Centerity Recognized for Market-Leading AIOps Platform with Integrated Cyber Security

Enterprise Management Associates (EMA) analyst report positions Centerity as a Top Value Leader for delivering Business Impact and IT-to-Business Alignment

NEWTON, MA (October 22, 2020)Centerity Systems, Inc., the leading AIOps Platform with advanced performance analytics and integrated security, today announced its recognition as a Top Value Leader in the latest “EMA Radar Report: AIOps – A Guide for Investing in Innovation.”

EMA evaluated 17 AIOps vendors on (i) Business Impact and IT-to-Business Alignment, (ii) Incident, Performance, and Availability Management, and (iii) Change Impact and Capacity Optimization use cases to guide organizations with their AIOps platform selection. Centerity’s AIOps Platform is designated as a market leader in all of the use cases EMA evaluated. Centerity is a front-runner in delivering exceptional value in both the Business Impact and IT-to-Business Alignment and Incident, Performance, and Availability Management usecases, due to its technical strength, impact on business outcomes, and deployment cost efficiency. In addition, Centeritywas honored by EMA with a special award for advanced integrated security functionality.

The Centerity AIOps Platform improves performance and reliability of business and operational processes, employing an approach that continuously measures the overall health of key technology services by providing real-time, consolidated business analytics. SLA executive dashboards expose business and security risks, identify performance anomalies, and provide fault isolation across applications, operating systems, infrastructure and cloud assets. It does this by automating topology and dependency maps of all IT assets, incorporating each asset into business and operational service views. Its AI-driven anomaly detection and multi-tenancy supports multi-user, multi-vendor, and multilocation management, which is ideal for managed service providers, cloud service providers, and enterprises.

“Centerity is a unique innovator in the AIOps arena,” said Dennis Drogseth, EMA vice president. “Centerity stands out for its advancing use of AI/ML in a variety of contexts, including ‘CyberOps,’ as well as its distinctive strengths in discovery across domains, data assimilation, and unifying views and dashboards. These strengths, along with the platform’s fast time to value and limited administrative overhead all help to make Centerity both a versatile and progressive choice for AIOps adopters.” According to EMA’s evaluation, the Centerity AIOps platform is differentiated among its competitors by:

  • Delivering many of the benefits of larger and more costly AIOps suites with reduced administrative overhead and more modest software costs.
  • Bringing the full seven-layer stack together with an eye toward IT service performance and business outcomes and priorities across cloud, hybrid, and legacy environments.
  • Integrating artificial intelligence and machine learning capabilities to support security and risk management needs – such as cybersecurity compliance, endpoint detection and response (EDR), supply chain security, and automated prevention of attacks on network hardware.

According to EMA, the message for IT organizations looking to pursue a forward path in AIOps adoption is overall a strongly positive one. The benefits achieved are growing in diversity and value. AIOps can and should be transformative in enabling more effective decision-making, data sharing, and analytics-driven automation. The recommendation from EMA remains that buyers should consider their own realities, then begin a search for the AIOps platform that most fits their requirements.

“In the digital age, AIOps, security and risk management must be observed and correlated through a single platform,” said Roi Keren, CEO of Centerity Systems. “That’s not only what we see our customers need and want, it’s what Centerity does best. EMA’s positioning of Centerity and award for integrated security acknowledges the convergence of AIOps and security. It’s more critical than ever for enterprise executives – whether you’re a CIO, CISO, CEO, or board member — to make strategic, risk-based business decisions with one platform, one dashboard; in essence, a single source of truth.”

AIOps Deployments and the Real Word: Bringing Operations and Security Together

Enterprises can see how others are deploying AIOps to address a variety of use cases by viewing a live EMA-hosted webcast titled “AIOps Deployments and the Real World: Bringing Operations and Security Together,” which will be held on Tuesday, November 10th at 1:00 pm EST. You can register for the webcast at https://info.enterprisemanagement.com/aiops-deployments-in-thereal-world-webinar-centerity

About Centerity
Centerity’s Cyber-AIOps Platform with advanced Integrated Security delivers Dynamic Business Service Views of the full technology stack to the executives responsible for technology-driven business services, ensuring the performance, availability and security of critical processes.
Centerity displays real-time, consolidated business analytics for complex on-prem, cloud, and hybrid technology environments generating SLA Executive Dashboards that identify performance anomalies and isolate faults across applications, operating systems, infrastructure and cloud assets. Learn more at centerity.com.

Media Contact:
Stephen McCarney
Merlin Ventures | Merlin Cyber
smccarney@merlin.vc

 

You are an internet star and you didn’t even know

Written by: Matan Reiman, VP of Business Development, Cyber AIOps Lead, Centerity.

Many people wish to be an internet celebrity in order to gain fame, influence and notability. Although, it is still hard work to become one, there is a good chance that you already are one of those internet stars and you just don’t know it yet…

Highlights

  • While security professionals often lack visibility of their organizations’ internet exposed assets, hackers are always on the lookout for such targets and case easily detected them
  • The statistics around misconfigurations are alarming and cybersecurity teams struggle to keep up and stay on top of this phenomenon
  • Using the right tools and increasing cyber hygiene can keep your organization from harm’s way

Be an internet star for the right reasons

When it comes to your personal brand, increasing your internet presence is important and can be very exciting. The prospect of becoming a powerful known influencer can bring along both social and financial benefits. But when it comes to your organization’s IT infrastructure, online exposure is a whole different story. Instead of fame and glory, your organization is risking a feature in the Wall Street Journal but for all the wrong reasons.
The reality on the ground is that all security teams today face unknown unknowns. With 70%1 of attacks being perpetrated by external threat actors, its crucial to understand what your organization’s digital footprint looks like and which unknown internet exposures you may have which hackers can easily find.
An average security tech stack today includes dozens of tools as well as awareness programs aiming to increase cyber resilience and improve the security posture. Nevertheless, millions of sensitive assets end up unintentionally exposed to the web and pose imminent threats to organizations. Such unknown exposures are low hanging fruit that are “waiting” to be exploited by hackers.
With so many tools and investment that goes into security programs, how come such blind spots are so prevalent? Simply put, misconfigurations and human errors.The natural maturation of businesses as well as digital transformation processes often translate into business growth but also mean that your IT ecosystem and digital footprint are growing and are in constant flux.
Spinning up new cloud instances, frequent deployment of development environments and adoption of new software tools are just a few examples of ongoing activities which often remain under IT and security teams’ radars and can easily result in risky misconfigurations.
Traditional tools are built for your known network ranges. Once set up, they will detect vulnerabilities and misconfigurations within pre-defined environments. But all your other connected assets will remain in the dark.
The numbers around misconfigurations which lead to unknown exposures are overwhelming. On average 64%2 of organizations’ digital assets are unintentionally exposed to the internet and not monitored. It’s time to take control of your critical assets before someone else does.

What can you do?

Here are 4 tips for achieving complete and ongoing visibility of your external attack surface.

  1. Accept the fact that assessing vulnerabilities from the inside only is insufficient. If you want to stay ahead of hackers, you must also gain their point of view and observe your business from the outside-in.
  2. Periodic and limited discovery exercises such as penetration testing are insufficient. With the current rate of change, exposed asset discovery should be fully automated, continuous and done at an internet-wide scale.
  3. Your supply chain is part of your IT ecosystem and is a source for potential unknown exposures. You need a solution which can monitor and identify the risks caused by your business partners and contractors.
  4. Full visibility is a must but not enough. Actionable security insights enriched with your business context is needed for quickly eliminating unwanted exposures.

Our advice… ensure your organization’s fame is driven by its success and not because a cybercriminal has managed to gain access to your sensitive data.

Conclusion

By gaining better visibility and converting unknown unknowns into known risks in real time, organizations can significantly mitigate and reduce security risks.

Centerity Cyber AIOps platform, with its unique attack surface management module is designed exactly for this purpose. With no installation or set up required, this solution indexes billions of exposed assets across the entire internet and automatically maps them back to your organization. You get real time visibility and insights into every potential risk across all your environments and the supply chain.

You’ll probably be surprised by the results! Talk with us!

[1] Source: Verizon’s DBIR 2020
[2] Source: Reposify 2020