DATA SECURITY

Atakama and BigID Announce Strategic Alliance for Discovering and Protecting Sensitive Data

Atakama | February 16, 2022

Atakama
Atakama, the leading encryption company, has partnered with BigID, the leading data intelligence platform, to provide organizations with an integrated, automated approach to discovering and protecting sensitive and critical data.

The integration of Atakama's file encryption solution with BigID's data discovery and classification ensures that organizations can automate well-defined policies to discover, classify, and protect their data. Together, BigID and Atakama make it easy for customers to accelerate governance, reduce risk, protect their sensitive data with advanced encryption, and achieve continuous data compliance.

BigID enables customers to automatically discover, catalog, and classify all types of data and metadata, structured and unstructured. This includes PII, PHI, NPI, IP, and other sensitive, critical, and regulated data. Once the data has been identified, BigID can label and tag data in accordance with the organization's policies. Atakama can read the labels and immediately encrypt files in whichever location the files are stored. The integration of BigID and Atakama provides a powerful and scalable approach to sensitive data discovery and protection across the entire enterprise.

"BigID together with Atakama provides our customers with a seamless, but multi-faceted approach to data security,This partnership takes data protection to another level and will immediately strengthen an organization's security posture through unmatched visibility and control. We're thrilled to have Atakama be an integral technology partner via the BigID App Marketplace as we continue helping organizations meet their data management and security objectives."

Marc DeGaetano, CRO at BigID

"Partnering with BigID is a natural fit given their industry-leading capabilities across discovery and classification," said Scott Glazer, CRO at Atakama. "The ability to discover and protect sensitive data is the cornerstone of a successful cybersecurity program. We're thrilled to be able to work with BigID to deliver the combined solution to our customers via the BigID App Marketplace, who can trust that their data has been properly identified and securely protected."

About BigID
BigID's data intelligence platform enables organizations to know their enterprise data and take action for privacy, protection, and perspective. Customers deploy BigID to proactively discover, manage, protect, and get more value from their regulated, sensitive, and personal data across their data landscape. BigID has been recognized for its data intelligence innovation as a 2019 World Economic Forum Technology Pioneer, named to the 2021 Forbes Cloud 100, the 2021 Inc 5000 as the #19th fastest growing company and #1 in Security, a Business Insider 2020 AI Startup to Watch, and an RSA Innovation Sandbox winner. Find out more at https://bigid.com.

About Atakama
Atakama is a distributed key management solution that enables granular, file-level encryption without the need for passwords, identity and access controls, centralized servers, or HSMs. Attackers are prevented from accessing any data encrypted by Atakama even when the network or systems are breached. Atakama's distributed architecture has no single point of attack or failure, a security breakthrough that vastly exceeds the status quo for information security. By using Atakama, organizations can prevent file exfiltration, enhance regulatory compliance, secure sensitive information, and enable the cornerstone of a full-fledged zero trust infrastructure.

Spotlight

Für Cyberkriminelle stellen Managed Service Provider (MSPs) wertvolle Ziele dar. Nach der erfolgreichen Attacke auf die Cyber Security eines einzigen MSPs können Angreifer die Daten aller Kunden dieses Unternehmens abgreifen. Wie aktuelle Nachrichten zeigen, sind diese Angriffe für Cyberkriminelle äußerst lukrativ und für MSPs e

Spotlight

Für Cyberkriminelle stellen Managed Service Provider (MSPs) wertvolle Ziele dar. Nach der erfolgreichen Attacke auf die Cyber Security eines einzigen MSPs können Angreifer die Daten aller Kunden dieses Unternehmens abgreifen. Wie aktuelle Nachrichten zeigen, sind diese Angriffe für Cyberkriminelle äußerst lukrativ und für MSPs e

Related News

ENTERPRISE SECURITY, PLATFORM SECURITY, SOFTWARE SECURITY

Tenable Enhances Tenable OT Security to Provide the Broadest Coverage

Tenable | March 13, 2023

Tenable®, the Exposure Management company, announced unveiling new features within Tenable OT Security, delivering greater protection for operational technology (OT), industrial control systems and critical infrastructure, regardless of deployment size or environment configuration. The new feature keeps the CISO's organization front and center, making it easier to protect and maintain governance of the whole attack surface using the same tools and processes throughout their infrastructure, whether IT, OT, IoT, the cloud, or other platforms. Tenable is ideally positioned to assist its customers in meeting their security needs by offering an all-encompassing solution for securing mixed environments. This latest update enhances Tenable OT Security's vulnerability detection capabilities with an improvement to the OT active scanner and a tighter integration with Tenable's Nessus, the market-leading vulnerability scanning solution. Tenable OT Security now provides companies with unparalleled scanning capabilities by leveraging the technology relied upon by over 40,000 security teams worldwide. Key new capabilities include: Increased Asset Discovery and Visibility Advanced Vulnerability and Threat Detection Enhanced Dashboards and Reporting Amir Hirsh, General Manager of OT Security, Tenable, said, "We consistently hear from CISOs that they have been tasked with security for mixed environments that include both OT and IT technologies, but they don't have the requisite visibility to secure either well. The new capabilities added to Tenable OT Security provide our customers with full visibility, security and control of all their environments and assets, in one consolidated view." He added, "Now, our customers can leverage the full strength of Tenable OT active scanning, tightly integrated with embedded Nessus scans for IT assets, to create a clear view of all assets, their vulnerabilities, risk score, attack path analysis and more." (Source – Globe Newswire) This most recent upgrade also includes product localization abilities for Japanese, Chinese, French, and German, reducing training and support expenses for businesses operating in non-English speaking regions. About Tenable Headquartered in Columbia, MD, Tenable® is a leading company for Exposure Management. Tenable is relied upon by about 43,000 enterprises worldwide to comprehend and mitigate cyber risk. As the originator of Nessus®, Tenable leveraged its experience in vulnerabilities to provide the world's first platform capable of identifying and securing any digital asset on any computer platform. Over sixty percent of the Fortune 500, forty percent of the Global 2000, and significant government bodies are prospective clients of Tenable.

Read More

DATA SECURITY, PLATFORM SECURITY, SOFTWARE SECURITY

Orca Announces New Capabilities to Optimize Cloud Security and Cost

Orca Security | February 17, 2023

On February 16, 2023, Orca Security, a pioneer in agentless cloud security, announced that the Orca Cloud Security Platform now includes a cloud cost optimization framework, which assists organizations in reducing unnecessary cloud consumption and optimizing cloud costs while providing unrivaled security with the deepest and broadest visibility. By using its proprietary SideScanning™ technology, Orca is now applying unparalleled insights into cloud environments, thereby allowing organizations to track and manage cloud spend. Unlike other cloud cost management tools, Orca's platform has the ability to identify more opportunities for cloud cost savings by having a deeper understanding of cloud workloads and their operations. Despite considering cost efficiency a motivator for cloud adoption, several organizations are experiencing high expenses in their monthly cloud bills, mainly due to underutilization and forgotten cloud infrastructure resources. The 2022 State of the Cloud Report by Flexera indicates that organizations lose up to 32% of their monthly cloud expenses. Orca's Cloud Cost Optimization feature addresses the problem of wasteful cloud spending by continuously aggregating relevant alerts about unnecessary cloud infrastructure spending across all supported cloud service providers. These providers include Microsoft Azure, Amazon Web Services, Google Cloud, and Alibaba Cloud. In addition, the Orca platform simplifies the cost optimization process by categorizing alerts based on cloud infrastructure that is causing excessive spending, such as virtual machines, databases, keys, and load balancers, making deallocation quick and easy for organizations. Even though Stopped VMs on Google Cloud and AWS and deallocated VMs on Azure do not incur charges, many organizations are unaware that they still incur costs for the resources associated with those VMs until they are deleted. Orca assists organizations in recognizing resources attached to stopped or deallocated VMs to avoid incurring undesired charges, including Elastic IP addresses and EBS volumes on AWS, OS and data storage disks on Azure, and persistent disks and external IP addresses on Google Cloud. About Orca Security Founded in 2019, Orca Security is a leading global firm that provides agentless cloud security solutions to hundreds of enterprises. Its Cloud Security Platform can detect, prioritize, and fix security risks and compliance issues across cloud environments such as Azure, AWS, Google Cloud, and Kubernetes. The company's patented SideScanning™ technology and Unified Data Model make security possible for organizations moving to and scaling in the cloud and enable them to secure their cloud infrastructure while providing comprehensive coverage and visibility of all risks. With continuous first-to-market innovations, the Orca Platform ensures security teams can quickly identify and remediate risks, keeping businesses secure.

Read More

DATA SECURITY,PLATFORM SECURITY,SOFTWARE SECURITY

Mendix and Software Improvement Group Introduced a New Cybersecurity Solution

Mendix | January 24, 2023

Mendix, a Siemens business and world leader in modern enterprise app development, and Software Improvement Group (SIG), a unique technology and advisory firm for software quality, security, and improvement, have announced the launch of Mendix Quality & Security Management (QSM), a new cybersecurity solution that provides continuous deep-dive insights into security and code quality to address risks and vulnerabilities immediately. Sigrid®, SIG's software assurance guidance platform, powers Mendix QSM. It delivers a complete perspective on the effect of security findings on business goals by combining more than 20 top-tier security scanning technologies. With Mendix QSM, the users can scan their Mendix apps, including third-party libraries, for security flaws and incorrectly configured security models, rank for compliance with major industry standards such as OWASP, ISO 5055, and PCI, and receive risk mitigation recommendations and clear guidance. Mendix QSM is based on application model static analysis. SIG experts have mapped Mendix models to the ISO 25010 maintainability model using Mendix model metadata. This enables its applications to be compared against a database of thousands of projects, including open-source initiatives. Mendix QSM also presents a five-star rating of the quality of the software. About Mendix Mendix is an industry-leading low-code application development platform for enterprises. With Mendix, you can transform a spreadsheet into an app, establish a portfolio of enterprise-wide apps, and upgrade a core system, among other things. In addition, the platform provides continuous collaboration between software developers and users, speeds up the application development lifecycle, and enables iterative deployment at scale. As a result, businesses can rapidly develop modern, adaptable applications with a tool that maintains the highest levels of security, quality, and governance. The platform has been used by over 4,000 of the world's leading enterprises. Mendix is a division of Siemens. About Software Improvement Group (SIG) Software Improvement Group (SIG) assists companies in gaining confidence in the technology they trust. Its mission is to get the software right for a healthier digital world by combining intelligent technology with human expertise. It drills into the build quality of enterprise software and architecture by monitoring, measuring, and benchmarking it against the world's largest software analysis database. As a result, organizations can use software assurance to uncover the variables driving the total cost of ownership of the software and make fact-based decisions to lower costs, reduce risk, improve time to market, and accelerate digital transformation.

Read More