Data Security

CyberMDX and Alphatron Medical to Partner for Improving Data Security in Healthcare Sector Worlwide

CyberMDX | June 29, 2021

CyberMDX, a leading healthcare cybersecurity provider, works in delivering visibility and threat prevention for clinical networks and medical devices, and  Alphatron Medical, has announced its  partnership to support manage risks in cybersecurity and protect the workflow of data for customers of Alphatron Medical.

Due to the augmented digitization of hospitals, Alphatron Medical offers data workflows, various IT solutions,   and medical workwear, enabling professionals in healthcare to work comfortably and smoothly throughout the entire process of care. The company's integrated approach helps healthcare delivery organizations (HDOs) manage progressively complex healthcare IT environments of today. As it serves hospitals in the Netherlands, Belgium, and Germany, the solutions of Alphatron help maximize their customers’ IT systems and enable healthcare providers to concentrate more on caring for patients.

Electronic personal health information (ePHI) value has dramatically increased cyber-attacks against healthcare organizations. As a result, it has underlined the criticality of cybersecurity as a constituent of any healthcare administration's IT strategy. The corporation will help progress the superiority of security for Alphatron's customers, using CyberMDX's Healthcare Security Suite to confirm the data security of Alphatron's data management solutions. CyberMDX's solution offers endpoint perceptibility, network threat deterrence, and functioning analytics to any linked medical, IT, or IoT devices.

About CyberMDX

CyberMDX, an IoT security leader, is dedicated to ensuring the quality of providing healthcare worldwide. CyberMDX offers cloud-based cybersecurity solutions that assist the progression of The IoT. The CyberMDX solution recognizes endpoints and judges susceptibilities to notice, respond to, and stop cyber occurrences. Deployed worldwide, CyberMDX is designed to integrate with our customers' existing environments through its easy-to-deploy, scalable, and agentless solution.

Spotlight

VMware, a global leader in cloud computing and virtualization technology uses MetaAccess from OPSWAT to ensure tens of thousands of remote users can access VMware's Horizon cloud software with devices that meet strict security standards. MetaAccess provides a zero trust access solution

Kristina de Nike, Director of Product Management, Horizon, discusses how OPSWAT's MetaAccess is able to detect and remediate endpoints at scale.

Spotlight

VMware, a global leader in cloud computing and virtualization technology uses MetaAccess from OPSWAT to ensure tens of thousands of remote users can access VMware's Horizon cloud software with devices that meet strict security standards. MetaAccess provides a zero trust access solution

Kristina de Nike, Director of Product Management, Horizon, discusses how OPSWAT's MetaAccess is able to detect and remediate endpoints at scale.

Related News

Enterprise Security, Platform Security, Software Security

Identiv Simplifies Cyber-Secure Access Control with Primis

Business Wire | July 31, 2023

Identiv, Inc. (NASDAQ: INVE), a global leader in digital security and identification in the Internet of Things (IoT), introduces Primis, a suite of access control solutions designed for every security need. Primis offers secure, affordable, and ready-to-use security solutions straight out of the box, streamlining access control for businesses of all sizes. The suite features Primis on-premises access control, Primis Cloud, Primis Mobile, and the EG-2 controller. By transforming traditional physical access control systems into user-friendly, cyber-secure solutions, Primis simplifies security. Ideal for small to medium-sized setups, the Primis suite ensures quick installation, minimal training, and easy maintenance. It delivers superior security and reliability at the lowest possible cost, already proven across over 500 deployments to date. “Primis isn't your parent's access control. It's designed for today's SMBs and future-focused organizations; this is our vision for the future of access control where complexity is no barrier and where high security is accessible to everyone,” said Mike Taylor, VP Global Sales, Identiv. “With Primis, access control is always ready, making security simple and easy to use.” The Primis suite includes: Primis: On-site access control hardware and software transforms security with robust, feature-rich technology. It integrates seamlessly with IT networks, eliminating complex configurations and potential vulnerabilities, resulting in enhanced, reliable access control at a lower cost. Primis Cloud: This flexible, secure access control as a service (ACaaS) offering delivers a cloud-based, subscription service version of Primis that minimizes maintenance. Housed in Identiv’s secure AWS virtual environment, Primis Cloud provides 24/7, interruption-free access control. Primis Mobile: The app leverages GPS technology to replace physical credentials with an innovative mobile solution, simplifying access control management through an easy mobile enrollment process. EG-2: A robust mix of power, flexibility, and security, EG-2 is a smart controller that allows door access management from anywhere. It provides a resilient solution that adapts to business needs, even in the event of server disconnections. “Today's launch underscores Identiv’s commitment to delivering top-tier service, security, and support to our partners,” Taylor added. “We invite potential partners to join our global network and benefit from our world-class program.” The Primis suite is exclusively available worldwide through the Identiv Channel Alliance Network (ICAN) partner program. ICAN Partners enjoy numerous benefits, including product discounts, access to comprehensive technical support, sales leads, authorized dealer certificates, co-branded marketing materials, and instant 24/7 access to sales tools and technical resources. About Identiv Identiv, Inc. is a global leader in digitally securing the physical world. Identiv’s platform encompasses RFID and NFC, cybersecurity, and the full spectrum of physical access, video, and audio security. Identiv is a publicly traded company, and its common stock is listed on the NASDAQ Stock Market LLC in the U.S. under the symbol “INVE.” For more information, visit identiv.com.

Read More

Data Security

Oracle Attempts to Design New Open Network and Data Security Standard

Oracle | September 20, 2023

Oracle to participate in an industry-wide initiative to design a new open network and data security standard. Oracle and Applied Invention are assisting to developing and promoting a novel network and data-centric security standard to tackle distributed cloud deployment challenges. This standard will enable organizations to protect their data throughout its entire lifecycle without requiring modifications to their distributed cloud environments' underlying architecture. Oracle, one of the world's largest database management companies, announced that it will participate in an industry-wide initiative to design a new open network and data security standards that will assist organizations in protecting their data in distributed IT environments. Oracle will collaborate with Applied Invention, a significant technology provider, and other industry leaders, including Nomura Research Institute, Ltd. (NRI), a global leader in consulting and system solutions. This new standard will enable networks to enforce shared security policies collectively, thereby augmenting the security architecture organizations already employ without requiring modifications to existing applications and networks. Oracle plans to launch the Oracle Zero-Trust Packet Routing Platform, based on the new standard, to support this new initiative. This platform will assist organizations in preventing illegal access or use of their data without imposing additional obstacles on legitimate activities. Executive Vice President of Security and Developer Platforms at Oracle Cloud Infrastructure, Mahesh Thiagarajan, said, Over the last 20 years, the cybersecurity industry has produced many incremental changes, but we need a fundamentally novel approach to protect our data in the increasingly complex cloud era. Organizations require a way to describe their data security policies in one place where they can be easily understood and audited, and they need a way to make sure those policies are enforced across their entire computing infrastructure, including their clouds. [Source – Cision PR Newswire] As the adoption of cloud technology rises and IT landscapes become more intricate with distributed cloud deployments, organizations face escalating challenges in safeguarding their data using conventional methods and tools. For example, many existing systems necessitate security teams to orchestrate disparate solutions across various facets, including database, application, network, and identity security. This complexity is further compounded when applied across diverse environments. Ensuring seamless collaboration among these solutions becomes a formidable task due to the dynamic and independent changes in applications, environments, and user profiles. Additionally, current security systems demand extensive configurations to accurately distinguish between different user categories, such as full-time employees and contractors, without compromising security or restricting access. Research Vice President of Cloud and Edge Infrastructure Services at IDC, Dave McCarthy, said, The new standard Oracle develop has the potential to change all of that by adding a unified layer of security on top of existing solutions. Building data protection policies into the network itself will assist users get the access they require while ensuring the data remains secure behind the scenes. [Source – Cision PR Newswire] Oracle and Applied Invention are assisting in designing and promoting a novel security standard, focusing on network and data-centric security, which aims to tackle these challenges. This innovative standard will empower organizations to safeguard their data across its entire lifecycle, including distributed cloud environments. To accomplish this, the standard will implement an intent-based security policy that is designed to be understandable, auditable, and interpretable by humans. This intent-driven approach will be put into practice at the network layer, ensuring that every data transmission contains authenticated attributes concerning the sender, receiver, and the nature of the data in transit.

Read More

Cloud Security

IBM Broadens its Cloud Security Services and Compliance Center

IBM | September 08, 2023

IBM has announced the expansion of its Cloud Security and Compliance Center to help enterprises protect data and mitigate risk across their hybrid, multi-cloud environments and workloads. With the addition of the latest solutions, IBM's solution suite now goes beyond compliance posture management and workload protection. It now includes application-level security capabilities. IBM Cloud Security and Compliance Center suite offers benefits, including intelligent automation technology, expanded compliance, and visibility into third- and fourth-party risk posture, among others. IBM, a global technology innovator at the forefront of automation, AI, and hybrid cloud solutions, has unveiled the expansion of the IBM Cloud Security and Compliance Center. This suite offers a range of updated cloud security and compliance solutions carefully designed to aid enterprises in mitigating risk and safeguarding data within their hybrid, multi-cloud environments and workloads. As organizations grapple with emerging threats along the supply chain and navigate evolving global regulations, this solution suite stands as a pillar of support for their resilience, performance, security, and compliance requirements, all while aiding in the reduction of operational costs. IBM's newly introduced Cloud Security and Compliance Center Data Security Broker solution offers a transparent data encryption layer. It utilizes format-preserving encryption and anonymization technology to safeguard sensitive data used in business applications and AI workloads. Rohit Badlaney, General Manager at IBM Cloud Product and Industry Platform, said, The expansion of the IBM Cloud Security and Compliance Center displays our continued focus on industry-specific capabilities that assist in addressing real world business challenges for our clients. For ex., clients have the ability to employ the IBM Cloud Framework for Financial Services, which can enable them to address evolving rules, laws and regulations surrounding cloud risk. The new capabilities demonstrate our commitment to supporting clients on their hybrid cloud modernization journeys, designed for security, privacy, compliance, and trust at the forefront of our product roadmap. [Source – Cision PR Newswire] IBM Cloud has a long history of working with client companies in financial services and other highly regulated sectors, especially when it comes to assisting them to drive innovation while securing their sensitive data, added Badlaney. In combination with the IBM Cloud Security and Compliance Center Data Security Broker, the upgraded suite of the IBM Cloud Security and Compliance Center will introduce a number of new features. These additions are intended to aid clients, especially those operating in regulated industries, in meeting security, compliance, and data residency requirements specific to their industry. Key features due to the expansion of IBM Cloud Security and Compliance Center: Intelligent automation technology Expanded compliance Enhanced Cloud Security Posture Management (CSPM) Optimized Cloud Workload Protection Platform (CWPP) Improved Cloud Infrastructure Entitlements Management (CIEM) Enhanced visibility into third- and fourth-party risk posture Frank Dickson, VP of Security and Trust at IDC, said, As more companies adopt a hybrid, multi-cloud approach to managing applications of all sorts across PaaS, SaaS, IaaS and on-premises, centrally automated and managed technologies that can execute security and compliance capabilities at scale are required. The IBM Security and Compliance Center addresses this requirement for holistic protection – which is especially crucial for organizations in highly regulated sectors that manage sensitive data, such as financial services – regardless of the application within which the data may live. [Source – Cision PR Newswire]

Read More