Pixalate Releases MRT App for Slack to Access Ad Fraud Insights

The Media Ratings Terminal (MRT) app for Slack was made available by Pixalate and can be found in the Slack App Directory. As Pixalate aims to even up privacy, ad fraud, and compliance insights, the Media Ratings Terminal (MRT) app delivers ad fraud data directly to Slack. Apart from privacy ad fraud, and compliance ratings, MRT brings insights throughout mobile and CTV apps as well as websites through Amazon, Roku, Google and Apple app stores.  

Jason Dias, Pixalate’s VP of Engineering, stated, “The MRT for Slack is our latest addition to increase accessibility of key data points around ad fraud and privacy compliance in the advertising supply chain. Bringing MRT data points into everyday conversations in Slack makes identifying, following, and troubleshooting issues easier for all types of teams.” 

The release of the latest app for Slack is another step taken by Pixalate to increase access of fraud and privacy compliance risk data as well as boost transparency in the ad tech space. This step follows the latest releases of the Ad Trust & Safety API Suite and COPPA Compliance Technology of Pixalate to discover child-directed mobile apps throughout the Apple App and Google App Stores. 

With the help of the app, users can quickly search for any app name, ID, or website address within their Slack workspace. Additionally, it has a summary Home tab for the user’s MRT Watchlist, which provides a quick view of data points for the applications and websites they have chosen to follow. Users may easily edit their lists via the “Follow” and “Unfollow” buttons in the Slack app. The app also incorporates conversations related to the MRT and opens links in a channel to deliver important data points when accessible. This provides immediate access for ad buyers, publishers, privacy regulators, and other parties to watch over apps and domains. 

Protecto and Snowflake Partnered for Data Protection

Protecto announced the integration of its artificial intelligence and privacy engineering platform into Snowflake. Snowflake is a data cloud company; this integration will help customers to identify data security issues before data breaches, and customer trust violations occur.

Data is the foundation of modern businesses, but it is increasingly susceptible to security flaws, privacy violations, and theft. Manual processes and compliance checks are insufficient to safeguard today’s complex data environments. The partnership between Protecto and Snowflake will provide visibility in identifying data protection vulnerabilities while maintaining the speed and agility of Snowflake’s platform.

Amar Kanagaraj, Founder and CEO of Protecto, commented, “The world is evolving to be privacy-first and zero-trust security. As a result, companies expect data security and privacy as part of their data stack. We’re introducing Data Posture Intelligence, a technology multiple steps ahead of the competition to deliver data protection in minutes.”

Protecto automates data privacy, security, and governance audits to provide results in minutes. The solution provides data posture insights in a single pane of glass, which helps their joint customers in finding personal information. It helps them determine who has access to sensitive data, identify inactive users, and audit user permissions. It allows customers to check user activities for potential privacy violations. Customers can recognize unused data that is open, overexposed, or stale.

Venkat Gopalan, Chief Data Officer of Belcorp, commented, “Cloud data platforms such as Snowflake give us enormous scalability and agility. With Protecto and Snowflake’s partnership, we have tighter control over our data security and privacy. Products like Protecto give us granular visibility over data protection across our Snowflake Data Cloud.”

IBM Acquired Databand.ai for Data Security

IBM announced the acquisition of Databand.ai, a provider of data observability software that assists organizations in resolving data issues such as errors, pipeline failures, and poor quality before they impact their bottom line.

Organizations are struggling to manage the health and quality of their data sets, which is required to make better business decisions and gain a competitive advantage as the volume of data continues to grow at an unprecedented rate. Data observability, a rapidly growing market opportunity, is quickly emerging as a key solution for assisting data teams and engineers in better understanding the health of data in their system and automatically identifying, troubleshooting, and resolving issues such as anomalies, breaking data changes, or pipeline failures in near real-time.

This acquisition enhances IBM’s software portfolio across data, AI, and automation to address the full spectrum of observability and aids organizations in ensuring that reliable data is placed in the hands of the appropriate users at the appropriate time.

Databand.ai is IBM’s fifth acquisition in 2022 as the company expands its hybrid cloud and AI capabilities.

Josh Benamram, Co-Founder and CEO of Databand.ai, stated, “You can’t protect what you can’t see, and when the data platform is ineffective, everyone is impacted –including customers. That’s why global brands such as FanDuel, Agoda, and Trax Retail already rely on Databand.ai to remove bad data surprises by detecting and resolving them before they create costly business impacts. Joining IBM will help us scale our software and significantly accelerate our ability to meet the evolving needs of enterprise clients.”

The open and extendable approach of Databand.ai enables data engineering teams to integrate and gain observability into their data infrastructure easily. This acquisition will provide Databand.ai with additional resources to expand its observability capabilities for broader integrations across more open-source and commercial solutions that power the modern data stack. Enterprises will also have complete control over how Databand.ai is deployed, whether as a SaaS or a self-hosted software subscription.

IBM’s acquisition of Databand.ai expands on the company’s R&D investments and strategic acquisitions in AI and automation. IBM is well-positioned to address the full spectrum of observability across IT operations by combining Databand.ai with IBM Observability by Instana APM and IBM Watson Studio.

Data observability solutions are also essential components of a company’s overall data strategy and architecture. The acquisition of Databand.ai expands IBM’s existing data fabric solution by assisting in the delivery of the most accurate and trustworthy data to the right hands at the right time – regardless of where it resides.

Daniel Hernandez, General Manager for Data and AI at IBM, commented, “Our clients are data-driven enterprises who rely on high-quality, trustworthy data to power their mission-critical processes. When they don’t have access to the data they need at any given moment, their business can grind to a halt. With the addition of Databand.ai, IBM offers the most comprehensive set of observability capabilities for IT across applications, data, and machine learning and is continuing to provide our clients and partners with the technology they need to deliver reliable data and AI at scale.”

Palo Alto Networks to Protect Oracle’s Cloud Apps and Data

Palo Alto Networks announced that Oracle selected the Palo Alto Networks VM-Series Next-Generation Firewall (NGFW) as the technology to power the Oracle Cloud Infrastructure (OCI) Network Firewall. The new OCI Network Firewall, a natively integrated offering, joins the Palo Alto VM-Series Next-Generation Firewall. Palo Alto Networks and Oracle collaborate to offer customers the solutions they require to secure their cloud adoption journey.

Enterprise customers who develop new applications or migrate existing Oracle applications to OCI require best-in-class security to help prevent new threats and breaches. Palo Alto and Oracle have been addressing the need for Oracle Cloud Infrastructure customers since 2019.

Lee Klarich, chief product officer, of Palo Alto Networks commented, “Oracle has made security foundational and built-in for OCI customers to help them address regulatory compliance requirements, stop security threats and concerns, and prevent security-related outages. As Oracle is expanding its cloud security capabilities to provide multiple layers of defense to help identify and defeat emerging threats and security violations quickly, we are incredibly proud that they have chosen Palo Alto Networks technology to power these new capabilities.”

The OCI Network Firewall is a cloud-native firewall service that extends best-in-class NGFW capabilities to protect OCI workloads and aids in providing centralized cyberattack protection across OCI. Customers can use it to activate and secure their applications and cloud environment with firewall features, as well as can scale their security across their cloud deployment.

Clay Magouyrk, executive vice president, of Oracle Cloud Infrastructure stated, “Our enterprise customers are confronted with an ever-changing threat landscape and the complexities that come with it. Therefore, we’re intently focused on providing our customers with a comprehensive set of cloud security services that are easy to deploy and built in. Teaming up with Palo Alto Networks to provide our customers with next-generation firewall security is going to make it even easier for enterprises to identify potential vulnerabilities.”

Read more articles:

Benefits of Cloud Security in 2022!!

The Ultimate Guide to NAC (Network Access Control) in 2022!

Network Access Control (NAC) solutions support organizations to manage endpoint and user access provision using a set of policies or protocols and authentication mechanisms to secure organizational networks and data. Organizations can control endpoints (otherwise known as nodes or devices) at the pre-and post-admission stages, implement security compliances, and create resource usage policies based on various factors such as location or user authority.

Wired networks generally have different kinds of security measures in place. However, with wireless networks, where endpoints are connected merely through the internet or via a common router, the security of data and devices becomes much more complex. The authentication of users in large organizations with wireless networks, especially with data increasingly being moved to the cloud, becomes a major concern since sensitive data must be protected at all costs. Traditionally, NAS (Network Access Server) was used to ensure that people without visibility rights would not be able to access resources by blocking off access based on the confirmation of login details. However, amidst the digital shift, NAS is no longer usable unless an organization maintains a rigid user environment.

This means that unless an organization has
1) a small number of employees, and
2) a fixed number of devices that can be monitored,
it most definitely needs more security than a log-in password. This is where NAC comes in to save the day.

NAC solutions are extremely important in situations where employees or guests are allowed to bring their own devices to the workplace, sign into the network, and access information from multiple devices simultaneously.
Nowadays, most organizations have moved to cloud-based storage, and allow their employees to access files remotely. With BYOD (Bring Your Own Device) and Remote-Access becoming more widely accepted as the norm, understanding, and adopting NAC becomes vital.

So, let us dive into what NAC is –

4 major concepts act as a foundation for NAC–

IDS/IPS (Intruder Detection Systems/Intruder Prevention Systems) – These are put in place to identify and contain breaches and attacks.

User Authentication – This involves the correct identification and verification of users/devices attempting to access a network.

Endpoint Security – Endpoints or devices need to remain secure once access has been granted. This is what is known as post-Admission security.

And finally, Network Security – This concept focuses on ensuring the security of the network environment.

We talk more about Identity and Access Management, User Authentication, Unified Endpoint Management, Zero-trust Network Security, and IDS/IPS in our other insights.

Coming back to Network Access Control Solutions, some of the most basic actions that they help organizations carry out are –

1) Create user profiles based on identity and role to detect trusted users. This method of identification steers away from IP address-based verification.
2) Restrict non-compliant, unverified users from utilizing the corporate network and accessing data.
3) Monitor user activity once admitted and control continuation of access provision.
4) Remove any unidentifiable or suspicious users, devices, or applications to prevent data misappropriation or malicious attacks.
5) Provide different levels of access to endpoints based on a profiling engine. This engine can discover, monitor, and/or quarantine endpoints based on user behavior or role in the organization.
6) Put firewalls, spyware detection, malware detection, anti-virus software, and intrusion detection systems into place.
7) Create a baseline for endpoint security and monitor all devices that request access for compliance/non-compliance.
8) Help administrators create and implement security policies based on user data, user roles, and network complexity to govern internal and external activity, as well as reduce security risks by controlling access for devices. This involves temporarily blocking or isolating devices until administrator intervention takes place.
9) Create and manage a guest network, which can be used to provide limited access to guest users. This involves the creation of a guest portal that is capable of authenticating, registering, and managing access for guest users.
10) Integrate with other access control tools and security applications to secure vulnerabilities, contain attacks, and restrict unprotected devices from contaminating other devices on the network.

Akamai introduced Linode Managed Database for Developers

Akamai Linode Managed Database simplifies database deployment by assisting developers in reducing risk, improving efficiency, and reducing the complexity associated with manually managing production database clusters. Akamai Technologies introduced its database service powered by Linode that supports MySQL, PostgreSQL, Redis, and MongoDB.

Will Charnock, Senior Director of Engineering at Akamai stated, “Every web application needs a database. Being able to automate aspects of database management is critical for applications that need to be scalable, highly performant, and resilient. Linode Managed Database continues the important work, which began with Linode Kubernetes Engine – our managed Kubernetes service – of supporting developers, businesses, and partners by managing the day-to-day tasks of mission-critical components of their applications, allowing them to focus more on innovation and less on daily infrastructure management. With the click of a button, developers can have a fully managed database deployed and ready to be populated.”

Databases are the most crucial facet of any application but managing them manually is a time-consuming and resource-intensive process.  Akamai Linode Managed Database service can allocate common deployment and maintenance tasks to Linode and select highly available configurations to ensure that database performance and uptime are never compromised. As a result, deploying applications requires less hands-on management expertise and has a lower risk of downtime when compared to manual management.

Linode customers have frequently sought the need for managed databases. Following the acquisition of Linode in March of this year, Akamai’s first product launch in its compute line of business is the Linode Managed Database service, reinforcing its mission to develop the world’s most powerful and distributed compute platform from the cloud to the edge.

Akamai will initially offer Linode Managed Database for MySQL in all of Linode’s 11 global data centers, with PostgreSQL, Redis, and MongoDB support coming in the second quarter of 2022. Customers can take advantage of features such as flat-rate costing, security and recovery measures, flexible deployment options, and high availability cluster options with each supported managed database.

Read more articles:

Integrated Risk Management Platform

BreachBits Launches BreachRisk

NetApp Announces Acquisition of Instaclustr

NetApp, a global, data-centric software company has signed a definitive agreement with Instaclustr, a pioneering platform supplier of a fully managed open-source database pipeline and workflow applications delivered as a service. The latest cloud applications are fully dependent on the primary developing services which consist of several open-source databases, workflow solutions, and data pipelines.

CEO at NetApp, George Kurian commented, “NetApp has long been a leader in solutions enabling customers to run applications. The acquisition of Instaclustr will combine NetApp’s established leadership in continuous storage and compute optimization with Instaclustr’s fully-managed database and data pipeline services to give customers a Cloud Operations platform that provides the best and most optimized foundation for their applications in the public clouds and on premises.”

This acquisition of Instaclustr made by NetApp will deliver the best of CloudOPs. Spot by NetApp is a captivating platform for applications on the hybrid cloud with the help of CloudCheckr, Data Mechanics, Fylamynt and lately Instaclustr. This platform offers continuous optimization, automation, monitoring and security along with leveraging and functional open-source applications, all delivered as a service on a hybrid cloud system to offer customers an efficient and effective cloud experience.

CEO and Co-founder at Instaclustr, Peter Lilley, stated, “Data management technology platforms are an increasingly essential priority for today’s modern enterprise as companies look for new ways to accelerate application development for competitive advantage. Instaclustr delivers fully managed open-source solutions that give companies increased productivity and reduced cost. Instaclustr’s growth has been driven by the fact that companies want to leverage open-source databases, pipelines, and workflow applications without overwhelming themselves with the complexity and cost of managing and operating them. We are excited for organizations building applications for their multi-cloud and hybrid cloud reality to benefit directly from Instaclustr’s data PaaS solutions along with NetApp and Spot by NetApp’s infrastructure solutions, while minimizing operations burdens.”

Read More Related Content:

What is Cloud Security?

Deloitte and VMware partner to form Distributed Cloud!

Kubernetes Protection Extended in AWS by Redstor

Redstor a Data management, and SaaS protection company has introduced a new service aimed at changing the way how managed and cloud service providers (MSPs and CSPs) handle Kubernetes installations on AWS. Amazon Elastic Kubernetes (Amazon EKS), a managed container service for handling applications in the cloud or on-premises, has been introduced to the firm’s offering, allowing partners to scale client backups and eliminate the need for multiple, ununified solutions.

Backups have traditionally not been built for modern, container-based applications, necessitating service providers to use separate Kubernetes solutions to back up not only apps but also configurations, according to Redstor. The company hopes to integrate such processes with its new extension, removing the need for disparate solutions to be bolted together.

According to Redstor, services providers will benefit from the ability to quickly restore a Kubernetes environment by injecting data back into an existing cluster for fast resolution of ransomware, accidental or malicious deletion, or misconfiguration while managing multiple accounts with a single solution designed specifically for cloud partners.

Redstor’s backup empowers users with easy scalability and ongoing maintenance, unlike other extremely sophisticated services that need error-prone scripting. There’s no necessity to move between interfaces. All the features give MSPs a better chance to achieve large margins quickly at scale, stated Redstor’s chief product officer, James Griffin.

Envision Virgin Racing and Palo Alto Networks form Multiyear Partnership

Palo Alto Networks, the world’s leading cybersecurity company, and Envision Virgin Racing, the current leader in the ABB FIA Formula E World Championship standings, announced a multiyear partnership. The organizations hope to raise awareness about their similar aims to promote a secure and sustainable future through this partnership.

Palo Alto Networks’ continuous advancements in cloud security, network security, and security analytics help resolve the world’s most pressing cybersecurity concerns. The company is a pioneer in providing cybersecurity solutions and trusted intelligence to assist enterprises in making secure progress in an increasingly connected world.

This will include the enhancement and optimisation of Envision Virgin Racing’s cybersecurity solutions, which are fundamental to the digital safety of the team. In addition, Envision Virgin Racing driver Robin Frijns, who is now second in the driver standing and a firm contender for the championship title, will also become an official ambassador of Palo Alto Networks.

“Both Envision Virgin Racing and Palo Alto Networks are at the forefront of new technologies that help us build a better future, and we are delighted to be joining forces with them. Envision Virgin Racing is driving new EV technologies that converge more and more with our daily activities, and the work that Palo Alto Networks does sits at the very centre of it, ensuring that we are all operating in a safe and happy environment,” said James Mercer, commercial director at Envision Virgin Racing.

“True partnerships are based on a shared aspiration to create great impact in the world. Envision Virgin Racing’s commitment to its Race Against Climate Change for a better future aligns with our vision of a world where each day is safer than the one before. We value this partnership and the opportunity to amplify each other’s mission, as we both continue to make progress on emerging challenges,” said Zeynep Inanoglu Ozdemir, chief marketing officer of Palo Alto Networks.

XYPRO and Hewlett Packard Enterprise are expanding their partnership to offer a full suite of security solutions on HPE NonStop systems

XYPRO Technology Corporation (XYPRO), a global leading organization in cybersecurity,  identity management, analytics and secure database management software, announced the expansion of a decades-long cooperation with Hewlett Packard Enterprise (HPE) to deploy its whole package via HPE NonStop systems. HPE NonStop systems, which are designed for mission-critical situations that require 100 percent fault tolerance, now include extended XYPRO solutions for improved threat detection and security management capabilities.

This expansion is in line with XYPRO’s growth plan and broadens the availability of mission-critical database management, security, and integration solutions into new sectors throughout HPE’s customer base. XYPRO’s flagship product, XYGATE SecurityOne, a patented security, compliance, and threat detection platform, and XYGATE Identity Connector, the first and only Sailpoint and CyberArk integrations for HPE NonStop systems, are among the solutions that help customers protect their mission-critical environment. Customers can now use HPE NonStop systems to meet criteria for securing and monitoring mission-critical investments.

HPE offers the whole XYPRO cybersecurity product family, including XYGATE SecurityOne (XS1) and Integrations.

“In our history of delivering risk management solutions for HPE NonStop systems customers longer than anyone has, we strive for meaningful and strategic business relationships while providing great support and leading edge security solutions. Our strong relationship with HPE is why several XYPRO solutions have shipped with the HPE NonStop operating system for more than a decade,” said Lisa Partridge, CEO, XYPRO. “Making the rest of the XYPRO’s solution suite available through HPE further strengthens security within the HPE NonStop system ecosystem, providing customers security and consistency at significant value.”

“Ensuring reliable cybersecurity and management capabilities is critical for customers running always-on, 100% fault-tolerant environments with sensitive data exchange,” said Jeff Kyle, vice president and general manager, Mission Critical Solutions, HPE. “By building on our long-standing partnership with XYPRO to expand security capabilities with new analytics and automation features on our HPE NonStop systems, we are furthering our ability to deliver trusted platforms for mission-critical needs that are easy to manage while meeting strict data governance requirements.”