About Us

Netskope Improvised Netskope Private Access

Netskope announced significant improvements to Netskope Private Access, the zero-trust network access (ZTNA) foundation of its security platform. Customers of Netskope can now apply zero trust principles to the broadest range of hybrid work security requirements, including SaaS, IaaS, private applications, web, e-mail, and endpoint devices.

In hybrid work environments, enterprises are rapidly adopting Secure Access Service Edge (SASE) technology architecture. ZTNA is critical to SASE, it enables organizations to transition from legacy remote access VPN infrastructure to a modern, efficient, and secure infrastructure.

Netskope Private Access, which provides ZTNA services, is an essential component of the Netskope Intelligent SSE platform. It connects users to corporate resources anywhere, using any device, and continuously evaluates context and adapts to reduce risk. This context has now been extended to the enterprise data layer, leveraging Netskope’s unified DLP capabilities. Netskope provides advanced data protection capabilities, which are highlighted as an area where other SASE and SSE vendors fall short.

John Martin, Chief Product Officer at Netskope stated, “Enterprises need data-centric ZTNA—period. Private applications often house some of an organization’s most valuable information, including trade secrets and code repositories, and are an absolute must for comprehensive data protection capabilities. These key enhancements to Netskope Private Access extend Netskope’s award-winning zero-trust data protection capabilities that much further, offering enterprises multiple options to protect the information, from inspecting private application traffic to applying DLP in risky use cases such as third-party access and BYOD.”

A hybrid work environment needs the ability to apply zero trust principles to govern user, device, network, application, and data behavior, thereby increasing confidence in policy enforcement everywhere. Under zero trust, technology resources no longer implicitly trust any entity seeking to connect. The resource can determine an appropriate level of confidence, or trust, only for that specific interaction and by evaluating several contextual elements such as user role and identity, device identity and security posture, time of day, data sensitivity level, and more. Businesses become more agile, reduce risk, and streamline application deployment and ongoing maintenance because of using Netskope Intelligent SSE with zero trust data protection throughout.

Chris Rodriguez, Research Director of Security & Trust at IDC stated, “Zero trust network access is all about optimizing the balance of enabling access and mitigating risk, and the most effective ZTNA solutions, including Netskope Private Access, help reduce the risk and exposure associated with legacy remote-access VPNs. Enterprises should be pleased to see that Netskope continues to innovate and has now added capabilities to strengthen data protection policies across the widest range of use cases, from SaaS to private apps.”

Read more articles:

Everything you need to know about Zero Trust Security in 2022!

SecZetta & Active Cyber Partnered for Identity Governance

SecZetta has collaborated with Active Cyber, a cloud consultancy firm that specializes in the implementation of cloud-based Identity & Access Management (IAM) solutions. SecZetta’s Third-Party Identity Risk solution will be sold by Active Cyber. It will also offer consulting and implementation services to organizations interested in implementing a comprehensive, zero-trust solution to their third-party non-employee challenges.

Kishore Vankayalapati, CIAM Practice Leader at Active Cyber commented, “Organizations are investing heavily in cybersecurity programs to make them more resilient against cyber-incidents and enable them to detect attacks in a shorter timeframe to minimize the costs associated with breaches.”

Almost every industry relies on a growing and increasingly diverse number of third parties to provide the elasticity required to respond to operational needs quickly and cost-effectively. Most organizations, however, lack a centralized way to track and manage their relationships with this growing number of non-employees, as well as the access to enterprise assets that they require.

SecZetta bridges the technological gap in third-party identity governance by providing third-party identity risk solutions that are simple to use and purpose-built to assist organizations in implementing risk-based identity access and lifecycle strategies for third-party non-employee populations. SecZetta adds the most value when combined with industry-leading IGA solutions like Okta and SailPoint.

Active Cyber adds value throughout the sales and delivery process by consulting with and advising customers on a complete, zero-trust solution to their third-party challenges, which includes SecZetta in addition to these other industry-leading identity solutions.

Jeremy Rohrs, SVP, global channel, alliances, and corporate development, SecZetta stated, “Active Cyber’s expertise uniquely positions them to advise clients around a true zero-trust approach to identity, ensuring both internal and external workforce needs are met for trusted, authoritative identity data that is essential for end-to-end identity governance. Non-employee identity governance is critical to limiting the attack surface of organizations relying on third-party services. We look forward to collaborating with Active Cyber to empower customers to maximize their use of third-party resources to support their business needs by managing the identity lifecycle and risk of third-party users and strengthening their resilience to identity-related cyber incidents.”

Read more articles:

Identity and Access Management in 2022!

Ivanti Announces Partnership with Lookout

Lookout, a leader in endpoint-to-cloud security, and Ivanti, the provider of the Ivanti Neurons automation platform that discovers, manages, secures and services IT assets from cloud to edge, announced today that they have partnered to help organizations accelerate cloud adoption and mature their Zero Trust security posture in the “Everywhere Workplace.”

In this new hybrid work paradigm, businesses confront numerous security issues in terms of protecting organizational data and detecting and blocking threats. To begin with, enterprises frequently lack visibility and control over who is accessing enterprise resources hosted in both managed and uncontrolled cloud sites, making comprehensive access and security governance challenges. At the same time, hackers are increasingly targeting mobile devices by exploiting security flaws in company IT infrastructure.

The President and Chief Product Officer at Ivanti, Nayaki Nayyar stated, “We’re excited to partner with Lookout to help organizations solve these challenges. This partnership allows us to expand on the Ivanti Neurons for ZTA solution by adding CASB and SWG technologies via the Lookout Security Platform. Our three core technologies solve different, but equally important, security challenges. And when deployed together, they enable organizations to achieve secure cloud adoption, deliver a better end-user experience and a comprehensive Zero Trust security posture.”

Ivanti’s Neurons for zero-trust access and Lookout’s cloud access security broker (CASB) and secure web gateway (SWG) have partnered to enable customers to increase threat prevention and data protection on both on-premises and in the cloud while adhering to zero-trust access security standards.

CEO of Lookout, Jim Dolce commented, “We share Ivanti’s commitment to help customers modernize IT, detect, and mitigate threats, and provide a secure and productive environment for the hybrid workforce. Together, we deliver secure access and advanced data protection across all users, devices and applications. By joining forces with Ivanti, Ivanti customers now have a clear path to a Zero Trust security strategy backed by our innovative, data-centric cloud security solutions. Our solution is optimized to simplify security operations fit for remote work and digital transformation to the cloud.”

Intertrust Platform Now Features Edge-to-cloud Security

Intertrust is expanding its flagship Intertrust Platform with robust, scalable authentication features to protect and manage IoT devices and data in zero-trust circumstances. New features provide end-to-end security and compatibility across data operations and multi-vendor IoT devices for data-driven businesses. Intertrust delivers trustworthy data technology and services to major global organizations, ranging from mobile, consumer electronics, and Internet of Things (IoT) manufacturers to service providers and corporate software platform firms.

Intertrust’s new edge-to-cloud capabilities combine a highly scalable secure device authentication architecture with application protection technology that safeguards devices running at the endpoint from malicious assault, allowing businesses to securely link IoT devices to cloud services. These devices relay trusted data to Intertrust Platform’s data operations layer, even if the data goes across untrusted networks. The control software then analyses and sends these devices reliable authorization signals. The Intertrust Platform offers device management capability through a “single pane of glass,” allowing businesses to choose devices from a variety of vendors while ensuring consistent and reliable security.

The Intertrust Platform gives businesses secure interoperability, allowing data management systems to work together as one. Enterprises can use the Intertrust Platform to choose best-of-breed technology via diverse data management systems from top data platforms, cloud service providers, and other vendors. When dealing with competitors and partners in complex legal and security contexts, this helps avoid vendor lock-in and provides scalability. Apps built on the Intertrust Platform, such as AI, benefit from secure access to controlled data.

Talal G. Shamoon, CEO of Intertrust commented, “Intertrust Platform enables enterprise customers to run interoperable services and devices in the face of growing threats and complex regulatory frameworks. With the addition of edge-to-cloud security for IoT devices in zero-trust networks to the Intertrust Platform, customers now have a comprehensive, secure and scalable platform that interoperates with best of breed data services, AI, and IoT devices in one consistent data operations and device management system.”

Intertrust’s solutions for digital media and energy applications are everywhere. The Intertrust Platform currently includes zero trust features in billions of devices. Intertrust is collaborating with global energy and mobility companies to allow IoT applications in renewable energy, modern grids, and energy retail environments. In addition, the Virtual Power Plant developers will provide security and interoperability between assets operated by diverse businesses.

Read more articles:

What is IoT Security?

What is Cloud Security?

AppOmni Introduced Developer Platform!!

Absolute Software Enhances its Security Access Product Portfolio!

Absolute Software, today announced new platform advancements that will allow clients to identify, and respond to possible endpoint security access threats across distant, distributed device fleets more quickly. This company is a leading provider of endpoint resilience solutions.

“The number of endpoint devices operating out of physical reach and off the corporate network has made it more challenging than ever for IT and Security admins to identify where their organization might be most vulnerable or exposed to risk,” said Ameer Karim, Executive VP of Product Management at Absolute. “These platform enhancements signal our ongoing commitment to delivering the visibility, intelligence, and self-healing capabilities our customers need to ensure devices and data remain protected, and critical applications stay healthy and resilient.”

IT and security professionals can now protect essential infrastructure, applications, devices, and data without sacrificing user productivity thanks to these product upgrades.

Benefits to users:

  1. Security access enforcement and dynamic re-authentication:

Customers may now more simply deploy current cloud authentication solutions to reduce the risk of compromised credentials. The ability to challenge a user’s security credentials if the conditions or environment change, forcing them to re-authenticate using existing technology such as Multi-factor Authentication, is one of the new features.

2. Foundational zero trust security:

New ZTNA policy actions improve the capacity to protect employees against harmful applications and network destinations, as well as prohibit lateral movement.

3. Resilient deployment architecture:

Using active server technology, Absolute has added Resilience to its distributed network architecture, bringing the benefits of Software-as-a-Service (SaaS) to customer-managed environments, including high availability, horizontal scale-out, and zero downtime upgrades. Improved diagnostics and monitoring capabilities:

4. Truly resilient ZTNA:

Absolute’s self-healing ZTNA client for Windows is capable of autonomously reinstalling itself if it is tampered with, accidentally uninstalled, or otherwise stops working, ensuring that it remains healthy and offers the full value intended.

Read more related news:

Absolute Software Announces New Product to Track Critical Performances

CrowdStrike Acquires SecureCircle to Extend Zero Trust Data Protection

CrowdStrike Holdings, a leading company in cloud-delivered endpoint and workload protection, announced the acquisition of SecureCircle, a SaaS-based cybersecurity service that extends Zero Trust security to endpoint data. CrowdStrike will strengthen its leading Zero Trust endpoint security device and identity capabilities to incorporate data with this takeover. The all-cash deal is expected to complete in the fourth quarter of CrowdStrike’s fiscal year.

By securing the hub of enterprise risk — the endpoint – CrowdStrike has transformed security for the cloud era. CrowdStrike will enhance data protection with SecureCircle’s technology, allowing customers to implement Zero Trust at the device, identity, and data levels. CrowdStrike intends to resolve complex problem that all organisations face, data protection, with a simple solution – enforcing Zero Trust control at multiple levels, all deployed through CrowdStrike’s lightweight Falcon agent on the endpoint – by combining forces and leveraging SecureCircle’s innovative capabilities.

Zero Trust Data Protection Reimagined

In 2021, the market for data loss prevention (DLP) and related technologies is expected to reach $3 billion. Even billions of dollars are invested in legacy DLP technologies, data breaches via inadvertent leaks, ransomware, sophisticated cyberattacks, and other sources continue to occur at an astonishing speed. Clients demand a solution to protect data without compromising the user experience, as DLP has failed. CrowdStrike promises to rethink data security using SecureCircle’s technology, enforcing encryption on data in all three states (in transit, at rest, and in use), allowing clients to secure data on, from, and to endpoints. Clients will be able to govern data access and usage regulations for each user based on their Zero Trust score when integrated with CrowdStrike Zero Trust Assessment, providing dynamic risk mitigation.

“Data loss prevention has suffered from a lack of innovation and legacy tools have completely failed to live up to the promise of preventing breaches. At the same time, the endpoint has become the focal point for how data is accessed, used, shared and stored,” said George Kurtz, co-founder and chief executive officer of CrowdStrike. “CrowdStrike will be setting a new standard for endpoint-based data protection by connecting Zero Trust enforcement to the device, the user identity and, with this acquisition, the data users are accessing and using.”

Jeff Capone, chief executive officer at SecureCircle said, “We are excited to join the CrowdStrike family, and integrate SecureCircle’s revolutionary data protection solutions with the industry leader in cloud-delivered endpoint protection. The endpoint in today’s enterprise is everything, and coupling our cloud-native approach to protecting sensitive data with CrowdStrike’s industry leading Zero Trust endpoint security will enable customers to enforce Zero Trust on the endpoint across all levels.”

RevBits Announced Zero Trust Network Security To Protects Digital Assets

RevBits, a firm providing complete 360-degree cyber defense, announced release of RevBits Zero Trust Network (ZTN). RevBits ZTN is an application providing authenticated access for remote users and devices to applications, services and data, with complete network security.

The remote employees and access to third parties increase the risk for companies. RevBits ZTN isolates and protects internal assets, without using complicated network segmentation, by moving network protection to endpoints. RevBits ZTN offers in-transit data security via encryption, secure access to apps and services and network security through user and device authentication to support a default no-trust security stance.

“As enterprise threat levels rise, rethinking cybersecurity and perimeter control is paramount. It is no longer a matter of ensuring data encryption for remote users through a VPN as a complement for network security; organizations must adopt a default no-trust posture,” said David Schiffer, CEO at RevBits.

Based on technological innovation in the market for access management, RevBits ZTN extends access management and control to user level with unified visibility and analytics to the individual user level through RevBits Privileged Access Management (PAM).

RevBits ZTN offers data security by authenticating all users and devices with encryption and granular access control. “Based on our unique architecture and patent-pending technologies, RevBits ZTN provides best in class protection. By combining the principles from our PAM solution, RevBits ZTN delivers data encryption, comprehensive obfuscation, granular user and machine access control, and monitoring to protect digital infrastructure,” said Mucteba Celik, CTO at RevBits.

ColorTokens Partners with Paramount to Empower Middle East Customers in Zero Trust Security

ColorTokens a cybersecurity firm has formed a strategic partnership with Paramount Computer Systems, a leader of product and services in the market for information assets security to enterprises in the Middle East.

Paramount will provide the ColorTokens’ Xtended ZeroTrust Platform, which includes Xshield for Workload Visibility and Segmentation, Xprotect for Endpoint and Host Protect, and Xessure for Zero Trust as a Service, to Middle East companies across Vertical Solutions like BFSI, logistics, aviation and more. The system has been designed to assist safety security teams protect endpoints quickly, effectively and react to zero-day attacks and integrate seamlessly with current security tools.

ColorTokens offers an easy-to-use cloud platform that extends far beyond the perimeter as a leader in using Zero Trust security. The Xtended ZeroTrust® Platform of ColorTokens offers real-time viewing, segmentation, and business resilience to cyber risks across hybrid networks and boundaries while allowing operating flexibilities in the entire IT infrastructure.

“Digital transformation in today’s modern workplace means enterprises are adopting multi-cloud strategies, with an increased focus on dynamic microservices. Traditional security approaches assume that everything within an enterprise network can be trusted. Zero Trust is a significant departure from this mindset as it centers on the belief that a user or device is untrustworthy until proven otherwise. In today’s world, adversaries don’t stop at the point of breach, they move laterally across networks to reach targeted data and assets. We are thrilled to be joining forces with Paramount, their extensive cloud capabilities and market expertise combined with our cutting-edge solutions can enable us to successfully empower regional organizations in their Zero Trust journeys,” said Lee Ealey-Newman, VP Channels for EMEA at ColorTokens.

“As organizations continue to embrace cloud transformation, a proactive approach to cybersecurity is the need of the hour. To stay ahead of evolving cyber threats, adopting micro-segmentation and a software-defined perimeter (SDP) has become crucial for modern enterprises. By integrating ColorTokens’ ground-breaking, end-to-end Zero Trust solutions into our portfolio, we can provide our clients with future-proof protection for their increasingly hybrid infrastructures,” said Suhas Varambally, SVP, Paramount.

“Cyber threats are adapting to the dynamic way people work today, making it crucial for organizations to revamp their security strategies. As ColorTokens’ value-added distributor, this new partnership with Paramount is reflective of our commitment to expanding their foothold in the region. We believe that Paramount’s longstanding market expertise makes them the perfect partner to help regional customers leverage ColorTokens’ solutions to move from a conventional security approach to a foolproof, advanced Zero Trust model,” said Garreth Scott, Managing Director, Credence Security.

Mission Secure and XONA partners to offer zero-trust OT cybersecurity solutions to industries relying on remote operations capacity

Mission Secure, the world’s leading Industrial control (ICS) cybersecurity tech firm, announced a strategic partnership with XONA, the developer of a zero-trust user access solution for remote industrial operations, to provide more comprehensive and integrated operational technology (OT) cybersecurity solutions across several industries.

Remote operations capability is becoming extremely important in a pandemic-affected operational landscape for sustaining resiliency, enhancing efficiency, and accomplishing corporate goals. However, as IT and OT systems converge, businesses are exposed to cybersecurity vulnerabilities that standard IT security solutions can’t address. In order to protect essential infrastructure and business data from malicious attackers, organizations need OT-specific cybersecurity features.

In the defence, critical infrastructure, and process industries, Mission Secure offers comprehensive OT security solutions. This partnership improves their security by bringing a zero-trust user access layer to their product offerings, which include integrated closed-loop multi-factor authentication (MFA), browser-based virtual desktop infrastructure (VDI), moderated secure file transfer, system connection segmentation and monitoring, protocol isolation, and deep user access forensics, all offered through a single platform.

“Mission Secure is proud to bring XONA’s ‘best-in-class’ solution to our customers Our OT/ICS customers often face challenges with remote access, but the XONA technology adds an important feature set to our Platform-as-a-Service that will bridge the gap between cyber protection and operational efficiency. That’s especially important now as threat actors increasingly turn their attention to vulnerabilities in OT/ICS to avoid the increased security in IT infrastructures,” said John K. Adams, Mission Secure’s CEO.

“Simple to deploy, zero-trust user access empowers companies to embrace OT remote operations capacity without compromising cybersecurity. As ransomware and other cybersecurity threats increase in scope, frequency and severity, it’s critical that companies fortify their remote operations to account for a shifting threat landscape. We’re excited to partner with Mission Secure to deliver just those necessary capabilities,” said XONA CEO, Bill Moore.

Together Mission Secure and XONA will offer a comprehensive cybersecurity solution that protects companies as they embrace remote operations.

Omada and SecZetta Collaborate to Decrease Threat of Third-Party Breaches

Omada, a worldwide provider of Identity Governance and Administration (IGA) solution announced an integration with SecZetta, a leading provider of third-party identity risk management solutions. Companies will be able to minimize the risk of third-party data breaches as a result of the integration.

SecZetta delivers easy-to-use, purpose-built third-party identity risk solutions to assist organizations in implementing risk-based identity access and lifecycle strategies for third-party non-employee populations such as contractors, supply chain, suppliers, partners, bots, and more. SecZetta information on managing third-party identities, onboarding, role changes, contract extension, termination, and identity risk management is used by Omada to help third-party users make better access decisions.

Companies are in danger because of this absence of protocol with non-employees; an estimated two-thirds of data breaches nowadays are caused by a third party. Businesses require a way to track and manage all of the people and things who have access to corporate systems. SecZetta uses a collaborative onboarding process to gather contextual information on third-party non-employees, which it then sends to Omada for providing and de-provisioning of access, as well as identity governance and access for SecZetta’s customers.

“Organizations are hyper-focused on adopting Zero Trust policies in the hope of reducing the risk of access-related cybersecurity incidents. Our integration with Omada enables organizations to extend the diligence they have around providing least privilege access to employees to their riskier, non-employee users,” said Jeremy Rohrs, Senior Vice President of Global Sales & Business Development, SecZetta.

“With most organizations today relying on third parties to achieve business goals, it’s critical to get access management right. It’s a balance between security and productivity – and that’s what this integration provides. Organizations can work confidently with non-employees, knowing they are all fully accounted for without creating a drag on IT resources,” said Michael Garrett, CEO, Omada.