Data loss prevention software

Caju AI joins forces with Proofpoint to deliver a Generative AI-powered customer engagement platform that provides mobile messaging, compliance, and conversation intelligence with industry-leading security.

Retrieved on: 
Monday, May 6, 2024

CHARLOTTESVILLE, Va., May 6, 2024 /PRNewswire/ -- Caju AI, an innovator in Generative (Gen) AI-powered customer engagement, today announced the integration of Proofpoint's advanced Archiving and Compliance capabilities with Caju AI's customer engagement platform. This collaboration provides enhanced conversation intelligence, business insights, and risk mitigation across mobile and customer-facing digital communications. It enables customers to manage corporate communications and data within a secure, market-leading archiving and compliance platform, which includes a private, secure Generative AI instance for each customer to foster AI-assisted engagement and insights. Captured data from Caju AI's cloud-based solution will be automatically stored by Proofpoint in near-native format, reconciled for completeness, and available for search, e-Discovery, and surveillance.

Key Points: 
  • CHARLOTTESVILLE, Va., May 6, 2024 /PRNewswire/ -- Caju AI, an innovator in Generative (Gen) AI-powered customer engagement, today announced the integration of Proofpoint's advanced Archiving and Compliance capabilities with Caju AI's customer engagement platform.
  • This collaboration provides enhanced conversation intelligence, business insights, and risk mitigation across mobile and customer-facing digital communications.
  • By providing each customer their own secure and compliant Generative AI instance, the Caju AI and Proofpoint solution facilitates adoption and ensures future-ready compliance while prioritizing security.
  • The combined solution from Caju AI and Proofpoint provides added security and the option to generate business insights using Generative AI."

Proofpoint Bolsters Information Protection Offering with Cross-Channel DLP Capabilities that Address the New GenAI Reality for Organizations

Retrieved on: 
Wednesday, May 1, 2024

Unlike legacy solutions limited to data classification or point solutions limited to one channel, Proofpoint Information Protection works across all major channels: email, cloud, endpoint, and web.

Key Points: 
  • Unlike legacy solutions limited to data classification or point solutions limited to one channel, Proofpoint Information Protection works across all major channels: email, cloud, endpoint, and web.
  • The uncertainty that has accompanied the explosion of GenAI tools has given the consolidation of DLP tools a new urgency.
  • Many organizations have crafted acceptable GenAI use policies to prevent privacy and corporate violations, ensuring confidential and customer information is not uploaded to GenAI tools and chatbots.
  • Proofpoint DLP Transform allows organizations to enforce those policies across all channels by allowing and disallowing interactions with GenAI tools based on user behavior, content, and data lineage.

Adaptive Shield Launches SaaS Security for AI at RSA Conference 2024 to Mitigate GenAI Revolution Risks

Retrieved on: 
Tuesday, April 30, 2024

RSA Conference-- Adaptive Shield , the leader in SaaS Security, today announced breakthrough SaaS Security Posture Management (SSPM) detection and response capabilities for AI-driven applications to enable enterprises to mitigate the risks introduced by the growing use of generative AI.

Key Points: 
  • RSA Conference-- Adaptive Shield , the leader in SaaS Security, today announced breakthrough SaaS Security Posture Management (SSPM) detection and response capabilities for AI-driven applications to enable enterprises to mitigate the risks introduced by the growing use of generative AI.
  • The workforce is rapidly adopting SaaS applications with GenAI to increase efficiency, including AI apps such as ChatGPT and Google Gimni, and AI tools within existing SaaS apps such as GitHub Copilot, Salesforce Einstein, and Microsoft 365 Copilot.
  • “The GenAI revolution requires new security strategies and organizations recognize the need to make it a priority,” said Maor Bin, CEO and co-founder of Adaptive Shield.
  • Adaptive Shield provides a security score for each application, enabling security teams to pinpoint those with heightened risk levels.

AIShield Unveils Professional Services for Delivering End-to-End AI Security Solutions under SecureAIx Platform

Retrieved on: 
Tuesday, April 23, 2024

DUBAI, UAE, April 23, 2024 /PRNewswire-PRWeb/ -- AIShield, the Gartner-recognized Bosch startup acclaimed for its AI security platform SecureAIx, proudly introduces its Professional Services portfolio. With an unwavering commitment to providing cutting-edge technology and comprehensive support, AIShield continues to lead the industry in safeguarding AI systems against emerging threats and ensuring AI safety and security to the highest standards.

Key Points: 
  • DUBAI, UAE, April 23, 2024 /PRNewswire-PRWeb/ -- AIShield, the Gartner-recognized Bosch startup acclaimed for its AI security platform SecureAIx, proudly introduces its Professional Services portfolio.
  • Key modules of SecureAIx, AIShield's Unified AI Security Platform include:
    Watchtower: This module safeguards the AI/ML supply chain, addressing potential vulnerabilities from the earliest stages.
  • AIShield Implementation Services: Enablement of seamless incorporation of AIShield's SecureAIx Platform into organizations' AI ecosystem to elevate security and operational efficiency.
  • With the expansion of its Professional Services division, AIShield reaffirms its dedication to delivering unparalleled support and value to clients worldwide.

Netskope Named a Leader in the Gartner® Magic Quadrant™ for Security Service Edge for 3rd Year in a Row

Retrieved on: 
Thursday, April 18, 2024

SANTA CLARA, Calif., April 18, 2024 /PRNewswire/ -- Netskope, a leader in Secure Access Service Edge (SASE), today announced that Gartner, Inc. has recognized the company for the third year in a row as a Leader in the Gartner Magic Quadrant for Security Service Edge (SSE). The 2024 Magic Quadrant for SSE report shows Netskope to have the highest Ability to Execute and to be furthest in Completeness of Vision. Netskope was also shown to have the highest Ability to Execute and to be furthest in Completeness of Vision in the 2023 Magic Quadrant for SSE report.

Key Points: 
  • The 2024 Magic Quadrant for SSE report shows Netskope to have the highest Ability to Execute and to be furthest in Completeness of Vision.
  • I'm extremely proud of our entire Netskope team, customers, and partners for what we've achieved in SSE, SASE, and zero trust.
  • For more on today's announcement, download your complimentary copy of the 2024 Magic Quadrant for Security Service Edge from Netskope.
  • Gartner, Magic Quadrant for Security Service Edge, Charlie Winckless, Thomas Lintemuth, Dale Koeppen, 15 April 2024.

DTEX Partners with Mandiant for Insider Risk Management Capabilities

Retrieved on: 
Monday, April 8, 2024

DTEX Systems , the global leader for insider risk management, today announced its partnership with Mandiant under the DTEX Systems Global Partner Program .

Key Points: 
  • DTEX Systems , the global leader for insider risk management, today announced its partnership with Mandiant under the DTEX Systems Global Partner Program .
  • As the newest member of the DTEX partner network, Mandiant will have the ability to deploy the DTEX InTERCEPT™ platform to elevate its global insider risk consulting practice.
  • DTEX InTERCEPT complements several SIEM, SOAR, and EDR technology partners to provide complete visibility across the attack surface while enriching data to provide a comprehensive understanding of insider risk.
  • Ai3 is the evolution of InTERCEPT™, building on 20 years of insider risk experience to guide and expedite investigations in a matter of minutes.

BRI Unveils Robust Cybersecurity Measures to Safeguard Customer Data

Retrieved on: 
Monday, April 8, 2024

Various forms of fraud aim to steal confidential data of bank customers, so that fraudsters can carry out illegal transactions.

Key Points: 
  • Various forms of fraud aim to steal confidential data of bank customers, so that fraudsters can carry out illegal transactions.
  • Although data protection from the customer side is very important, BRI also continues to ensure that it has data protection and governance that refers to international standards that are industry references.
  • BRI reveals its latest initiatives to combat cybersecurity risks and protect customer data.
  • Regarding technology, BRI adopts a comprehensive approach based on the NIST framework (Identify, Protect, Detect, Respond) to minimize the risk of customer data breaches.

Zoom announces communications compliance solution, Zoom Compliance Manager

Retrieved on: 
Wednesday, March 20, 2024

Zoom Compliance Manager powered by Theta Lake allows you to confidently use Zoom while maintaining regulatory requirements.

Key Points: 
  • Zoom Compliance Manager powered by Theta Lake allows you to confidently use Zoom while maintaining regulatory requirements.
  • Zoom Compliance Manager provides compliance capabilities across the Zoom platform, including AI Companion, Meetings, Team Chat, Phone, Whiteboard, Rooms, Webinars, Events, and Contact Center.
  • Zoom Compliance Manager integrates the proven compliance solution from Theta Lake, a leader in digital communications governance providing modern communication compliance and security solutions.
  • To experience a live demo of Zoom Compliance Manager, visit the Zoom booth on March 26 at 5:30 p.m. EST.

Trellix Accelerates Zero Trust Framework Implementation

Retrieved on: 
Thursday, April 4, 2024

The solution enables organizations to establish security hygiene and strengthen cyber resilience through faster adoption of a Zero Trust framework.

Key Points: 
  • The solution enables organizations to establish security hygiene and strengthen cyber resilience through faster adoption of a Zero Trust framework.
  • “The concept of Zero Trust – built on the principle of 'never trust, always verify' – is a goal state for operational security.
  • Trellix coverage mapping to the five Zero Trust pillars includes:
    Identities: Trellix partners with leading identity vendors like Okta and service providers like Trustwave, Illumio, and Duo to help implement this pillar of Zero Trust alongside the Trellix platform, which provides visibility, analytics, and automation.
  • According to Capterra’s Zero Trust Survey , 99% of organizations who’ve adopted Zero Trust say it’s improved their company’s cybersecurity.

DoControl Wins Best SaaS Security Platform for Insider Threats and Most Innovative Security Software of the Year at the 2024 Globee® Awards for Cybersecurity

Retrieved on: 
Friday, March 15, 2024

NEW YORK, March 15, 2024 /PRNewswire/ -- DoControl is proud to announce its three wins at the 20th Annual 2024 Globee Cybersecurity Awards. The Globee® Awards, a leading authority in recognizing business excellence globally, has honored DoControl for outstanding innovation and effectiveness in cybersecurity.

Key Points: 
  • NEW YORK, March 15, 2024 /PRNewswire/ -- DoControl is proud to announce its three wins at the 20th Annual 2024 Globee Cybersecurity Awards.
  • The Globee® Awards, a leading authority in recognizing business excellence globally, has honored DoControl for outstanding innovation and effectiveness in cybersecurity.
  • DoControl won two golds (best-in-class) in the categories of Insider Threat Management and Most Innovative Security Software of the Year.
  • Unlike traditional CASB and DLP solutions, DoControl incorporates business and security context to ensure quick response to emerging threats and effective insider risk management.