About Us

Pixalate Releases MRT App for Slack to Access Ad Fraud Insights

The Media Ratings Terminal (MRT) app for Slack was made available by Pixalate and can be found in the Slack App Directory. As Pixalate aims to even up privacy, ad fraud, and compliance insights, the Media Ratings Terminal (MRT) app delivers ad fraud data directly to Slack. Apart from privacy ad fraud, and compliance ratings, MRT brings insights throughout mobile and CTV apps as well as websites through Amazon, Roku, Google and Apple app stores.  

Jason Dias, Pixalate’s VP of Engineering, stated, “The MRT for Slack is our latest addition to increase accessibility of key data points around ad fraud and privacy compliance in the advertising supply chain. Bringing MRT data points into everyday conversations in Slack makes identifying, following, and troubleshooting issues easier for all types of teams.” 

The release of the latest app for Slack is another step taken by Pixalate to increase access of fraud and privacy compliance risk data as well as boost transparency in the ad tech space. This step follows the latest releases of the Ad Trust & Safety API Suite and COPPA Compliance Technology of Pixalate to discover child-directed mobile apps throughout the Apple App and Google App Stores. 

With the help of the app, users can quickly search for any app name, ID, or website address within their Slack workspace. Additionally, it has a summary Home tab for the user’s MRT Watchlist, which provides a quick view of data points for the applications and websites they have chosen to follow. Users may easily edit their lists via the “Follow” and “Unfollow” buttons in the Slack app. The app also incorporates conversations related to the MRT and opens links in a channel to deliver important data points when accessible. This provides immediate access for ad buyers, publishers, privacy regulators, and other parties to watch over apps and domains. 

Infortrend Announces the Release of WORM and MFA features on EonStor GS

Infortrend, a leading provider of SAN, NAS, Unified, Hybrid Cloud and AI Storage Solutions, recently added immutable object storage, also known as write-once-read-many (WORM), and multi-factor authentication (MFA) security features to their EonStor GS unified storage systems. These features are introduced to ensure the protection of stored data, particularly against ransomware.

Ransomware attacks are still on the rise today, proving that traditional defenses like firewalls and antivirus software are insufficient to completely stop these threats. In order to secure archived data, businesses have begun using immutable or WORM storage repositories. With immutable object storage, organisations can set the data as WORM to protect it against ransomware encryption and choose a retention term to prevent unintentional data erasure.

Apart from the immutable object storage, the multi-factor authentication (MFA) feature is also integrated into the GS families. A separate one-time password is needed to access account by email or an APP. Even if the password has been hacked, the feature is demonstrated to be effective against unauthorized access. The Cybersecurity & Infrastructure Security Agency claims that implementing the MFA function reduces the likelihood of account hacking by 99 percent.

Frank Lee, Senior Director of Product Planning, said, “The immutable object storage and MFA offer reinforced security. Mandatory for some and highly-recommended safety measure by governments around the globe, especially in government organizations, financial, and medical industries, WORM and MFA functions can further protect sensitive and valuable data from unlawful access.”

Imperva Announces its Data Security Fabric for Data Protection

Imperva unveils that Imperva Data Security Fabric (DSF) offers data-centric protection and compliance for enterprise data lakes which is built on Amazon Web Services (AWS). It has been done with regards to its commitment to data protection as it empowers AWS consumers to secure their data with one platform. It impacts an integrated security model without utilizing any changes to their current data infrastructure across Amazon Aurora, Amazon Athena, Amazon Relational Database Service (Amazon RDS), Amazon Redshift, Amazon DynamoDB, and AWS CloudFormation.

Dan Neault, SVP and GM, Data Security, Imperva, said, “AWS allows organizations to quickly and securely build solutions that help them to reach new markets and deliver new services to end users. Imperva Data Security Fabric gives organizations building data lakes on AWS a streamlined experience for securing data, and confidence that their data lakes comply.”

Utilizing services like AWS Lake Formation and AWS Glue, Imperva Data Security Fabric finds data lakes that have been established and categorised to overcome these problems. By employing its internal data classification engine or by importing categorization scans from Amazon Macie, it can determine where sensitive data is stored across services like Amazon S3, Amazon Redshift, and Amazon RDS. To audit when a user accesses raw data files kept in Amazon S3 or runs analytical queries on the data using services like Amazon Athena or Amazon EMR, Imperva DSF gathers data access logs from providers like Amazon CloudWatch.

Identification of doubtful data access patterns, like the suspected network connections, extensive access to sensitive information, and the utilization of eminent service accounts by interactive users are included in Imperva DSF includes User Entity Behavior Analytics (UEBA). With these capabilities, companies discover and find important data breaches without the involvement of expert data security analysts. Lastly, security operation teams can build playbooks to automatically remove threats utilizing native features of AWS such as security groups included in Imperva DSF. This allows companies remain compliant while also preventing data breaches.

Seclore announces partnership with TD SYNNEX!

Seclore, a pioneering platform in data-centric security, recently announced a new collaboration with TD SYNNEX, a worldwide IT distributor and solutions aggregator created by the union of Tech Data and Synnex. This collaboration provides enterprises with complete solutions to their data protection challenges.

“Seclore has been innovating data-centric security for many years. Starting a partnership with TD Synnex for North America will be a critical step to educate the market on the impressive data protection capabilities Seclore provides,” says Keith Mozena, VP Partner & Channel Sales at Seclore.

This collaboration goes beyond “one-time labeling and access policy.” The combined solution offers real-time tracking and visibility of both authorized and unauthorized activity on the data, enabling the enterprise to learn, identify suspicious behavior, evolve data security policies, immediately change security permissions, and even completely remove an item to prevent data loss.

“TD SYNNEX is committed to uniting IT solutions that deliver business outcomes today and unlock growth for the future,” Cheryl Neal, Vice President of New Vendor Acquisition. “With Seclore added to our vast portfolio of vendor partners, we’re able to enrich the breadth and depth of our offerings so customers can do great things with technology.”

By safeguarding sensitive data wherever it goes—on any device, in any cloud, or throughout your company ecosystem—Seclore and TD SYNNEX offer the total data security solution. For instance, integrating Seclore with collaboration tools like Microsoft 365 can help businesses control and secure unstructured data that is shared and used internally as well as with clients, partners, and other businesses.

Catalogic Software launches Newest Version of DPX!

The most recent version of Catalogic DPX, the company’s enterprise data protection software, has been released and is now generally available, according to Catalogic Software, a top provider of smart data protection solutions. With DPX 4.8.1, two new features are available: DPX vPlus, cloud data protection for Microsoft 365 and other open virtualization platforms, and GuardMode, a feature that enables ransomware early detection.  

Krista Macomber, the Senior Analyst, Evaluator Group, said, “Cybercriminals are constantly innovating, costing US victims $49.2 million in losses to ransomware attacks last year alone – and that is just based on incidents reported to the FBI. Catalogic DPX’s new GuardMode feature can help organizations minimize business disruption, including financial losses, when they are hit by ransomware. For example, proactive monitoring against a list of over 4,000 known ransomware patterns that are automatically updated helps to mitigate the spread of ransomware, and the ability to roll back only affected data allows good data that might be interspersed with infected files to be preserved.”

When used in place of a specific binary fingerprint, DPX GuardMode complements endpoint and edge protection by keeping an eye on file shares and file system activity even over a network. GuardMode monitors and updates over 4000 known ransomware threat patterns and assess affected files. Honeypots serve as a deception layer to catch various ransomware strains that are constantly changing, supporting this extensive forensic layer of security. GuardMode boosts confidence in ransomware detection by identifying and recovering only the affected data.

“DPX GuardMode changes a backup team’s cyber reliance posture from reactive to proactive with early detection,” said Sathya Sankaran, COO, Catalogic Software. “DPX GuardMode notifies backup and storage teams of suspicious activity and pinpoints the extent of damage caused by cyber incidents. Combined with the comprehensive workload coverage of DPX and instant recoveries, Catalogic DPX customers will be among the best prepared to recover from a cyberattack.”

Ken Barth, CEO of Catalogic Software, said, “We are excited to extend our relationship with Storware and announce DPX vPlus, that adds Microsoft 365 cloud data protection and expands our coverage of hypervisor workloads. DPX vPlus is fully integrated into the DPX vStor backup repository and delivers greater workload coverage for an organization’s edge and cloud data.”

Protecto and Snowflake Partnered for Data Protection

Protecto announced the integration of its artificial intelligence and privacy engineering platform into Snowflake. Snowflake is a data cloud company; this integration will help customers to identify data security issues before data breaches, and customer trust violations occur.

Data is the foundation of modern businesses, but it is increasingly susceptible to security flaws, privacy violations, and theft. Manual processes and compliance checks are insufficient to safeguard today’s complex data environments. The partnership between Protecto and Snowflake will provide visibility in identifying data protection vulnerabilities while maintaining the speed and agility of Snowflake’s platform.

Amar Kanagaraj, Founder and CEO of Protecto, commented, “The world is evolving to be privacy-first and zero-trust security. As a result, companies expect data security and privacy as part of their data stack. We’re introducing Data Posture Intelligence, a technology multiple steps ahead of the competition to deliver data protection in minutes.”

Protecto automates data privacy, security, and governance audits to provide results in minutes. The solution provides data posture insights in a single pane of glass, which helps their joint customers in finding personal information. It helps them determine who has access to sensitive data, identify inactive users, and audit user permissions. It allows customers to check user activities for potential privacy violations. Customers can recognize unused data that is open, overexposed, or stale.

Venkat Gopalan, Chief Data Officer of Belcorp, commented, “Cloud data platforms such as Snowflake give us enormous scalability and agility. With Protecto and Snowflake’s partnership, we have tighter control over our data security and privacy. Products like Protecto give us granular visibility over data protection across our Snowflake Data Cloud.”

IBM Acquired Databand.ai for Data Security

IBM announced the acquisition of Databand.ai, a provider of data observability software that assists organizations in resolving data issues such as errors, pipeline failures, and poor quality before they impact their bottom line.

Organizations are struggling to manage the health and quality of their data sets, which is required to make better business decisions and gain a competitive advantage as the volume of data continues to grow at an unprecedented rate. Data observability, a rapidly growing market opportunity, is quickly emerging as a key solution for assisting data teams and engineers in better understanding the health of data in their system and automatically identifying, troubleshooting, and resolving issues such as anomalies, breaking data changes, or pipeline failures in near real-time.

This acquisition enhances IBM’s software portfolio across data, AI, and automation to address the full spectrum of observability and aids organizations in ensuring that reliable data is placed in the hands of the appropriate users at the appropriate time.

Databand.ai is IBM’s fifth acquisition in 2022 as the company expands its hybrid cloud and AI capabilities.

Josh Benamram, Co-Founder and CEO of Databand.ai, stated, “You can’t protect what you can’t see, and when the data platform is ineffective, everyone is impacted –including customers. That’s why global brands such as FanDuel, Agoda, and Trax Retail already rely on Databand.ai to remove bad data surprises by detecting and resolving them before they create costly business impacts. Joining IBM will help us scale our software and significantly accelerate our ability to meet the evolving needs of enterprise clients.”

The open and extendable approach of Databand.ai enables data engineering teams to integrate and gain observability into their data infrastructure easily. This acquisition will provide Databand.ai with additional resources to expand its observability capabilities for broader integrations across more open-source and commercial solutions that power the modern data stack. Enterprises will also have complete control over how Databand.ai is deployed, whether as a SaaS or a self-hosted software subscription.

IBM’s acquisition of Databand.ai expands on the company’s R&D investments and strategic acquisitions in AI and automation. IBM is well-positioned to address the full spectrum of observability across IT operations by combining Databand.ai with IBM Observability by Instana APM and IBM Watson Studio.

Data observability solutions are also essential components of a company’s overall data strategy and architecture. The acquisition of Databand.ai expands IBM’s existing data fabric solution by assisting in the delivery of the most accurate and trustworthy data to the right hands at the right time – regardless of where it resides.

Daniel Hernandez, General Manager for Data and AI at IBM, commented, “Our clients are data-driven enterprises who rely on high-quality, trustworthy data to power their mission-critical processes. When they don’t have access to the data they need at any given moment, their business can grind to a halt. With the addition of Databand.ai, IBM offers the most comprehensive set of observability capabilities for IT across applications, data, and machine learning and is continuing to provide our clients and partners with the technology they need to deliver reliable data and AI at scale.”

Normalyze Raises Millions to Help Manage Sensitive Data

Normalyze is an agentless platform that assists organizations in better managing sensitive data, as well as attack paths to it in today’s complex, multi-cloud environments, thereby protecting customers from large and damaging data breaches. Security teams can continuously assess, prioritize, and react to cloud data threats and stop sensitive data loss using Normalyze’s graph-powered platform.

Normalyze has emerged from stealth with $22.2 million in Series A funding led by Lightspeed Venture Partners and Battery Ventures. This funding round brings the company’s total funding to $26.6 million.

Amer Deeba, Cofounder and CEO at Normalyze stated, “Today’s enterprises find their data scattered throughout their various cloud environments with limited visibility of where sensitive data resides. It’s a massive problem that current cloud security offerings aren’t equipped to handle. We built Normalyze to help companies of all sizes discover, classify and secure sensitive data across all public clouds. With simple onboarding and minimum ramp-up time, our platform provides full visibility on data security posture to better gauge risk and proactively respond to sensitive data threats.”

Normalyze has the unique ability to bring together all security stakeholders in one user interface, from the CISO to the security engineer to DevOps, to discover data, classify it, and prioritize the discovery of attack paths that can lead to sensitive information. Normalyze’s data-first cloud security platform works in three stages, it builds an intelligent graph with deep context and transitive trust relationships representing all the data stores, applications, identities, and infrastructure resources in all clouds and how they all connect during discovery and analysis. The agentless data scanner from Normalyze then determines which data stores contain sensitive information and automatically maps it to specific profiles such as PCI, HIPAA, and GDPR.

Ravi Ithal, Cofounder and CTO of Normalyze commented, “Our graph-powered platform is a hub that connects all data with assets, identities, accesses, misconfigurations, and vulnerabilities to help security teams continuously discover sensitive information, determine attack paths, and automate remediation efforts to secure it. With the Normalyze one-pass scanner, users can scan structured and unstructured data stores to discover sensitive information based on predefined compliance profiles for PII, GDPR, HIPAA, and more with minimal upfront configuration and cost, all while ensuring data never leaves their cloud environments.”

Read more articles:

Cyware Declared SOC 2 TYPE 2 Compliance for Data Security

Phison Electronics and Cigent Technology announces a partnership program!

Phison Electronics Corp and Cigent Technology announces a partnership program, Cigent Secure SSD Ready. Through this strong alliance, Cigent’s built-in cybersecurity enhancements are embedded into a subset of Phison storage devices and controllers. Phison’s storage partners can easily activate these features and offer them as an option to their customers and global channel partners.

Sebastien Jean, CTO, Phison said, “We couldn’t be more excited about our exclusive partnership with Cigent to equip selected Phison products with the most secure storage solution on the market. Phison OEM partners and PC OEMs now have a turnkey solution that provides unparalleled storage-based data security across the entire storage ecosystem/PC supply chain.”

Phison and Cigent have closely collaborated to embed security protections directly into the storage device, guarding against all known attacks. The critical features of the Cigent Secure SSD Ready firmware include secured portions of a drive that are rendered unreadable and thus invisible at the sector level. The keys derived from user-supplied credentials are always stored in their final form and have the maximum length allowed. Furthermore, Keep-Alive heartbeat detects and automatically hides data if security software is disabled. The Firmware is responsible for storing secure data access logs that cannot be changed or erased. Also, True EraseTM data destruction verification ensures that all data has been completely erased. The Dual-Mode provides two distinct drives on a single SSD, as well as the ability for independent operating systems to be completely invisible to each other at the BIOS level, resulting in a secret and secure drive that adversaries cannot access or even know exists. The cloud-based management console from Cigent allows for enterprise-wide data security, zero-trust data security controls, and integration with existing security solutions.

John Benkert, CEO of Cigent Technology said, “Our alliance with Phison makes it easy for Phison’s storage partners to deliver next-gen data security to customers that require enhanced endpoint data protection in order to defend sensitive information from today’s increasingly sophisticated threats.

Read More: Stellar Cyber security sensors improves overall security posture!

Cyware Declared SOC 2 TYPE 2 Compliance for Data Security

Cyware declares the completion of the System and Organization Controls (SOC) 2 Type 2 Audit for the trust services criteria relevant to Security (“applicable trust services criteria”) Trust Services Criteria for Security, Availability, Processing Integrity, Confidentiality, and Privacy, as outlined in TSP section 100, (AICPA, Trust Services Criteria).

Anuj Goel, CEO of Cyware commented, “Commitment to the highest levels of data security has always been one of our foremost business priorities. The SOC 2 Type 2 certification process is not easy to achieve but our team was fully committed and prepared to ensure we checked all the required boxes. The new milestone will further strengthen the confidence of our current and future customers in our robust compliance with industry benchmark data security standards including SOC 2 (Type 1 and Type 2) and ISO/IEC 27001:2013.”

This accomplishment shows how dedicated the company is to the highest data security standards. The American Institute of Certified Public Accountants (AICPA) developed SOC 2 as a reporting framework that establishes benchmarks for Software-as-a-Service (SaaS) companies that manage customer and user data. The certification confirms that the organization’s internal systems and controls are in continuous compliance with the SOC 2 audit standards. Schellman & Company, a globally recognized attestation, and compliance services provider performed the audit for Cyware.

Cyware’s clients include some of the world’s largest financial and healthcare organizations, as well as ISAOs and more than 20 sectoral information-sharing communities (ISACs and ISAOs), use Cyware’s solutions to communicate threat intelligence with more than 10,000 member organizations, National CERTs, and Managed Security Service Providers (MSSPs/MDRs). In addition, Cyware recently launched the industry’s first ISAC-to-ISAC Operational Collaboration initiative to remove barriers to cross-sectoral threat sharing. The SOC 2 certification validates the company’s ongoing commitment to earning and retaining customer trust by using security as the foundation for all business operations and product development.

Read more articles:

Netskope Improvised Netskope Private Access