Search Results for: Zero Trust

Viakoo Extends Zero Trust to IoT Through Automation With New Device Certificate Manager

Viakoo announced the release of its Device Certificate Manager (DCM) as a part of the Viakoo Action Platform to help organizations extend Zero Trust to IoT Networks. DCM can be leveraged to authenticate devices with 802.1x certificates and encrypt traffic with TLS certificates. This ensures that authorized IoT devices maintain consistent and secure network access by automatically managing the IoT certificate process.

John Kindervag Creator of Zero Trust joins MSSP ON2IT

N2IT, the global managed security services company and Zero Trust innovator, announced that Zero Trust creator, John Kindervag, will join ON2IT as Senior VP Cybersecurity Strategy and Group Fellow. ON2IT announced that Zero Trust creator, John Kindervag, will join ON2IT as Senior VP Cybersecurity Strategy and Group Fellow. John Kindervag has held the position of Field CTO at Palo Alto Networks for the past four years.

Survey Findings Show Gap Regarding PKI’s Role in a Zero Trust Security Strategy

96% of North American enterprise IT security leaders say public key infrastructure and digital certificates are essential to achieving zero trust architecture. Yet only 39% use PKI as part of their zero trust security strategy according to an executive survey from Pulse Research and Keyfactor, the leader in PKI as-a-Service and crypto-agility solutions. The survey explores enterprise security priorities, the challenges of zero trust strategy implementation and the use of PKI.

BlastWave Publishes Zero-Trust Network Access Technical White Paper

BlastWave announced it has released a technical white paper that helps enterprises accelerate compliance with zero trust architecture (ZTA) requirements and protect vulnerable systems and data across IT, operational technology (OT) and Internet of things (IoT) environments. The Zero-Trust Network Access (ZTNA) white paper helps federal and commercial organizations comply with the United States NIST SP 800-207 – Zero Trust Architecture (ZTA) standards and meet U.S.-mandated cybersecurity goals by the end of 2024. This paper explores the different approaches to deploying ZTA and shows how BlastWave’s BlastShield ZTNA solution can be deployed as a software-defined perimeter (SDP) that addresses the need for zero trust network access. 

New WatchGuard Cloud Platform Streamlines Security Delivery, Enables Zero-Trust and More

WatchGuard Technologies announced a series of new capabilities that make WatchGuard Cloud the ideal security platform for managed service providers (MSPs). With a new single, centralized interface for delivering and managing network security, advanced threat detection, MFA, and more, MSPs will benefit from simplified client management while enabling rapid, efficient and profitable growth. With WatchGuard Cloud, MSPs can create policy templates for easy, repeatable security deployments across many subscriber accounts.

Elisity Launches Micro Edge for its Cognitive Trust Solution

Elisity announced the availability of Elisity Micro Edge, extending the Cognitive Trust platform as a containerized application on Cisco Catalyst 9000 series switches, or as a virtual machine (VM) on a hypervisor for Cisco Catalyst 3850 series switches. It also provides the capability to further control the Cisco Catalyst 3850 series switches. With Elisity Micro Edge, organizations can unleash the full power of their Cisco switches with a lightweight, centrally managed edge deployment of the market’s most innovative identity-based zero trust access platform.

HID’s IdenTrust and Keyfactor Collaborate to Solve Enterprise Digital Certificate Procurement and Lifecycle Management Challenges

HID Global a provider of secure digital identity management solutions, today announced a collaboration that will improve how organizations secure data and protect privacy. By adding HID IdenTrust digital certificates to the Keyfactor platform, the offering provides enterprise customers with a single convenient solution to meet today’s zero-trust security models and identity. Digital certificates are used as a foundational security layer within IT and PKI frameworks.

WatchGuard Speeds Zero Day Malware Breach Detection from Months to Minutes

WatchGuard® Technologies announced a series of major updates to its threat correlation and response platform, ThreatSync, with the latest release of Threat Detection and Response. These enhancements include accelerated breach detection, network process correlation and AI-powered threat analysis, enabling managed service providers and the organizations they support to reduce breach detection and containment timeframes from months to minutes.

Unisys Unveils Stealth Biometric Identity Management Software For Establishing Trusted Humans

Unisys Corporation announced the availability of Unisys Stealth(identity), the company’s biometric identity management software for large-scale biometric enrollment processing supporting fingerprint, face, voice and iris recognition as well as behavioral biometrics, with the ability to integrate new biometric modalities in the future. Stealth(identity) automates the process of biometric enrollment—capturing and storing biometric data used to authenticate identities—and provides configurable application programming interfaces (APIs) for integrating biometric authentication across physical and digital channels, including mobile devices.

Zero Touch Network Provisioning Lessens Installation Time And Expense

BCDVideo announces the addition of their new Pro-Lite Server Switch Bundles featuring Zero Touch Provisioning. Designed to reduce errors and labor expenses the configuration will provision cameras in your network automatically, with minimal manual intervention. Each bundle can accommodate up to 7, 16 or 24 cameras providing security integrators with a simplified and affordable solution for small to mid-size video surveillance projects.

Rasilient Systems Provides Video Surveillance Server And Storage For UAE’s New Zero 6 Mall

Rasilient Systems has been chosen to provide video surveillance server and storage solutions for Zero 6 Mall, the impressive new-generation shopping destination that opened in April this year in Sharjah, United Arab Emirates. Zero 6 is a 16,000 square-metre complex that offers a diverse selection of dining, retail and entertainment attractions. Strategically located in Al Juraina, in close proximity to prominent city landmarks like University City and Sharjah International Airport, Zero 6 celebrates Sharjah’s evolving lifestyle community experience.

WatchGuard Technologies Launches AI-Based Antivirus To Help Defend Against Zero Day Malware

Latest version of Fireware operating system introduces new IntelligentAV service for malware detection. WatchGuard Technologies announced version 12.2 of its Fireware® operating system for its Firebox® Unified Security Platform appliances. Key to the update is IntelligentAV, a new antivirus scan service that uses an artificial intelligence (AI) engine to predict, detect and block constantly evolving zero day malware. IntelligentAV joins Threat Detection and Response (TDR), Gateway AntiVirus, and APT Blocker as an additional layer of industry-leading malware defense on the Firebox platform.

Pivot3 Expands Partnership With HyTrust To Transform Video Data Security

Pivot3 has expanded its relationship with HyTrust, a leading cloud workload security vendor, to deliver secure, compliant video surveillance infrastructure solutions that ensure high levels of data protection. Video data requires stringent logical and physical protection to ensure compliance and reduce unauthorized breaches. Through highly secure encryption and comprehensive role-based access control, HyTrust workload security solutions ensure the highest levels of data protection.

Portnox Debuts First Cloud-Native IoT Fingerprinting and Profiling Solution

Portnox announced the general availability of the first cloud-native IoT security solution to help mid-market and enterprise businesses address rising Internet of Things (IoT) security threats. Now available via the Portnox Cloud, Portnox’s new IoT fingerprinting and profiling capabilities empower organizations to easily and accurately identify, authenticate, authorize, and segment IoT devices across their network to ensure an effective zero trust security posture.

StrongDM Ushers in New Era of Access Management with Deeper Okta and Azure AD Integrations and Dynamic Access Rules

strongDM announced a major release, featuring deep integrations with Okta and Azure AD and the ability to create and enforce dynamic access rules. Businesses can now manage least-privilege access to their critical infrastructure directly from their identity provider, simplifying access management workflows and accelerating development cycles—all while supporting Zero Trust security for hybrid and multi-cloud environments.

Tetrate and NIST Cohost ZTA and DevSecOps Conference 2022

Tetrate announced their third annual conference on Zero Trust Architecture (ZTA) and DevSecOps for Cloud Native Applications in partnership with the U.S. National Institute of Standards and Technology (NIST), the federal organization responsible for creating security standards. The NIST–Tetrate multi-cloud conference is a premier event for CISOs, platform architects, and tech leadership from federal and corporate organizations.

Datawiza AMaaS Now Available in the Microsoft Azure Marketplace

Datawiza announced availability of Datawiza AMaaS in the Microsoft Azure Marketplace, an online store providing applications and services for use on Azure. Datawiza customers can now take advantage of the productive and trusted Azure cloud platform, with streamlined deployment and management. The cloud-delivered Datawiza Platform helps companies implement Zero Trust architecture by providing a no-code/low-code solution.

Alcatraz Provides Three Factor Authentication to Deliver Ultimate in Access Control Security

Alcatraz has added Three Factor Authentication (3FA) to the Rock facial authentication platform to deliver the ultimate in protection for high security areas and zero trust environments. The Rock can be used for one, two or three factor authentication. In one-factor authentication, the Rock is the primary access control device and facially authenticates authorized users. In two-factor authentication, the Rock is used in combination with a badge reader to grant access.