Asigra launched Tigris Data Protection

Asigra launched Tigris Data Protection software with CDR (Content Disarm & Reconstruction). Asigra Tigris Data Protection software now includes CDR for protection against deeply embedded malware to address the ransomware threat, which now significantly increases the risk to both primary and backup data. 

The most recent generation of ransomware hides harmful code within content files that are frequently nested and compressed. Cybercriminals know that antimalware cannot scan what it cannot see, so they can avoid detection by using deeply embedded code. The data protection platform Asigra Tigris unifies cybersecurity and backup, fostering new levels of collaboration between data protection and security experts. 

Val Silva, CTO of Asigra “Worrisome increases in cybersecurity attacks on critical business systems has followed the rise in remote work environments over the past couple years. These attacks are commonly finding their way within corporate networks, and in many cases, specifically targeting backup systems. 

With Asigra CDR, Tigris Data Protection has reset the bar with ultra-secure backup that ensures organizations meet their business continuity objectives for absolute confidence in the ability to recover mission-critical data when needed.” 

The brand-new security feature, CDR, breaks down supported files into their smallest parts to find any embedded malicious code, macros, links, or executables. CDR reconstructs the original file without the malware after filtering and containing the malware. The technology eliminates any potential payload threats that are deeply buried within each file, outperforming predictive detection-based techniques. By maintaining file functionality and authenticity without the use of malicious code, the new CDR functionality ensures the integrity of the files. 

Asigra’s security architecture now includes soft-delete support, FIPS 140-2 certified encryption, bidirectional CDR, zero-day exploit protection, variable repository naming to non-standard names to prevent recognition, deep MFA (multi-factor authentication), and variable repository sanitization with inline detection on both the backup and recovery streams. 

Voltage CyberRes One solution, FAS SmartScan, provides data discovery and protection capabilities!

Voltage File Analysis Suite (FAS), a cloud platform that combines the newest in data discovery and data protection, has received an update from CyberRes, a Micro Focus business. The business claims that SmartScan, a tool for intelligent sampling and dynamic tagging for petabyte-scale data discovery, is one of the new features of Voltage FAS that enables data analysts to locate the areas of higher data risk faster. 

Reiner Kappenberger, Director Product Management for Voltage Data Privacy and Protection at CyberRes, says, “The new CyberRes Voltage File Analysis Suite takes data security to the next level with its data discovery and protection capabilities within one solution. Since it is delivered as a Software-as-a-Service (SaaS) solution, it possesses the scalability needed to meet the needs of any user’s data estate. Furthermore, the dynamic Voltage SmartScan tool provides users with the resources needed to conduct more prescriptive, deeper scans of their data infrastructure, and take more focused protective actions.” 

Voltage FAS, according to CyberRes, is not constrained by the limitations of physical or political boundaries, allowing users to reach and maintain compliance standards for the numerous privacy regulations that are becoming more and more prevalent around the world. 

With dynamic data masking and contextually aware entity detection for more than 39 nations and economic zones, Voltage FAS is intended to improve overall privacy awareness. Along with its availability as a SaaS platform, Voltage FAS is now also offered as an MSSP option with this release. By comprehending and overseeing existing data, Voltage FAS integrates with cloud, on-premises, and all hybrid models. Voltage FAS may also be used on private clouds, allowing organizations to effectively locate and safeguard their sensitive data without having any data leave the region, which is advantageous because some regions restrict data residency for organizations. 

Read More : IBM Acquired Databand.ai for Data Security

Data Dynamics launched StorageX9.0

Data Dynamics StorageX9.0, released by Data Dynamics, will enhance, and expand the functionalities of the company’s current products to assist customers in managing the complexity and sprawl of unstructured data. Enterprises can use it to organize and analyze their data, derive practical insights, implement security procedures, uphold compliance, and improve business performance. StorageX 9.0 is loaded with new features like Share and DFS analytics, NFSv4 and NFSv3 POSIX security translation, and support for versioned object mobility. 

Cuong Le, CSO of Data Dynamics commented, “StorageX 9.0 is an enhancement to our already strong data management portfolio. It helps our enterprise customers with the capabilities they need for intelligent heterogenous petabyte-scale migrations and modernization, with fast time to value, maintaining compliance, and enhanced data security.” 

Furthermore, StorageX and Microsoft recently worked together to create the Azure File Migration service. Through this program, businesses can use StorageX for cost-free data migration to Azure. 

StorageX can assist businesses in realizing the full potential of their data when combined with Data Dynamics’ unified unstructured data management platform. Data Mobility, Data Analytics, Data Security, and Data Compliance are just a few of the end-to-end data management capabilities that the platform supports. 

Leading unstructured data migration software from Data Dynamics, StorageX offers policy-based data migration without vendor lock-in. Intelligent, quick, and secure petabyte-scale unstructured data migrations are made possible by StorageX’s seamless cloud data migration, data center consolidation, and storage optimization technologies. StorageX provides dynamic data for the digital enterprise, allowing enterprises to use its data to gain a competitive edge. 

Ntrinsec Launches Groundbreaking Key Security Automation Platform

Ntrinsec launched a groundbreaking new key security automation platform. The platform reduces security issues related to improper key management and misuse of encryption keys. Ntrinsec delivers complete automation around all key lifecycle operations by integrating with third-party key management systems (KMS), hard security modules (HSMs), certificate authorities, and significant cloud providers. This will guarantee that all keys follow the best procedures and put an end to key compromises. 

Ntrinsec CEO, Michael Leidesdorff said, “With a potent combination of technology and a team with decades of expertise, Ntrinsec is in a prime position to solve today’s data protection challenges. We are excited to introduce the world’s first key security automation platform from Ntrinsec. Our goal is to protect organizations from data breaches, and this tool has the strength to do just that. Ntrinsec’s moving target defense approach is making sure that digital secrets are kept safe in perpetuity. Bad actors are increasingly exploiting key hygiene issues like key reuse and local wallets. With this attack vector quickly growing and industry standards calling only for annual key rotation, which is hopelessly out-of-date, a platform like Ntrinsec is needed now more than ever.” 

Ntrinsec has developed a moving-target protection method that outwits hackers in today’s more complicated situations by automating machine identification secrets at scale. To maintain good key hygiene and spot exploitable key reuse, users can automatically and safely map all keys and host computers within the platform. In order to successfully prevent data breaches before they ever start, Ntrinsec powers intelligent crypto-reduction strategies to develop anomaly detection and automate speedy remediation. 

Davenport Group Collaborated with Stratodesk

Davenport Group has announced a partnership with Stratodesk and is now a part of the Stratodesk Edge channel partner program, which provides end-to-end IT solutions to businesses across the country. This new collaboration will provide their joint customers, particularly in the education, health care, state and local government, and manufacturing markets, with an IT solution that includes everything from storage to data security technologies and Stratodesk NoTouch software. 

Sonia St. Charles, CEO of Davenport Group stated, “Working with Stratodesk will enable Davenport Group to enhance our strategic focus on the end-user computing space by making it easier than ever for organizations to self-service within Stratodesk NoTouch OS. Our clients will benefit greatly from this unique capability from the EUC innovator. Our customers want secure endpoints, user mobility, and ease of management – a critical IT need we meet with Stratodesk when paired with Dell and VMware Solutions. Additionally, as a Dell Technologies Titanium Partner, these latest updates mean our customers can leverage new and existing Dell PCs, laptops, and thin clients – repurposing them with the latest clients from VDI/Cloud vendors to operate like new.” 

Davenport Group has been delivering IT solutions to businesses across North America since 2001, including data center modernization, virtualization, storage, data protection, HCI, and client computing. 

Davenport Group provides customers with true IT transformation through its years of field experience, certifications in Dell EMC and VMware technologies, and recognition as a Dell EMC Certified Titanium Partner and a VMware Enterprise Partner. Davenport ensures that customers now have more secure, hybrid workplaces by providing Stratodesk NoTouch OS as a preferred EUC operating system. 

Stratodesk Edge, the company’s channel partner enablement program, has welcomed Davenport Group. Customers of Stratodesk and Davenport Group can use Stratodesk software to support multiple work sites and mobile workers. This collaboration will provide organizations with a solution for transforming their endpoints into centrally managed and secure endpoints capable of delivering seamless user experiences to end users via VMware Horizon. 

Stratodesk NoTouch software is preinstalled on all VDI clients and runs on all endpoints in an organization, regardless of make, model, or manufacturer. Businesses can save money by eliminating the need to purchase hardware while connecting endpoints to their network environment and integrating with other Davenport Group solutions. 

Emanuel Pirker, Founder and CEO at Stratodesk commented, “We continue our focus as a channel-led company and commitment to providing enterprises across the country and beyond with access to best-of-breed leading technology solutions. Customers gain competitive advantage through the feature rich EUC technology solutions offered by Stratodesk’s partnership with trusted technology advisors.” 

Pixalate Releases MRT App for Slack to Access Ad Fraud Insights

The Media Ratings Terminal (MRT) app for Slack was made available by Pixalate and can be found in the Slack App Directory. As Pixalate aims to even up privacy, ad fraud, and compliance insights, the Media Ratings Terminal (MRT) app delivers ad fraud data directly to Slack. Apart from privacy ad fraud, and compliance ratings, MRT brings insights throughout mobile and CTV apps as well as websites through Amazon, Roku, Google and Apple app stores.  

Jason Dias, Pixalate’s VP of Engineering, stated, “The MRT for Slack is our latest addition to increase accessibility of key data points around ad fraud and privacy compliance in the advertising supply chain. Bringing MRT data points into everyday conversations in Slack makes identifying, following, and troubleshooting issues easier for all types of teams.” 

The release of the latest app for Slack is another step taken by Pixalate to increase access of fraud and privacy compliance risk data as well as boost transparency in the ad tech space. This step follows the latest releases of the Ad Trust & Safety API Suite and COPPA Compliance Technology of Pixalate to discover child-directed mobile apps throughout the Apple App and Google App Stores. 

With the help of the app, users can quickly search for any app name, ID, or website address within their Slack workspace. Additionally, it has a summary Home tab for the user’s MRT Watchlist, which provides a quick view of data points for the applications and websites they have chosen to follow. Users may easily edit their lists via the “Follow” and “Unfollow” buttons in the Slack app. The app also incorporates conversations related to the MRT and opens links in a channel to deliver important data points when accessible. This provides immediate access for ad buyers, publishers, privacy regulators, and other parties to watch over apps and domains. 

Infortrend Announces the Release of WORM and MFA features on EonStor GS

Infortrend, a leading provider of SAN, NAS, Unified, Hybrid Cloud and AI Storage Solutions, recently added immutable object storage, also known as write-once-read-many (WORM), and multi-factor authentication (MFA) security features to their EonStor GS unified storage systems. These features are introduced to ensure the protection of stored data, particularly against ransomware.

Ransomware attacks are still on the rise today, proving that traditional defenses like firewalls and antivirus software are insufficient to completely stop these threats. In order to secure archived data, businesses have begun using immutable or WORM storage repositories. With immutable object storage, organisations can set the data as WORM to protect it against ransomware encryption and choose a retention term to prevent unintentional data erasure.

Apart from the immutable object storage, the multi-factor authentication (MFA) feature is also integrated into the GS families. A separate one-time password is needed to access account by email or an APP. Even if the password has been hacked, the feature is demonstrated to be effective against unauthorized access. The Cybersecurity & Infrastructure Security Agency claims that implementing the MFA function reduces the likelihood of account hacking by 99 percent.

Frank Lee, Senior Director of Product Planning, said, “The immutable object storage and MFA offer reinforced security. Mandatory for some and highly-recommended safety measure by governments around the globe, especially in government organizations, financial, and medical industries, WORM and MFA functions can further protect sensitive and valuable data from unlawful access.”

Imperva Announces its Data Security Fabric for Data Protection

Imperva unveils that Imperva Data Security Fabric (DSF) offers data-centric protection and compliance for enterprise data lakes which is built on Amazon Web Services (AWS). It has been done with regards to its commitment to data protection as it empowers AWS consumers to secure their data with one platform. It impacts an integrated security model without utilizing any changes to their current data infrastructure across Amazon Aurora, Amazon Athena, Amazon Relational Database Service (Amazon RDS), Amazon Redshift, Amazon DynamoDB, and AWS CloudFormation.

Dan Neault, SVP and GM, Data Security, Imperva, said, “AWS allows organizations to quickly and securely build solutions that help them to reach new markets and deliver new services to end users. Imperva Data Security Fabric gives organizations building data lakes on AWS a streamlined experience for securing data, and confidence that their data lakes comply.”

Utilizing services like AWS Lake Formation and AWS Glue, Imperva Data Security Fabric finds data lakes that have been established and categorised to overcome these problems. By employing its internal data classification engine or by importing categorization scans from Amazon Macie, it can determine where sensitive data is stored across services like Amazon S3, Amazon Redshift, and Amazon RDS. To audit when a user accesses raw data files kept in Amazon S3 or runs analytical queries on the data using services like Amazon Athena or Amazon EMR, Imperva DSF gathers data access logs from providers like Amazon CloudWatch.

Identification of doubtful data access patterns, like the suspected network connections, extensive access to sensitive information, and the utilization of eminent service accounts by interactive users are included in Imperva DSF includes User Entity Behavior Analytics (UEBA). With these capabilities, companies discover and find important data breaches without the involvement of expert data security analysts. Lastly, security operation teams can build playbooks to automatically remove threats utilizing native features of AWS such as security groups included in Imperva DSF. This allows companies remain compliant while also preventing data breaches.

Protecto and Snowflake Partnered for Data Protection

Protecto announced the integration of its artificial intelligence and privacy engineering platform into Snowflake. Snowflake is a data cloud company; this integration will help customers to identify data security issues before data breaches, and customer trust violations occur.

Data is the foundation of modern businesses, but it is increasingly susceptible to security flaws, privacy violations, and theft. Manual processes and compliance checks are insufficient to safeguard today’s complex data environments. The partnership between Protecto and Snowflake will provide visibility in identifying data protection vulnerabilities while maintaining the speed and agility of Snowflake’s platform.

Amar Kanagaraj, Founder and CEO of Protecto, commented, “The world is evolving to be privacy-first and zero-trust security. As a result, companies expect data security and privacy as part of their data stack. We’re introducing Data Posture Intelligence, a technology multiple steps ahead of the competition to deliver data protection in minutes.”

Protecto automates data privacy, security, and governance audits to provide results in minutes. The solution provides data posture insights in a single pane of glass, which helps their joint customers in finding personal information. It helps them determine who has access to sensitive data, identify inactive users, and audit user permissions. It allows customers to check user activities for potential privacy violations. Customers can recognize unused data that is open, overexposed, or stale.

Venkat Gopalan, Chief Data Officer of Belcorp, commented, “Cloud data platforms such as Snowflake give us enormous scalability and agility. With Protecto and Snowflake’s partnership, we have tighter control over our data security and privacy. Products like Protecto give us granular visibility over data protection across our Snowflake Data Cloud.”

Normalyze Raises Millions to Help Manage Sensitive Data

Normalyze is an agentless platform that assists organizations in better managing sensitive data, as well as attack paths to it in today’s complex, multi-cloud environments, thereby protecting customers from large and damaging data breaches. Security teams can continuously assess, prioritize, and react to cloud data threats and stop sensitive data loss using Normalyze’s graph-powered platform.

Normalyze has emerged from stealth with $22.2 million in Series A funding led by Lightspeed Venture Partners and Battery Ventures. This funding round brings the company’s total funding to $26.6 million.

Amer Deeba, Cofounder and CEO at Normalyze stated, “Today’s enterprises find their data scattered throughout their various cloud environments with limited visibility of where sensitive data resides. It’s a massive problem that current cloud security offerings aren’t equipped to handle. We built Normalyze to help companies of all sizes discover, classify and secure sensitive data across all public clouds. With simple onboarding and minimum ramp-up time, our platform provides full visibility on data security posture to better gauge risk and proactively respond to sensitive data threats.”

Normalyze has the unique ability to bring together all security stakeholders in one user interface, from the CISO to the security engineer to DevOps, to discover data, classify it, and prioritize the discovery of attack paths that can lead to sensitive information. Normalyze’s data-first cloud security platform works in three stages, it builds an intelligent graph with deep context and transitive trust relationships representing all the data stores, applications, identities, and infrastructure resources in all clouds and how they all connect during discovery and analysis. The agentless data scanner from Normalyze then determines which data stores contain sensitive information and automatically maps it to specific profiles such as PCI, HIPAA, and GDPR.

Ravi Ithal, Cofounder and CTO of Normalyze commented, “Our graph-powered platform is a hub that connects all data with assets, identities, accesses, misconfigurations, and vulnerabilities to help security teams continuously discover sensitive information, determine attack paths, and automate remediation efforts to secure it. With the Normalyze one-pass scanner, users can scan structured and unstructured data stores to discover sensitive information based on predefined compliance profiles for PII, GDPR, HIPAA, and more with minimal upfront configuration and cost, all while ensuring data never leaves their cloud environments.”

Read more articles:

Cyware Declared SOC 2 TYPE 2 Compliance for Data Security