young’ organization that’s not seen as cloud-mature, or an older enterprise struggling with organizational immaturity, Guardicore can help you to get your skis on. As long as you have a realistic understanding of your organization’s requirements and capabilities, you can apply the right Guardicore security solution to your business and enjoy superior protection without breaking a leg.

Lessons Learned from One of the Largest Bank Heists in Mexico

News report: $20M was stolen from Mexican banks, with the initial intention to steal $150M. Automatically we are drawn to think of a “Casa de Papel” style heist, bank robbers wearing masks hijacking a bank and stealing money from an underground vault. This time, the bank robbers were hackers, the vault is the SPEI application and well, no mask was needed. The hackers were able to figuratively “walk right in” and take the money. Nothing was stopping them from entering the back door and moving laterally until they reached the SPEI application.

Central bank Banco de México, also known as Banxico, has published an official report detailing the attack, the techniques used by the attackers and how they were able to compromise several banks in Mexico to steal $20M. The report clearly emphasizes how easy it was for the attackers to reach their goal, due to insecure network architecture and lack of controls.

The bank heist was directed at the Mexican financial system called SPEI, Mexico’s domestic money transfer platform, managed by Banxico. Once the attackers found their initial entrance into the network, they started moving laterally to find the “crown jewels”, the SPEI application servers. The report states that the lack of network segmentation enabled the intruders to use that initial access to go deeper in the network with little to no interference and reach the SPEI transaction servers easily. Moreover, the SPEI app itself and its different components had bugs and lacked adequate validation checks of communication between the application servers. This meant that within the application the attackers could create an infrastructure of control that eventually enabled them to create bogus transactions and extract the money they were after.

Questions arise: what can be learned from this heist? How do we prevent the next one? Attackers will always find their way in to the network, so how do you prevent them from getting the gold?

Follow Advice to Remain Compliant

When it comes to protecting valuable customer information and achieving regulatory compliance, organizations such as PCI-DSS and SWIFT recommend the following basic steps: system integrity monitoring, vulnerability management, and segmentation and application control. For financial information, PCI-DSS regulations enforce file integrity monitoring on your Cardholder Data Environment itself, to examine the way that files change, establish the origin of such changes, and determine if they are suspicious in nature. SWIFT regulations require customers to “Restrict internet access and protect critical systems from the general IT environment” as well as encourage companies to implement internal segmentation within each secure zone to further reduce the attack surface.

Let’s look at a few guidelines, as detailed by SWIFT while incorporating our general advice on remaining compliant in a hybrid environment.

  • Inbound and outbound connectivity for the secure zone is fully limited.
    Transport layer stateful firewalls are used to create logical separation at the boundary of the secure zone.
  • No “allow any” firewall rules are implemented, and all network flows are explicitly authorized.
    Operators connect from dedicated operator PCs located within the secure zone (that is, PCs located within the secure zone, and used only for secure zone purposes).
  • SWIFT systems within the secure zone restrict administrative access to only expected ports, protocols, and originating IPs.
  • Internal segmentation is implemented between components in the secure zone to further reduce the risk.

SPEI servers, that serve a similar function to SWIFT application servers should adhere to similar regulatory requirements, and as elaborated on by Banxico in the official analysis report, such regulations are forming for this critical application.

Don’t Rely on Traditional Security Controls

The protocols detailed above are recommended by security experts and compliance regulations worldwide, so it’s safe to assume the Mexican bank teams were aware of the benefits of such controls. Many of them have even been open about their attempts to implement these kinds of controls with traditionally available tools such as VLANS and endpoint FWs. This has proven to be a long, costly and tiresome process, sometimes requiring 9 months of work to segment a single SWIFT application! Would you take 9 months to install a metal gate around your vault and between your vault compartments? I didn’t think so…

Guardicore Centra is set on resolving this challenge. Moving away from traditional segmentation methods to use micro-segmentation that provides foundational actionable data center visibility, this technology shows quick time to value, with controls down to the process level. Our customers, including Santander Brasil and BancoDelBajio in Mexico, benefit from early wins like protecting critical assets or achieving regulatory compliance, avoiding the trap of “all or nothing segmentation” that can happen when competitors do not implement a phased approach.

Guardicore provides the whole package to secure the data center, including real-time and historical visibility down to the process level, segmentation and micro-segmentation supporting various segmentation use cases, and breach detection and response, to thoroughly strengthen our client’s security posture overall.

Micro-segmentation is more achievable than ever before. Let’s upgrade your company’s security practices to prevent attackers from gaining access to sensitive information and crown jewels in your hybrid data center. Request a demo now or read more about smart segmentation.

Read More

Micro-Segmentation: Getting Done Faster With Machine Learning

Building micro-segmentation policies around workloads to address compliance, reduce attack surfaces and prevent threat propagation between machines is on every organization’s security agenda and made it to the CISO’s 2019 shortlist. Many times, deploying segmentation policies in hybrid data centers proves harder than it looks. At Guardicore, we are very proud of our ability to assist customers segment and micro-segment their clouds and data centers quickly, protecting their workloads across any environment and achieving fast return on security investments.

But, we always think that there is room for improvement. Analyzing the different assignments that are involved with the task of micro-segmentation, we have identified several steps that can be accelerated with more sophisticated code. Using data that was collected from our customers and studied by Guardicore Labs, we added machine learning capabilities that accelerate micro-segmentation.

In order to properly micro-segment a large environment, one should discover all the workloads, create application dependency mappings, classify the workloads and label accordingly. Next, one is required to understand how the application is tiered and its behavior in order to set micro-segmentation policies both for its internal components as well as the other entities it is serving.

This is where our machine learning capabilities can assist.

We are taking advantage of the fact that in Guardicore deployments we collect information about every flow in the network. Discovery is automatic, creating a visualization of all application communications and dependencies. The visualized map shows how workloads are communicating. The algorithms use this data and model the network as an annotated graph and use our customized unsupervised machine learning technique to cluster similar workloads into groups, based on communication patterns. Then, Centra can perform the following tasks:

  • Automatic classification of workloads
  • Automatic label creation for applications and their tiers
  • Automatic rule suggestion for flow level-segmentation and process level micro-segmentation

Here is an example of running classification from Reveal’s data center map:

running classification from Reveal with ML

Below is a visualization of results of automatic workload classification:

results of automatic workload classification with machine learning

 

And this is how this looks in Reveal, at the application tier:

Reveal view with ML

 

Want to learn more about our solution? Contact us.

IResponse to IEncrypt

Guardicore Labs provided assistance in a ransomware investigation. We analysed the decryption process of the IEncrypt ransomware and provided a safe-to-use version of the attackers’ decryptor.

Cloud migration challenges and risks – prevent and overcome them

Even though it seems to be almost ubiquitous, cloud computing continues to grow at an impressive rate. According to Gartner, public cloud revenues as a whole will grow by 17.3% in 2019, and the IaaS (Infrastructure as a Service) market will experience 27.6% growth. What this means is that more and more organizations will need to navigate the cloud migration challenges associated with maintaining a hybrid cloud infrastructure in order to reap the benefits of the cloud.

While there are a number of benefits to cloud migration, there are also operational, security, and financial risks that must be accounted for. In this piece, we’ll dive into the different approaches to cloud migration, some of the cloud migration challenges many organizations face, and how to effectively address those challenges to minimize your risk and maximize the upside of the cloud.

Approaches to cloud migration

At a high-level, there are 3 different approaches an organization can take to cloud migration, each with its own set of pros and cons. Aater Suleman did a good job summarizing the 3 main approaches in his Forbes piece, they are:

  • Rehost. Simply move workloads as they are. While simple and less work-intensive than the other methods, the downside here is the inability to maximize the cost and performance benefits of operating in the cloud (e.g. elasticity).
  • Replatform. Make minor changes to workloads to help capture some of the inherent benefits of the cloud (e.g. use a managed database for an app). Replatforming seeks to find a middle ground between the benefits of rehosting and refactoring.
  • Refactor. Re-architect the workloads to maximize the benefits of the cloud. While refactoring is the most work-intensive upfront, it also positions enterprises to maximize the cost and performance benefits of the cloud.

Common challenges and risks of cloud migration

In addition to weighing the pros and cons of the different cloud migration strategies, organizations must be able to identify and overcome the inherent cloud migration risks and challenges that come with shifting workloads off of on-premises hardware. Below, we’ll review three of the most common.

Developing the right strategy to address cloud migration risks

Strategy is vital to any major IT endeavor, and cloud migration is no different. A major part of developing the right strategy is selecting the right approach (rehost, replatform, or refactor) to your migration. While this will have a major impact on ROI and operations, it is not the only area to consider when planning a cloud migration.

Another key component of a cloud migration strategy is knowing what solutions you should say “no” to. Wasted spend is a big cloud migration risk. How big? Consider the statistics that suggest 35% of cloud spend is wasted. Understanding what your business needs, and what it doesn’t, will help you properly plan and avoid wasted spend. Paying for additional cloud infrastructure you don’t need and won’t use isn’t only a poor investment, it also unnecessarily increases your attack surface.

Maintaining application visibility in a hybrid cloud

The cloud comes with challenges beyond wasted spend as well. Generally, security policies are applied within the context of a given cloud platform (e.g. AWS, Azure, GCP, private clouds, etc) or on-premsies data center. This siloed approach to infrastructure leads to disjointed security policies and one-off configurations that make capturing a holistic and granular view of data across the entirety of a network a real challenge.
Lack of visibility can hurt both before and after a migration, particularly when using a “rehost” approach. For example, in order to understand how an application performs, its dependencies, and what ports it uses, granular, process level visibility is required. Similarly, detailed visibility is required after the migration to ensure the app is operating as expected.

Adapting security to fit the hybrid cloud model

Another important part of executing a cloud migration is understanding and accounting for the complexity it can add to network security once it is complete. We often think of cloud migrations as a way to minimize complexity in IT. After all, the provisioning, maintenance, and patching of software and hardware can be abstracted away and taken care of by a service provider. However, from a security perspective, the more discrete clouds and solutions you implement, the more silos you create. As a result, it becomes more difficult to maintain robust, scalable, and holistic security policies. This complexity is only compounded when a single application spans multiple cloud configurations.

In short, the hybrid cloud model is fundamentally different than an on-premises model. Multiple discrete infrastructures and services each have their own wrinkles that make developing policies that can scale and span the entirety of an enterprise difficult. As a result, you are left with multiple silos within your infrastructure that create blind spots, lead to more maintenance, require more resources, and demand more time and energy from the security professionals on your team.

Addressing cloud migration challenges with Guardicore

Some of the challenges we have discussed thus far, namely selecting the right approach for your cloud migration and knowing when to say “no” to unnecessary solutions, can be mitigated with proper planning and an understanding of your infrastructure needs. However, from an operational perspective, you’ll still require tools that enable the visibility, flexibility, and security required to effectively execute a cloud migration and implement enterprise-grade security thereafter.

This is where a solution like Guardicore Centra can add a tremendous amount of value. Since it is designed from the ground up to solve the security and visibility problems facing the modern enterprise, Centra users are able to create and enforce security policies that span clouds and on-premises environments, helping to break through silos. Further, Centra enables the creation of cloud-ready policies with features like auto-scaling that enable users to get the most out of the flexible, burstable nature of the cloud without compromising security.

Centra offers process level visibility across clouds and on-premises which enables detailed planning before a migration and performance monitoring after. Centra also supports a wide variety of cloud API integrations that enable enterprises to capture granular details on migrated infrastructure. Additionally, Centra is able to use dynamic labeling and integrate with Software Defined Data Center (SDDC) controllers, orchestration tools, and bare metal hardware to ensure that security policies follow instances no matter where they are deployed. You can learn more about Centra on the Centra Product Page.

Ready to get started with your cloud migration?

As we have seen, there are a number of factors to consider when planning a cloud migration. Enterprises must be diligent and ensure they aren’t making strategic or operational errors when making the leap. By properly strategizing prior to your migration and leveraging a solution like Guardicore Centra, you can help resolve the inherent cloud migration challenges involved in shifting workloads to the cloud. This will position your business to get the most ROI on your cloud spend and help ensure your IT security is not compromised due to silos and blind spots.

If you’re interested in learning more about how Guardicore can help ensure your next cloud migration is a success, check out our Cloud Migration Use Case Page or contact us today.

Guardicore Awarded 5 Stars In CRN’s 2019 Partner Program Guide

Annual Guide Recognizes the IT Channel’s Top Partner Programs; Guardicore Senior Director of Channels Named to 2019 list of CRN Channel Chiefs

Boston, Mass. and Tel Aviv, Israel – April 02, 2019 – Guardicore, a leader in internal data center and cloud security, today announced CRN®, a brand of The Channel Company, has recognized The Guardicore Partner Program with a 5 Star rating in the 2019 Partner Program Guide. Additionally, Guardicore applauds Senior Director of Channels Todd Bice for being named once again to the annual list of CRN Channel Chiefs.

CRN’s annual guide identifies the strongest and most successful partner programs in the channel today, offered by the top technology suppliers for IT products and services.  The 5 Star rating recognizes an elite subset of companies that offer solution providers the best partnering elements in their channel programs.  To determine the 2019 5 Star ratings, The Channel Company’s research team assessed each Supplier’s partner program based on investments in program offerings, partner profitability, partner training, education and support, marketing programs and resources, sales support, and communication.

“We are delighted to once again be awarded this 5 Star rating from CRN. Our partners recognize that the Guardicore channel program is designed to drive success by aligning the award-winning capabilities of our Guardicore Centra Security Platform to partners’ unique business models, helping to establish breakthrough go-to-market service offerings and driving new revenue streams,” said Todd Bice, Senior Director of Channels, and a 2019 CRN Channel Chief.

Continued Bice, “Guardicore partners value the best-in-class visibility, software-defined segmentation, and real-time breach detection and response capabilities of our platform, which help to ensure protection of their clients’ most critical assets as they face a growing attack surface and increasing complexities involved in defending hybrid environments. Today’s honor, combined with continued traction in the Managed Security Services market and a 100 percent increase in new partner engagements since last year, demonstrates how much we value our partners and how our commitment to the channel has translated to success for their clients and businesses.”

As a CRN Channel Chief Bice demonstrated exceptional leadership, vision and commitment to Guardicore’s channel partner programs. Channel Chief honorees are selected by CRN’s editorial staff as a result of their professional achievements, standing in the industry, dedication to the channel partner community, and strategies for driving future growth and innovation.

Exclusive Networks recently joined the Guardicore Partner Program as its first value added distributor in North America. Laurent Daudré-Vignier, Exclusive Networks Executive Vice-President North America shares, “Partnering with Guardicore has enabled us to easily expand delivery of cloud security services to our clients. Through its innovative channel program Guardicore enables us to address potential blind spots for our customers, helping to protect critical data center assets in dynamic environments with software-defined micro-segmentation and distributed breach detection and automated attack mitigation.”

Guardicore Partner Program

The award-winning Guardicore Partner Program offers differentiated go-to-market service offerings and revenue opportunities for our growing ecosystem of partners. It is designed to drive value for partners by helping them gain a competitive advantage in the security marketplace. Guardicore partners can leverage the Guardicore Centra Security Platform to deliver project-based service engagements, embed it into an operational services model or simply resell to address a specific use case.  The Guardicore Partner Program was created to meet the unique needs of different partner types including resellers, service providers, managed security services and technology partners.

About Guardicore

Guardicore is a data center and cloud security company that protects your organization’s core assets using flexible, quickly deployed, and easy to understand micro-segmentation controls. Our solutions provide a simpler, faster way to guarantee persistent and consistent security — for any application, in any IT environment. For more information, visit www.guardicore.com.