DATA SECURITY,ENTERPRISE SECURITY,SOFTWARE SECURITY
Arkose Labs | January 30, 2023
Arkose Labs™, one of the worldwide leaders in bot management and account security, announced the launch of Arkose Email Intelligence™. This new tool prevents bots and bad actors from using fraudulent or dangerous email addresses to target online services and apps.
Legacy email intelligence systems are not optimized and are too costly to utilize in high-volume applications such as new account registration that are targets of bot-driven assaults. Arkose Email Intelligence combines email risk discovery with the industry-leading Arkose Protect, a bot detection and challenge platform, to create the first email intelligence solution.
This solution prevents bots and bad actors from using fake, throw-away, and other high-risk email addresses to develop synthetic online accounts and launch volumetric account takeover (ATO) attacks. In the second half of 2022, the creation of bogus accounts increased by 81% compared to the first half. Additionally, 11% of all attack attempt sessions were ATOs in 2022 and were of the same severity.
Extremely high market demand exists for an email intelligence service that is both highly effective and reasonably priced. Existing services are exorbitantly costly, often compelling CISOs and product teams to use email intelligence at restricted locations more profoundly in the user flow of an application, such as during the payment transaction. This trade-off leaves important occasions, such as the creation of a new account, exposed to assault and misuse by email addresses that are fake or high-risk.
Arkose Email Intelligence is meant to provide robust abuse protection at a much lower cost than previous industry solutions. This allows businesses to afford email intelligence beyond standard transactions.
In addition to combating automated and fraud farm attacks, Arkose Email Intelligence offers organizations over forty relevant data insights. These extensive data points and signals give a multidimensional perspective of the risk connected with the email address, allowing for additional threat assessment and decision-making.
About Arkose Labs
Arkose Labs is one of the industry leaders in bot management. Its novel method identifies genuine user intent and mitigates threats in real time. In addition, risk assessments and interactive authentication difficulties degrade the return on investment (ROI) behind attacks, ensuring long-term security and enhancing consumer throughput. The firm, headquartered in San Mateo, California, with operations in Brisbane and Sydney, Australia, San Jose, Costa Rica, and London, United Kingdom, placed 106th on the North American Deloitte Fast 500 list for 2022.
DATA SECURITY, ENTERPRISE SECURITY, SOFTWARE SECURITY
Beyond Identity | March 16, 2023
Beyond Identity, the industry leader in providing phishing-resistant, passwordless MFA, has announced the official launch of 'Zero Trust Authentication' as a subcategory of zero trust technology, along with the introduction of the Zero Trust Leadership series of events worldwide, which will be held throughout 2023.
Combining industry-leading security integrators and technologies, such as Beyond Identity, CrowdStrike, Palo Alto Networks, Optiv, World Wide Technology, BeyondTrust, Climb Channel SolutionsPing Identity, and Guidepoint Security will enable organizations to move toward secure authentication designed to improve the zero-trust strategies of the Fortune 5000.
Zero Trust Authentication was created in response to the failure of conventional authentication methods, a problem that has been compounded by the rise of cyberattacks. Implementing Zero Trust Authentication will enable businesses to surpass the constraints of legacy multi-factor authentication (MFA) and passwords and deploy more effective security strategies.
To achieve this, the Zero Trust Authentication strategy incorporates components like Beyond Identity's risk scoring and continuous authentication functionalities, which greatly increase the given level of security.
Tom Jermoluk, Co-Founder and Chief Executive Officer of Beyond Identity, mentioned, "In working with leaders across the security ecosystem, it became apparent to us that the industry needs to formally bring identity and access management into the security fold to continuously deliver the highest level of security around users and devices."
(Source – Business Wire)
He added, "We are bringing together the leaders from the essential technology categories to ensure authentication decisions are risk based and continuously informed with signals from the wealth of existing cybersecurity tooling. Through close technology collaboration and now go-to-market collaboration in this Zero Trust Leadership series, we are delivering strong authentication built for an 'always on' zero trust world coupled with the practical advice and best practices so that enterprises can finally close identity and access management vulnerabilities."
(Source – Business Wire)
About Beyond Identity
Beyond Identity is redefining digital access for companies seeking to enhance protection against cyber assaults and provide the greatest levels of security for their customers, employees, and developers. The company's phishing-resistant, passwordless, and Zero Trust Authentication technologies enhance both security and the user experience.
The platform provides continuous risk-based authentication that incorporates signals from the zero-trust ecosystem to guarantee that only valid users and secure devices get or keep access to vital resources. Snowflake, Roblox, and Unqork rely on Beyond Identity's highly accessible cloud-native platform to deter assaults and advance their zero-trust strategy.
ENTERPRISE SECURITY, PLATFORM SECURITY, SOFTWARE SECURITY
Absolute Software | March 14, 2023
Absolute SoftwareTM, the only provider of self-healing, intelligent security solutions, recently announced the continued addition to the Absolute Application Resilience ecosystem with the introduction of the latest product.
Joint clients can now utilize Absolute's proprietary Persistence® technology and unbreakable device connection to improve the resiliency and health of over 70 mission-critical security and business solutions, such as eClinicalWorks, HCL BigFix, IMTLazarus, UNOWHY, Forescout® SecureConnector, Pixart® MDM, Plurilock CloudCodes, and XM Cyber HaXy.
In today's work-from-anywhere scenarios, the need for resilient security policies able to secure remote devices and sensitive data has never been more critical. Absolute's analysis reveals that non-resilient applications may function effectively on lesser than 80% of the devices on which they have been installed, and in some cases as low as 35%, whereas over 95% of devices with Application Resilience functionalities facilitated reported healthy security applications.
As a result of increasing demand, Absolute has witnessed a 26% year-over-year rise in the number of customer devices utilizing Application Resilience to monitor app behavior and health, as well as a 42% increase in the number of devices monitoring application health and autonomously reinstalling and repairing them when required.
John Herrema, EVP of Product and Strategy at Absolute Software, said, "It is abundantly clear that in order to deliver both maximum protection and returns on security investments, critical controls must be constantly monitored and maintained." He added, "Our unique intelligence repeatedly shows that complex device environments have put endpoint agents at constant risk of collision, decay, or being disabled by malicious or negligent users. By making the investments to continuously grow our Application Resilience ecosystem, we are enabling our customers to harden their defenses against malicious attackers and strengthen overall security posture."
About Absolute Software
Headquartered in Vancouver, Canada, Absolute Software is the exclusive provider of intelligent, self-healing security systems. Integrated into over 600 million devices, Absolute is the only platform that provides a permanent digital connection that dynamically and intelligently applies visibility, control, and self-healing capabilities to applications, endpoints, and network connections - enabling companies to improve cyber resilience against the rising danger of ransomware and malicious assaults.