About Us

Arcserve launched Unified Data Protection 9.0 for improved data resilience 

Arcserve launched Unified Data Protection (UDP) 9.0, it is a centrally managed backup and disaster recovery solution that provides every data infrastructure with reliable protection for all types of workloads, ensuring it is future-proof. Complete data protection along with Sophos cybersecurity defense, immutable storage, tape backup, and scalable on-site or off-site business continuity are all included. 

Florian Malecki, EVP of marketing at Arcserve stated, “The data resilience of organizations of all sizes is constantly challenged with the volumes and types of data they need to manage, protect, and secure. Arcserve UDP 9.0 takes data resilience to the next level delivering enhanced data protection, performance reliability, and management. By offering complete ransomware resilience in one solution, Arcserve UDP 9.0 helps our partners drive customer value and growth opportunities in this burgeoning market.” 

A recent independent research study of IT decision makers (ITDMs) commissioned by Arcserve found that 83% of respondents have a data resilience strategy, emphasizing the need for robust enterprise data resilience strategies. However, only 23% have a comprehensive strategy. According to the research, nearly half (45%) of organizations that experienced data loss were unable to recover all of their data. 

AJ Stevens, director of sales at CTS-Companies commented, “It’s getting harder and more complex to deliver always-on, always-recoverable data protection to our customers. Arcserve UDP 9.0 is an ideal single-vendor solution because it removes complexity while providing the most advanced and robust cybersecurity, data protection, immutable backup, and recovery features.” 

Arcserve UDP 9.0 improves data resilience by introducing new advanced capabilities, such as the following: 

Data protection for Oracle Database (DB): With the ability to restore the entire Oracle PDB (including all tablespaces and control files) to its original location, organizations can quickly recover terabytes of Oracle PDBs backed up using Oracle RMAN. Customers can recover granular Oracle PDB files and restore them to their original location. Oracle DBs on Solaris x64 platforms are fully protected by UDP 9.0. 

Options for restoring Microsoft SQL server deployments: UDP 9.0 provides increased granularity, allowing database recovery to any transaction point between two recovery points. Assures restore integrity by performing a consistency check to ensure that the data retrieved is usable. This avoids a major issue in which restores are successful, but data is unusable. 

Cloud object storage improves availability, durability, and scalability: Organizations can store deduplicated backups directly on AWS S3, Wasabi, or Google Cloud Storage to lower total cost of ownership and improve disaster recovery support with cloud-based offsite safe stores. 

UDP 9.0 now includes a cloud-based management console with multi-tenancy and secure identity management, as well as an on-premises private management console. The cloud-based console requires no installation, manual deployment, or extensive configuration. The multi-tenancy capabilities of UDP 9.0 enable users to easily configure sub-organizations and manage them as separate tenants. Okta’s Zero Trust implementation, which uses multifactor authentication, is one example of stringent identity security measures (MFA). 

Varonis announced improved data security through least privilege automation 

Varonis announced the availability of least privilege automation for Microsoft 365, Google Drive, and Box — a new capability that automatically removes unnecessary data risk without the need for human intervention. 

Jim Reavis, CEO, Cloud Security Alliance commented, “When excessive data access goes unchecked, a single compromised user or rogue insider can inflict untold damage on a business. 

Reducing the data blast radius is a top priority for CISOs, but manual remediation isn’t possible with today’s pace of data growth and collaboration.” 
 

Varonis’ goal to provide customers with effortless data security outcomes is furthered by this innovation. 

Varonis’ cloud-native platform, in contrast to other approaches that are all-or-nothing, determines who needs access to data and who doesn’t based on usage, data sensitivity, and exposure. 

Because least privilege automation consistently upholds them without hindering collaboration, organizations can tailor remediation policies to meet their security and compliance requirements. 

David Bass, CTO of Varonis stated, “With the launch of our new SaaS platform, our mission is to solve our customers’ critical data security challenges with automation — and that starts by ending excessive data access with the industry’s first fully autonomous remediation engine. 

We offer the only scalable way to eliminate collaboration risk and continually keep data exposure low across today’s most critical data stores.” 

More than 40 million unique permissions and 157,000 sensitive records are available online in the cloud environment of the typical business. By eliminating the public and organizational exposure caused by sharing links and unused entitlements, least privilege automation eliminates collaboration risk. 

Pixalate Releases MRT App for Slack to Access Ad Fraud Insights

The Media Ratings Terminal (MRT) app for Slack was made available by Pixalate and can be found in the Slack App Directory. As Pixalate aims to even up privacy, ad fraud, and compliance insights, the Media Ratings Terminal (MRT) app delivers ad fraud data directly to Slack. Apart from privacy ad fraud, and compliance ratings, MRT brings insights throughout mobile and CTV apps as well as websites through Amazon, Roku, Google and Apple app stores.  

Jason Dias, Pixalate’s VP of Engineering, stated, “The MRT for Slack is our latest addition to increase accessibility of key data points around ad fraud and privacy compliance in the advertising supply chain. Bringing MRT data points into everyday conversations in Slack makes identifying, following, and troubleshooting issues easier for all types of teams.” 

The release of the latest app for Slack is another step taken by Pixalate to increase access of fraud and privacy compliance risk data as well as boost transparency in the ad tech space. This step follows the latest releases of the Ad Trust & Safety API Suite and COPPA Compliance Technology of Pixalate to discover child-directed mobile apps throughout the Apple App and Google App Stores. 

With the help of the app, users can quickly search for any app name, ID, or website address within their Slack workspace. Additionally, it has a summary Home tab for the user’s MRT Watchlist, which provides a quick view of data points for the applications and websites they have chosen to follow. Users may easily edit their lists via the “Follow” and “Unfollow” buttons in the Slack app. The app also incorporates conversations related to the MRT and opens links in a channel to deliver important data points when accessible. This provides immediate access for ad buyers, publishers, privacy regulators, and other parties to watch over apps and domains. 

Infortrend Announces the Release of WORM and MFA features on EonStor GS

Infortrend, a leading provider of SAN, NAS, Unified, Hybrid Cloud and AI Storage Solutions, recently added immutable object storage, also known as write-once-read-many (WORM), and multi-factor authentication (MFA) security features to their EonStor GS unified storage systems. These features are introduced to ensure the protection of stored data, particularly against ransomware.

Ransomware attacks are still on the rise today, proving that traditional defenses like firewalls and antivirus software are insufficient to completely stop these threats. In order to secure archived data, businesses have begun using immutable or WORM storage repositories. With immutable object storage, organisations can set the data as WORM to protect it against ransomware encryption and choose a retention term to prevent unintentional data erasure.

Apart from the immutable object storage, the multi-factor authentication (MFA) feature is also integrated into the GS families. A separate one-time password is needed to access account by email or an APP. Even if the password has been hacked, the feature is demonstrated to be effective against unauthorized access. The Cybersecurity & Infrastructure Security Agency claims that implementing the MFA function reduces the likelihood of account hacking by 99 percent.

Frank Lee, Senior Director of Product Planning, said, “The immutable object storage and MFA offer reinforced security. Mandatory for some and highly-recommended safety measure by governments around the globe, especially in government organizations, financial, and medical industries, WORM and MFA functions can further protect sensitive and valuable data from unlawful access.”

Imperva Announces its Data Security Fabric for Data Protection

Imperva unveils that Imperva Data Security Fabric (DSF) offers data-centric protection and compliance for enterprise data lakes which is built on Amazon Web Services (AWS). It has been done with regards to its commitment to data protection as it empowers AWS consumers to secure their data with one platform. It impacts an integrated security model without utilizing any changes to their current data infrastructure across Amazon Aurora, Amazon Athena, Amazon Relational Database Service (Amazon RDS), Amazon Redshift, Amazon DynamoDB, and AWS CloudFormation.

Dan Neault, SVP and GM, Data Security, Imperva, said, “AWS allows organizations to quickly and securely build solutions that help them to reach new markets and deliver new services to end users. Imperva Data Security Fabric gives organizations building data lakes on AWS a streamlined experience for securing data, and confidence that their data lakes comply.”

Utilizing services like AWS Lake Formation and AWS Glue, Imperva Data Security Fabric finds data lakes that have been established and categorised to overcome these problems. By employing its internal data classification engine or by importing categorization scans from Amazon Macie, it can determine where sensitive data is stored across services like Amazon S3, Amazon Redshift, and Amazon RDS. To audit when a user accesses raw data files kept in Amazon S3 or runs analytical queries on the data using services like Amazon Athena or Amazon EMR, Imperva DSF gathers data access logs from providers like Amazon CloudWatch.

Identification of doubtful data access patterns, like the suspected network connections, extensive access to sensitive information, and the utilization of eminent service accounts by interactive users are included in Imperva DSF includes User Entity Behavior Analytics (UEBA). With these capabilities, companies discover and find important data breaches without the involvement of expert data security analysts. Lastly, security operation teams can build playbooks to automatically remove threats utilizing native features of AWS such as security groups included in Imperva DSF. This allows companies remain compliant while also preventing data breaches.

Seclore announces partnership with TD SYNNEX!

Seclore, a pioneering platform in data-centric security, recently announced a new collaboration with TD SYNNEX, a worldwide IT distributor and solutions aggregator created by the union of Tech Data and Synnex. This collaboration provides enterprises with complete solutions to their data protection challenges.

“Seclore has been innovating data-centric security for many years. Starting a partnership with TD Synnex for North America will be a critical step to educate the market on the impressive data protection capabilities Seclore provides,” says Keith Mozena, VP Partner & Channel Sales at Seclore.

This collaboration goes beyond “one-time labeling and access policy.” The combined solution offers real-time tracking and visibility of both authorized and unauthorized activity on the data, enabling the enterprise to learn, identify suspicious behavior, evolve data security policies, immediately change security permissions, and even completely remove an item to prevent data loss.

“TD SYNNEX is committed to uniting IT solutions that deliver business outcomes today and unlock growth for the future,” Cheryl Neal, Vice President of New Vendor Acquisition. “With Seclore added to our vast portfolio of vendor partners, we’re able to enrich the breadth and depth of our offerings so customers can do great things with technology.”

By safeguarding sensitive data wherever it goes—on any device, in any cloud, or throughout your company ecosystem—Seclore and TD SYNNEX offer the total data security solution. For instance, integrating Seclore with collaboration tools like Microsoft 365 can help businesses control and secure unstructured data that is shared and used internally as well as with clients, partners, and other businesses.

Catalogic Software launches Newest Version of DPX!

The most recent version of Catalogic DPX, the company’s enterprise data protection software, has been released and is now generally available, according to Catalogic Software, a top provider of smart data protection solutions. With DPX 4.8.1, two new features are available: DPX vPlus, cloud data protection for Microsoft 365 and other open virtualization platforms, and GuardMode, a feature that enables ransomware early detection.  

Krista Macomber, the Senior Analyst, Evaluator Group, said, “Cybercriminals are constantly innovating, costing US victims $49.2 million in losses to ransomware attacks last year alone – and that is just based on incidents reported to the FBI. Catalogic DPX’s new GuardMode feature can help organizations minimize business disruption, including financial losses, when they are hit by ransomware. For example, proactive monitoring against a list of over 4,000 known ransomware patterns that are automatically updated helps to mitigate the spread of ransomware, and the ability to roll back only affected data allows good data that might be interspersed with infected files to be preserved.”

When used in place of a specific binary fingerprint, DPX GuardMode complements endpoint and edge protection by keeping an eye on file shares and file system activity even over a network. GuardMode monitors and updates over 4000 known ransomware threat patterns and assess affected files. Honeypots serve as a deception layer to catch various ransomware strains that are constantly changing, supporting this extensive forensic layer of security. GuardMode boosts confidence in ransomware detection by identifying and recovering only the affected data.

“DPX GuardMode changes a backup team’s cyber reliance posture from reactive to proactive with early detection,” said Sathya Sankaran, COO, Catalogic Software. “DPX GuardMode notifies backup and storage teams of suspicious activity and pinpoints the extent of damage caused by cyber incidents. Combined with the comprehensive workload coverage of DPX and instant recoveries, Catalogic DPX customers will be among the best prepared to recover from a cyberattack.”

Ken Barth, CEO of Catalogic Software, said, “We are excited to extend our relationship with Storware and announce DPX vPlus, that adds Microsoft 365 cloud data protection and expands our coverage of hypervisor workloads. DPX vPlus is fully integrated into the DPX vStor backup repository and delivers greater workload coverage for an organization’s edge and cloud data.”

Protecto and Snowflake Partnered for Data Protection

Protecto announced the integration of its artificial intelligence and privacy engineering platform into Snowflake. Snowflake is a data cloud company; this integration will help customers to identify data security issues before data breaches, and customer trust violations occur.

Data is the foundation of modern businesses, but it is increasingly susceptible to security flaws, privacy violations, and theft. Manual processes and compliance checks are insufficient to safeguard today’s complex data environments. The partnership between Protecto and Snowflake will provide visibility in identifying data protection vulnerabilities while maintaining the speed and agility of Snowflake’s platform.

Amar Kanagaraj, Founder and CEO of Protecto, commented, “The world is evolving to be privacy-first and zero-trust security. As a result, companies expect data security and privacy as part of their data stack. We’re introducing Data Posture Intelligence, a technology multiple steps ahead of the competition to deliver data protection in minutes.”

Protecto automates data privacy, security, and governance audits to provide results in minutes. The solution provides data posture insights in a single pane of glass, which helps their joint customers in finding personal information. It helps them determine who has access to sensitive data, identify inactive users, and audit user permissions. It allows customers to check user activities for potential privacy violations. Customers can recognize unused data that is open, overexposed, or stale.

Venkat Gopalan, Chief Data Officer of Belcorp, commented, “Cloud data platforms such as Snowflake give us enormous scalability and agility. With Protecto and Snowflake’s partnership, we have tighter control over our data security and privacy. Products like Protecto give us granular visibility over data protection across our Snowflake Data Cloud.”

IBM Acquired Databand.ai for Data Security

IBM announced the acquisition of Databand.ai, a provider of data observability software that assists organizations in resolving data issues such as errors, pipeline failures, and poor quality before they impact their bottom line.

Organizations are struggling to manage the health and quality of their data sets, which is required to make better business decisions and gain a competitive advantage as the volume of data continues to grow at an unprecedented rate. Data observability, a rapidly growing market opportunity, is quickly emerging as a key solution for assisting data teams and engineers in better understanding the health of data in their system and automatically identifying, troubleshooting, and resolving issues such as anomalies, breaking data changes, or pipeline failures in near real-time.

This acquisition enhances IBM’s software portfolio across data, AI, and automation to address the full spectrum of observability and aids organizations in ensuring that reliable data is placed in the hands of the appropriate users at the appropriate time.

Databand.ai is IBM’s fifth acquisition in 2022 as the company expands its hybrid cloud and AI capabilities.

Josh Benamram, Co-Founder and CEO of Databand.ai, stated, “You can’t protect what you can’t see, and when the data platform is ineffective, everyone is impacted –including customers. That’s why global brands such as FanDuel, Agoda, and Trax Retail already rely on Databand.ai to remove bad data surprises by detecting and resolving them before they create costly business impacts. Joining IBM will help us scale our software and significantly accelerate our ability to meet the evolving needs of enterprise clients.”

The open and extendable approach of Databand.ai enables data engineering teams to integrate and gain observability into their data infrastructure easily. This acquisition will provide Databand.ai with additional resources to expand its observability capabilities for broader integrations across more open-source and commercial solutions that power the modern data stack. Enterprises will also have complete control over how Databand.ai is deployed, whether as a SaaS or a self-hosted software subscription.

IBM’s acquisition of Databand.ai expands on the company’s R&D investments and strategic acquisitions in AI and automation. IBM is well-positioned to address the full spectrum of observability across IT operations by combining Databand.ai with IBM Observability by Instana APM and IBM Watson Studio.

Data observability solutions are also essential components of a company’s overall data strategy and architecture. The acquisition of Databand.ai expands IBM’s existing data fabric solution by assisting in the delivery of the most accurate and trustworthy data to the right hands at the right time – regardless of where it resides.

Daniel Hernandez, General Manager for Data and AI at IBM, commented, “Our clients are data-driven enterprises who rely on high-quality, trustworthy data to power their mission-critical processes. When they don’t have access to the data they need at any given moment, their business can grind to a halt. With the addition of Databand.ai, IBM offers the most comprehensive set of observability capabilities for IT across applications, data, and machine learning and is continuing to provide our clients and partners with the technology they need to deliver reliable data and AI at scale.”

Normalyze Raises Millions to Help Manage Sensitive Data

Normalyze is an agentless platform that assists organizations in better managing sensitive data, as well as attack paths to it in today’s complex, multi-cloud environments, thereby protecting customers from large and damaging data breaches. Security teams can continuously assess, prioritize, and react to cloud data threats and stop sensitive data loss using Normalyze’s graph-powered platform.

Normalyze has emerged from stealth with $22.2 million in Series A funding led by Lightspeed Venture Partners and Battery Ventures. This funding round brings the company’s total funding to $26.6 million.

Amer Deeba, Cofounder and CEO at Normalyze stated, “Today’s enterprises find their data scattered throughout their various cloud environments with limited visibility of where sensitive data resides. It’s a massive problem that current cloud security offerings aren’t equipped to handle. We built Normalyze to help companies of all sizes discover, classify and secure sensitive data across all public clouds. With simple onboarding and minimum ramp-up time, our platform provides full visibility on data security posture to better gauge risk and proactively respond to sensitive data threats.”

Normalyze has the unique ability to bring together all security stakeholders in one user interface, from the CISO to the security engineer to DevOps, to discover data, classify it, and prioritize the discovery of attack paths that can lead to sensitive information. Normalyze’s data-first cloud security platform works in three stages, it builds an intelligent graph with deep context and transitive trust relationships representing all the data stores, applications, identities, and infrastructure resources in all clouds and how they all connect during discovery and analysis. The agentless data scanner from Normalyze then determines which data stores contain sensitive information and automatically maps it to specific profiles such as PCI, HIPAA, and GDPR.

Ravi Ithal, Cofounder and CTO of Normalyze commented, “Our graph-powered platform is a hub that connects all data with assets, identities, accesses, misconfigurations, and vulnerabilities to help security teams continuously discover sensitive information, determine attack paths, and automate remediation efforts to secure it. With the Normalyze one-pass scanner, users can scan structured and unstructured data stores to discover sensitive information based on predefined compliance profiles for PII, GDPR, HIPAA, and more with minimal upfront configuration and cost, all while ensuring data never leaves their cloud environments.”

Read more articles:

Cyware Declared SOC 2 TYPE 2 Compliance for Data Security