Security News
Cyral, provider of the first cloud security platform for the data layer, announced general availability of its data layer security platform. "Cyral pioneered the concept of a security platform for the data layer and has closed scores of new customer trials and production deployments since announcing our funding in January 2020," said Manav Mital, founder and CEO of Cyral.
BehavioSec is positioned for strong growth as post-pandemic mobile shifts and evolving cyber threats highlight greater demand for deep authentication and anti-fraud capabilities delivering increased trust without breaking the user experience. BehavioSec's intuitive behavioral biometrics technology meets enhanced authentication demands by delivering zero trust safeguards authenticating individuals based on users' typing patterns, touchscreen activity and cursor movements, beyond vulnerable passwords.
Trustgrid announced an extension of their leading Zero Trust software-defined perimeter platform to include agents for roaming end points. The newly released Mac and PC agents address the growing demand for secure connectivity between remote end users and enterprise applications that require access from personal devices in home offices.
Zero trust aims to eliminate implicit trust associated with the locality of user access, for example users on the Intranet versus the Internet, and moves the focus of security to applications, devices, and users. Zero trust is a framework, an approach to managing IT and network operations that helps drive protection and prevent security breaches.
The US National Institute of Standards and Technology, in its current draft of standards for zero trust architecture, defines zero trust basically as "Zero trust is a cybersecurity paradigm focused on resource protection and the premise that trust is never granted implicitly but must be continually evaluated." NIST adds, there is a distinction to be drawn between zero trust and zero trust architecture.
Software Defined Perimeter is the most effective architecture for adopting a zero trust strategy, an approach that is being heralded as the breakthrough technology for preventing large-scale breaches, according to the Cloud Security Alliance. "Most of the existing zero trust security measures are applied as authentication and sometimes authorization, based on policy after the termination of Transport Layer Security certificates," said Nya Alison Murray, senior ICT architect and co-lead author of the report.
The Intel vPro® platform is a set of capabilities embedded into the hardware of endpoint systems aimed at businesses and large organisations, covering areas such as security and remote management. The latest updates to the Intel vPro® platform includes a new security technology called Intel® Hardware Shield.
The Intel vPro® platform is a set of capabilities embedded into the hardware of endpoint systems aimed at businesses and large organisations, covering areas such as security and remote management. The latest updates to the Intel vPro® platform includes a new security technology called Intel® Hardware Shield.
Zero Trust can seem scary to those accustomed to traditional security approaches. There are many reasons to go Zero Trust when it comes to enterprise security.
Microsoft last week announced the availability of a tool designed to help organizations see where they are in their journey to implement a zero trust security model. The capabilities provided by on-premises identity and security solutions can be limited, and one way to address the challenges associated with secure remote access is to implement a zero trust security model.