About Us

ioSafe 1522+ protects data from fire and water 

The ioSafe 1522+ is a five-bay network attached storage (NAS) system that ioSafe has developed for companies of all sizes, including those with remote locations in areas that are prone to fire and flooding. ioSafe, a leading provider of data protection solutions, announced the launch of their latest product, the ioSafe 1522+. This innovative device is designed to help organizations protect their valuable data from the devastating effects of fire and water damage. 

Randal Barber, CEO of ioSafe parent company CDSG commented, “The 1522+ is the next proof point in our commitment to delivering the world’s most innovative and effective fireproof and waterproof data protection solutions. This powerful device helps businesses and government agencies, media companies, and creative professionals restore enormous amounts of data faster than ever after a disaster, ensuring as little disruption to their businesses as possible.” 

For both large and small businesses across all industries, including those with remote facilities, the ioSafe 1522+ is a versatile, all-in-one solution. The brand-new ioSafe 1522+ is now accessible. The devices come with a two-year hardware warranty as well as two years of data recovery service for devices with factory-installed and verified drives. 

  • Its AMD dual-core processor is perfect for taxing business settings. 
  • The 1522+ is perfect for a variety of storage environment tasks, including running virtual machines and data server applications for a department or an entire business. It comes standard with 8GB of configurable RAM and is upgradeable to 32GB. 
  • A new optional 10GbE network port for the quickest access and performance is available on ioSafe NAS devices. In addition, link aggregation for high throughput and failover support is made possible by the four 1 GbE LAN ports. 
  • The trusted Synology DiskStation Manager (DSM), which offers on-site or cloud-integrated backup, data encryption, data sharing, synchronization, and surveillance, is only available with the 1522+. 

Tom Wynkoop, Hardware Support Supervisor, Astra Practice Partners stated, “I have seen an ioSafe device perform above expectations in a live-fire situation in Portland, Oregon, where a dental practice suffered the complete loss of building and equipment. We extracted the drive, performed a 100% recovery, and had the practice back in business the following day. ioSafe products perform, surviving both extremes: the fire itself and the fire department’s water when extinguishing the fire.” 

Immuta launched Immuta Detect for insights into risky user data access behavior 

Immuta has launched its most recent product Immuta Detect. Immuta Detect alerts data and security teams about risky data access behavior through its continuous data security monitoring capabilities. This improves data security posture management across contemporary cloud data platforms and allows for more precise risk remediation. 

Mo Plassnig, CPO, Immuta stated, “In the modern business landscape, organizations face a challenging dichotomy in which they need to use and share data to remain competitive but also maintain the highest standards of data security. 

It comes down to managing your risk appetite and to do that effectively, it is vital for teams to have a comprehensive view of data access activities and risks. Immuta Detect is an important step towards meeting customer demands for a comprehensive approach to data security, from discovering sensitive data, protecting it, and monitoring its usage, to keeping data policies up to date.” 

Immuta’s Data Security Platform now includes a new key pillar that provides sensitive data discovery, security and access control, and data activity monitoring. The platform integrates with existing SIEM and Managed Detection and Response (MDR) tools as well as cloud data platforms. 

As the number of data sources and users in modern cloud environments grows, monitoring data usage and responding to threats becomes more difficult. This is critical for safeguarding against insider threats and adhering to rules and regulations. 

Customers can utilize Immuta Detect’s new features to surface and prioritize risks associated with data usage, shorten the time required for risk mitigation, and maintain data security. 

Advanced access behavior analytics – Immuta Detect unifies data access logs so that data and security teams can continuously monitor and analyze changes in user behavior and data access entitlements by source, query, or user activity, as well as gain understanding of security configuration and data classification changes. 

Sensitive data views and indicators – Immuta Detect provides analysis of individual user and data activity, summarizing activity across time frame, data access events categorization, most active data sources, and sensitive data indicators. 

Arcserve launched Unified Data Protection 9.0 for improved data resilience 

Arcserve launched Unified Data Protection (UDP) 9.0, it is a centrally managed backup and disaster recovery solution that provides every data infrastructure with reliable protection for all types of workloads, ensuring it is future-proof. Complete data protection along with Sophos cybersecurity defense, immutable storage, tape backup, and scalable on-site or off-site business continuity are all included. 

Florian Malecki, EVP of marketing at Arcserve stated, “The data resilience of organizations of all sizes is constantly challenged with the volumes and types of data they need to manage, protect, and secure. Arcserve UDP 9.0 takes data resilience to the next level delivering enhanced data protection, performance reliability, and management. By offering complete ransomware resilience in one solution, Arcserve UDP 9.0 helps our partners drive customer value and growth opportunities in this burgeoning market.” 

A recent independent research study of IT decision makers (ITDMs) commissioned by Arcserve found that 83% of respondents have a data resilience strategy, emphasizing the need for robust enterprise data resilience strategies. However, only 23% have a comprehensive strategy. According to the research, nearly half (45%) of organizations that experienced data loss were unable to recover all of their data. 

AJ Stevens, director of sales at CTS-Companies commented, “It’s getting harder and more complex to deliver always-on, always-recoverable data protection to our customers. Arcserve UDP 9.0 is an ideal single-vendor solution because it removes complexity while providing the most advanced and robust cybersecurity, data protection, immutable backup, and recovery features.” 

Arcserve UDP 9.0 improves data resilience by introducing new advanced capabilities, such as the following: 

Data protection for Oracle Database (DB): With the ability to restore the entire Oracle PDB (including all tablespaces and control files) to its original location, organizations can quickly recover terabytes of Oracle PDBs backed up using Oracle RMAN. Customers can recover granular Oracle PDB files and restore them to their original location. Oracle DBs on Solaris x64 platforms are fully protected by UDP 9.0. 

Options for restoring Microsoft SQL server deployments: UDP 9.0 provides increased granularity, allowing database recovery to any transaction point between two recovery points. Assures restore integrity by performing a consistency check to ensure that the data retrieved is usable. This avoids a major issue in which restores are successful, but data is unusable. 

Cloud object storage improves availability, durability, and scalability: Organizations can store deduplicated backups directly on AWS S3, Wasabi, or Google Cloud Storage to lower total cost of ownership and improve disaster recovery support with cloud-based offsite safe stores. 

UDP 9.0 now includes a cloud-based management console with multi-tenancy and secure identity management, as well as an on-premises private management console. The cloud-based console requires no installation, manual deployment, or extensive configuration. The multi-tenancy capabilities of UDP 9.0 enable users to easily configure sub-organizations and manage them as separate tenants. Okta’s Zero Trust implementation, which uses multifactor authentication, is one example of stringent identity security measures (MFA). 

Varonis announced improved data security through least privilege automation 

Varonis announced the availability of least privilege automation for Microsoft 365, Google Drive, and Box — a new capability that automatically removes unnecessary data risk without the need for human intervention. 

Jim Reavis, CEO, Cloud Security Alliance commented, “When excessive data access goes unchecked, a single compromised user or rogue insider can inflict untold damage on a business. 

Reducing the data blast radius is a top priority for CISOs, but manual remediation isn’t possible with today’s pace of data growth and collaboration.” 
 

Varonis’ goal to provide customers with effortless data security outcomes is furthered by this innovation. 

Varonis’ cloud-native platform, in contrast to other approaches that are all-or-nothing, determines who needs access to data and who doesn’t based on usage, data sensitivity, and exposure. 

Because least privilege automation consistently upholds them without hindering collaboration, organizations can tailor remediation policies to meet their security and compliance requirements. 

David Bass, CTO of Varonis stated, “With the launch of our new SaaS platform, our mission is to solve our customers’ critical data security challenges with automation — and that starts by ending excessive data access with the industry’s first fully autonomous remediation engine. 

We offer the only scalable way to eliminate collaboration risk and continually keep data exposure low across today’s most critical data stores.” 

More than 40 million unique permissions and 157,000 sensitive records are available online in the cloud environment of the typical business. By eliminating the public and organizational exposure caused by sharing links and unused entitlements, least privilege automation eliminates collaboration risk. 

Pixalate Releases MRT App for Slack to Access Ad Fraud Insights

The Media Ratings Terminal (MRT) app for Slack was made available by Pixalate and can be found in the Slack App Directory. As Pixalate aims to even up privacy, ad fraud, and compliance insights, the Media Ratings Terminal (MRT) app delivers ad fraud data directly to Slack. Apart from privacy ad fraud, and compliance ratings, MRT brings insights throughout mobile and CTV apps as well as websites through Amazon, Roku, Google and Apple app stores.  

Jason Dias, Pixalate’s VP of Engineering, stated, “The MRT for Slack is our latest addition to increase accessibility of key data points around ad fraud and privacy compliance in the advertising supply chain. Bringing MRT data points into everyday conversations in Slack makes identifying, following, and troubleshooting issues easier for all types of teams.” 

The release of the latest app for Slack is another step taken by Pixalate to increase access of fraud and privacy compliance risk data as well as boost transparency in the ad tech space. This step follows the latest releases of the Ad Trust & Safety API Suite and COPPA Compliance Technology of Pixalate to discover child-directed mobile apps throughout the Apple App and Google App Stores. 

With the help of the app, users can quickly search for any app name, ID, or website address within their Slack workspace. Additionally, it has a summary Home tab for the user’s MRT Watchlist, which provides a quick view of data points for the applications and websites they have chosen to follow. Users may easily edit their lists via the “Follow” and “Unfollow” buttons in the Slack app. The app also incorporates conversations related to the MRT and opens links in a channel to deliver important data points when accessible. This provides immediate access for ad buyers, publishers, privacy regulators, and other parties to watch over apps and domains. 

Protecto and Snowflake Partnered for Data Protection

Protecto announced the integration of its artificial intelligence and privacy engineering platform into Snowflake. Snowflake is a data cloud company; this integration will help customers to identify data security issues before data breaches, and customer trust violations occur.

Data is the foundation of modern businesses, but it is increasingly susceptible to security flaws, privacy violations, and theft. Manual processes and compliance checks are insufficient to safeguard today’s complex data environments. The partnership between Protecto and Snowflake will provide visibility in identifying data protection vulnerabilities while maintaining the speed and agility of Snowflake’s platform.

Amar Kanagaraj, Founder and CEO of Protecto, commented, “The world is evolving to be privacy-first and zero-trust security. As a result, companies expect data security and privacy as part of their data stack. We’re introducing Data Posture Intelligence, a technology multiple steps ahead of the competition to deliver data protection in minutes.”

Protecto automates data privacy, security, and governance audits to provide results in minutes. The solution provides data posture insights in a single pane of glass, which helps their joint customers in finding personal information. It helps them determine who has access to sensitive data, identify inactive users, and audit user permissions. It allows customers to check user activities for potential privacy violations. Customers can recognize unused data that is open, overexposed, or stale.

Venkat Gopalan, Chief Data Officer of Belcorp, commented, “Cloud data platforms such as Snowflake give us enormous scalability and agility. With Protecto and Snowflake’s partnership, we have tighter control over our data security and privacy. Products like Protecto give us granular visibility over data protection across our Snowflake Data Cloud.”

IBM Acquired Databand.ai for Data Security

IBM announced the acquisition of Databand.ai, a provider of data observability software that assists organizations in resolving data issues such as errors, pipeline failures, and poor quality before they impact their bottom line.

Organizations are struggling to manage the health and quality of their data sets, which is required to make better business decisions and gain a competitive advantage as the volume of data continues to grow at an unprecedented rate. Data observability, a rapidly growing market opportunity, is quickly emerging as a key solution for assisting data teams and engineers in better understanding the health of data in their system and automatically identifying, troubleshooting, and resolving issues such as anomalies, breaking data changes, or pipeline failures in near real-time.

This acquisition enhances IBM’s software portfolio across data, AI, and automation to address the full spectrum of observability and aids organizations in ensuring that reliable data is placed in the hands of the appropriate users at the appropriate time.

Databand.ai is IBM’s fifth acquisition in 2022 as the company expands its hybrid cloud and AI capabilities.

Josh Benamram, Co-Founder and CEO of Databand.ai, stated, “You can’t protect what you can’t see, and when the data platform is ineffective, everyone is impacted –including customers. That’s why global brands such as FanDuel, Agoda, and Trax Retail already rely on Databand.ai to remove bad data surprises by detecting and resolving them before they create costly business impacts. Joining IBM will help us scale our software and significantly accelerate our ability to meet the evolving needs of enterprise clients.”

The open and extendable approach of Databand.ai enables data engineering teams to integrate and gain observability into their data infrastructure easily. This acquisition will provide Databand.ai with additional resources to expand its observability capabilities for broader integrations across more open-source and commercial solutions that power the modern data stack. Enterprises will also have complete control over how Databand.ai is deployed, whether as a SaaS or a self-hosted software subscription.

IBM’s acquisition of Databand.ai expands on the company’s R&D investments and strategic acquisitions in AI and automation. IBM is well-positioned to address the full spectrum of observability across IT operations by combining Databand.ai with IBM Observability by Instana APM and IBM Watson Studio.

Data observability solutions are also essential components of a company’s overall data strategy and architecture. The acquisition of Databand.ai expands IBM’s existing data fabric solution by assisting in the delivery of the most accurate and trustworthy data to the right hands at the right time – regardless of where it resides.

Daniel Hernandez, General Manager for Data and AI at IBM, commented, “Our clients are data-driven enterprises who rely on high-quality, trustworthy data to power their mission-critical processes. When they don’t have access to the data they need at any given moment, their business can grind to a halt. With the addition of Databand.ai, IBM offers the most comprehensive set of observability capabilities for IT across applications, data, and machine learning and is continuing to provide our clients and partners with the technology they need to deliver reliable data and AI at scale.”

Palo Alto Networks to Protect Oracle’s Cloud Apps and Data

Palo Alto Networks announced that Oracle selected the Palo Alto Networks VM-Series Next-Generation Firewall (NGFW) as the technology to power the Oracle Cloud Infrastructure (OCI) Network Firewall. The new OCI Network Firewall, a natively integrated offering, joins the Palo Alto VM-Series Next-Generation Firewall. Palo Alto Networks and Oracle collaborate to offer customers the solutions they require to secure their cloud adoption journey.

Enterprise customers who develop new applications or migrate existing Oracle applications to OCI require best-in-class security to help prevent new threats and breaches. Palo Alto and Oracle have been addressing the need for Oracle Cloud Infrastructure customers since 2019.

Lee Klarich, chief product officer, of Palo Alto Networks commented, “Oracle has made security foundational and built-in for OCI customers to help them address regulatory compliance requirements, stop security threats and concerns, and prevent security-related outages. As Oracle is expanding its cloud security capabilities to provide multiple layers of defense to help identify and defeat emerging threats and security violations quickly, we are incredibly proud that they have chosen Palo Alto Networks technology to power these new capabilities.”

The OCI Network Firewall is a cloud-native firewall service that extends best-in-class NGFW capabilities to protect OCI workloads and aids in providing centralized cyberattack protection across OCI. Customers can use it to activate and secure their applications and cloud environment with firewall features, as well as can scale their security across their cloud deployment.

Clay Magouyrk, executive vice president, of Oracle Cloud Infrastructure stated, “Our enterprise customers are confronted with an ever-changing threat landscape and the complexities that come with it. Therefore, we’re intently focused on providing our customers with a comprehensive set of cloud security services that are easy to deploy and built in. Teaming up with Palo Alto Networks to provide our customers with next-generation firewall security is going to make it even easier for enterprises to identify potential vulnerabilities.”

Read more articles:

Benefits of Cloud Security in 2022!!

The Ultimate Guide to NAC (Network Access Control) in 2022!

Network Access Control (NAC) solutions support organizations to manage endpoint and user access provision using a set of policies or protocols and authentication mechanisms to secure organizational networks and data. Organizations can control endpoints (otherwise known as nodes or devices) at the pre-and post-admission stages, implement security compliances, and create resource usage policies based on various factors such as location or user authority.

Wired networks generally have different kinds of security measures in place. However, with wireless networks, where endpoints are connected merely through the internet or via a common router, the security of data and devices becomes much more complex. The authentication of users in large organizations with wireless networks, especially with data increasingly being moved to the cloud, becomes a major concern since sensitive data must be protected at all costs. Traditionally, NAS (Network Access Server) was used to ensure that people without visibility rights would not be able to access resources by blocking off access based on the confirmation of login details. However, amidst the digital shift, NAS is no longer usable unless an organization maintains a rigid user environment.

This means that unless an organization has
1) a small number of employees, and
2) a fixed number of devices that can be monitored,
it most definitely needs more security than a log-in password. This is where NAC comes in to save the day.

NAC solutions are extremely important in situations where employees or guests are allowed to bring their own devices to the workplace, sign into the network, and access information from multiple devices simultaneously.
Nowadays, most organizations have moved to cloud-based storage, and allow their employees to access files remotely. With BYOD (Bring Your Own Device) and Remote-Access becoming more widely accepted as the norm, understanding, and adopting NAC becomes vital.

So, let us dive into what NAC is –

4 major concepts act as a foundation for NAC–

IDS/IPS (Intruder Detection Systems/Intruder Prevention Systems) – These are put in place to identify and contain breaches and attacks.

User Authentication – This involves the correct identification and verification of users/devices attempting to access a network.

Endpoint Security – Endpoints or devices need to remain secure once access has been granted. This is what is known as post-Admission security.

And finally, Network Security – This concept focuses on ensuring the security of the network environment.

We talk more about Identity and Access Management, User Authentication, Unified Endpoint Management, Zero-trust Network Security, and IDS/IPS in our other insights.

Coming back to Network Access Control Solutions, some of the most basic actions that they help organizations carry out are –

1) Create user profiles based on identity and role to detect trusted users. This method of identification steers away from IP address-based verification.
2) Restrict non-compliant, unverified users from utilizing the corporate network and accessing data.
3) Monitor user activity once admitted and control continuation of access provision.
4) Remove any unidentifiable or suspicious users, devices, or applications to prevent data misappropriation or malicious attacks.
5) Provide different levels of access to endpoints based on a profiling engine. This engine can discover, monitor, and/or quarantine endpoints based on user behavior or role in the organization.
6) Put firewalls, spyware detection, malware detection, anti-virus software, and intrusion detection systems into place.
7) Create a baseline for endpoint security and monitor all devices that request access for compliance/non-compliance.
8) Help administrators create and implement security policies based on user data, user roles, and network complexity to govern internal and external activity, as well as reduce security risks by controlling access for devices. This involves temporarily blocking or isolating devices until administrator intervention takes place.
9) Create and manage a guest network, which can be used to provide limited access to guest users. This involves the creation of a guest portal that is capable of authenticating, registering, and managing access for guest users.
10) Integrate with other access control tools and security applications to secure vulnerabilities, contain attacks, and restrict unprotected devices from contaminating other devices on the network.

Akamai introduced Linode Managed Database for Developers

Akamai Linode Managed Database simplifies database deployment by assisting developers in reducing risk, improving efficiency, and reducing the complexity associated with manually managing production database clusters. Akamai Technologies introduced its database service powered by Linode that supports MySQL, PostgreSQL, Redis, and MongoDB.

Will Charnock, Senior Director of Engineering at Akamai stated, “Every web application needs a database. Being able to automate aspects of database management is critical for applications that need to be scalable, highly performant, and resilient. Linode Managed Database continues the important work, which began with Linode Kubernetes Engine – our managed Kubernetes service – of supporting developers, businesses, and partners by managing the day-to-day tasks of mission-critical components of their applications, allowing them to focus more on innovation and less on daily infrastructure management. With the click of a button, developers can have a fully managed database deployed and ready to be populated.”

Databases are the most crucial facet of any application but managing them manually is a time-consuming and resource-intensive process.  Akamai Linode Managed Database service can allocate common deployment and maintenance tasks to Linode and select highly available configurations to ensure that database performance and uptime are never compromised. As a result, deploying applications requires less hands-on management expertise and has a lower risk of downtime when compared to manual management.

Linode customers have frequently sought the need for managed databases. Following the acquisition of Linode in March of this year, Akamai’s first product launch in its compute line of business is the Linode Managed Database service, reinforcing its mission to develop the world’s most powerful and distributed compute platform from the cloud to the edge.

Akamai will initially offer Linode Managed Database for MySQL in all of Linode’s 11 global data centers, with PostgreSQL, Redis, and MongoDB support coming in the second quarter of 2022. Customers can take advantage of features such as flat-rate costing, security and recovery measures, flexible deployment options, and high availability cluster options with each supported managed database.

Read more articles:

Integrated Risk Management Platform

BreachBits Launches BreachRisk