Welcome!

Artificial Intelligence Authors: Pat Romanski, Yeshim Deniz, Liz McMillan, Elizabeth White, Zakia Bouachraoui

News Feed Item

Cenzic Launches GovShield Initiative to Help Defend Government Web Infrastructure Against Cyber Attacks

Key New Hires, Special Training for Government Integrators, Solutions Focused on Government Regulatory Compliance Among Highlights

ATLANTA, GA -- (Marketwire) -- 08/24/09 -- GFIRST NATIONAL CONFERENCE -- Cenzic Inc., the leading provider of Web application vulnerability assessment and risk management solutions, today announced the introduction of GovShield(TM), a new cybersecurity initiative focused on defending the government Web infrastructure. In light of recent cyber attacks against the U.S. government, this new initiative will provide focused solutions that help government agencies get compliant with federal regulations, including the Federal Information Security Management ACT (FISMA), National Institute of Standards and Technology (NIST), and others, as well as special packages for government integrators to bring solutions closer to the end-users. Additionally, the program will be led by industry veteran David Kimball with over twenty years of experience, whose background includes extensive security experience working alongside federal, state, and local government agencies. David Kimball will be based out of Washington, D.C. and will be expanding the team with aggressive growth plans.

"Recent attacks against the U.S. government's Web infrastructure have shown that hackers are not afraid to target an entire nation," said Mandeep Khera, CMO for Cenzic. "Whether it's politically motivated and funded attacks such as the recent ones from North Korea, or financially motivated attacks from Russia, Ukraine, China, and other countries, these attacks have become unrelenting and have been successful in causing a great deal of damage. With President Obama's new security initiatives making cybersecurity a top priority, government agencies are making strides in this area and we want to make sure Cenzic's turnkey solutions help them achieve their goals quickly and efficiently. Our solutions already protect a number of key government agencies, so the new Cenzic GovShield initiative is a natural progression of our existing commitment to providing government agencies with solutions to prevent against these types of attacks."

Cenzic GovShield will supply a government-focused, turnkey solution to help agencies expedite its cybersecurity implementations through cloud based assessments, software solutions, application security awareness and best practices training, as well as process improvement consulting. The training program offered through GovShield will provide an introduction to the most common types of Web application vulnerabilities, and how to both identify and prevent them. Government system integrators will get special benefits of extensive training on Web application security, incentives to offer Cenzic solutions, and marketing promotion support.

"Protecting agencies as vital as those included in the government Web infrastructure is a great undertaking," said Warren Bell, vice president of field operations for Cenzic. "To ensure its success, the Cenzic GovShield program needed a leader who had already been at the front line of securing our infrastructure. David Kimball's history of providing security solutions to government agencies of all sizes gives him the necessary expertise and leadership to achieve our goal."

"It is an honor to work with a company such as Cenzic that shares a similar vision of ensuring the security of the most critical Web infrastructures in this nation," said David Kimball, managing director of the Federal Business Unit for Cenzic. "Current events have proven that we must be in a constant state of readiness when it comes to cybersecurity, which is impossible without solutions such as those provided by Cenzic."

Cenzic Hailstorm provides automated continuous security assessment of custom and commercial Web applications throughout the software development lifecycle -- whether in development, QA, or operations -- to help find and remediate security vulnerabilities, guide enforcement of internal security policies and support regulatory compliance. With its dashboard views of Web applications, Hailstorm enables departments, business units, and security and compliance executives access to real-time actionable information and status across the enterprise.

For more information about the GovShield program, please visit http://www.govshield.com.

About Cenzic

Cenzic is the next-generation Web application security assessment and risk management solutions leader. The Cenzic suite of application security solutions fits the need of any company from remote, Cloud Computing (ClickToSecure®), for testing one or more applications, to a full enterprise-wide solution (Cenzic Hailstorm® Enterprise ARC) for effectively managing application security risks across an enterprise. Always an innovator, Cenzic has integrated Hailstorm with VMware to enable testing of production Web applications through virtualization -- making Cenzic the only company in the industry with a complete solution for assessing Web applications in all stages from development to production. In addition, Cenzic solutions, targeted at financial services, e-retail, high-tech, energy, healthcare and government sectors, are the most accurate, comprehensive and extensible in the industry, empowering organizations to stay on top of unrelenting application security threats.

Add to Digg Bookmark with del.icio.us Add to Newsvine

Contact:
Tami Casey
Kulesa Faul for Cenzic
(650) 340-1984
Email Contact

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

IoT & Smart Cities Stories
BMC has unmatched experience in IT management, supporting 92 of the Forbes Global 100, and earning recognition as an ITSM Gartner Magic Quadrant Leader for five years running. Our solutions offer speed, agility, and efficiency to tackle business challenges in the areas of service management, automation, operations, and the mainframe.
At CloudEXPO Silicon Valley, June 24-26, 2019, Digital Transformation (DX) is a major focus with expanded DevOpsSUMMIT and FinTechEXPO programs within the DXWorldEXPO agenda. Successful transformation requires a laser focus on being data-driven and on using all the tools available that enable transformation if they plan to survive over the long term. A total of 88% of Fortune 500 companies from a generation ago are now out of business. Only 12% still survive. Similar percentages are found throug...
After years of investments and acquisitions, CloudBlue was created with the goal of building the world's only hyperscale digital platform with an increasingly infinite ecosystem and proven go-to-market services. The result? An unmatched platform that helps customers streamline cloud operations, save time and money, and revolutionize their businesses overnight. Today, the platform operates in more than 45 countries and powers more than 200 of the world's largest cloud marketplaces, managing mo...
The platform combines the strengths of Singtel's extensive, intelligent network capabilities with Microsoft's cloud expertise to create a unique solution that sets new standards for IoT applications," said Mr Diomedes Kastanis, Head of IoT at Singtel. "Our solution provides speed, transparency and flexibility, paving the way for a more pervasive use of IoT to accelerate enterprises' digitalisation efforts. AI-powered intelligent connectivity over Microsoft Azure will be the fastest connected pat...
Apptio fuels digital business transformation. Technology leaders use Apptio's machine learning to analyze and plan their technology spend so they can invest in products that increase the speed of business and deliver innovation. With Apptio, they translate raw costs, utilization, and billing data into business-centric views that help their organization optimize spending, plan strategically, and drive digital strategy that funds growth of the business. Technology leaders can gather instant recomm...
At CloudEXPO Silicon Valley, June 24-26, 2019, Digital Transformation (DX) is a major focus with expanded DevOpsSUMMIT and FinTechEXPO programs within the DXWorldEXPO agenda. Successful transformation requires a laser focus on being data-driven and on using all the tools available that enable transformation if they plan to survive over the long term. A total of 88% of Fortune 500 companies from a generation ago are now out of business. Only 12% still survive. Similar percentages are found throug...
As you know, enterprise IT conversation over the past year have often centered upon the open-source Kubernetes container orchestration system. In fact, Kubernetes has emerged as the key technology -- and even primary platform -- of cloud migrations for a wide variety of organizations. Kubernetes is critical to forward-looking enterprises that continue to push their IT infrastructures toward maximum functionality, scalability, and flexibility. As they do so, IT professionals are also embr...
CloudEXPO has been the M&A capital for Cloud companies for more than a decade with memorable acquisition news stories which came out of CloudEXPO expo floor. DevOpsSUMMIT New York faculty member Greg Bledsoe shared his views on IBM's Red Hat acquisition live from NASDAQ floor. Acquisition news was announced during CloudEXPO New York which took place November 12-13, 2019 in New York City.
In an age of borderless networks, security for the cloud and security for the corporate network can no longer be separated. Security teams are now presented with the challenge of monitoring and controlling access to these cloud environments, at the same time that developers quickly spin up new cloud instances and executives push forwards new initiatives. The vulnerabilities created by migration to the cloud, such as misconfigurations and compromised credentials, require that security teams t...
The graph represents a network of 1,329 Twitter users whose recent tweets contained "#DevOps", or who were replied to or mentioned in those tweets, taken from a data set limited to a maximum of 18,000 tweets. The network was obtained from Twitter on Thursday, 10 January 2019 at 23:50 UTC. The tweets in the network were tweeted over the 7-hour, 6-minute period from Thursday, 10 January 2019 at 16:29 UTC to Thursday, 10 January 2019 at 23:36 UTC. Additional tweets that were mentioned in this...