Premier Continuous Controls Monitoring platform empowers enterprises with continuous, unified visibility of security tool effectiveness on-premises and in-cloud
TEL AVIV, Israel & TYSONS CORNER, Va. –(BUSINESS WIRE)– Cyber Observer, the premier Continuous Controls Monitoring (CCM) solution, today announced a major enhancement to its platform that enables CISOs and other security and risk management executives to obtain new, continuous, unified visibility into the effectiveness of cybersecurity tools that are implemented throughout their enterprise. By continuously retrieving and analyzing Critical Security Controls (CSCs) from applications on-premises and in-cloud, Cyber Observer’s CCM platform simplifies compliance, reduces mean time to detection and response, and advances risk posture management.
Cybersecurity teams are overwhelmed with complexity of managing dozens of disparate security tools that have been implemented across their hybrid enterprises. Despite best efforts to implement security controls to minimize threats and risks, enterprise executives are discovering that misconfigured or malfunctioning tools are too often a blind spot and one of the weakest links in their security defenses. Cyber Observer’s CCM platform eliminates this problem and now enables enterprises to keep a finger on the pulse of how their security tools are performing.
Cyber Observer connects and pulls data from an enterprise’s on-premises and in-cloud tools to create a comprehensive view of the security tools implemented. In addition to continuously analyzing more than 5,000 CSCs and providing controls status in the context of management, compliance requirements and other frameworks, Cyber Observer released a set of new features, including:
- Real-time dashboards. Easily demonstrate the status of each tool, status of the different security areas, prioritize vulnerabilities, aggregate risk posture scoring, and alert on deviation from normal behavior.
- Continuous reporting. New reporting module automates reports on an organization’s cybersecurity tools status and cyber posture views.
- Open API enhancements. Enable enterprises to easily share data collected by Cyber Observer with third-party tools that provide security information and event management (SIEM), automation (SOAR), and artificial intelligence.
“Managing risks requires more than implementing security tools and checking the box,” said Shimon Becker, Cyber Observer Co-founder and VP Product. “It requires continuous monitoring, management, and oversight to ensure that people, processes, and technology are in fact protecting your data and your enterprise.”
“The new release offers quick and easy remote implementation,” said Moti Ram, Cyber Observer Co-founder and VP R&D. “We support hybrid on-premises and in-cloud connectivity and deployment.”
Cyber Observer is backed by Merlin Ventures, which strategically invests in and scales innovative cybersecurity companies. “Things like misconfigured or unpatched security tools are such easy targets for adversaries to exploit,” stated Seth Spergel, Vice President of Emerging Technology at Merlin Ventures. “Implementing a simple solution like Cyber Observer’s Continuous Controls Monitoring platform should really be a part of any organization’s cyber hygiene protocol and a standard practice for all enterprises.”
About Cyber Observer
Cyber Observer is the premier Continuous Controls Monitoring (CCM) solution. CCM reduces business losses and audit costs by leveraging technology that performs continuous monitoring and auditing of Critical Security Controls (CSCs) and applications.
Cyber Observer integrates dozens of the most popular security tools into a single intuitive interface that enables organizations to continuously monitor tool performance and maintain alignment with cybersecurity, business, and regulatory frameworks. Powered by artificial intelligence and machine learning, Cyber Observer’s continuous, automated reporting equips security and risk management executives with unprecedented visibility, control, and strategic oversight that empowers them to proactively identify and close critical security gaps while demonstrating the effectiveness and maturity of their security programs and investments. Visit www.cyber-observer.com to learn more.