DATA SECURITY, PLATFORM SECURITY, SOFTWARE SECURITY

BeyondTrust Introduces New Intelligent Identity and Access Security Platform

BeyondTrust | August 23, 2022 | Read time : 02:50 min

BeyondTrust
BeyondTrust, the leader in intelligent identity and access security, today announced the BeyondTrust Platform, featuring a modern architecture that delivers unprecedented visibility of identities and access across an organization’s entire digital estate, from on-premises to cloud, hybrid and operational technology environments. The BeyondTrust Platform delivers the most powerful intelligent identity and access security through an elegant, unified platform and interface that removes friction and drives unparalleled insights for organizations of all sizes.

Today, organizations are being asked to do more with less, while facing an expanding threat landscape. They know they cannot solve emerging security problems with a disjointed patchwork of solutions or a poorly integrated ecosystem.

“Our customers have told us they want a single platform that removes complexity and the risk created by fragmented infrastructure,” said Raj Cherukuri, Chief Product Officer at BeyondTrust. “They need solutions that accelerate time to value with easy deployments and deliver a robust set of common capabilities to reduce security risk, while accelerating their digital transformation initiatives.”

The BeyondTrust Platform leverages a single interface to discover, manage, and protect identities, control access, as well as proactively detect anomalous activity. This new solution reduces complexity and management burden through a revolutionary single agent approach and unified management console across all BeyondTrust apps. Along with the platform, BeyondTrust also announced:

  • BeyondTrust’s new Endpoint Security App, a modern privilege management solution that enables better policy management, access control, aggregated application monitoring, and threat detection; these integrated capabilities prevent attackers from elevating privileges, mitigating cyberattacks.
  • The initial release of BeyondTrust’s new Cloud Privilege Manager App, which provides visibility and management of entitlements across multicloud environments from a single pane of glass. Together, with the Endpoint Security App, it enables broad visibility of identities across an organization’s on-premises and cloud footprint.

By adopting a natively integrated and unified solution for identity and access security, organizations can better tackle existing use cases and expand to emerging ones, further reducing their attack surface. The BeyondTrust Platform provides a unified view of an organization’s identity landscape. This visibility helps organizations:

  • Better manage, control, and protect their identity landscape
  • More effectively control access to critical resources
  • Easily meet security and compliance targets

Key features and benefits include:

  • Breakthrough User Experience – Unprecedented ease of use by leveraging natively integrated common capabilities, which can be activated as needed with a new trial and self-service approach
  • Unified Management – A single console and unified dashboard deliver navigation, management, and reporting across all apps
  • A Universal Agent – Streamlined deployment and straightforward maintenance with automatic installs and upgrades with no reboot required
  • Asset Discovery – Gain unified cross domain visibility with scanning across the entire environment
  • Unified Policy Management - Proactively manage drift with a policy advisor, a common policy framework, out-of-the-box policy templates and version control
  • Centralized Reporting - Leverage information holistically across apps to support better decision-making, with easy customization options
  • Holistic Visibility – Gain insight into privileges in use across the entire IT environment – on-premises, cloud, hybrid
  • Identity Security Insights – Use identity-centric and cross app analytics for better decision making and prevent problems before they happen
  • Health Monitoring – Keep track of the health and status of your endpoints and assets with proactive analytics
  • Multitenant Deployment – Create multiple tenants within a deployment with complete isolation to match the organization’s structure

About BeyondTrust
BeyondTrust is the worldwide leader in intelligent identity and access security, empowering organizations to protect identities, stop threats, and deliver dynamic access to empower and secure a work-from-anywhere world. Our integrated products and platform offer the industry's most advanced privileged access management (PAM) solution, enabling organizations to quickly shrink their attack surface across traditional, cloud and hybrid environments.

Spotlight

As part of the IBM Security Ready for Security Intelligence Ecosystem, Trend Micro offers a malware sandboxing solution integrated with IBM Security QRadar SIEM to help protect your network and valuable data. Partha Panda, VP of Corporate and Business Development for Trend Micro explains how integration between the two offerings supports cooperation for collaborative defense. Learn more about how the IBM Security App Exchange platform helps clients reach a wealth of security solutions and extend those capabilities to support crowd-sourced protection.

Spotlight

As part of the IBM Security Ready for Security Intelligence Ecosystem, Trend Micro offers a malware sandboxing solution integrated with IBM Security QRadar SIEM to help protect your network and valuable data. Partha Panda, VP of Corporate and Business Development for Trend Micro explains how integration between the two offerings supports cooperation for collaborative defense. Learn more about how the IBM Security App Exchange platform helps clients reach a wealth of security solutions and extend those capabilities to support crowd-sourced protection.

Related News

DATA SECURITY, PLATFORM SECURITY

Privacera Expands Google Cloud Capabilities with Latest Release to Dataproc to Provide Enterprise-Grade Data Security Governance

Privacera | October 11, 2022

Privacera, the only open-standards based data security governance leader founded by the creators of Apache Ranger™, today announced native support for Dataproc. This integration allows users to define and enforce fine-grained level access control to Dataproc with Apache Hive, Apache Spark, and Presto. Privacera already natively integrates and supports a number of Google Cloud Platform (GCP) services such as BigQuery and Google Cloud Storage. Privacera helps enterprise data teams protect sensitive data and enable privacy across all on-premise, hybrid and multi-cloud data sources while reducing time to insights by automating outdated, manual governance processes. With the availability of Privacera's native integration to Dataproc, organizations will be able to accelerate their migration to GCP by securely managing data access policies across diverse on-premise and GCP data sources. This will significantly reduce the efforts around data migrations to the cloud through increased automation and consistent policy management, and the ability to ensure compliance through an open, consistent and proven standard. For users of Apache Ranger who are looking to build new secure data applications in the cloud, with Privacera, they can now leverage the same security and governance capabilities that they are familiar with to more sources, at enterprise scale, and greater functionality, since Privacera is based on Apache Ranger open standards. "Expanding the sources that we support and contributing to the Apache Ranger community increases the ability for our customers to leverage their existing investments in secure and consistent data access policies. "Our customers, including a large consumer credit reporting agency that uses GCP and Privacera as part of their modern data stack, can now extend their capabilities to discover and secure sensitive data sets across numerous GCP data services while migrating safely to the cloud." Privacera CEO Balaji Ganesan Privacera offers Dataproc users the following extended privacy and governance capabilities: Centralized management and enforcement of tag-based data access control policies across GCP and other cloud data services Policies for fine-grained access controls for Apache Hive, Apache Spark,and Presto Customizable, out-of-the-box compliance, audit, and governance reports for CCPA, GDPR, LGPD, HIPAA, RTBF, and more Dynamic encryption, decryption, and masking (column masking and row filtering) Broad integrations with identity management systems like corporate AD/LDAP, Okta, and SCIM SOC 2 Type 2 compliant, enterprise-grade SaaS data access governance solution that can be configured in minutes Hardened deployment of Apache Ranger with high-availability About Privacera Founded in 2016 by the creators of Apache Ranger™, Privacera's SaaS-based data security and access governance platform enables data and security teams to simplify data access, security, and privacy for data applications and analytical workloads. The Privacera platform supports compliance with regulations such as GDPR, CCPA, LGPD, and HIPAA. Privacera provides a unified view and control for securing sensitive data across multiple cloud services such as AWS, Azure, Databricks, GCP, Snowflake, and Starburst. The Privacera platform is utilized by Fortune 500 customers across finance, insurance, life sciences, retail, media, and consumer industries, as well as government agencies to automate sensitive data discovery, mask sensitive data, and manage high-fidelity policies at petabyte scale on-premises and in the cloud.

Read More

DATA SECURITY,ENTERPRISE SECURITY,SOFTWARE SECURITY

Veza Announces Open Authorization API to Extend Identity-First Security Across the Enterprise Data Landscape

Veza | December 02, 2022

Veza today announced that its Open Authorization API (OAA) is now public on GitHub for community collaboration, extending the reach of identity-first security across the enterprise. Developers can now create and share connectors to extend the Veza Authorization Graph to all sensitive data, wherever it lives, including cloud providers, SaaS apps, and custom-built internal apps, accelerating their company’s path to zero trust security. Security professionals espouse the principle of ‘Least Privilege’ to secure enterprise data, but the rush to a multi-cloud, multi-app environment has exploded the complexity and layers of interconnection for which access must be understood, monitored, and constantly remediated to achieve and maintain least privilege. Recent attacks on Okta and Twilio demonstrate that companies are allowing overly-broad access to data via constructs of groups, roles, policies, and system specific permissions. Veza connects the dots of effective permissions across cloud providers, SaaS apps and identity platforms, making it easy to visualize who can view or delete sensitive data. OAA allows organizations and the broader community to create their own integrations with Veza, extending visibility to any resource, including SaaS apps like GitLab and Jira as well as custom-built internal apps. “The vast majority of cybersecurity failures are rooted in issues with the gap that exists between identity, access to data, and permissions,” said Tarun Thakur, co-founder and CEO, Veza. “Since our founding, we have been committed to protecting our customers from threats like ransomware, privilege abuse, and data breaches. With Veza Open Authorization API, we are extending our identity-first security approach broadly in the market and arming organizations with the tools they need to remediate undesirable and unnecessary data access at a granular level, and meet the requirements of access governance for enterprise systems, both on-premises and in the cloud." With Veza's Open Authorization API, customers can translate and visualize authorization metadata from any SaaS app, custom and in-house applications. Users can explore identity-to-data relationships through the Authorization Graph, monitor for least privilege misconfigurations and violations, and conduct comprehensive entitlement reviews for all of their sensitive data. “We specifically chose Veza because their Open Authorization API allowed us to connect to our custom internal applications. We follow the principle of least privilege, but with so many systems to review, we valued Veza’s unique ability to give us a comprehensive view quickly. They made it faster and easier for our team to review all permissions with confidence.” -Riaz Lakhani, CISO of Barracuda Networks. As an open-source project on GitHub, Veza’s Open Authorization API allows customers and partners to learn from, and build upon, each other’s work to create a control plane that reaches all data. By bringing OAA SDK and connectors available on GitHub Community, Veza empowers customers to ingest authorization metadata previously isolated in internal systems and SaaS applications. The OAA community has already created integrations for critical SaaS apps including GitHub, GitLab, Bitbucket, Jira, Zendesk, Slack, Coupa Software, Pagerduty, and Looker. These integrations are available now to all Veza customers. “Veza solves the problem of aligning identities to data,” said Craig Rosen, Chief Security & Trust Officer at ASAPP. “Veza’s Open Authorization Platform helped us extend that visibility to all the apps and data that matter most to us, like GitHub and Jira. Now it is easy for our security professionals to understand (and remediate) who has access to our important intellectual property.” About Veza Veza is the authorization platform for data. Built for hybrid, multi-cloud environments, Veza enables organizations to visualize, remediate, and control who can and should take what action on what data. We empower customers to take an identity-first approach to secure data by addressing critical business needs of streamlining identity and access governance, implementing data lake security, managing cloud entitlements, and modernizing privileged access. Our Authorization Graph connects identities to data across enterprise systems, enabling analysis, monitoring, and certification of end-to-end access. Global enterprises like Blackstone, ASAPP, Barracuda Networks, Choice Hotels, and a number of Fortune 500 and emerging organizations trust Veza to secure their enterprise data. Founded in 2020, Veza is headquartered in Los Gatos, California, and is funded by Accel, Bain Capital, Ballistic Ventures, GV, Norwest Venture Partners, and True Ventures.

Read More

DATA SECURITY,PLATFORM SECURITY,SOFTWARE SECURITY

Cymulate Integrates with the Trend Micro Vision One XDR Platform

Cymulate | December 07, 2022

Cymulate, the market leader in Threat Exposure Assessment and Cybersecurity Controls Validation, today announced a new technology integration with Trend Micro, a global cybersecurity leader, which reduces risk related to cyber threats. In addition to joining the Trend Micro Vision One ecosystem partner program, the company has completed the technology integration of its cybersecurity risk validation and exposure management solution with the Trend Micro Vision One XDR platform. The collaboration will correlate simulated attacks with ongoing events and alerts, enhancing the security control environment and management against malicious behavior and real and simulated malware. Today's malicious actors are becoming increasingly sophisticated in their execution of attacks. As a result, organizations must have measures in place to protect their network and ensure they are constantly monitoring their environment for new threats. Together, the integrated Cymulate and Trend Micro Vision One XDR solution provides comprehensive protection against cyber threats and strengthens an organization's security posture with the following benefits: Automated and continuous security validation across the entire attack kill-chain Ongoing simulation that operationalizes the MITRE ATT&CK framework Creating auto remediation playbooks to new threats and attack vectors Configuration of Trend Micro's XDR policies to Cymulate's actionable remediation guidance "Cyberattacks are not showing any signs of slowing down and need a united front from security providers to combat them. "We are delighted to be partnering with Trend Micro so that businesses can better understand any weaknesses in their security posture and optimize their existing security infrastructure to better protect their organizations." Carolyn Crandall, chief security advocate at Cymulate "Security validation is an essential step for organizations to take towards cyber resilience," said Jon Clay, vice president of threat intelligence at Trend Micro. "Integrating our solutions with Cymulate is an exciting milestone for us. This new offering will significantly strengthen the risk assessment capability and provide enhanced seamless protection for mission-critical environments through ongoing simulated attacks deployed alongside events and alerts coming from Trend Micro." Cymulate's platform is recognized for its ability to continuously test a business's security posture against immediate threats and to validate whether security controls are functioning properly to stop in-network activities tied to execution methods, OS manipulation, data manipulation, lateral movement, data exfiltration, and other actions that inform on how bad the incursion or breach might be. The breadth and depth of this platform have earned it recognition as the gold standard for continuous threat exposure management (CTEM) programs, an emerging security program that was coined by Gartner, Inc. About Cymulate Cymulate's continuous risk validation and exposure management platform provides security professionals with the ability to continuously challenge, validate and optimize their on-premises and cloud cyber-security posture with visualization end-to-end across the MITRE ATT&CK® framework. The platform provides automated, expert and threat intelligence led risk assessments that are simple to deploy and use for organizations of all cybersecurity maturity levels. It also provides an open framework to create and automate red and purple teaming by generating penetration scenarios and advanced attack campaigns tailored to their unique environments and security policies. About Trend Micro Trend Micro, a global cybersecurity leader, helps make the world safe for exchanging digital information. Fueled by decades of security expertise, global threat research, and continuous innovation, Trend Micro's cybersecurity platform protects hundreds of thousands of organizations and millions of individuals across clouds, networks, devices, and endpoints. As a leader in cloud and enterprise cybersecurity, the platform delivers a powerful range of advanced threat defense techniques optimized for environments like AWS, Microsoft, and Google, and central visibility for better, faster detection and response. With 7,000 employees across 65 countries, Trend Micro enables organizations to simplify and secure their connected world.

Read More