Fortanix’s runtime encryption Platform secures Python- and R-based applications

Fortanix announced it has extended the capabilities of the industry’s Runtime Encryption Platform to secure Python- and R-based applications that have widespread use in the data science community. As a result, developers and data scientists can now train artificial intelligence (AI) and machine learning (ML) algorithms leveraging sensitive data as inputs without compromising on the confidentiality of the data. Fortanix Runtime Encryption, leveraging Intel Software Guard Extensions (Intel SGX), enables secure exchange of data for … More

Quest enhances KACE product line

Quest Software announced several enhancements to its KACE product line. The updates enable and empower organizations as they move to a unified endpoint management (UEM) environment by simplifying their endpoint infrastructure to create a more secure computing environment. The enhancements to KACE Cloud Mobile Device Management (MDM) and the release of KACE Systems Deployment Appliance (SDA) v6.0 introduce new functionality for easy-to-use, comprehensive, multi-platform endpoint and asset management. The latest update to KACE MDM allows … More

Cylance announces $120 million funding round

Cylance announced that it has closed a $120 million funding round led by funds managed by Blackstone Tactical Opportunities and including other investors. The financing enables Cylance to continue its global expansion and extend its portfolio of cybersecurity solutions. Cylance’s market growth came from machine learning powered predictive endpoint security solution and proving that it is possible to protect users from unknown cyberattacks. According to a recent SE Labs report, with Cylance’s ‘predictive advantage,’ a … More

ExtraHop Reveal(x) sheds light on the darkspace

ExtraHop announced Reveal(x) Summer 2018, setting a new bar for Network Traffic Analytics at enterprise scale. The latest release includes new capabilities designed to modernize enterprise security operations with critical asset behavior analysis that instantly surfaces the highest-risk threats, even those hiding within encrypted traffic. With this insight, security operations teams can zero in on critical threat patterns and investigate down to the root cause in seconds, not days. Between 2017 and 2018, threat dwell … More

Twistlock releases serverless runtime defense

Twistlock announced the addition of serverless runtime defense to the Twistlock platform. With this new functionality, companies can extend Twistlock’s automated, whitelist based threat protection to serverless functions running in AWS Lambda and other leading serverless platforms. This new capability builds upon Twistlock’s release of vulnerability scanning for serverless functions in July 2017, and brings Twistlock’s serverless capabilities to parity with the full lifecycle, full stack protection the platform currently offers for containers and virtual … More

Red Hat Process Automation Manager 7

Red Hat announced the launch of Red Hat Process Automation Manager 7, cloud-native platform for developing business automation services and process-centric applications across hybrid cloud environments. Process Automation Manager is the next generation of Red Hat’s business process management (BPM) offering, Red Hat JBoss BPM Suite, and enables organizations to streamline, automate, measure and continuously improve business operations. Digital transformation can place new demands on both business and IT to deliver greater efficiency and agility … More

Bomgar announced the release of Bomgar Privileged Access 18.2

Bomgar announced the release of Bomgar Privileged Access 18.2. With enhanced integrations with IGA solutions, and the ability to inject privileged credentials to securely launch applications, Bomgar continues to advance its unified Privileged Access Management (PAM) solution. Bomgar Privileged Access 18.2 is enhancing its IGA integrations utilizing SCIM 2.0. This allows the product to become part of an organization’s governance strategy by provisioning, deprovisioning and auditing privileged access granted by user and group entitlements from … More

CrowdStrike announces Series E financing

CrowdStrike announced that the company has executed a financing round of over $200 million, led by General Atlantic, Accel and IVP, with participation from March Capital and CapitalG. Following this round, the company has achieved a valuation of more than $3 billion. This round of financing will help CrowdStrike continue to accelerate the global demand for the CrowdStrike Falcon platform, the new standard for endpoint protection. CrowdStrike is demonstrating that its cloud-based approach is the … More

Trend Micro launches managed detection and response service

Trend Micro announced the Trend Micro Managed Detection and Response (MDR) service. In addition, multiple new AI-powered capabilities are being embedded across the entire portfolio of Trend Micro’s products to allow security operations centers (SOC) to triage their critical threat alerts. Together these enhancements address the challenge of the global cybersecurity skills shortage and the challenge of dealing with a myriad of threat alerts from even the best cybersecurity solutions. Regardless of their size, organizations … More

Pulse Secure extends capabilities for Microsoft Azure

Pulse Secure announced an enhancement to its hybrid IT strategy allowing enterprises to deploy and uniformly manage physical, virtual and cloud-based Pulse Secure Appliances (PSA) now certified for Microsoft Azure and available in the Azure marketplace. Enterprises are moving a variety of applications and data stores to Hybrid IT environments that leverage both managed data centers alongside public cloud, private cloud and SaaS to expedite new business services, optimize on-demand computing resources and gain improved … More