Security News
Ericom Software announced the launch of ZTEdge, a comprehensive zero trust security platform that meets the unique requirements of midsize enterprises and small businesses. ZTEdge is delivered to MSEs by certified ZTEdge MSSP partners as a single cloud security solution that cuts complexity, reduces cyber-risk, and improves performance, all at a dramatically lower price point than alternative solutions.
Acquisition will extend Jamf's Zero Trust Network Access, threat defense and data policy enforcement for Apple devices. Jamf, a provider of enterprise management software for Apple devices, has signed a definitive agreement to acquire Wandera, a provider of zero trust cloud security and access for mobile devices, in a deal valued at $400 million in cash.
SecurID announced key enhancements that will help organizations accelerate their cloud journeys, provide full-spectrum authentication options, and ensure flexible and adaptive identity experiences for all users and use cases. "Based on the trust our customers placed in us, we saw remarkable growth in our identity business and are honored to serve this dynamic market with a new vision of SecurID that harnesses decades of innovation, accelerates organizations' cloud journeys, embraces and advances zero trust strategies, and provides the full range of modern authentication options for all users," said Rohit Ghai, CEO RSA. "From intelligence organizations to healthcare providers to financial institutions, SecurID works with both global enterprises and small and medium-sized businesses, and we're committed to developing the innovations they need in a single platform in the cloud to empower all users, without sacrificing enterprise-grade security."
In addition to new blueprints, IBM Security also announced a partnership with the cloud and network security provider Zscaler. On Wednesday, IBM Security announced new ways the company will help customers adopt a zero trust approach to security.
IBM Security introduced a new Software as a Service version of IBM Cloud Pak for Security, designed to simplify how organizations deploy a zero trust architecture across the enterprise. The new IBM Security zero trust blueprints offer a framework for building a security program designed by applying the core principles of zero trust: least privilege access; never trust, always verify; and assume breach.
To better defend their networks, systems, and devices from an ongoing barrage of attack techniques, healthcare organizations are increasingly turning to zero trust architecture, which does away with the traditional security perimeter, assuming that every user and every device on the network could potentially be malicious. Ransomware - widely prevalent in connected healthcare environments due to outdated and unpatched operating systems in myriad devices.
AccuKnox announced that it has closed an over-subscribed $4.6 million seed financing led by National Grid Partners, with strategic participation from SRI, z5Capital and Outliers VC. The funding will be used to expand the engineering team and enable AccuKnox to further capitalize on its technology innovations in security and zero trust in dynamic, cloud-native environments. AccuKnox is a zero trust run-time Kubernetes security platform that leverages an identity-driven approach.
Fudo Security announced that the company has signed a distribution agreement with SYNNEX. "Quite often, the misconception is that identity access management solutions are an alternative to privileged access management, but this leaves an organization open to exploits from insider misuse and breached credentials." "Fudo PAM is a comprehensive, all-in-one solution that monitors all remote access and sessions. Other elements like MFA or VPN are insufficient to guarantee a complete safeguard against internal or external threats," explained Patryk Brozek, CEO, Fudo Security.
As the information infrastructure expands with new technologies and locations, zero trust allows organizations to focus on protecting the data, regardless of where it is sourced or how it is used. Now the U.S. Air Force has adopted zero trust to improve and protect its flightline.
As a protective model, zero trust does not put a wall around networks and applications, but around employees and their devices, so it can protect remote environments at scale. Committing to zero trust means assessing where the major security risks are in the existing enterprise environment and understanding the flow of data.