IT Security
As digital threats evolve, LastPass' proactive security measures will continue to gain momentum and improve their market strategy, positioning them well to serve their diverse clientele effectively.
Hornetsecurity has distinguished itself in our integrated cloud email security (ICES) quadrant with its advanced email security platform. My discussions with numerous email security vendors highlight Hornetsecurity’s standout features like its robust phishing detection, adaptive data utilization for AI enhancement, and the flexibility of their deployment models.
In our email security SoftwareReviews quadrant, IRONSCALES stands out as a leader with its integrated cloud email security (ICES) solution, now often called integrated cloud workspace security (ICWS).
Zoho Corporation has announced a strategic partnership with NVIDIA to leverage the NVIDIA AI accelerated computing platform, including NVIDIA NeMo, for the development and deployment of advanced AI models within Zoho's SaaS applications. This collaboration aims to enhance AI capabilities for Zoho's extensive customer base of over 700,000 businesses worldwide.
I speak to many cybersecurity vendors, some are good, some are not memorable, but others excel. Recently, one company I briefed with stood out to me for its innovative approach to identity attack path management (iAPM): SpecterOps. Its flagship product, BloodHound Enterprise, has become an indispensable tool for organizations worldwide looking to secure their identity infrastructure against sophisticated cyber risks.
Proofpoint's Identity Threat Detection and Response (ITDR) solution, known as Identity Threat Defense (ITD), emerges as a beacon of security, offering not just a shield but a proactive platform against identity-based threats.
As cyberthreats continue to evolve, managing access to sensitive resources is a growing challenge for organizations. Lumos, a relatively new player in the identity governance and administration (IGA) space, is making waves with its innovative approach. This tech note explores how Lumos’ technology simplifies access management while bolstering security.
Savvy is an identity-first SaaS security vendor that has rapidly gained traction in the market. While the company is relatively young, its founders and core team bring decades of experience from leading identity and access management (IAM) providers such as Ping Identity, Okta, and SailPoint. This deep understanding of the IAM landscape is evident in Savvy's approach to addressing the pervasive challenges of shadow IT governance and identity security. With a growing member network of over 50,000 individuals and organizations, Savvy has established itself as a trusted advisor and provider of innovative solutions in the SaaS-identity security space.
Kaspersky Lab has been knee-deep in controversy surrounding its ties to the Russian government and potential national security risks. We try to understand the situation from a security analyst’s perspective, examining the capabilities of Kaspersky products, the US government's concerns, and the implications for businesses.
Eracent is a privately held IT asset management (ITAM), software asset management (SAM) and cybersecurity solution provider founded in 2000. Their roots trace back to AT&T, Bell Labs, and Lucent’s pre-Y2K initiatives (around 1997-2000), where a core focus was placed on IT asset discovery and protection. Eracent emphasizes their experience with extensive asset discovery during a period with significantly different internet and network connectivity compared to today and have consistently focused on ITAM and SAM solutions throughout their existence. This note features Eracent’s extension into open-source software risk mitigation though software bill of materials (SBOM) management.
In this tech note I take a closer look at Devolutions, a partial stack Privileged Access Management (PAM) vendor, exploring its history, market positioning, core features, and differentiating factors. Through insights gleaned from a vendor briefing and demo, I explore Devolutions’ evolution, target audience, and its strategic approach to the PAM landscape.
We examine Verkada's history, market position, and core offerings, providing an expert’s perspective informed by three decades of security architecture experience.
This article explores Zoho's security suite, examining the interplay between its various products and the benefits it collectively brings to enterprise security.
With evolving threats and regulations, traditional DLP solutions are struggling to keep pace. Proofpoint is addressing these challenges with its Information Protection platform, emphasizing a human-centric approach empowered by behavioral analytics, granular controls, and cloud capabilities.
Proofpoint, an innovator in the cybersecurity industry, has earned its reputation as a leader in email security and DLP. As the threat landscape evolves, Proofpoint has expanded its solutions, embracing a more holistic, human-centric approach.
Identity governance and administration (IGA) platforms have become essential for robust security strategies in modern enterprises. SailPoint, at the forefront of IGA solutions, has strategically expanded its capabilities to align with the growing demand for unified identity security. This note will examine the growing need for these platforms and SailPoint's transformation to address it.
I have met with David from senhasegura several times. He explained this translates to Secure Password in Portuguese. Founded in Brazil and available in more than 60 countries, senhasegura is a leading cybersecurity firm specializing in Privileged Access Management (PAM), Certificate Lifecycle Management (CLM), and Cloud Infrastructure Entitlement Management (CIEM) solutions. Senhasegura is recognized as a global leader in PAM by top consulting firms and clients and has been consistently rated as a leader and challenger in various reports by analysts and industry experts. Senhasegura's PAM solution is known for its ease of use, good customization, unique key analysis features, and ability to meet rigorous auditing requirements.
"Fortresstify" your company's defenses with the right multifactor authentication (MFA) tool. This article dives deep into the world of MFA, exploring its features, key providers, and why cultivating a strong relationship with your chosen vendor is crucial. Discover how MFA can become your ultimate security ally, safeguarding your data and empowering a worry-free digital environment.
Acronis presents a compelling option for organizations seeking a comprehensive platform that merges reliable data protection with proactive cybersecurity measures.
Cisco consolidated its position as one of the largest software companies globally by completing the acquisition of Splunk.
The conversation around security awareness training and phishing simulations has changed in the past year. The training and tools of the past simply aren’t working against today’s more sophisticated attackers. Abnormal Security can mitigate an assortment of the most common types of business and vendor email compromise.