HomeCII/OTInfosec products of the month: May 2024

Infosec products of the month: May 2024

Published on

spot_img

In the world of cybersecurity, the month of May saw a flurry of innovative product releases from various companies. From enhanced threat detection capabilities to streamlined security operations, the industry was abuzz with new offerings aimed at enhancing digital defense mechanisms. Let’s take a closer look at some of the most notable releases from the past month.

Abnormal Security, a prominent player in the cybersecurity space, made waves with its expansion of the Account Takeover Protection product line. Going beyond email security, the new offering provides visibility into cross-platform user behavior and centralizes compromised account detection and remediation across various applications, including identity, collaboration, and cloud infrastructure. This move highlights the company’s commitment to addressing evolving cyber threats on multiple fronts.

Another standout release came from Splunk, which introduced its Asset and Risk Intelligence solution designed to power the SOC (Security Operations Center) of the future. By mapping relationships between assets and identities, the platform enables security operations teams to streamline compliance efforts, reduce cyber risk, and eliminate sources of shadow IT. The rich asset and identity context provided by the solution accelerates security incident response, underscoring Splunk’s focus on proactive threat mitigation.

In a similar vein, SentinelOne unveiled its Singularity Cloud Native Security platform, which combines Cloud Native Security with AI-powered Cloud Workload Security and Cloud Data Security threat protection products. This comprehensive offering delivers visibility and mitigation capabilities in a single cloud security platform, empowering organizations to block attacks and secure their cloud infrastructure effectively. The platform’s integrated approach reflects SentinelOne’s commitment to holistic cloud security strategies.

On the data protection front, Forcepoint introduced its ONE Data Security solution, which simplifies data protection with zero-trust principles for all organizations. The unified management platform offers endpoint and multi-channel cloud data security, streamlining policy enforcement and compliance efforts. By providing a centralized hub for data security policy management, Forcepoint aims to enhance operational resilience and proactive breach prevention in the digital landscape.

In the realm of artificial intelligence, CyberArk launched its CORA AI initiative, embedding AI-powered capabilities across its identity security platform. The introduction of AI-driven anomaly analysis and threat detection mechanisms promises to revolutionize identity threat detection, reducing response times from hours to minutes. This innovative approach underscores CyberArk’s commitment to leveraging cutting-edge technologies for advanced cybersecurity defenses.

Overall, the cybersecurity landscape in May witnessed a wave of innovative product releases aimed at enhancing digital defense mechanisms, streamlining security operations, and empowering organizations to mitigate evolving cyber threats effectively. As threat actors continue to evolve their tactics, staying ahead of the curve with the latest technological advancements is crucial for safeguarding digital assets and maintaining robust cybersecurity postures.

Source link

Latest articles

Indigenous HSMs for DPDP and RBI Compliance

Data Sovereignty in the Digital Age: The Role of Hardware Security Modules (HSMs) in...

AI Agents Making Purchases Require Security Teams to Rethink Risk

In a recent interview featured on Help Net Security, Donald Kossmann, the Chief Technology...

AI Is Making Social Engineering Detection More Challenging—Yet Training Methods Remain Stuck in 2015

In a groundbreaking incident that has significant implications for cybersecurity, Hong Kong police revealed...

State-affiliated Hackers Prepare for Undetectable Critical OT Attacks

In a comprehensive analysis of tabletop exercises conducted by a cybersecurity firm in 2025,...

More like this

Indigenous HSMs for DPDP and RBI Compliance

Data Sovereignty in the Digital Age: The Role of Hardware Security Modules (HSMs) in...

AI Agents Making Purchases Require Security Teams to Rethink Risk

In a recent interview featured on Help Net Security, Donald Kossmann, the Chief Technology...

AI Is Making Social Engineering Detection More Challenging—Yet Training Methods Remain Stuck in 2015

In a groundbreaking incident that has significant implications for cybersecurity, Hong Kong police revealed...