Posts

Automation and Orchestration Firm Ayehu Moves Headquarters to Silicon Valley


IT and Cyber Security Incident Response Automation Solutions Driving Triple-Digit Growth


Ayehu Software Technologies Ltd.
, leading provider of enterprise-grade automation & orchestration solutions for IT and cyber security incident response automation, today announced that it is expanding its operations and has relocated its headquarters from Tel Aviv, Israel to Palo Alto, Calif.

“We are thrilled to be growing the business and joining this community of highly successful technology innovators that call Silicon Valley home,” said Gabby Nizri, Co-Founder and CEO of Ayehu. “This is a perfect location from which to recruit top talent, expand strategic vendor partnerships and cultivate new channel relationships that will further accelerate our business.”

Over the past year Ayehu has achieved triple-digit worldwide revenue growth and increased its North American customer base by 30 percent with the addition of many large enterprises in a range of industries including financial services, healthcare and retail. Demand for its solutions continues to rise as more organizations are realizing the value of automating IT processes and mitigating the risk of cyber security incidents such as ransomware.

“The current innovation landscape is ripe for new companies to emerge and displace incumbents by creating value from the ground up,” said Eric Benhamou, founder and CEO of Benhamou Global Ventures and Chairman of Ayehu. “We see Ayehu as an organization that is bringing the right kind of technology to a very large and hungry market. This gives them the potential to be a truly disruptive force.”

The Ayehu executive team, including co-founder and CEO Gabby Nizri, will be based in the new office located in Palo Alto. Research & Development will remain in the original office in Israel and the company’s New York City location continues to grow its sales and support services staff.

“As we expand our reach in the cyber security space, we are planning ahead for 2017 and beyond, which will bring exciting next-generation products featuring advanced technology such as machine learning and artificial intelligence. Also on the horizon, we anticipate new technology partnerships and even greater channel distribution opportunities,” concluded Nizri.

Recently named a 2016 Cool Vendor in IT Automation by Gartner, Ayehu’s IT process and cyber security incident response automation software helps organizations deliver superior performance by automating manual, repetitive tasks and orchestrating workflows between critical IT systems. Its flagship solution, eyeShare, is an easily deployed, agentless solution that comes with seamless integrations to nearly all leading ITSM platforms, network monitoring systems and SIEM tools including Intel-McAfee, Splunk, HP ArcSight, IBM Qradar, ServiceNow, VMware, AWS, JIRA and more. It is available on premise or as a service through Ayehu’s partners.

About Ayehu

Ayehu provides IT Process Automation solutions for IT and Security professionals to identify and resolve critical incidents and enable rapid containment, eradication and recovery from cyber security breaches. Ayehu provides customers greater control over IT infrastructure through automation. Ayehu solutions have been deployed by major enterprises worldwide, and currently support thousands of IT processes across the globe. Headquartered in Palo Alto, Calif., the company has additional offices in New York and Tel Aviv, Israel. For more information, visit www.ayehu.com.

CONTACT INFORMATION

PR Contact:

  • Christy Kemp
    Dahlia Public Relations
    303-898-3390

AYEHU JOINS INTEL SECURITY INNOVATION ALLIANCE


IT Process Automation Software Integration with Intel Security to Accelerate Cyber Security Incident Response Times; Help Reduce Breach ImpactAYEHU JOINS INTEL SECURITY INNOVATION ALLIANCE

Ayehu Software Technologies Ltd., leading provider of enterprise-grade IT process automation software solutions, today announced that it has joined the Intel Security Innovation Alliance™ partner program.

Under the Intel Security Innovation Alliance program, Ayehu  plans to integrate its eyeShare™ IT process automation software with McAfee Enterprise Security Manager™ (ESM), enabling customers to easily automate and streamline security policy tasks (playbooks) such as incident response, designed to provide more  immediate and reliable defense against detected threats.

Ayehu’s eyeShare™ IT process automation platform accelerates cyber security incident response and resolution while improving security operations efficiency. By integrating its IT process automation software with McAfee’s security information and event management (SIEM) system, Ayehu provides a rule-based workflow engine that extends incident response capabilities. Benefits of cyber security incident response automation include:

  • Cyber security incidents are addressed the moment they appear on ESM
  • Accelerated security response and automatically triggered pre-defined playbook help contain threats before they impact the business
  • Reduced manual and time-consuming security procedures with a digital, closed-loop process
  • Forensics and enriched data provide insight and enable stronger decision making
  • Supporting audit compliance through documented processes

“As cyber security technology goes hand in hand with IT automation, we are continuing to partner with industry leaders like Intel Security,” said Gabby Nizri, Co-Founder and CEO of Ayehu, Inc.  “Ayehu’s deep experience and leadership in remediating IT incidents brings McAfee ESM customers the industry’s most powerful capabilities to more effectively address the increasing speed and volume of cyber security threats.  At the end of the day, we want to help give cyber security professionals the tools to better secure their enterprises by becoming  highly efficient and  extremely knowledgeable.”

“A key goal behind the Intel Security Innovation Alliance program is to accelerate the development of interoperable security products and simplify the integration of those products with complex customer environments,” said D.J. Long, Head of the Security Innovation Alliance at Intel Security.  “We’re thrilled to see Ayehu leverage Intel Security’s investment in its security risk management platform and extend this value to Ayehu customers.”

For more information on automating cyber security incident response, download Ayehu’s  eBook.

About Ayehu

Ayehu provides IT Process Automation solutions for IT and Security professionals to identify and resolve critical incidents and enable rapid containment, eradication and recovery from cyber security breaches.  Ayehu provides customers greater control over IT infrastructure through automation. Ayehu solutions have been deployed by major enterprises worldwide, and currently support thousands of IT processes across the globe.  The company has offices in New York and Tel Aviv, Israel.  For more information please visit www.ayehu.com.

About The Intel Security Innovation Alliance

The Intel Security Innovation Alliance is the foundation of a technology ecosystem designed to assemble the world’s leading security innovations. Working together, Intel Security and its partners aim to deliver solutions more comprehensive than those available from any single vendor. By implementing products designated as McAfee Compatible, mutual customers can enjoy faster time to deployment; lower total cost of ownership; and makes security risk management projects more efficient and effective.

 

PR Contact:

Christy Kemp

Dahlia Public Relations

303-898-3390

ckemp@dahliapr.com

 

Contact Ayehu at: marketing@ayehu.com





eBook: 5 Reasons You Should Automate Cyber Security Incident Response




 

No computer system can be absolutely secure.

Intel, the Intel logo, Intel Security Innovation Alliance, McAfee, the McAfee logo and McAfee Enterprise Security Manager are trademarks of Intel Corporation in the U.S. and/or other countries.

How Automated Cyber Security Incident Response can Protect Government Infrastructures

Cyber Security Incident Response AutomationWhen the term security breach is used, many of us envision corporate retail giants or global financial institutions becoming the latest victims. The truth is, nobody is immune to such a risk – including the government. In fact, given the wealth of highly classified information and sensitive data these infrastructures contain, the threat of such a security breach can have much more dire implications. The good news is, automated cyber security incident response offers a real, actionable and effective solution to incident management.

The Best Defense is a Good Offense

The reason cyber-threats are so ominous is the fact that those behind them are becoming savvier by the day. As a result, the tools used to combat these risks and manage incoming incidents effectively must be equally sophisticated and ever-evolving. Not only does having an army of human workers handling this daunting task leave room for costly errors, but it’s also something that most government organizations simply cannot afford.

Automated cyber security incident response, on the other hand, ensures that any and all incoming alerts are identified, analyzed, prioritized and addressed in the most timely and effective manner. As an added bonus, this can be done with only the bare minimum in terms of personnel. Essentially, automated incident response provides the ability to do more with less while also achieving a greater level of protection against dangerous security risks.

Immediate Response is Critical

With the very security of a nation potentially at risk, the timeliness of incident response is absolutely critical to government agencies. While a breach can happen in an instant, the after-effect can take months to overcome and cost an enormous amount of money. To avoid this, those in charge of security must invest in the appropriate tools which will ensure that any incident that occurs is immediately detected and expeditiously dealt with.

This is another area where automated incident response is highly effective. Removing the human element of incident management not only speeds up the process, but it all but eliminates the possibility of an alert being overlooked and allowed to wreak havoc. Oftentimes just identifying the appropriate party to handle a cyber-attack can be a costly and impactful waste of time. The right automation tool will ensure that alert notifications and escalations are handled properly.

Streamlining Systems for Maximum Performance

Many of those in charge of security at a government level have been hesitant about adopting automated incident response for fear of going over an already tight budget. What isn’t being taken into account, however, is how versatile and agile a quality automation platform can be. In fact, such a tool can easily be implemented with little to no interruption, and without the need to replace existing systems. Rather, the right product will seamlessly integrate with legacy systems to further enhance the incident response process. Most importantly, doing so is much less expensive than one may imagine. Likewise, the added level of protection is well worth any initial investment, with far-reaching benefits for many years to come.

A Proactive Approach for the Future

In addition to real-time incident management, automation also provides forward-thinking government agencies the ability to project and prepare for future problems before they occur. Identifying and outlining best practices and being proactive about cyber-threats can vastly decrease the odds of a breach occurring, thereby enhancing security from the forefront.

These days, nobody is safe from the dangers of cyber-security threats. Government agencies are at just as great a risk, if not more so, than other organizations, and therefore must take the appropriate measures to protect sensitive data. With an automated cyber security incident response plan in place, the dangers can be greatly reduced and any potential damages mitigated while also reducing costs and improving operational efficiency. It’s a win-win.

To learn more about automated cyber security incident response and how it can better protect government infrastructures, click here or download your free trial today.





eBook: 5 Reasons You Should Automate Cyber Security Incident Response




Should You Automate Security Incident Response?

Should You Automate Security Incident Response?There’s no question that incidents of cyber-security violations are on the rise. In fact, the numbers are steadily climbing at an alarming rate. In 2013, the number of incidents increased by an incredible 48%. The following year, security breaches rose another 23%. With statistics like this, it’s becoming increasingly evident that businesses must be proactive and extremely diligent about protecting their sensitive data from falling into the wrong hands. Could automated security incident response be the answer?

In years past, the traditional 4-step method of managing security incidents was sufficient. IT personnel would prepare as much as they could for possible attacks and spend a great deal of their time analyzing the events that were detected to determine their legitimacy and severity. From there, the next step was to contain or eradicate the problem and work toward system recovery as quickly as possible. IT would then evaluate their response to develop better practices for use in the future. For a while, this was enough to keep cyber-attackers in check.

Unfortunately, with online security breaches becoming much more frequent and sophisticated, the old method for security incident response is no longer effective. It’s simply not fast enough, nor is it proactive or thorough enough to keep up with the changing demands. Today, IT personnel just don’t have the capacity to handle such an influx of threats, nor do they have the time or bandwidth to evaluate and address every event as it comes in. This can lead to devastating and costly breaches.

When you add automation into the security incident response process, however, all of these shortcomings can be addressed and eliminated. With a quality automation product, the IT department can streamline their incident management process. Incoming events are detected and the system automatically evaluates, prioritizes and escalates. This eliminates false positives and ensures that legitimate threats are always detected, reported and addressed in a timely manner.

Additionally, automation can then facilitate a seamless, closed-loop process, updating the incident log, resolving alerts and tracking and documenting all processes to be used for developing best practices moving forward. An automated system can also help IT departments to become more proactive by identifying and mitigating vulnerabilities. Most importantly, with an automated process, systems can be back up and running much faster, reducing costly downtime and improving customer satisfaction.

Today’s automation products can be easily and seamlessly integrated with existing incident management programs, such as Solarwinds and Servicenow, to extend and enhance legacy systems without the need for an entire platform replacement or overhaul.

With cyber-attacks steadily on the rise, businesses of every shape, size and industry are at risk of becoming victims. The best way to protect yourself, your organization and those whose sensitive information may be at risk is to establish a solid security incident response plan.

Is your company protected?


eBook: 5 Reasons You Should Automate Cyber Security Incident Response




The Importance of Maturity in Security Incident Response Automation

With cyber-attacks on the rise and becoming more and more sophisticated, the need for quality security incident response automation products is also increasing. As with any other technology product, there are a wide variety of vendors offering this type of solution, with many new players emerging at a rapid pace. It’s important to note, however, that not all automation products are created equal. Let’s consider the importance of choosing a mature, established IT Process Automation (ITPA) product and the risks associated with electing a newer option.

The lure of newer products typically stems from budgetary needs. An emerging software provider may offer an ITPA solution at a discounted rate to attract more business. The problem with this is, as the old adage states, you get what you pay for. While not all newer products are necessarily bad, there is an inherent risk involved with choosing a product based on price and ending up with something that isn’t quite up to par. The result is often a solution that doesn’t quite meet the needs of the business or cannot perform at the level desired.

The fact is, security incident response is one of the most important tasks for businesses today. Regardless of size or industry, every company in the world is at risk of having their sensitive data compromised, and the implications can be nothing short of devastating. Whether it’s an incident that causes widespread outages or costly system down time or a serious security breech in which confidential information ends up in the wrong hands, businesses can end up on the brink of losing everything.

For something so critical, it’s equally important that the product chosen to prevent such a catastrophic event be of the highest quality. The most effective way to ensure this is by carefully selecting a security IT Process Automation provider that has years of experience in IT Process Automation and can back their product up with real numbers and proof of performance.

One area in which maturity becomes even more crucial is that of integration. Most companies already have security incident and event management (SIEM) tools in place to monitor incoming threats. To maximize security and create a more close-looped, end to end process, the right ITPA product can be easily integrated with the existing monitoring tools. Newer products often lack this ability, or they are not developed and honed enough to integrate seamlessly. This leaves the business at a greater risk, defeating the purpose of the investment in IT Process Automation.

Ayehu has nearly a decade of experience in IT Process Automation and we are continuously exploring ways to bring that knowledge and experience into the SOC world. We have made some excellent progress with clients who run their SIEM tools with our eyeShare solution for SIM-SOC to automate the alert response, incorporate data enrichment into the SIM tools, as well as managed automated containment and risk mitigation. The below image demonstrates the process more clearly.
The Importance of Maturity in Security Incident Response Automation

You care about the security of your business. Don’t settle for less than a robust product from an experienced, mature IT Process Automation partner.

eBook: 5 Reasons You Should Automate Cyber Security Incident Response