DATA SECURITY

Data Protection Platform, Protegrity to introduce dynamic monitoring and data masking capabilities

helpnetsecurity | June 11, 2021

Version 8.1 of Protegrity, the latest version of the Protegrity Data Protection Platform, is released. This has the features such as monitoring capabilities and dynamic data masking. It provides all the customers, from a single data store, multiple data-protection methods. The company has also introduced Protegrity Cloud API and a redesigned logging architecture.

Monitoring and dynamic data masking provide visibility and control for sensitive data access

With this functionality, version 8.1 of the Protegrity Data Protection Platform gives a greater level of control and choice to meet the data protection they need to run their business smoothly. Monitoring capabilities provide customers standard visibility into how data is being retrieved and used across the company. Customers can utilize dynamic data masking of Protegrity for a greater level of control over their sensitive data.

Unicode tokenization delivers language-preserving data security for global businesses

Unicode is a standard for the consistent handling, encoding, and representing text expressed in the world's writing systems. Protegrity, with version 8.1, now brings all the benefits of its tokenization to all text encoded in the one- and two-byte Unicode standards.

New cloud API and logging architecture enhance platform functionality

Along with new data-protection methods, including data masking, monitoring, and Unicode tokenization, version 8.1 of Protegrity has revealed the following essential platform enhancements:

• Protegrity Cloud API
• Redesigned logging architecture

Spotlight

The aim of this section is to verify that the advanced endpoint product is capable of detecting, preventing, and continuously logging threats accurately, whilst remaining resistant to false positives. This section utilizes real threats and attack methods that exist in the wild and that are being used by cybercriminals and other threat actors, based on attacks collected from NSS’ global threat intelligence network.

Spotlight

The aim of this section is to verify that the advanced endpoint product is capable of detecting, preventing, and continuously logging threats accurately, whilst remaining resistant to false positives. This section utilizes real threats and attack methods that exist in the wild and that are being used by cybercriminals and other threat actors, based on attacks collected from NSS’ global threat intelligence network.

Related News

DATA SECURITY

Kameleon Security and Xilinx Collaborate on New Cybersecurity Solution for Servers, Cloud Computing and Data Centers

businesswire | November 10, 2020

Kameleon Security, a semiconductor startup with an advanced hardware cybersecurity platform for computing systems, today announced a collaboration with Xilinx, Inc. as well as plans to release a new cybersecurity product, the Kameleon ProSPU. The ProSPU is a state-of-the-art, Open Compute Project (OCP)-compliant cyber protection chip for servers, data centers and cloud computing. OCP is an open standards organization, and the Security workgroup is developing specifications for data center security. At this week’s OCP Tech Week virtual event, OCP will release Version 1.0 specification for Root of Trust (RoT), which includes security documents for secure boot, attestation and common threats scope.

Read More

DATA SECURITY

Living Security Hosts a Panel of Industry Experts to Discuss Emerging Threats

Living Security | May 27, 2021

Living Security, a pioneer in Human Risk Management and a cybersecurity awareness training leader, is proud to host this year's Breaking Security Awareness Conference 2021, which will be held virtually on Thursday, June 24, 2021. The free event will educate business, IT, and security leaders on the most recent threats emerging in our increasingly digital world, as well as explain how effective training can protect employees both at work and at home. The conference will include a panel of industry thought leaders who will discuss topics such as: • Human risk management • Social engineering • DEI in cybersecurity • Enterprise security awareness • Remote working security • Ransomware Among the speakers this year are executives from Amplitude, Cisco, CISO Series, Forrester, LARES, National CyberSecurity Alliance (NCSA), Netflix, Social Engineer, and Yass Partners. About Living Security The objective of Living Security, which was founded in 2017, is to help prevent cybersecurity breaches by providing a human risk management platform that does more than just meet compliance requirements. It has a real effect on behavior. Living Security believes that empowering individuals is the key to putting an end to breaches. Gamified learning and immersive experiences engage and educate users, while the science-backed, tech-enabled platform enables CISOs to measure efficacy and program ROI uniquely. The Living Security team named one of Austin's Best Places to Work is made up of 50+ cybersecurity professionals dedicated to redefining security awareness training as we know it and transforming end-users into the enterprise's greatest asset against cybercrime. CVS Health, MasterCard, Verizon, MassMutual, Biogen, AmerisourceBergen, Hewlett Packard, JP Morgan, and Target are among the companies that rely on Living Security.

Read More

DATA SECURITY

Owl Cyber Defense improves advanced network security capabilities with Trident Assured Collaboration Systems Acquisition

prnewswire | January 05, 2021

Owl Cyber Defense Solutions, LLC ("Owl"), a worldwide market pioneer in online protection arrangements and administrations for safeguarding network limits and empowering secure information sharing across areas, reported today the obtaining of the Trident Assured Collaboration Systems ("ACS") product offering. ACS has the solitary U.S. government-affirmed Voice over IP ("VoIP") and Video Teleconference ("VTC") Cross Domain Solution ("CDS") just as the business' most exceptional Full Motion Video ("FMV") sifting ability – usefulness basic to CDS activities in a time of robots and cameras. The obtaining gives Owl a more extensive scope of guaranteed network border guard arrangements than any rival on the lookout. Owl, upheld by private speculation firm DC Capital Partners, has been a main supplier of CDS to the U.S. Branch of Defense ("DoD") and Intelligence Community for over 20 years. Owl is likewise the worldwide pioneer in network safety assurance for basic framework, offering the solitary U.S. government tried and certify CDS accessible for organization inside and outside the U.S to both government and business customers. Owl's Cross Domain Solutions offer the most elevated level of organization edge security, far surpassing the capacities of firewalls and other ordinary organization protections. Owl's items are the decision for ensuring the country's most delicate organizations and frameworks against assault. Ongoing episodes have exhibited the failure of inheritance firewalls to forestall cyberattacks against basic business and working frameworks and cloud-based applications. The blend of Owl and ACS's innovation offers a full continuum of CDS items that give equipment upheld space partition and layers of information separating confirmation instead of a solitary organization line checkpoint with insignificant substance sifting. Arrangements like firewalls that worked 25 years back as an organization insurance approach are not, at this point compelling against country state quality assaults. As country state assaults increment, the methodologies utilized by state entertainers start to saturate the criminal side of cyberattacks. Powerful network safety presently requires a coordinated, multi-layered framework with information diode equipment parts in gatekeepers which perform escalated information assessment and confirmation. The up and coming age of insurance, coming out now and based on a mix of Owl and ACS innovation, installs CDS usefulness in incredibly low-inactivity, unmodifiable equipment. Thomas J. Campbell, Chairman of Owl and Founder and Managing Partner of DC Capital, said, "This is another step in executing our strategic vision. The acquisition of ACS not only places Owl ahead of other Cross Domain Solution providers, but it also plays a pivotal role in our larger strategy to offer true cybersecurity protection. The future requires solutions that are cost effective and easy to implement, use, and maintain." "The explosion of the Internet of Things ("IoT") demands cyber-secure devices, from those that control our critical infrastructure, to our homes and cars," said Campbell. "The technology Owl pioneered 20 years ago is now available in form factors small enough to be embedded inside devices. Owl has always been an early mover, the first to develop hardware-enforced network protection and now the first to offer a hardware-enforced CDS that can be embedded." "Owl has been rapidly moving towards this number one position for the last couple of years," commented Robert Stalick, President and CEO of Owl. "With the addition of ACS, the last piece has fallen into place. Owl is now the clear leader in accredited Cross Domain Solution offerings, with the widest range of capabilities and products – solving problems from tactical to enterprise in data, voice, and video; for government, critical infrastructure and commercial enterprises." Jerry B. Chernock, Partner at DC Capital, added, "Clearly we need to address the deficiency of firewalls. There is a motivation behind why our customers demand Cross Domain Solutions and not exclusively on firewalls. Late assaults, including a security break at an unmistakable U.S. based network protection firm and a few U.S. Government organizations, have accentuated the requirement for knowledge, military, basic framework and corporate customers to rapidly develop how they secure their organizations." "The sophistication of these technologies cannot be overstated," said Ken Walker, Chief Technology Officer at Owl. "The U.S. Government continues to set the standards for the most rigorous operational requirements and testing regimes globally, setting expectations that very few companies can meet. Owl is one of a handful of elite companies that satisfies the government-established 'Raise the Bar' requirements." About Owl Cyber Defense Solutions Owl has been serving the cybersecurity needs of the U.S. government since inception – providing hardware-enforced cybersecurity controls, industry leading expertise in operating system hardening, extensive device and network-based assessment services and thought-leadership in filtering/data processing disciplines. Owl Cross Domain Solutions are operating broadly in missions across both the DoD and the U.S. intelligence agencies. Globally Owl is the leader in perimeter protection for nuclear power plants, oil and gas operations, renewables and power generation and transmission, with aggressive growth occurring in the data center and cloud provider sectors. Owl continues to innovate and is bringing to market the world's first embeddable cybersecurity to serve the Internet of Things ("IoT").

Read More