Infosec products of the month: April 2022
Here’s a look at the most interesting products from the past month, featuring releases from: Akamai, Alert Logic, Arcanna.ai, Axis Security, BigID, BreachBits, ColorTokens, Finite State, Forescout, Fortinet, Hillstone Networks, IBM, Imperva, Keysight Technologies, Kudelski Security, oak9, Orca Security, OwnBackup, Palo Alto Networks, Prevailion, Spin Technology, ThreatX, Vicarius, and Workato.
IBM z16 protects data and systems against current and future threats
IBM unveiled IBM z16, IBM’s next-generation system with an integrated on-chip AI accelerator—delivering latency-optimized inferencing. This innovation is designed to enable clients to analyze real-time transactions, at scale — for mission-critical workloads such as credit card, healthcare and financial transactions.
ColorTokens Xcloud allows enterprises to address cloud security challenges
Xcloud combines multiple security tools into a single comprehensive platform to bring risk visibility and essential insights into the risks that threaten cloud and container environments. Xcloud automatically tracks the latest vulnerabilities and malware from multiple threat intelligence and vulnerability sources.
Imperva Data Security Fabric enables organizations to safeguard their sensitive data
Imperva DSF standardizes data security controls across enterprise environments to provide full visibility of what is happening across all file stores and assets, on-premises, and across clouds. Its architecture supports a wide range of data repositories, ensuring security policies are applied consistently everywhere.
Orca Security adds attack path analysis capability to improve the effectiveness of security teams
Orca Security announced Attack Path Analysis and Business Impact Score for cloud-native applications. Security teams can now visualize organizational risk through an interactive dashboard rather than chasing siloed alerts. This approach eliminates alert fatigue, reduces time-to-remediation, and helps avoid damaging data breaches.
Keysight CyPerf 2.0 enables NEMs to validate devices in distributed cloud networks
Keysight Technologies released CyPerf 2.0, a new subscription-based software solution that enables network equipment manufacturers (NEMs) to validate the performance and security of their offerings when deployed in complex distributed cloud environments utilizing zero trust security policies.
Forescout Continuum Platform manages the risk posture of all network-connected assets
Continuum Platform maintains an organization’s security framework by automating the continuous discovery, assessment and governance for complete coverage of cyber assets to mitigate risk and drive business automation and efficiency.
FortiOS 7.2 enables organizations to protect their hybrid networks
FortiOS 7.2 delivers new AI-powered FortiGuard security services and further consolidation of security point products across networks, endpoints, and clouds. These enhancements enable FortiOS to further protect today’s hybrid networks in the face of an escalating threat landscape while also helping organizations achieve digital acceleration.
Axis Security Atmos protects sensitive business data from cyberthreats or high-risk users
Atmos helps IT avoid the need to connect users to the corporate network, reduce exposure to ransomware threats, and spend less time on costly, and complex, firewall-based network segmentation. The cloud-native platform artfully extends secure connectivity out to the user’s location through its 350 Atmos edge locations running on the global backbone of AWS Global Accelerator, Google Cloud Platform, and Oracle.
BigID Data Insights Studio provides customizable data intelligence reporting for IT teams
Data Insights Studio gives privacy, security, and governance teams the power to create actionable reporting best suited for their organization and monitor relevant metrics to better assess the progress of their data initiatives. Data Insights Studio seeks to close the gap between insight and action so that teams have the speed to make the best decisions about their data.
Palo Alto Networks Okyo Garde Enterprise Edition protects businesses from home network vulnerabilities
Okyo Garde Enterprise Edition is built upon the principles of zero trust and enables organizations to extend the corporate network and bring unified security policy management and SASE to the hybrid workforce. In order to create tightly controlled security zones for corporate and personal devices, Okyo Garde Enterprise Edition also includes an option for at-home employees to create separate private and personal networks.
OwnBackup Secure helps companies address SaaS data security gaps
OwnBackup launched a new SaaS Security Posture Management (SSPM) solution, OwnBackup Secure, to help companies identify data vulnerabilities and proactively take action to protect their mission-critical data.
oak9 adds automated remediation capability to infrastructure as code security
oak9 announced infrastructure as code remediation helping developers automatically maintain security and compliance without sacrificing speed. Additionally, oak9 monitors security changes on a recurring schedule throughout the entire DevSecOps lifecycle, including post-deployment where developers can continue to take advantage of automatic remediation.
Spin Technology introduces a new solution for Microsoft Office 365 customers to identify risky applications
Spin Technology introduced Application Risk Assessment and Access Management as a new module for SpinOne for Office 365 SaaS data protection platform. This solution allows Office 365 administrators to assess risk of all applications that have OAuth access to their mission critical SaaS data with insights and remediation methods on possible incurred risks to reduce Shadow IT cases.
Finite State Exploit Intelligence enables security teams to improve visibility into device software
Finite State’s Exploit Intelligence capability helps level the playing field by monitoring thousands of industrial control systems (ICS) and operational technology (OT) advisories to surface vulnerabilities that threat actors are actively and maliciously exploiting, also known as “weaponizing.”
Prevailion ARKTOS allows companies to test their network security against real world malware threats
By collecting realtime telemetry data from the ARKTOS Replication Engine and monitoring communication with infiltrated C2 infrastructure, ARKTOS quantifies and qualifies the readiness and response of end to end security controls for emerging and latent threats.
Finite State for Asset Owners provides visibility into device supply chain risk
Finite State is launching Finite State for Asset Owners. The purpose-built solution automates and solves the complex challenges asset owners face in maintaining device software supply chain visibility, including collecting and managing large repositories of Software Bills of Materials (SBOMs).
Arcanna.ai improves efficiency in security operations with AI-Assisted Cybersecurity platform
Arcanna.ai augments the security analyst team with an AI-Assisted Cybersecurity solution that leverages the judgment of security experts. The platform provides scalable AI models that assist with SecOps processes through deep learning and NLP, without having to write a line of code.
Vicarius Nmap Scan Analysis helps security professionals identify high risk assets
With Nmap Scan Analysis, users import an XML file of an Nmap scan result directly into the Vicarius TOPIA dashboard. After the analysis is complete, users are presented with a comprehensive and visually coherent interpretation of their results, including open ports, services, operating systems, and detected CVEs.
Hillstone CloudArmour secures containers and virtual machines in hybrid multi-cloud environments
CloudArmour brings Hillstone’s enterprise-grade security to cloud workloads with features that include firewall micro-segmentation to halt lateral attacks, machine learning-enhanced runtime behavior modeling, and smart policy operations. Working across all cloud-based environments, CloudArmour helps organizations meet the security demands of both the evolution of DevOps and the new cloud infrastructure architecture.
Alert Logic Intelligent Response minimizes the impact of a security breach
Alert Logic Intelligent Response is designed to minimize the impact of a breach via embedded SOAR capabilities with workflows to enable response actions across network, endpoints, and cloud environments. This provides a backstop if attacks bypass prevention tools, improving an organization’s security posture while allowing them to adopt automation at their own pace.
Akamai Audience Hijacking Protector defends online businesses against fraud
Audience Hijacking Protector defends against unwanted redirection of customers to competing and malicious websites, reducing affiliate fraud and mitigating privacy risks. And as pop-up advertisements become commonplace, Akamai’s new solution helps businesses keep consumers on their site to ensure successful engagement and consistently frictionless online experiences that improve site visits, sales conversion rates and brand trust.
ThreatX expands API visibility and protection capabilities to stop complex threats in real-time
ThreatX unveiled new capabilities designed to strengthen its customers’ API security. These new capabilities will provide customers with deeper insight into the scope of API attacks, more fully visualize the API attack surfaces and identify API schema compliance gaps that attackers can exploit.
Kudelski Security MDR ONE addresses the growing sophistication of threats across hybrid environments
An alternative model for accessing high-touch MDR services, Kudelski Security’s MDR ONE solution is designed for clients who also seek to reduce the complexity of handling multiple-point threat detection solutions and accelerate time to value. MDR ONE is powered by FusionDetect, the foundation of Kudelski Security’s XDR architecture, which streamlines security processes and technology across all Kudelski Security’s portfolio of MDR offerings.
BreachBits BreachRisk helps organizations to understand and measure cyber risk
Built by U.S. military cyber warfare veterans and based on the same methods used by hackers, BreachRisk allows individual companies, insurers, portfolio managers and others to continuously assess an organization’s likelihood of a data breach while quantifying and communicating their risk reduction with a simplified cyber risk score.
Workato Enterprise Key Management protects sensitive data for enterprise customers
Workato introduced Workato Enterprise Key Management (EKM) for its customers. The feature gives customers in highly regulated industries control, flexibility, and compliance over their encryption keys and their data inside of the Workato platform.