DATA SECURITY

Elisity to Close $26-Million Round for Cognitive Trust CyberSecurity Platform

Elisity | June 17, 2021

The new platform for behavior and identity-based enterprise cybersecurity, Elisity, Inc., the pioneer of Cognitive Trust™, has announced a Series A funding round totaling $26 million. It is co-led by AllegisCyber Capital and Two Bear Capital. Atlantic Bridge, the previous seed investor, is participating.

The present subsidizing will scale Elisity to satisfy customer needs for its cloud-delivered cybersecurity stage that can investigate the identity and context of individuals, applications, and gadgets—including IoT and OT—any place they're working. The platform can comprehend, engage and progressively adjust security from the edge to the cloud by learning conduct to review hazards, consequently and constantly streamline security assurance.

Elisity is the principal organization to offer a solitary online protection stage that is adequately astute to see how resources and individuals associate past corporate edges and powerfully adjust security for each client, gadget, information, and application from the edge to the cloud. Elisity's Cognitive Trust stage wires character and AI-driven social insight to ceaselessly evaluate hazard and quickly upgrade access, availability, and security arrangements that follow resources and individuals any place they go. Elisity helps endeavor class associations, everything being equal, and ventures get through the present siloed systems administration and-security bunch difficulties by incorporating resource the board, availability, and security.

Three co-founders began Elisity: Burjiz Pithawala, chief product officer; Sundher Narayan, chief architect; and Srinivas Sardar, vice president of engineering, who all previously held leadership roles product development, engineering, and architecture at Cisco. The chief group is driven by James Winebrenner, CEO, who drove the go-to-market procedure for Viptela from pre-dispatch through the deal to Cisco in 2017, having additionally held influential leader positions at Cisco, Aviatrix, and Checkpoint Software.

Strategic advisors include security and networking leaders such as Greg Akers (former SVP Advanced Security Research and Governments at Cisco), Khalid Raza (co-founder of Viptela and CEO and founder of Graphient), Brian Long (co-founder and managing partner at Atlantic Bridge and on Elisity's Board of Directors), and Jeff Tantsura (Internet Architecture Board). Spencer Tall and Mike Goguen will join Brian Long on the Elisity board due to today's transaction.



About Elisity

Elisity understands behaviors and identity to simplify connectivity, asset and user access, and security from the initiative edge to the cloud. Elisity invented the AI-powered Cognitive Trust platform to learn behavior, measure risk enthusiastically, and promptly adapt apparent access policies for people, devices, data, and applications. Elisity is based in San Jose. The company is backed by AllegisCyber Capital, Two Bear Capital, and Atlantic Bridge.

Spotlight

The proliferation of disruptive technologies, heightened sensitivity to privacy issues and stronger regulations have raised the bar for information security. It's time for security functions to evolve from tactical firefighter to strategic business enabler. They need take a step back, understand where their information assets are, how they need to protect those, what various constituencies they need to account for ─ and take a circumspect view of security programs.
On this episode of Insights moderator Sean O'Grady speaks with Ed Powers and Irfan Saif, both principals with Deloitte and Touche LLP. Tune in to learn more about what organizations need to do to keep their data safe.
Category
News & Politics

Spotlight

The proliferation of disruptive technologies, heightened sensitivity to privacy issues and stronger regulations have raised the bar for information security. It's time for security functions to evolve from tactical firefighter to strategic business enabler. They need take a step back, understand where their information assets are, how they need to protect those, what various constituencies they need to account for ─ and take a circumspect view of security programs.
On this episode of Insights moderator Sean O'Grady speaks with Ed Powers and Irfan Saif, both principals with Deloitte and Touche LLP. Tune in to learn more about what organizations need to do to keep their data safe.
Category
News & Politics

Related News

SOFTWARE SECURITY

iboss Achieves FedRAMP Authorization for its Zero Trust Edge Cloud Security Solution

iboss, Inc. | July 29, 2022

iboss, the leading Zero Trust Edge cloud security provider, announces that it has obtained Federal Risk and Authorization Management Program (FedRAMP) Authorization. The achievement is reflective of the company’s commitment to work alongside federal agencies to protect government entities and civilians from growing and increasingly sophisticated cyberthreats. Earlier this year, the United States Office of Management and Budget unveiled a strategy designed to prevent damaging hacks and breaches by moving federal agencies toward a zero trust cybersecurity approach. The announcement followed a 2021 Biden Administration executive order aimed at protecting federal networks by modernizing government cybersecurity, including through the implementation of zero trust security architecture as defined in the National Institute of Standards and Technology (NIST). The iboss platform is a purpose-built, patented, cloud delivered security solution that has been trusted by organizations worldwide to implement Zero Trust architecture as laid out specifically in the NIST 800-207 Special Publication. The company’s containerized cloud architecture makes it the only platform that can control what NIST refers to as the “Implicit Trust Zone” to ensure that all data and resources are completely private. The FedRAMP authorization now extends iboss’s leading platform to all U.S. government customers. “Our Zero Trust Edge platform prevents breaches by making applications and data inaccessible to attackers while allowing trusted users to securely and directly connect to resources from anywhere. “In today’s work-from-anywhere world, protecting sensitive information, regardless of who is accessing it or where, is critical. We look forward to continuing to extend our platform and expertise to U.S. government agencies.” iboss CEO Paul Martini A Zero Trust Architecture built on iboss consolidates network security technologies (SWG, CASB, DLP, IPS, malware defense, browser isolation, firewall) into a single unified cloud platform and eliminates the need for a VPN while securing any device, regardless of location. By making all applications private, iboss eliminates the top three initial ransomware infection vectors as identified by the Cybersecurity and Infrastructure Security Agency (CISA). With applications, data and services made accessible only through the iboss Zero Trust Edge, cyber risk is greatly reduced, breaches and data loss are prevented, and visibility and security are delivered consistently throughout an organization. FedRAMP is a US government-wide program that provides a standardized approach to security assessment, authorization, and continuous monitoring for cloud products and services. About iboss, Inc. iboss is a cloud security company that enables organizations to reduce cyber risk by delivering a Zero Trust service designed to protect resources and users in the modern distributed world. Applications, data and services have moved to the cloud and are located everywhere while users needing access to those resources are working from anywhere. Built on a containerized cloud architecture, iboss delivers security capabilities such as SWG, malware defense, browser isolation, CASB and data loss prevention to protect all resources, via the cloud, instantaneously and at scale. This shifts the focus from protecting buildings to protecting people and resources wherever they are located. Leveraging a purpose-built cloud architecture backed by 230+ issued and pending patents and more than 100 points of presence globally, iboss processes over 150 billion transactions daily, blocking 4 billion threats per day. More than 4,000 global enterprises trust the iboss Cloud Platform to support their modern workforces, including a large number of Fortune 50 companies. iboss was named one of the Top 25 Cybersecurity Companies by The Software Report, one of the 25 highest-rated Private Cloud Computing Companies to work for by Battery Ventures, and CRN’s Top 20 Coolest Cloud Security Companies of 2022.

Read More

DATA SECURITY

Imperva Extends its Data Security Fabric to Include Enterprise Data Lakes Built on AWS

Imperva | July 27, 2022

Imperva, Inc., a comprehensive digital security leader, announces that its award-winning Imperva Data Security Fabric (DSF) now provides data-centric protection and compliance for enterprise data lakes built on Amazon Web Services (AWS). Imperva reinforces its commitment to securing data and all paths to it by allowing AWS customers to secure their data with one comprehensive platform, leveraging a unified security model across Amazon Aurora, Amazon Redshift, Amazon Relational Database Service (Amazon RDS), Amazon DynamoDB, Amazon Athena, and AWS CloudFormation without requiring any changes to their existing data infrastructure. Many security teams have gaps in their resources and domain expertise required to ensure their data lake meets organizational compliance and security policies. In particular, organizations must be able to simultaneously identify when a compromised user accesses sensitive data, while also preventing data from being stolen by malicious insiders. These gaps can mean that organizations must choose between limiting the data they store in a data lake, and putting themselves at risk of non-compliance, or in the worst-case scenario, a data breach. Many security teams have gaps in their resources and domain expertise required to ensure their data lake meets organizational compliance and security policies. In particular, organizations must be able to simultaneously identify when a compromised user accesses sensitive data, while also preventing data from being stolen by malicious insiders. These gaps can mean that organizations must choose between limiting the data they store in a data lake, and putting themselves at risk of non-compliance, or in the worst-case scenario, a data breach. Imperva DSF includes User Entity Behavior Analytics (UEBA) models that can identify suspicious data access patterns, such as excessive access to sensitive records, the use of privileged service accounts by interactive users, and suspicious network connections. This helps organizations automatically identify and detect potential data breaches without the need for specialized data security analysts. Finally, with Imperva DSF, security operations teams can create playbooks to automatically mitigate threats using native AWS features like security groups or revoking user access using AWS IAM. This ensures organizations stay in compliance while also helping to prevent data breaches. Comprehensive Data Security From one holistic dashboard, Imperva DSF delivers a broad range of data security capabilities – including data discovery, classification, monitoring, access control, risk analytics, compliance management, security automation, threat detection, and audit reporting. This makes it easier for customers to protect the migration of sensitive data, including Personally Identifiable Information (PII) like customer names, email addresses, phone numbers, and gender, and adhere to privacy regulations, such as the General Data Protection Regulation (GDPR), Payment Card Industry Data Security Standard (PCI-DSS), and the Health Insurance Portability and Accountability Act (HIPAA). Tens of thousands of organizations build data lakes on AWS and configure AWS Lake Formation, AWS Identity and Access Management (IAM), and Amazon Simple Storage Service (Amazon S3) policies to secure access to them. Imperva DSF leverages services like AWS Lake Formation and AWS Glue to discover data lakes, monitor how users query and access stored data, and detect and prevent malicious user access and data leakage incidents. Imperva DSF also safeguards critical data workloads across all of their databases, file repositories, data warehouses, multicloud, and data lake environments. Imperva Data Security Fabric can be deployed directly in any AWS Regions using pre-built AWS CloudFormation templates. Once deployed, Imperva DSF will begin discovering and monitoring data lakes. More than 400 pre-defined vulnerability assessment tests are available for cloud databases on AWS. Also, Imperva DSF takes the complexity out of deciding which baselines to establish by including policies based on Center for Internet Security (CIS) and Defense Information System Agency’s (DISA) Security Technical Implementation Guide (STIG) benchmarks that are adapted for the cloud. "AWS allows organizations to quickly and securely build solutions that help them to reach new markets and deliver new services to end users,” says Dan Neault, SVP and GM, Data Security, Imperva. “Imperva Data Security Fabric gives organizations building data lakes on AWS a streamlined experience for securing data, and confidence that their data lakes are in compliance.” About Imperva DSF on AWS The support of data lakes is the latest milestone in Imperva’s work with AWS. Imperva is an AWS Partner with the AWS Security Independent Software Vendor (ISV) Competency and Amazon RDS Ready Product validation. Imperva also participates in AWS Marketplace and AWS ISV Accelerate Program. About Imperva Imperva is the cybersecurity leader whose mission is to help organizations protect their data and all paths to it. Customers around the world trust Imperva to protect their applications, data and websites from cyber attacks. With an integrated approach combining edge, application security and data security, Imperva protects companies through all stages of their digital journey. Imperva Research Labs and our global intelligence community enable Imperva to stay ahead of the threat landscape and seamlessly integrate the latest security, privacy and compliance expertise into our solutions.

Read More

PLATFORM SECURITY

Thrive Acquires Edge Technology Group

Thrive | July 04, 2022

Thrive, a prominent supplier of cybersecurity and digital transformation managed services, announced today the acquisition of Edge Technology Group, a leading worldwide technology consulting and fully managed IT service provider for alternate investment managers located in Connecticut. Edge Technology Group's purchase adds new worldwide offices and data centers in the United Kingdom, Australia, Singapore, Hong Kong, and the Philippines, bolstering Thrive's international footprint for all clients. Edge clients throughout the world, including hedge funds, private equity companies, family offices, and asset managers, will now have access to Thrive's next-generation managed cybersecurity, collaboration, and cloud services. Edge, founded in 2007, is a worldwide technology advisory and fully managed financial services IT service company that offers alternative investment manager advisory services and cloud computing solutions. Edge services over 300 hedge fund, asset manager, private equity, REIT, and wealth management clients, offering public cloud configurations tailored to each client's specific business needs. Edge Technology Group employs 265 people, including a team of client-focused IT strategists and engineers. "Edge Technology Group is the leading Financial Industry MSP in the world. Their talented engineering and account management teams will now have access to the Thrive Automation Platform and our 24x7x365 comprehensive suite of Cybersecurity SOC services to enhance the Edge client experience." Rob Stephenson, Thrive's CEO "As a founder-owned managed services provider, we are fully immersed in advancing clients' alternative investment practices via our IT advisory services and cloud computing solutions. Edge is thrilled to join the Thrive family as their client-first commitment is perfectly aligned with ours and their advanced cybersecurity, automation, collaboration and managed services platform will expedite our customers' Digital Transformation journey," said Jim Nekos, CEO, Edge Technology Group. Thrive will have over 1,000 people servicing customers all around the globe as a result of this purchase, consolidating its position as the premier technology outsourcing service for the financial industry. Edge Technology Group is Thrive's fourth acquisition in 2022, solidifying the company's worldwide position as a premier technology supplier offering end-to-end managed services and unrivaled experience to achieve secure digital transformation.

Read More