Ad Image

Identity Management and Information Security News for the Week of June 16; Concentric AI, Egnyte, Veza, and More

Identity Management and Information Security News for the Week of June 16

Identity Management and Information Security News for the Week of June 16

The editors at Solutions Review have curated this list of the most noteworthy identity management and information security news for the week of June 16. This curated list features identity management and information security vendors such as Concentric AI, Egnyte, Veza, and more.

Keeping tabs on all the most relevant identity management and information security news can be a time-consuming task. As a result, our editorial team aims to provide a summary of the top headlines from the last month, in this space. Solutions Review editors will curate vendor product news, mergers and acquisitions, venture capital funding, talent acquisition, and other noteworthy identity management and information security news items.

Download Link to SIEM Buyers Guide

Identity Management and Information Security News for the Week of June 16


Concentric AI Granted Foundational Patent for Data Security with Semantic Intelligence

Concentric AI, a data security solutions provider, this week announced it has been awarded a patent for its approach to data security. The patent, titled “Method and Electronic Device for Generating Semantic Representation of Document using Large Language Models to Determine Data Security Risk,” showcases Concentric AI’s leadership in the DSPM space and its advances in AI technologies to better address the data security needs of organizations. This patent describes Concentric AI’s unique approach to “understand” the context and content of every data record to inform and strengthen the security posture. It details the generation of a document-level semantic representation utilizing Large Language Models (LLMs), specifically deep-learning models. These representations, called embeddings, are analyzed to determine whether a document’s security posture is aligned with other similar documents, and how it should be secured.

Read on for more.

OneSpan Expands OneSpan Notary Capabilities to Secure Digital Identities

OneSpan, a digital agreements security company, this week announced expanded features for OneSpan Notary, a next-generation, all-in-one, cloud-connected solution that changes the way notaries and customers complete agreements and notarize documents in a secure and trusted environment. OneSpan Notary provides a seamless, secure digital journey for the historically paper-intensive notarization process, while delivering bank-grade security and facilitating RON compliance requirements to mitigate fraud. The newly expanded capabilities of OneSpan Notary include additional identity verification features, enabling organizations to securely identify unknown signers.

Read on for more.

Egnyte Named Category Leader for Data Security in Several G2 Summer 2023 Reports

Egnyte, a data security solutions provider, announced this week announced that it has been recognized by software marketplace G2 in multiple Summer 2023 reports based on reviews from its user community and data aggregated from online sources and social networks. In addition, the company has retained leadership positions in the Cloud Content Collaboration, Data Governance, Data Security, Data-Centric Security, Encryption Key Management, and Sensitive Data Discovery categories. Egnyte’s award-winning platform allows companies of all sizes to better protect and manage their content.

Read on for more.

Okta Introduces Okta Device Access Platform

Okta, a leader in identity solutions, this week announced Okta Device Access, a new product that enables organizations to extend Okta’s Identity and Access Management (IAM) capabilities to secure access to corporate devices for a hybrid workforce. As part of Okta’s Workforce Identity Cloud, the solution will deliver stronger authentication to unlock a device, helping organizations achieve zero trust while simplifying the login experience for employees. Okta Device Access is part of Okta’s broader effort to move the industry beyond traditional multi-factor authentication (MFA) to enable phishing resistance and passwordless capabilities.

Read on for more.

Dig Security Announced as Launch Partner for Wiz Integrations

Dig Security, a data security solutions provider, this week announced its partnership with cloud security provider, Wiz, as the company unveils Wiz Integrations (WIN). Dig Security, hand selected as a launch partner, will bring the power of the Dig Data Security Platform and its cloud Data security Posture Management (DSPM), DLP and real-time data detection and response (DDR) capabilities to WIN, with the intent that customers can seamlessly integrate Wiz into their existing cloud data security workflows. Once the integrated solution is launched, WIN enables Wiz and Dig Security to share prioritized security findings with context including inventory, vulnerabilities, issues, and configuration findings.

Read on for more.

Veza Reaches Milestone 100 Integrations to Secure Identity Access

Veza, an identity security solutions provider, this week announced support for 100 integrations across cloud providers, SaaS apps, data systems, and custom and on-premise applications, to accelerate deployment of modern identity security in the enterprise. The milestone underscores Veza’s scalable approach to extending its Veza Authorization Platform across apps, data systems, and cloud infrastructure. Veza also introduced a new no-code self-service offering for customers operating on legacy and non-standard systems to automatically load and map permissions data into Veza. Backed by the scalability and reliability of the Veza platform, this new service enables its global customer base – which includes brands like Blackstone, Wynn Resorts, Expedia, and Zoom – to continuously monitor over 200 million permissions.

Read on for more.

Zscaler and Banner Health Team Up for Solution Review’s Spotlight Series

Solutions Review’s Solution Spotlights are exclusive webinar events for industry professionals across enterprise technology. Since its first virtual event in June 2020, Solutions Review has expanded its multimedia capabilities in response to the overwhelming demand for these kinds of events. Solutions Review’s current menu of online offerings includes the Demo Day, Solution Spotlight, best practices or case study webinars, and panel discussions. And the best part about the “Spotlight” series? They are free to attend! With the next Solution Spotlight event, the team at Solutions Review has partnered with Zscaler and Banner Health to provide viewers with a unique webinar called Learn How Banner Health Ensures Seamless Digital Experiences.

Read on for more.


Expert Insights Section

expert insight badgeWatch this space each week as Solutions Review editors will use it to share new Expert Insights Series articles, Contributed Shorts videos, Expert Roundtable and event replays, and other curated content to help you gain a forward-thinking analysis and remain on-trend. All to meet the demand for what its editors do best: bring industry experts together to publish the web’s leading insights for enterprise technology practitioners.

Weathering the Storm: How Severe Weather Impacts Critical Infrastructure Security

Paul Von Hertsenberg of 1898 and Co. enlightens us how severe weather impacts critical infrastructure security and how we can weather the storm. The recent increase in severe weather events is threatening utilities with increased vulnerability. Continued unpredictability of weather can put utilities in more severe positions for safety incidents, cyber-attacks, or unplanned downtime and outages with some lasting consequences beyond expected maintenance and repairs. Our nation’s aging infrastructure has been in a constant state of repair, standing with an ASCE C minus rating, and while leaders evaluate upgrades against failures due to weather, protections against other incidents should be considered too.

Read on for more.

Download Link to SIEM Buyers Guide

Mike Costello

Share This

Related Posts

Udacity Cybersecurity Ad

Ad Image