Platform Security, Software Security, API Security

Traceable AI Introduces World’s First Zero Trust API Access (ZTAA) Solution

Businesswire | April 28, 2023 | Read time : 05:00 min

Traceable AI Introduces World’s First Zero Trust API Access

Traceable AI, the industry’s leading API security company, today announced the launch of its innovative solution, Zero Trust API Access, to help organizations better protect sensitive data, stop API abuse, and align data security programs with broader innovation and business objectives.

As the industry’s first and only solution in the market, Traceable’s Zero Trust API Access actively reduces your attack surface by minimizing or eliminating implied and persistent trust for your APIs.

“You cannot have true Zero Trust without API security,” said Sanjay Nagaraj, CTO of Traceable. “Traceable’s Zero Trust API Access provides a guiding principle for API security architectures for enhanced data protection, security posture and resiliency. APIs are the universal attack vector, and if companies truly want to take the Zero Trust framework seriously, protect their data and create an environment that enables the ability to grow securely, they need a solution that is both strategic and tactical.”

Zero Trust API Access (ZTAA) provides enterprises considerable business benefits including:

  1. Dynamic Data Access policies stop data breaches in their tracks: With Traceable, you can detect and classify the data that APIs are handling, to apply proper policies. These policies define which users and roles can access different data types, at what times, from what geolocations and from what client types. With dynamic data access policies, you can quickly and easily create policies with out-of-the-box templates or customize policies based on organization needs.
  2. Continuous Adaptive Trust for real-time threat prevention: Traceable’s ZTAA provides security that continuously adjusts to the organization’s threat landscape. This is achieved through real-time, context-based authentication and authorization for API access (both user and machine). Traceable can stitch APIs, as well as the data and user context, via flexible data collection options. This ensures that adaptive trust is enforced for APIs at the edge, as well as for all internal services, for-service APIs and 3rd party APIs. The result is the right access for the right users and entities, at the right time, thereby protecting the business and its sensitive customer data.
  3. Intelligent Rate Limiting for API abuse prevention: API rate limiting enables organizations to control the incoming traffic to an API by automatically limiting the number of requests that the API can receive within a given period of time. After the limit is reached, the policy rejects all requests, thereby avoiding any additional load on the backend API. Intelligent rate limiting factors in the rates for users, proxies, bots, and the business function of APIs. This provides enhanced protection against API DDoS attacks, reduces load on backend APIs, honors SLAs, and reduces costs often associated with 3rd party APIs. Access to APIs and sensitive data is therefore proactive and automatic, preventing API abuse.
  4. Security becomes a business enabler: When combined, Zero Trust Security and API Security create a holistic and robust security approach that actively mitigates the risks associated with accessing sensitive data via APIs. This comprehensive approach helps protect sensitive information and fosters a secure environment for innovation and growth. Organizations can now confidently offer new products and services, turning security from a hindrance, to a catalyst for accelerated growth.

Traceable’s Zero Trust API Access is essential to aligning Zero Trust implementations with the realities of today’s application architectures and extending the Zero Trust Security model to the full application stack.

To learn more about Zero Trust API Access from Traceable, visit the team at RSA South Hall, Booth 2133 or request a demo with a security expert.

About Traceable

Traceable is the industry’s leading API Security company that helps organizations achieve API protection in a cloud-first, API-driven world. With an API Data Lake at the core of the platform, Traceable is the only intelligent and context-aware solution that powers complete API security – security posture management, threat protection and threat management across the entire Software Development Lifecycle – enabling organizations to minimize risk and maximize the value that APIs bring to their customers. To learn more about how API security can help your business, book a demo with a security expert.

Spotlight

Whether you’re securing IT infrastructure, the software supply chain, or embedding identities into connected products, organizations turn to public key infrastructure (PKI) as a proven technology to establish digital trust. However, legacy PKI deployments often leave teams straining to cope with costly infrastructure, certificat

Spotlight

Whether you’re securing IT infrastructure, the software supply chain, or embedding identities into connected products, organizations turn to public key infrastructure (PKI) as a proven technology to establish digital trust. However, legacy PKI deployments often leave teams straining to cope with costly infrastructure, certificat

Related News

Enterprise Security, Platform Security, Software Security

ZeroFox Contributes to Open Source Amass Project to Help Businesses Manage Their External Attack Surface

Globenewswire | July 21, 2023

ZeroFox (Nasdaq: ZFOX), an enterprise software-as-a-service leader in external cybersecurity, highlights its recent contributions to the OWASP Amass Project in an ongoing effort to give businesses and government entities better visibility to their full external attack surface asset ecosystem. The recent additions to the project from the ZeroFox team provide more advanced tool sets for analysts to discover and catalog their internet-facing assets and exposures. The contributions create a new standard framework to lead the industry in a more cohesive approach to attack surface management. As organizations face increasingly sophisticated cyber threats, understanding and managing their external attack surface has become paramount. By leveraging its expertise in external cybersecurity, ZeroFox identified a critical gap in the attack surface management landscape and responded by spearheading the development of the Open Asset Model and Asset Database within the OWASP Amass Project. The Open Asset Model and Asset Database contributions offer security analysts a unified and structured approach to identifying and managing potential vulnerabilities outside the perimeter. The Open Asset Model provides a new standard for asset definitions, representing a comprehensive framework for describing and categorizing diverse internet-facing assets. The Amass community can quickly adapt the model to include new types of assets exposed on the Internet, and their relationships to each other, for more accurate discovery, tracking, monitoring, and management. The Asset Database implements this model, offering the database interaction layer to store discovered assets in the popular sqlite3 and PostgreSQL database management systems. The Asset Database will foster the development of an ecosystem of scanning and analysis tools, allowing them to store and analyze assets from the Open Asset Model and their relationships. These contributions directly benefit both existing Amass users and the broader attack surface management community in an effort to standardize asset definitions. The new standards now provide the information security community with a consistent and predictable format when transferring data describing external attack surfaces. "We are thrilled to contribute to the OWASP Amass Project and provide the security community with cutting-edge tools for Attack Surface Management," said Jeff Foley, VP of Research at ZeroFox. "By leveraging the power of open source, we aim to expand access to advanced cybersecurity capabilities, helping organizations proactively defend against emerging threats." These engineering contributions represent a continued commitment by ZeroFox to the open source community, OWASP, and the Amass Project. ZeroFox will continue to contribute to the Amass Project in an effort to enable the discovery, management, and protection of the external attack surface. By sharing its expertise and resources, ZeroFox aims to foster collaboration and innovation within the information security community, ultimately making the digital landscape safer for all users. About ZeroFox ZeroFox (Nasdaq: ZFOX), an enterprise software-as-a-service leader in external cybersecurity, has redefined security outside the corporate perimeter on the internet, where businesses operate, and threat actors thrive. The ZeroFox platform combines advanced AI analytics, digital risk and privacy protection, full-spectrum threat intelligence, and a robust portfolio of breach, incident and takedown response capabilities to expose and disrupt phishing and fraud campaigns, botnet exposures, credential theft, impersonations, data breaches, and physical threats that target your brands, domains, people, and assets. Join thousands of customers, including some of the largest public sector organizations as well as finance, media, technology and retail companies to stay ahead of adversaries and address the entire lifecycle of external cyber risks. ZeroFox and the ZeroFox logo are trademarks or registered trademarks of ZeroFox, Inc. and/or its affiliates in the U.S. and other countries. Visit www.zerofox.com for more information.

Read More

Data Security, Platform Security, Software Security

Skyhigh Security Enables Secure Use of AI Applications with Leading Data Protection Technology

Businesswire | June 29, 2023

Skyhigh Security today announced it’s enabling organizations to adopt artificial intelligence applications in a secure manner that protects sensitive, confidential, and business critical information through its leading Security Service Edge (SSE) portfolio. Skyhigh Security’s technology protects data and stops threats in the cloud across all websites, Software-as-a-Service (SaaS) applications, Infrastructure-as-a-Service (IaaS) environments and Shadow IT, from a single, cloud-native enforcement point. Skyhigh Security’s purpose-built SSE platform is future-proofed with advanced data protection controls that directly apply to AI apps to protect customers’ business critical data. The same controls will apply to all new and emerging cloud applications in the future to protect against the risks of data loss. Skyhigh Security also delivers the largest and most accurate cloud registry of over 40K+ cloud services, based on a detailed security assessment across more than 75 objective criteria. The Skyhigh Cloud Registry quickly identifies new generative AI apps and the corresponding risk level for each app. According to Skyhigh Security’s global telemetry data from the first half of 2023, close to a million of its users have accessed ChatGPT through corporate infrastructures. The volume of users has increased by 1500 percent from January to June, demonstrating the unprecedented momentum and adoption of generative AI applications across organizations and industries. Because of the risks associated with ChatGPT and similar AI applications, many organizations are seeking ways to ensure data is protected while allowing for productive use of the technology. “Securing corporate data in SaaS applications, like ChatGPT and other generative AI applications, is what Skyhigh Security was built to do,” said Anand Ramanathan, chief product officer, Skyhigh Security. “We currently track more than 500 different AI cloud service providers as part of our registry—a 130 percent increase since January. Through the Skyhigh SSE portfolio, organizations already enjoy granular visibility and control of these apps, protect sensitive data, and meet compliance regulations such as PCIDSS, HIPAA, and GDPR, all in one comprehensive solution. We ensure our customers have the appropriate guardrails in place.” “Skyhigh Security is paving the way forward for organizations to drive productivity and innovation by adopting AI technologies, while reducing risk and protecting critical business data,” said Dan Meacham, CISO, Legendary Entertainment. “At Legendary Entertainment, we use the Skyhigh Cloud Platform to help us monitor our generative AI traffic and prevent inadvertent uploads of regulated data, such as PII or trade secrets, or downloads of fake or malicious apps. It provides crucial insight into the corresponding risk levels of workflows pertaining to different AI tools and applications, along with the amount of data being posted within them. This visibility is essential for us to accelerate business productivity, while ensuring our risk is efficiently mitigated.” The Skyhigh SSE portfolio includes Skyhigh Cloud Access Security Broker (CASB), Skyhigh Secure Web Gateway (SWG), Skyhigh Private Access and other products, integrated into its comprehensive Skyhigh Cloud Platform, with Data Loss Prevention (DLP) as a core capability. Through its CASB for Shadow IT and SWG capabilities, it provides advanced data protection for organizations that allows the use of AI applications, including: Visibility into AI applications in use, as well as their corresponding risk levels. With insights into usage trends, businesses can exercise greater control over their data. Control over the amount of data uploads/in posts, lowering the risk of unintentional access to sensitive data. Flexibility in giving access to AI applications. Block complete access to AI applications for all users or simply block just risky/specific AI applications.Restrict AI applications used within your organization by providing access only to users with a business justification. Improved security awareness across the organization by coaching users on the risks of utilizing AI applications. Add pop ups whenever users access these sites, which direct them to not input any sensitive info in the application and note that it will be monitored by DLP. Reduced risk by automatically disabling and deleting the conversation history within AI applications, like ChatGPT, so that corporate data cannot be used to train the system. Prevent copy/paste of sensitive content into AI applications, like ChatGPT, by leveraging Skyhigh Security’s Web Isolation capabilities. Protect sensitive data from being uploaded to AI applications like ChatGPT. Apply DLP policies to block sensitive data from being posted, including social security numbers, bank account numbers, proprietary IP such as source code, employee and customer names. On July 11 and 13, Skyhigh Security will host a special webinar titled, ChatGPT and AI: Embrace It or Fear It, with Skyhigh Security’s Cloud Security Architect, Nate Brady. Register here to attend the webinar and learn more about how to harness AI and cloud services effectively and responsibly. About Skyhigh Security Skyhigh Security is focused on helping customers secure the world’s data. It protects organizations with cloud-native security solutions that are both data-aware and simple to use. Its market-leading Security Service Edge (SSE) Portfolio goes beyond data access and focuses on data use, allowing organizations to collaborate from any device and from anywhere without sacrificing security. For more information, visit www.skyhighsecurity.com.

Read More

Enterprise Security

Netskope Partners with Wipro to Power New Managed Security and Network Services

PRnewswire | July 11, 2023

Netskope, a leader in Secure Access Service Edge (SASE) today announced a new partnership with Wipro Limited to deliver robust cloud-native Managed Secure Access Service Edge (SASE) and Managed Zero Trust Network Access (ZTNA) services to Wipro's extensive global enterprise client portfolio. "As the global work environment transforms, our Security Cloud platform continues to serve as a critical component for remote workforces, and we are well-positioned to continue to support enterprises as their security needs evolve," said Dave Rogers, SVP of Global Alliances and Channel Sales, Netskope. "By pairing Wipro's deep cybersecurity managed services expertise with Netskope's advanced, full-stack SASE platform, this partnership will build on our shared goal of providing customers an efficient and robust integrated managed cloud security offering to secure and accelerate their digital transformation projects." Wipro provides best-in-class, end-to-end transformative cybersecurity solutions. Wipro CyberTransform® delivers cyber resilience to clients through an integrated suite of business-aligned strategy-first cybersecurity advisory and implementation services. Wipro CyberShieldSM offers proactive, on-demand cyber defense and comprehensive managed security services. "Wipro and Netskope support many Fortune 2000 companies that have successfully navigated significant digital transformation journeys," said Tony Buffomante, Senior Vice President and Global Head of Cybersecurity and Risk Services, Wipro Limited. "As our clients move forward, they understand the need to have a strong cloud-based security posture that's smart enough to protect data, applications and users no matter where they are located. That's now possible through this new partnership with Netskope, which extends Wipro CyberTransform® and Wipro CyberShieldSM capabilities." Managed Secure Access Service Edge (SASE) powered by Netskope delivers security services to protect employees and applications in the cloud as well as existing on-premises applications and infrastructure. The solution helps users: • Eliminate blind spots across thousands of cloud services (SaaS and IaaS) and millions of websites • Secure managed cloud services like Microsoft 365, Google Workspace and AWS, as well as unmanaged cloud services, without the need for blocking • Guard sensitive data with award-winning data loss prevention (DLP), including pre-defined profiles for compliance • Stop elusive cloud threats with anti-malware, sandboxing, machine learning (ML) analysis, Cloud Threat Exchange for IOC sharing, plus behavior analytics or targeted remote browser isolation (RBI) The managed SASE package offers clients unparalleled service coverage, performance and resilience, by leveraging Wipro's strategy-first design and Netskope's NewEdge Network, the world's largest, highest-performing security private cloud. Access to key enterprise applications and data must be controlled no matter where the resources are located. Wipro's Managed Zero Trust Network Access (ZTNA) powered by Netskope allows users to retire legacy connections and gain direct access to applications based on user identity and behavioral context, providing: • Superior user experience with consistent and secure policy controls • Application-level access control that reduces threats by eliminating lateral movement within the network • Reduced deployment complexity and higher visibility and control, lowering the risk of data loss associated with multiple vendor solutions • Improved efficiency in security operations leveraging platforms • Simplified security and lower total cost of ownership About Netskope Netskope, a global SASE leader, is redefining cloud, data, and network security to help organizations apply zero trust principles to protect data. Fast and easy to use, the Netskope platform provides optimized access and real-time security for people, devices, and data anywhere they go. Netskope helps customers reduce risk, accelerate performance, and get unrivaled visibility into any cloud, web, and private application activity. Thousands of customers, including more than 25 of the Fortune 100, trust Netskope and its powerful NewEdge network to address evolving threats, new risks, technology shifts, organizational and network changes, and new regulatory requirements.

Read More