Asigra launched Tigris Data Protection

Asigra launched Tigris Data Protection software with CDR (Content Disarm & Reconstruction). Asigra Tigris Data Protection software now includes CDR for protection against deeply embedded malware to address the ransomware threat, which now significantly increases the risk to both primary and backup data. 

The most recent generation of ransomware hides harmful code within content files that are frequently nested and compressed. Cybercriminals know that antimalware cannot scan what it cannot see, so they can avoid detection by using deeply embedded code. The data protection platform Asigra Tigris unifies cybersecurity and backup, fostering new levels of collaboration between data protection and security experts. 

Val Silva, CTO of Asigra “Worrisome increases in cybersecurity attacks on critical business systems has followed the rise in remote work environments over the past couple years. These attacks are commonly finding their way within corporate networks, and in many cases, specifically targeting backup systems. 

With Asigra CDR, Tigris Data Protection has reset the bar with ultra-secure backup that ensures organizations meet their business continuity objectives for absolute confidence in the ability to recover mission-critical data when needed.” 

The brand-new security feature, CDR, breaks down supported files into their smallest parts to find any embedded malicious code, macros, links, or executables. CDR reconstructs the original file without the malware after filtering and containing the malware. The technology eliminates any potential payload threats that are deeply buried within each file, outperforming predictive detection-based techniques. By maintaining file functionality and authenticity without the use of malicious code, the new CDR functionality ensures the integrity of the files. 

Asigra’s security architecture now includes soft-delete support, FIPS 140-2 certified encryption, bidirectional CDR, zero-day exploit protection, variable repository naming to non-standard names to prevent recognition, deep MFA (multi-factor authentication), and variable repository sanitization with inline detection on both the backup and recovery streams. 

Voltage CyberRes One solution, FAS SmartScan, provides data discovery and protection capabilities!

Voltage File Analysis Suite (FAS), a cloud platform that combines the newest in data discovery and data protection, has received an update from CyberRes, a Micro Focus business. The business claims that SmartScan, a tool for intelligent sampling and dynamic tagging for petabyte-scale data discovery, is one of the new features of Voltage FAS that enables data analysts to locate the areas of higher data risk faster. 

Reiner Kappenberger, Director Product Management for Voltage Data Privacy and Protection at CyberRes, says, “The new CyberRes Voltage File Analysis Suite takes data security to the next level with its data discovery and protection capabilities within one solution. Since it is delivered as a Software-as-a-Service (SaaS) solution, it possesses the scalability needed to meet the needs of any user’s data estate. Furthermore, the dynamic Voltage SmartScan tool provides users with the resources needed to conduct more prescriptive, deeper scans of their data infrastructure, and take more focused protective actions.” 

Voltage FAS, according to CyberRes, is not constrained by the limitations of physical or political boundaries, allowing users to reach and maintain compliance standards for the numerous privacy regulations that are becoming more and more prevalent around the world. 

With dynamic data masking and contextually aware entity detection for more than 39 nations and economic zones, Voltage FAS is intended to improve overall privacy awareness. Along with its availability as a SaaS platform, Voltage FAS is now also offered as an MSSP option with this release. By comprehending and overseeing existing data, Voltage FAS integrates with cloud, on-premises, and all hybrid models. Voltage FAS may also be used on private clouds, allowing organizations to effectively locate and safeguard their sensitive data without having any data leave the region, which is advantageous because some regions restrict data residency for organizations. 

Read More : IBM Acquired Databand.ai for Data Security

Data Dynamics launched StorageX9.0

Data Dynamics StorageX9.0, released by Data Dynamics, will enhance, and expand the functionalities of the company’s current products to assist customers in managing the complexity and sprawl of unstructured data. Enterprises can use it to organize and analyze their data, derive practical insights, implement security procedures, uphold compliance, and improve business performance. StorageX 9.0 is loaded with new features like Share and DFS analytics, NFSv4 and NFSv3 POSIX security translation, and support for versioned object mobility. 

Cuong Le, CSO of Data Dynamics commented, “StorageX 9.0 is an enhancement to our already strong data management portfolio. It helps our enterprise customers with the capabilities they need for intelligent heterogenous petabyte-scale migrations and modernization, with fast time to value, maintaining compliance, and enhanced data security.” 

Furthermore, StorageX and Microsoft recently worked together to create the Azure File Migration service. Through this program, businesses can use StorageX for cost-free data migration to Azure. 

StorageX can assist businesses in realizing the full potential of their data when combined with Data Dynamics’ unified unstructured data management platform. Data Mobility, Data Analytics, Data Security, and Data Compliance are just a few of the end-to-end data management capabilities that the platform supports. 

Leading unstructured data migration software from Data Dynamics, StorageX offers policy-based data migration without vendor lock-in. Intelligent, quick, and secure petabyte-scale unstructured data migrations are made possible by StorageX’s seamless cloud data migration, data center consolidation, and storage optimization technologies. StorageX provides dynamic data for the digital enterprise, allowing enterprises to use its data to gain a competitive edge. 

Ntrinsec Launches Groundbreaking Key Security Automation Platform

Ntrinsec launched a groundbreaking new key security automation platform. The platform reduces security issues related to improper key management and misuse of encryption keys. Ntrinsec delivers complete automation around all key lifecycle operations by integrating with third-party key management systems (KMS), hard security modules (HSMs), certificate authorities, and significant cloud providers. This will guarantee that all keys follow the best procedures and put an end to key compromises. 

Ntrinsec CEO, Michael Leidesdorff said, “With a potent combination of technology and a team with decades of expertise, Ntrinsec is in a prime position to solve today’s data protection challenges. We are excited to introduce the world’s first key security automation platform from Ntrinsec. Our goal is to protect organizations from data breaches, and this tool has the strength to do just that. Ntrinsec’s moving target defense approach is making sure that digital secrets are kept safe in perpetuity. Bad actors are increasingly exploiting key hygiene issues like key reuse and local wallets. With this attack vector quickly growing and industry standards calling only for annual key rotation, which is hopelessly out-of-date, a platform like Ntrinsec is needed now more than ever.” 

Ntrinsec has developed a moving-target protection method that outwits hackers in today’s more complicated situations by automating machine identification secrets at scale. To maintain good key hygiene and spot exploitable key reuse, users can automatically and safely map all keys and host computers within the platform. In order to successfully prevent data breaches before they ever start, Ntrinsec powers intelligent crypto-reduction strategies to develop anomaly detection and automate speedy remediation. 

Davenport Group Collaborated with Stratodesk

Davenport Group has announced a partnership with Stratodesk and is now a part of the Stratodesk Edge channel partner program, which provides end-to-end IT solutions to businesses across the country. This new collaboration will provide their joint customers, particularly in the education, health care, state and local government, and manufacturing markets, with an IT solution that includes everything from storage to data security technologies and Stratodesk NoTouch software. 

Sonia St. Charles, CEO of Davenport Group stated, “Working with Stratodesk will enable Davenport Group to enhance our strategic focus on the end-user computing space by making it easier than ever for organizations to self-service within Stratodesk NoTouch OS. Our clients will benefit greatly from this unique capability from the EUC innovator. Our customers want secure endpoints, user mobility, and ease of management – a critical IT need we meet with Stratodesk when paired with Dell and VMware Solutions. Additionally, as a Dell Technologies Titanium Partner, these latest updates mean our customers can leverage new and existing Dell PCs, laptops, and thin clients – repurposing them with the latest clients from VDI/Cloud vendors to operate like new.” 

Davenport Group has been delivering IT solutions to businesses across North America since 2001, including data center modernization, virtualization, storage, data protection, HCI, and client computing. 

Davenport Group provides customers with true IT transformation through its years of field experience, certifications in Dell EMC and VMware technologies, and recognition as a Dell EMC Certified Titanium Partner and a VMware Enterprise Partner. Davenport ensures that customers now have more secure, hybrid workplaces by providing Stratodesk NoTouch OS as a preferred EUC operating system. 

Stratodesk Edge, the company’s channel partner enablement program, has welcomed Davenport Group. Customers of Stratodesk and Davenport Group can use Stratodesk software to support multiple work sites and mobile workers. This collaboration will provide organizations with a solution for transforming their endpoints into centrally managed and secure endpoints capable of delivering seamless user experiences to end users via VMware Horizon. 

Stratodesk NoTouch software is preinstalled on all VDI clients and runs on all endpoints in an organization, regardless of make, model, or manufacturer. Businesses can save money by eliminating the need to purchase hardware while connecting endpoints to their network environment and integrating with other Davenport Group solutions. 

Emanuel Pirker, Founder and CEO at Stratodesk commented, “We continue our focus as a channel-led company and commitment to providing enterprises across the country and beyond with access to best-of-breed leading technology solutions. Customers gain competitive advantage through the feature rich EUC technology solutions offered by Stratodesk’s partnership with trusted technology advisors.” 

Pixalate Releases MRT App for Slack to Access Ad Fraud Insights

The Media Ratings Terminal (MRT) app for Slack was made available by Pixalate and can be found in the Slack App Directory. As Pixalate aims to even up privacy, ad fraud, and compliance insights, the Media Ratings Terminal (MRT) app delivers ad fraud data directly to Slack. Apart from privacy ad fraud, and compliance ratings, MRT brings insights throughout mobile and CTV apps as well as websites through Amazon, Roku, Google and Apple app stores.  

Jason Dias, Pixalate’s VP of Engineering, stated, “The MRT for Slack is our latest addition to increase accessibility of key data points around ad fraud and privacy compliance in the advertising supply chain. Bringing MRT data points into everyday conversations in Slack makes identifying, following, and troubleshooting issues easier for all types of teams.” 

The release of the latest app for Slack is another step taken by Pixalate to increase access of fraud and privacy compliance risk data as well as boost transparency in the ad tech space. This step follows the latest releases of the Ad Trust & Safety API Suite and COPPA Compliance Technology of Pixalate to discover child-directed mobile apps throughout the Apple App and Google App Stores. 

With the help of the app, users can quickly search for any app name, ID, or website address within their Slack workspace. Additionally, it has a summary Home tab for the user’s MRT Watchlist, which provides a quick view of data points for the applications and websites they have chosen to follow. Users may easily edit their lists via the “Follow” and “Unfollow” buttons in the Slack app. The app also incorporates conversations related to the MRT and opens links in a channel to deliver important data points when accessible. This provides immediate access for ad buyers, publishers, privacy regulators, and other parties to watch over apps and domains. 

Protecto and Snowflake Partnered for Data Protection

Protecto announced the integration of its artificial intelligence and privacy engineering platform into Snowflake. Snowflake is a data cloud company; this integration will help customers to identify data security issues before data breaches, and customer trust violations occur.

Data is the foundation of modern businesses, but it is increasingly susceptible to security flaws, privacy violations, and theft. Manual processes and compliance checks are insufficient to safeguard today’s complex data environments. The partnership between Protecto and Snowflake will provide visibility in identifying data protection vulnerabilities while maintaining the speed and agility of Snowflake’s platform.

Amar Kanagaraj, Founder and CEO of Protecto, commented, “The world is evolving to be privacy-first and zero-trust security. As a result, companies expect data security and privacy as part of their data stack. We’re introducing Data Posture Intelligence, a technology multiple steps ahead of the competition to deliver data protection in minutes.”

Protecto automates data privacy, security, and governance audits to provide results in minutes. The solution provides data posture insights in a single pane of glass, which helps their joint customers in finding personal information. It helps them determine who has access to sensitive data, identify inactive users, and audit user permissions. It allows customers to check user activities for potential privacy violations. Customers can recognize unused data that is open, overexposed, or stale.

Venkat Gopalan, Chief Data Officer of Belcorp, commented, “Cloud data platforms such as Snowflake give us enormous scalability and agility. With Protecto and Snowflake’s partnership, we have tighter control over our data security and privacy. Products like Protecto give us granular visibility over data protection across our Snowflake Data Cloud.”

IBM Acquired Databand.ai for Data Security

IBM announced the acquisition of Databand.ai, a provider of data observability software that assists organizations in resolving data issues such as errors, pipeline failures, and poor quality before they impact their bottom line.

Organizations are struggling to manage the health and quality of their data sets, which is required to make better business decisions and gain a competitive advantage as the volume of data continues to grow at an unprecedented rate. Data observability, a rapidly growing market opportunity, is quickly emerging as a key solution for assisting data teams and engineers in better understanding the health of data in their system and automatically identifying, troubleshooting, and resolving issues such as anomalies, breaking data changes, or pipeline failures in near real-time.

This acquisition enhances IBM’s software portfolio across data, AI, and automation to address the full spectrum of observability and aids organizations in ensuring that reliable data is placed in the hands of the appropriate users at the appropriate time.

Databand.ai is IBM’s fifth acquisition in 2022 as the company expands its hybrid cloud and AI capabilities.

Josh Benamram, Co-Founder and CEO of Databand.ai, stated, “You can’t protect what you can’t see, and when the data platform is ineffective, everyone is impacted –including customers. That’s why global brands such as FanDuel, Agoda, and Trax Retail already rely on Databand.ai to remove bad data surprises by detecting and resolving them before they create costly business impacts. Joining IBM will help us scale our software and significantly accelerate our ability to meet the evolving needs of enterprise clients.”

The open and extendable approach of Databand.ai enables data engineering teams to integrate and gain observability into their data infrastructure easily. This acquisition will provide Databand.ai with additional resources to expand its observability capabilities for broader integrations across more open-source and commercial solutions that power the modern data stack. Enterprises will also have complete control over how Databand.ai is deployed, whether as a SaaS or a self-hosted software subscription.

IBM’s acquisition of Databand.ai expands on the company’s R&D investments and strategic acquisitions in AI and automation. IBM is well-positioned to address the full spectrum of observability across IT operations by combining Databand.ai with IBM Observability by Instana APM and IBM Watson Studio.

Data observability solutions are also essential components of a company’s overall data strategy and architecture. The acquisition of Databand.ai expands IBM’s existing data fabric solution by assisting in the delivery of the most accurate and trustworthy data to the right hands at the right time – regardless of where it resides.

Daniel Hernandez, General Manager for Data and AI at IBM, commented, “Our clients are data-driven enterprises who rely on high-quality, trustworthy data to power their mission-critical processes. When they don’t have access to the data they need at any given moment, their business can grind to a halt. With the addition of Databand.ai, IBM offers the most comprehensive set of observability capabilities for IT across applications, data, and machine learning and is continuing to provide our clients and partners with the technology they need to deliver reliable data and AI at scale.”

Normalyze Raises Millions to Help Manage Sensitive Data

Normalyze is an agentless platform that assists organizations in better managing sensitive data, as well as attack paths to it in today’s complex, multi-cloud environments, thereby protecting customers from large and damaging data breaches. Security teams can continuously assess, prioritize, and react to cloud data threats and stop sensitive data loss using Normalyze’s graph-powered platform.

Normalyze has emerged from stealth with $22.2 million in Series A funding led by Lightspeed Venture Partners and Battery Ventures. This funding round brings the company’s total funding to $26.6 million.

Amer Deeba, Cofounder and CEO at Normalyze stated, “Today’s enterprises find their data scattered throughout their various cloud environments with limited visibility of where sensitive data resides. It’s a massive problem that current cloud security offerings aren’t equipped to handle. We built Normalyze to help companies of all sizes discover, classify and secure sensitive data across all public clouds. With simple onboarding and minimum ramp-up time, our platform provides full visibility on data security posture to better gauge risk and proactively respond to sensitive data threats.”

Normalyze has the unique ability to bring together all security stakeholders in one user interface, from the CISO to the security engineer to DevOps, to discover data, classify it, and prioritize the discovery of attack paths that can lead to sensitive information. Normalyze’s data-first cloud security platform works in three stages, it builds an intelligent graph with deep context and transitive trust relationships representing all the data stores, applications, identities, and infrastructure resources in all clouds and how they all connect during discovery and analysis. The agentless data scanner from Normalyze then determines which data stores contain sensitive information and automatically maps it to specific profiles such as PCI, HIPAA, and GDPR.

Ravi Ithal, Cofounder and CTO of Normalyze commented, “Our graph-powered platform is a hub that connects all data with assets, identities, accesses, misconfigurations, and vulnerabilities to help security teams continuously discover sensitive information, determine attack paths, and automate remediation efforts to secure it. With the Normalyze one-pass scanner, users can scan structured and unstructured data stores to discover sensitive information based on predefined compliance profiles for PII, GDPR, HIPAA, and more with minimal upfront configuration and cost, all while ensuring data never leaves their cloud environments.”

Read more articles:

Cyware Declared SOC 2 TYPE 2 Compliance for Data Security

Cyware Declared SOC 2 TYPE 2 Compliance for Data Security

Cyware declares the completion of the System and Organization Controls (SOC) 2 Type 2 Audit for the trust services criteria relevant to Security (“applicable trust services criteria”) Trust Services Criteria for Security, Availability, Processing Integrity, Confidentiality, and Privacy, as outlined in TSP section 100, (AICPA, Trust Services Criteria).

Anuj Goel, CEO of Cyware commented, “Commitment to the highest levels of data security has always been one of our foremost business priorities. The SOC 2 Type 2 certification process is not easy to achieve but our team was fully committed and prepared to ensure we checked all the required boxes. The new milestone will further strengthen the confidence of our current and future customers in our robust compliance with industry benchmark data security standards including SOC 2 (Type 1 and Type 2) and ISO/IEC 27001:2013.”

This accomplishment shows how dedicated the company is to the highest data security standards. The American Institute of Certified Public Accountants (AICPA) developed SOC 2 as a reporting framework that establishes benchmarks for Software-as-a-Service (SaaS) companies that manage customer and user data. The certification confirms that the organization’s internal systems and controls are in continuous compliance with the SOC 2 audit standards. Schellman & Company, a globally recognized attestation, and compliance services provider performed the audit for Cyware.

Cyware’s clients include some of the world’s largest financial and healthcare organizations, as well as ISAOs and more than 20 sectoral information-sharing communities (ISACs and ISAOs), use Cyware’s solutions to communicate threat intelligence with more than 10,000 member organizations, National CERTs, and Managed Security Service Providers (MSSPs/MDRs). In addition, Cyware recently launched the industry’s first ISAC-to-ISAC Operational Collaboration initiative to remove barriers to cross-sectoral threat sharing. The SOC 2 certification validates the company’s ongoing commitment to earning and retaining customer trust by using security as the foundation for all business operations and product development.

Read more articles:

Netskope Improvised Netskope Private Access