59.8 F
Washington D.C.
Saturday, October 1, 2022

Tychon Delivers Comprehensive, Automated, Endpoint Security Solution to Eliminate the Classic ‘IT vs Security’ Separation

A "best-in-class" security optimization and systems management solution built by operators for operators was announced by Tychon, a company unifying security and IT operations. The company said it "formal launch and general availability of the Tychon product suite … empowers operators with instant visibility and control of their endpoints, and eliminates the classic “IT vs. security” separation by transcending silos to drive efficiencies for any organization’s systems management and security teams.

"Tychon is focused on bridging the gap between IT and Security. Tychon empowers operators with instant visibility and control of their endpoints, eliminating the classic ‘IT vs. security’ separation and removes conventional security obstacles to accelerate and enhance endpoint incident detection and response," a spokesperson told Homeland Security Today.

Founded by former cyber defense operators in the Department of Defense responsible for incident response and defensive cyber operations, Tychon addresses "many of the operational and scalability challenges that are routinely faced with protecting enterprise networks. Currently, there is a gap in the ability to rapidly perform event diagnosis and respond at scale across a global enterprise."

"Operators are also often challenged by having to switch between multiple disjointed solutions to determine the state of the enterprise networks," Tychon said, noting it was "created to close that gap and provide operators with a single console that provides integrated systems management and security optimization. Users can remediate known vulnerabilities, patch out of date software in a single click, save money by retiring underutilized assets and bridge the gap between security and IT operations teams by putting them on a single console.

"In an environment beset by constant cyber-attacks, network breaches and insider threats, the need to fill the gap between systems management and endpoint detection and response (EDR) to a single console is more important than ever," Tychon said in its announcement. "In order to establish network hygiene amplified by a strong security posture, both groups need to operate in unity and uniformity, thus allowing their tools to better address occurring incidents."

“We are redefining what security means to an organization and are paying attention to the ways IT teams are changing in organizations large and small. Security and operations are no longer separate," said Tychon Chief Technology Officer Travis Rosiek. "Security starts with all teams working from the same data set and the sane console with instant access to the answers they need at any time across the enterprise. Our mission is to fortify enterprises with ever evolving technology that provides visibility into the network for any division, from any angle. We also believe in providing solutions that remove conventional security obstacles to accelerate and enhance endpoint incident detection and response."

Tychon said its "single console platform provides a complete view of an incident, present or past, including its cause and the ability to trace network propagation. Tychon also empowers organizations to remediate known vulnerabilities and patch out-of-date software in a single click. This is the first, and only, solution to leverage a fuzzy hashing algorithm to index all files allowing more effective use of indicators of compromise (IOCs) to identify polymorphic and other unknown variants of malware. By matching on partial fragments of files, fuzzy hashing allows Tychon operators to search enterprise-wide for sensitive documents and data leakage incidents. Built to easily deploy across diverse IT infrastructures and alongside existing defenses, the Tychon product suite is built to safely execute against advanced cyber and malware attacks with zero impact on IT assets."

Additionally, Tychon said it "can overcome one of the largest compliance-related issues facing CIOs today: shadow IT, or a threat caused by the use of unseen third-party solutions — including hardware devices and software applications. Tychon can detect every application and device running on a network at any given time, on what systems, and can block or uninstall all non-compliant third party applications."

The Tychon product suite is fully integrated with the McAfee Data Exchange Layer (DXL) and is engineered in partnership with the McAfee Security Innovation Alliance.

Homeland Security Todayhttp://www.hstoday.us
The Government Technology & Services Coalition's Homeland Security Today (HSToday) is the premier news and information resource for the homeland security community, dedicated to elevating the discussions and insights that can support a safe and secure nation. A non-profit magazine and media platform, HSToday provides readers with the whole story, placing facts and comments in context to inform debate and drive realistic solutions to some of the nation’s most vexing security challenges.

Related Articles

- Advertisement -

Latest Articles