HomeCII/OTNew infosec products released in the week of June 16, 2023

New infosec products released in the week of June 16, 2023

Published on

spot_img

Okta, a leading company in workforce identity solutions, has introduced a new product called Okta Device Access. This product aims to provide stronger authentication for device access, allowing organizations to achieve a zero trust environment while simplifying the login experience for employees. Okta Device Access is part of Okta’s Workforce Identity Cloud.

With the increasing complexity of cybersecurity threats, it is crucial for businesses to secure both devices and applications. Okta Device Access addresses this need by offering enhanced authentication measures to unlock a device, ensuring that only authorized individuals can gain access. By implementing this solution, organizations can minimize the risk of unauthorized access to sensitive information and protect against potential security breaches.

The main advantage of Okta Device Access is its ability to streamline the login process for employees. With stronger authentication, users can confidently access their devices without compromising security. This eliminates the need for cumbersome, multi-step authentication processes while still providing robust security measures.

Another addition to the list of infosec products is Zilla Security’s suite of identity security SaaS solutions. These solutions, Zilla Secure and Segregation of Duties (SOD), enable enterprise-wide identity security for various applications and infrastructures, including cloud-based applications, SaaS, and legacy applications. With the rise of cloud computing and the increasing reliance on digital platforms, ensuring the security of identities has become a critical concern for businesses.

Zilla Secure provides comprehensive identity security measures to protect against potential threats. It offers advanced authentication and authorization capabilities, ensuring that only authorized users can access sensitive information. Segregation of Duties (SOD), on the other hand, allows organizations to define and enforce access control policies, reducing the risk of unauthorized access and potential security breaches.

Seceon, a leading provider of cybersecurity solutions, has unveiled two new products designed to help managed service providers (MSPs) and managed security service providers (MSSPs) quantify and report on the value of their platform. The first product, Seceon aiSecurity Score360 service, offers comprehensive scanning and risk assessments of attack surfaces. This enables MSPs and MSSPs to identify and prioritize potential vulnerabilities, allowing them to take proactive measures to mitigate risks.

The second product, Seceon aiSecurity BI360, enables partners to select from pre-set compliance and regulatory frameworks, such as CMMC, HIPAA, PCI-DSS, NIST, and GDPR, and perform their own analytics and reporting. This empowers MSPs and MSSPs to demonstrate compliance with industry standards and regulations, giving their clients confidence in the security of their systems and data.

Quantinuum, a company specializing in advanced cyber protection, has launched Quantum Origin Onboard. This innovative product provides quantum computing hardened cyber protection for a wide range of connected devices by maximizing the strength of keys generated within the devices themselves. With the increasing threat of cyberattacks, securing connected devices has become a top priority for organizations across industries.

Quantum Origin Onboard offers a unique approach to device security by leveraging the power of quantum computing. By generating cryptographic keys within the devices themselves, the product ensures that these keys are resistant to attacks from quantum computers, which pose a significant threat to traditional encryption methods. This provides a higher level of security for connected devices, protecting against potential breaches and unauthorized access.

Lastly, NETSCOUT has introduced its Visibility Without Borders platform. This platform aims to help organizations maintain the flow of goods and services by uniting performance, security, and availability under one common data framework. In today’s interconnected world, ensuring the smooth operation of critical services is essential for businesses to thrive.

The Visibility Without Borders platform offers comprehensive visibility into network performance, security, and availability. By analyzing data from various sources, including network traffic, application logs, and cybersecurity threat intelligence, organizations can gain valuable insights into their infrastructure’s health and security. This allows them to identify and address potential issues before they impact the delivery of goods and services to customers.

In conclusion, the recent releases from Okta, Zilla Security, Seceon, Quantinuum, and NETSCOUT demonstrate the ongoing commitment to innovation in the field of information security. These products address the evolving cybersecurity threats faced by organizations and offer enhanced solutions to protect against potential breaches and unauthorized access. By adopting these advanced technologies, businesses can strengthen their security measures and ensure the smooth operation of critical services in an increasingly interconnected world.

Source link

Latest articles

Anubis Ransomware Now Hitting Android and Windows Devices

 A sophisticated new ransomware threat has emerged from the cybercriminal underground, presenting a...

Real Enough to Fool You: The Evolution of Deepfakes

Not long ago, deepfakes were digital curiosities – convincing to some, glitchy to...

What Happened and Why It Matters

In June 2025, Albania once again found itself under a digital siege—this time,...

Why IT Leaders Must Rethink Backup in the Age of Ransomware

 With IT outages and disruptions escalating, IT teams are shifting their focus beyond...

More like this

Anubis Ransomware Now Hitting Android and Windows Devices

 A sophisticated new ransomware threat has emerged from the cybercriminal underground, presenting a...

Real Enough to Fool You: The Evolution of Deepfakes

Not long ago, deepfakes were digital curiosities – convincing to some, glitchy to...

What Happened and Why It Matters

In June 2025, Albania once again found itself under a digital siege—this time,...