Remediant Announces Participation in CyberXchange, the World's Preeminent B2B ecommerce Marketplace Dedicated to Cybersecurity

prnewswire | October 21, 2020

Remediant, a leading provider of precision Privileged Access Management (PAM) software, today announced the immediate availability of its SecureONE solution on CyberXchange, the innovative new ecommerce marketplace dedicated to cybersecurity and compliance. For the first time, CIOs, CISOs and IT professionals can find and buy Remediant solutions mapped to the major cybersecurity frameworks such as CMMC, NIST and DFARS, bringing unprecedented visibility and efficiencies in building their cybersecurity programs.

Spotlight

Dashlane Business supports login with single sign-on (SSO), using any SAML 2.0 enabled IdP. In a single-sign-on setup, the user doesn’t have to input UserMP . Instead, a random key is generated at account creation. This key (the data encryption key) is delivered to the Dashlane app after the user successfully logs in to the IdP, and it is used as a symmetric encryption key to encrypt and decrypt the user data.

Spotlight

Dashlane Business supports login with single sign-on (SSO), using any SAML 2.0 enabled IdP. In a single-sign-on setup, the user doesn’t have to input UserMP . Instead, a random key is generated at account creation. This key (the data encryption key) is delivered to the Dashlane app after the user successfully logs in to the IdP, and it is used as a symmetric encryption key to encrypt and decrypt the user data.

Related News

DATA SECURITY, ENTERPRISE SECURITY, PLATFORM SECURITY

BlueVoyant Enhances its Cloud-Native Splunk Managed Detection & Response (MDR), Consulting, and Implementation Services

BlueVoyant | March 20, 2023

BlueVoyant, a cybersecurity company that illuminates, validates, and remediates internal and external risks in one platform, announced enhanced Splunk capabilities, with end-to-end consulting, implementation, and Managed Detection & Response (MDR) services. With the increasing adoption of cloud technologies, organizations face a complex and rapidly evolving threat landscape. The service helps clients maximize their Splunk investment whether it be on the Splunk Cloud Platform or Splunk Enterprise. "Splunk Your Way with BlueVoyant enables our clients to have industry-leading consulting, implementation, and cyber defense in a cost-effective manner," said Drew Gibson, BlueVoyant senior director for the company's Splunk Alliance. "BlueVoyant has a strong relationship with Splunk, and is known for its dynamic expertise in the company's products, helping our joint clients have greater control and visibility of their data usage and security posture." Key components of Splunk Your Way with BlueVoyant include: Enabling clients to collect, monitor, and analyze security data across on-premise, hybrid, and multi-cloud environments in a single platform Cloud-native SIEM (security information and event management) with real-time visibility to identify security threats and remediate them quickly Clients can reduce their data burden by 20% or more with a proprietary Data Readiness model that improves data quality and reduces costs Onboarding within a month for Existing Splunk users to quickly see the benefits of BlueVoyant Continuously improving client's Splunk instance by using faster security content delivery, and parity between different SIEM and EDR (endpoint detection and response) tools Availability of numerous bundles of workshops, retainers, and MDR services to help clients optimize, implement, manage, and monitor and protect their Splunk instance "BlueVoyant has the strength of our MDR for Splunk which we launched in 2021, aided by the expertise of thousands of Splunk deployments by our Concanon Professional Services division to provide a compelling service which helps the client get the most their Splunk investment, whether Splunk is installed 'on-prem' or via Splunk Cloud," said Michael Cormier, managing director for Concanon, a BlueVoyant company. BlueVoyant acquired Conanon in fall 2021 to enhance its end-to-end Splunk platform capabilities. Splunk recognized BlueVoyant as a key MSP (managed service provider) partner with the new Premier Manage designation. BlueVoyant also earned core competency badges for Cloud Migration and Cloud Migration: Co-Delivery. The company has 200 active Splunk certifications. In 2022, BlueVoyant expanded its Splunk go-to-market by including its offerings on the Amazon Web Services (AWS) Marketplace. BlueVoyant is hosting a webinar at 1 p.m. EDT Thursday, April 13 to discuss what the company has learned from our Splunk deployments and clients, and to answer questions. Current clients, security professionals, and other parties are encouraged to attend. About BlueVoyant BlueVoyant combines internal and external cyber defense capabilities into an outcomes-based cloud-native platform by continuously monitoring your network, endpoints, attack surface, and supply chain, as well as the clear, deep, and dark web for threats. The full-spectrum cyber defense platform illuminates, validates, and quickly remediates threats to protect your enterprise. BlueVoyant leverages both machine-learning-driven automation and human-led expertise to deliver industry-leading cybersecurity to more than 900 clients across the globe.

Read More

DATA SECURITY, ENTERPRISE SECURITY

Sonatype Launches New Partner Acceleration Program to Help Partners Scale and Secure their Customers’ Software Supply Chains

Globenewswire | April 04, 2023

Sonatype, the pioneer of software supply chain management, today announced the launch of its Partner Acceleration Program. This new program framework delivers a wider range of benefits and increased go-to-market value for Sonatype Solution Providers, Global System Integrators and Technology Integration Alliances. With the initial program launch, Sonatype has formalized its partner benefits for Solution Providers delivering Sonatype technology and services, ranging from design support to on-premises and cloud platform integration. “The open source intelligence and security that Sonatype’s platform provides across the entire software development life cycle is second to none,” said Allen Talbott, Vice President of Sales at Saltworks Security. “Our long-time partnership with Sonatype has been incredibly valuable in growing our business, securing new clients, and giving our customers the information, tools, and software supply chain guidance they need to transform their development processes and build world-class application security programs.” Ninety-one percent of organizations have adopted or have plans to adopt a digital-first business strategy. As the digital landscape becomes increasingly dangerous and complex, software supply chain management and security is critical to the digital transformation and success of today's businesses. Sonatype is on a mission to empower every engineering team with intelligence to create and maintain secure, quality and innovative software at scale. The new Sonatype Partner Acceleration Program features an ecosystem of technically certified solution providers, system integrators, and technology alliances that share this same vision, enabling organizations to scale and secure their application development processes while propelling growth. “Software supply chain management remains a critical piece to securing the applications our customers develop and maintain over time,” said Joey Campione, President at Opticca Security. “Sonatype’s platform continues to deliver consistent results, reliability and increases overall developer productivity, providing our customers with what they need to continue to innovate at an accelerated pace. As a strategic partner, Sonatype’s solutions and support has been integral to scaling our business, and we anticipate that the new partner program will only amplify this further.” Sonatype partners report higher win rates, increased profits, and more opportunities to build new revenue streams. With the Sonatype Partner Acceleration Program, Solution Providers receive structured tiers of benefits that support increased time to value and customer growth. As partners grow their business with Sonatype, they have access to increasing program benefits and exclusive resources, including dedicated partner managers, co-branded marketing materials, technical support, event opportunities, and more. “This is an incredible time of growth for our Sonatype partner ecosystem. The demand for software supply chain management solutions continues to skyrocket as organizations increasingly recognize the need to understand the open source their applications depend on,” said Bruce Gordon, Senior Vice President of Global Channel Sales & Alliances at Sonatype. “We have an outstanding community of partners from across the globe providing industry-leading services and technologies. We’re excited to now provide this partner community with additional benefits designed to increase the value and delivery speed of safe and secure open source software.” ABOUT SONATYPE Sonatype is the software supply chain management company. We empower developers and security professionals with intelligent tools to innovate more securely at scale. Our platform addresses every element of an organization’s entire software development life cycle, including third-party open source code, first-party source code, and containerized code. Sonatype identifies critical security vulnerabilities and code quality issues and reports results directly to developers when they can most effectively fix them. This helps organizations develop consistently high-quality, secure software which fully meets their business needs and those of their end-customers and partners. More than 2,000 organizations, including 70% of the Fortune 100, and 15 million software developers already rely on our tools and guidance to help them deliver and maintain exceptional and secure software.

Read More

PLATFORM SECURITY, SOFTWARE SECURITY, API SECURITY

Traceable AI Introduces World’s First Zero Trust API Access (ZTAA) Solution

Businesswire | April 28, 2023

Traceable AI, the industry’s leading API security company, today announced the launch of its innovative solution, Zero Trust API Access, to help organizations better protect sensitive data, stop API abuse, and align data security programs with broader innovation and business objectives. As the industry’s first and only solution in the market, Traceable’s Zero Trust API Access actively reduces your attack surface by minimizing or eliminating implied and persistent trust for your APIs. “You cannot have true Zero Trust without API security,” said Sanjay Nagaraj, CTO of Traceable. “Traceable’s Zero Trust API Access provides a guiding principle for API security architectures for enhanced data protection, security posture and resiliency. APIs are the universal attack vector, and if companies truly want to take the Zero Trust framework seriously, protect their data and create an environment that enables the ability to grow securely, they need a solution that is both strategic and tactical.” Zero Trust API Access (ZTAA) provides enterprises considerable business benefits including: Dynamic Data Access policies stop data breaches in their tracks: With Traceable, you can detect and classify the data that APIs are handling, to apply proper policies. These policies define which users and roles can access different data types, at what times, from what geolocations and from what client types. With dynamic data access policies, you can quickly and easily create policies with out-of-the-box templates or customize policies based on organization needs. Continuous Adaptive Trust for real-time threat prevention: Traceable’s ZTAA provides security that continuously adjusts to the organization’s threat landscape. This is achieved through real-time, context-based authentication and authorization for API access (both user and machine). Traceable can stitch APIs, as well as the data and user context, via flexible data collection options. This ensures that adaptive trust is enforced for APIs at the edge, as well as for all internal services, for-service APIs and 3rd party APIs. The result is the right access for the right users and entities, at the right time, thereby protecting the business and its sensitive customer data. Intelligent Rate Limiting for API abuse prevention: API rate limiting enables organizations to control the incoming traffic to an API by automatically limiting the number of requests that the API can receive within a given period of time. After the limit is reached, the policy rejects all requests, thereby avoiding any additional load on the backend API. Intelligent rate limiting factors in the rates for users, proxies, bots, and the business function of APIs. This provides enhanced protection against API DDoS attacks, reduces load on backend APIs, honors SLAs, and reduces costs often associated with 3rd party APIs. Access to APIs and sensitive data is therefore proactive and automatic, preventing API abuse. Security becomes a business enabler: When combined, Zero Trust Security and API Security create a holistic and robust security approach that actively mitigates the risks associated with accessing sensitive data via APIs. This comprehensive approach helps protect sensitive information and fosters a secure environment for innovation and growth. Organizations can now confidently offer new products and services, turning security from a hindrance, to a catalyst for accelerated growth. Traceable’s Zero Trust API Access is essential to aligning Zero Trust implementations with the realities of today’s application architectures and extending the Zero Trust Security model to the full application stack. To learn more about Zero Trust API Access from Traceable, visit the team at RSA South Hall, Booth 2133 or request a demo with a security expert. About Traceable Traceable is the industry’s leading API Security company that helps organizations achieve API protection in a cloud-first, API-driven world. With an API Data Lake at the core of the platform, Traceable is the only intelligent and context-aware solution that powers complete API security – security posture management, threat protection and threat management across the entire Software Development Lifecycle – enabling organizations to minimize risk and maximize the value that APIs bring to their customers. To learn more about how API security can help your business, book a demo with a security expert.

Read More