CINXE.COM

The 20 Coolest Identity Access Management And Data Protection Companies Of 2024: The Security 100

<!DOCTYPE html> <html> <head> <title>The 20 Coolest Identity Access Management And Data Protection Companies Of 2024: The Security 100</title> <link rel="canonical" href="https://www.crn.com/news/security/2024/the-20-coolest-identity-access-management-and-data-protection-companies-of-2024-the-security-100"> <meta name="description" content="The coolest identity, access and data security companies of CRN’s Security 100 for 2024 include Microsoft, Okta, Zscaler and Netskope."> <meta name="keywords" content="Application and Platform Security, Cybersecurity, Security operations"> <meta property="og:title" content="The 20 Coolest Identity Access Management And Data Protection Companies Of 2024: The Security 100"> <meta property="og:description" content="The coolest identity, access and data security companies of CRN’s Security 100 for 2024 include Microsoft, Okta, Zscaler and Netskope."> <meta property="og:url" content="https://www.crn.com/news/security/2024/the-20-coolest-identity-access-management-and-data-protection-companies-of-2024-the-security-100"> <meta property="og:image" content="https://www.crn.com/news/security/2024/media_17ed40a8fdaf4bbba5b491b4cedf70449c1df39ea.jpeg?width=1200&#x26;format=pjpg&#x26;optimize=medium"> <meta property="og:image:secure_url" content="https://www.crn.com/news/security/2024/media_17ed40a8fdaf4bbba5b491b4cedf70449c1df39ea.jpeg?width=1200&#x26;format=pjpg&#x26;optimize=medium"> <meta name="twitter:card" content="summary_large_image"> <meta name="twitter:title" content="The 20 Coolest Identity Access Management And Data Protection Companies Of 2024: The Security 100"> <meta name="twitter:description" content="The coolest identity, access and data security companies of CRN’s Security 100 for 2024 include Microsoft, Okta, Zscaler and Netskope."> <meta name="twitter:image" content="https://www.crn.com/news/security/2024/media_17ed40a8fdaf4bbba5b491b4cedf70449c1df39ea.jpeg?width=1200&#x26;format=pjpg&#x26;optimize=medium"> <meta name="template" content="article"> <meta name="format-detection" content="telephone=no"> <meta name="author" content="Kyle Alspach"> <meta name="category" content="Security"> <meta name="publisheddate" content="February 20, 2024, 12:00 PM EST"> <meta name="slideshow" content="true"> <meta name="viewport" content="width=device-width, initial-scale=1"> <script src="/scripts/lib-franklin.js" type="module"></script> <script src="/scripts/scripts.js" type="module"></script> <link rel="stylesheet" href="/styles/styles.css"> <link rel="apple-touch-icon" href="/icons/apple-touch-icon.png"> </head> <body> <header></header> <main> <div> <h1 id="the-20-coolest-identity-access-management-and-data-protection-companies-of-2024-the-security-100">The 20 Coolest Identity Access Management And Data Protection Companies Of 2024: The Security 100</h1> <p><em>From vendors offering identity and data security to providers of security service edge, here’s a look at 20 key companies in identity, access and data security.</em></p> </div> <div> <p> <picture> <source type="image/webp" srcset="./media_17ed40a8fdaf4bbba5b491b4cedf70449c1df39ea.jpeg?width=2000&#x26;format=webply&#x26;optimize=medium" media="(min-width: 600px)"> <source type="image/webp" srcset="./media_17ed40a8fdaf4bbba5b491b4cedf70449c1df39ea.jpeg?width=750&#x26;format=webply&#x26;optimize=medium"> <source type="image/jpeg" srcset="./media_17ed40a8fdaf4bbba5b491b4cedf70449c1df39ea.jpeg?width=2000&#x26;format=jpeg&#x26;optimize=medium" media="(min-width: 600px)"> <img loading="lazy" alt="" src="./media_17ed40a8fdaf4bbba5b491b4cedf70449c1df39ea.jpeg?width=750&#x26;format=jpeg&#x26;optimize=medium" width="611" height="458"> </picture> </p> <p>In 2024, attackers are showing no signs of losing interest in their go-to tactics of the past few years. Those include heavily favoring identity-based attacks along with targeting of workers in environments outside the corporate firewall, such as work from home.</p> <p>Meanwhile, data security has taken on expanded importance amid continued attacks focused on data theft and extortion, even as the possibility of data exposure through GenAI tools only further underscores the risks.</p> <p><strong>[Related: <a href="https://www.crn.com/news/security/2024/10-cybersecurity-companies-making-moves-january-2024">10 Cybersecurity Companies Making Moves: January 2024</a>]</strong></p> <p><a href="https://www.crn.com/news/security/2024/2024-security-100">As part of CRN’s Security 100 2024</a>, we’ve assembled the following list by collecting many of the top vendors in the related — but not identical — segments of identity protection, data security and security service edge (SSE). In some cases, vendors on our list offer more than one of these technologies (or offer all three, as is the case with Microsoft).</p> <p>In addition to Microsoft, key identity security vendors on our list include two of Gartner’s “leaders” quadrant picks — Okta and Ping Identity — for the research firm’s 2023 Magic Quadrant for Access Management.</p> <p>As for SSE — an integrated set of technologies focused on enabling secure remote access to applications and other resources — vendors on our list include Zscaler and Netskope, which were <a href="https://www.crn.com/news/security/netskope-zscaler-palo-alto-networks-lead-gartner-s-sse-magic-quadrant-for-2023">ranked</a> in Gartner’s “leaders” quadrant for 2023. (We’ve chosen to include the third “leader” on Gartner’s 2023 Magic Quadrant for SSE, Palo Alto Networks, and several other SSE vendors with roots in the network space in our forthcoming Network Security category for this year’s Security 100.)</p> <p>What follows are the 20 identity, access and data security companies that made our Security 100 for 2024.</p> </div> <div> <p> <picture> <source type="image/webp" srcset="./media_1ff8352b72f08710cb50cb24462027f5ba1ee4db9.jpeg?width=2000&#x26;format=webply&#x26;optimize=medium" media="(min-width: 600px)"> <source type="image/webp" srcset="./media_1ff8352b72f08710cb50cb24462027f5ba1ee4db9.jpeg?width=750&#x26;format=webply&#x26;optimize=medium"> <source type="image/jpeg" srcset="./media_1ff8352b72f08710cb50cb24462027f5ba1ee4db9.jpeg?width=2000&#x26;format=jpeg&#x26;optimize=medium" media="(min-width: 600px)"> <img loading="lazy" alt="" src="./media_1ff8352b72f08710cb50cb24462027f5ba1ee4db9.jpeg?width=750&#x26;format=jpeg&#x26;optimize=medium" width="611" height="458"> </picture> </p> <p><strong>Acronis</strong></p> <p><strong>Ezequiel Steiner</strong></p> <p><strong>CEO</strong></p> <p>Recent moves by Acronis included the debut of Acronis CyberApp Standard, an integration technology that opens the company’s ecosystem to third-party vendors. Acronis also launched its Advanced Automation offering, which aims to enable MSP partners to adopt subscription-based services.</p> </div> <div> <p> <picture> <source type="image/webp" srcset="./media_19cc74145a00063ab0b25e9d850bce00ba33fd948.png?width=2000&#x26;format=webply&#x26;optimize=medium" media="(min-width: 600px)"> <source type="image/webp" srcset="./media_19cc74145a00063ab0b25e9d850bce00ba33fd948.png?width=750&#x26;format=webply&#x26;optimize=medium"> <source type="image/png" srcset="./media_19cc74145a00063ab0b25e9d850bce00ba33fd948.png?width=2000&#x26;format=png&#x26;optimize=medium" media="(min-width: 600px)"> <img loading="lazy" alt="" src="./media_19cc74145a00063ab0b25e9d850bce00ba33fd948.png?width=750&#x26;format=png&#x26;optimize=medium" width="610" height="457"> </picture> </p> <p><strong>BeyondTrust</strong></p> <p><strong>Janine Seebeck</strong></p> <p><strong>CEO</strong></p> <p>BeyondTrust debuted its Workforce Passwords capability as part of its BeyondTrust Password Safe platform to provide secure storage and management for passwords used with business apps. Workforce Passwords enables business app password management at the same level as security typically only used with privileged accounts.</p> </div> <div> <p> <picture> <source type="image/webp" srcset="./media_1146167f0761711456824247f2923abf10d009209.png?width=2000&#x26;format=webply&#x26;optimize=medium" media="(min-width: 600px)"> <source type="image/webp" srcset="./media_1146167f0761711456824247f2923abf10d009209.png?width=750&#x26;format=webply&#x26;optimize=medium"> <source type="image/png" srcset="./media_1146167f0761711456824247f2923abf10d009209.png?width=2000&#x26;format=png&#x26;optimize=medium" media="(min-width: 600px)"> <img loading="lazy" alt="" src="./media_1146167f0761711456824247f2923abf10d009209.png?width=750&#x26;format=png&#x26;optimize=medium" width="610" height="457"> </picture> </p> <p><strong>BigID</strong></p> <p><strong>Dimitri Sirota</strong></p> <p><strong>Co-Founder, CEO</strong></p> <p>Recent updates to BigID’s data security and privacy platform have included the introduction of “intelligent” remediation using recommendations based on context. The capability enables accelerated data security risk reduction as well as minimized disruption, according to the company.</p> </div> <div> <p> <picture> <source type="image/webp" srcset="./media_15a10269f4dbb09ff9c41c1f2a482f5e890f809af.png?width=2000&#x26;format=webply&#x26;optimize=medium" media="(min-width: 600px)"> <source type="image/webp" srcset="./media_15a10269f4dbb09ff9c41c1f2a482f5e890f809af.png?width=750&#x26;format=webply&#x26;optimize=medium"> <source type="image/png" srcset="./media_15a10269f4dbb09ff9c41c1f2a482f5e890f809af.png?width=2000&#x26;format=png&#x26;optimize=medium" media="(min-width: 600px)"> <img loading="lazy" alt="" src="./media_15a10269f4dbb09ff9c41c1f2a482f5e890f809af.png?width=750&#x26;format=png&#x26;optimize=medium" width="610" height="456"> </picture> </p> <p><strong>Code42</strong></p> <p><strong>Joe Payne</strong></p> <p><strong>President, CEO</strong></p> <p>Code42 enhanced its portfolio over the past year with the addition of custom indicators of insider risk for its data protection platform, Incydr. Code42 also improved Incydr with capabilities for accurate detection of source code exfiltration, providing complete visibility of the movement of source code, according to the company.</p> </div> <div> <p> <picture> <source type="image/webp" srcset="./media_152254fd33f3839d51252d23ef5a79679be1480fa.png?width=2000&#x26;format=webply&#x26;optimize=medium" media="(min-width: 600px)"> <source type="image/webp" srcset="./media_152254fd33f3839d51252d23ef5a79679be1480fa.png?width=750&#x26;format=webply&#x26;optimize=medium"> <source type="image/png" srcset="./media_152254fd33f3839d51252d23ef5a79679be1480fa.png?width=2000&#x26;format=png&#x26;optimize=medium" media="(min-width: 600px)"> <img loading="lazy" alt="" src="./media_152254fd33f3839d51252d23ef5a79679be1480fa.png?width=750&#x26;format=png&#x26;optimize=medium" width="610" height="457"> </picture> </p> <p><strong>Cohesity</strong></p> <p><strong>Sanjay Poonen</strong></p> <p><strong>President, CEO</strong></p> <p>Key updates to Cohesity DataProtect included an integration with Microsoft 365 Backup Storage. Meanwhile, its GenAI-powered Cohesity Turing offering was integrated with Google Cloud’s Vertex AI, Microsoft’s Azure OpenAI Service and Amazon Bedrock. Cohesity also recently said it plans to acquire Veritas’ data protection business.</p> </div> <div> <p> <picture> <source type="image/webp" srcset="./media_13f2bb1edf4d69a622d9630fa17f066345e2ab39f.jpeg?width=2000&#x26;format=webply&#x26;optimize=medium" media="(min-width: 600px)"> <source type="image/webp" srcset="./media_13f2bb1edf4d69a622d9630fa17f066345e2ab39f.jpeg?width=750&#x26;format=webply&#x26;optimize=medium"> <source type="image/jpeg" srcset="./media_13f2bb1edf4d69a622d9630fa17f066345e2ab39f.jpeg?width=2000&#x26;format=jpeg&#x26;optimize=medium" media="(min-width: 600px)"> <img loading="lazy" alt="" src="./media_13f2bb1edf4d69a622d9630fa17f066345e2ab39f.jpeg?width=750&#x26;format=jpeg&#x26;optimize=medium" width="611" height="459"> </picture> </p> <p><strong>CyberArk</strong></p> <p><strong>Matt Cohen</strong></p> <p><strong>CEO</strong></p> <p>Key launches from CyberArk included the CyberArk Secure Browser, which it called the “first identity security-based enterprise browser.” The web browser enables enhanced security for workforces through cookieless browsing, password replacement, and simplified configuration of</p> <p>security and productivity controls.</p> </div> <div> <p> <picture> <source type="image/webp" srcset="./media_1a264f2e3f9c2bfb74fb0dbc842288d5463840cf4.png?width=2000&#x26;format=webply&#x26;optimize=medium" media="(min-width: 600px)"> <source type="image/webp" srcset="./media_1a264f2e3f9c2bfb74fb0dbc842288d5463840cf4.png?width=750&#x26;format=webply&#x26;optimize=medium"> <source type="image/png" srcset="./media_1a264f2e3f9c2bfb74fb0dbc842288d5463840cf4.png?width=2000&#x26;format=png&#x26;optimize=medium" media="(min-width: 600px)"> <img loading="lazy" alt="" src="./media_1a264f2e3f9c2bfb74fb0dbc842288d5463840cf4.png?width=750&#x26;format=png&#x26;optimize=medium" width="610" height="457"> </picture> </p> <p><strong>Dell Security</strong></p> <p><strong>Michael Dell</strong></p> <p><strong>Chairman, CEO</strong></p> <p>Dell Security, a unit of Dell Technologies, has brought a major focus on enabling zero trust security through its portfolio of offerings. Recent launches have included a new private cloud offering, which brings together numerous technologies and capabilities in a bid to replicate Department of Defense-approved zero trust architecture.</p> </div> <div> <p> <picture> <source type="image/webp" srcset="./media_13fdac5628f6e3bb49cc1298fe5e6f1d1924c905b.png?width=2000&#x26;format=webply&#x26;optimize=medium" media="(min-width: 600px)"> <source type="image/webp" srcset="./media_13fdac5628f6e3bb49cc1298fe5e6f1d1924c905b.png?width=750&#x26;format=webply&#x26;optimize=medium"> <source type="image/png" srcset="./media_13fdac5628f6e3bb49cc1298fe5e6f1d1924c905b.png?width=2000&#x26;format=png&#x26;optimize=medium" media="(min-width: 600px)"> <img loading="lazy" alt="" src="./media_13fdac5628f6e3bb49cc1298fe5e6f1d1924c905b.png?width=750&#x26;format=png&#x26;optimize=medium" width="610" height="458"> </picture> </p> <p><strong>Microsoft</strong></p> <p><strong>Satya Nadella</strong></p> <p><strong>Chairman, CEO</strong></p> <p>Microsoft extended its identity management and security offerings through its Entra portfolio, most prominently with Entra ID, formerly Azure Active Directory. It also expanded into the security service edge market with identity-centric offerings for secure web gateway (Entra Internet Access) and zero trust network access (Entra Private Access).</p> </div> <div> <p> <picture> <source type="image/webp" srcset="./media_10819879488352a2cbc97114cb1a8e22c45f6bed4.png?width=2000&#x26;format=webply&#x26;optimize=medium" media="(min-width: 600px)"> <source type="image/webp" srcset="./media_10819879488352a2cbc97114cb1a8e22c45f6bed4.png?width=750&#x26;format=webply&#x26;optimize=medium"> <source type="image/png" srcset="./media_10819879488352a2cbc97114cb1a8e22c45f6bed4.png?width=2000&#x26;format=png&#x26;optimize=medium" media="(min-width: 600px)"> <img loading="lazy" alt="" src="./media_10819879488352a2cbc97114cb1a8e22c45f6bed4.png?width=750&#x26;format=png&#x26;optimize=medium" width="610" height="457"> </picture> </p> <p><strong>Netskope</strong></p> <p><strong>Sanjay Beri</strong></p> <p><strong>CEO</strong></p> <p>Netskope’s Next Gen SASE Branch offering brings together its “borderless” SD-WAN with its zero trust security offerings and AI and ML capabilities. The platform leverages Netskope’s SkopeAI technology that offers deep contextual awareness for improved data loss prevention across structured and unstructured data.</p> </div> <div> <p> <picture> <source type="image/webp" srcset="./media_1efdeb423a39b04bc41ab656b14e538872d5c18c3.png?width=2000&#x26;format=webply&#x26;optimize=medium" media="(min-width: 600px)"> <source type="image/webp" srcset="./media_1efdeb423a39b04bc41ab656b14e538872d5c18c3.png?width=750&#x26;format=webply&#x26;optimize=medium"> <source type="image/png" srcset="./media_1efdeb423a39b04bc41ab656b14e538872d5c18c3.png?width=2000&#x26;format=png&#x26;optimize=medium" media="(min-width: 600px)"> <img loading="lazy" alt="" src="./media_1efdeb423a39b04bc41ab656b14e538872d5c18c3.png?width=750&#x26;format=png&#x26;optimize=medium" width="611" height="458"> </picture> </p> <p><strong>Okta</strong></p> <p><strong>Todd McKinnon</strong></p> <p><strong>Co-Founder, CEO</strong></p> <p>As Okta has expanded beyond identity and access management, the company has moved into areas including identity governance. Meanwhile, Okta Privileged Access recently reached general availability and aims to offer differentiated capabilities including just-in-time infrastructure access.</p> </div> <div> <p> <picture> <source type="image/webp" srcset="./media_17242d5296f329a040f2dd1d7c7a21ac149600ab6.png?width=2000&#x26;format=webply&#x26;optimize=medium" media="(min-width: 600px)"> <source type="image/webp" srcset="./media_17242d5296f329a040f2dd1d7c7a21ac149600ab6.png?width=750&#x26;format=webply&#x26;optimize=medium"> <source type="image/png" srcset="./media_17242d5296f329a040f2dd1d7c7a21ac149600ab6.png?width=2000&#x26;format=png&#x26;optimize=medium" media="(min-width: 600px)"> <img loading="lazy" alt="" src="./media_17242d5296f329a040f2dd1d7c7a21ac149600ab6.png?width=750&#x26;format=png&#x26;optimize=medium" width="610" height="458"> </picture> </p> <p><strong>OneTrust</strong></p> <p><strong>Kabir Barday</strong></p> <p><strong>Founder, CEO</strong></p> <p>OneTrust debuted an array of new offerings including AI governance, localized consent action, data catalog integration and third-party risk management. Meanwhile, with the recent introduction of new data policy configuration capabilities, OneTrust said it is seeking to enable improved data policy enforcement.</p> </div> <div> <p> <picture> <source type="image/webp" srcset="./media_1ec62be6c080547e5e14b21eb404a41caa4adfbe2.jpeg?width=2000&#x26;format=webply&#x26;optimize=medium" media="(min-width: 600px)"> <source type="image/webp" srcset="./media_1ec62be6c080547e5e14b21eb404a41caa4adfbe2.jpeg?width=750&#x26;format=webply&#x26;optimize=medium"> <source type="image/jpeg" srcset="./media_1ec62be6c080547e5e14b21eb404a41caa4adfbe2.jpeg?width=2000&#x26;format=jpeg&#x26;optimize=medium" media="(min-width: 600px)"> <img loading="lazy" alt="" src="./media_1ec62be6c080547e5e14b21eb404a41caa4adfbe2.jpeg?width=750&#x26;format=jpeg&#x26;optimize=medium" width="611" height="458"> </picture> </p> <p><strong>Ping Identity</strong></p> <p><strong>Andre Durand</strong></p> <p><strong>Founder, CEO</strong></p> <p>PingOne Neo, Ping Identity's new decentralized identity management offering, looks to enhance data security and privacy while simplifying the process of verifying information from internal and external sources. The company’s approach aims to minimize identity theft risks and bolster organizational security through instant trust establishment.</p> </div> <div> <p> <picture> <source type="image/webp" srcset="./media_1c58bf21f51c93227bc11d87af89e675a915b0847.jpeg?width=2000&#x26;format=webply&#x26;optimize=medium" media="(min-width: 600px)"> <source type="image/webp" srcset="./media_1c58bf21f51c93227bc11d87af89e675a915b0847.jpeg?width=750&#x26;format=webply&#x26;optimize=medium"> <source type="image/jpeg" srcset="./media_1c58bf21f51c93227bc11d87af89e675a915b0847.jpeg?width=2000&#x26;format=jpeg&#x26;optimize=medium" media="(min-width: 600px)"> <img loading="lazy" alt="" src="./media_1c58bf21f51c93227bc11d87af89e675a915b0847.jpeg?width=750&#x26;format=jpeg&#x26;optimize=medium" width="611" height="458"> </picture> </p> <p><strong>RSA</strong></p> <p><strong>Rohit Ghai</strong></p> <p><strong>CEO</strong></p> <p>RSA recently unveiled plans to support OAuth, a key open standard for delegating access. The move will lead to better protection of critical infrastructure through helping to enable delivery of improved identity security, including at the government level, according to the company.</p> </div> <div> <p> <picture> <source type="image/webp" srcset="./media_12585106cba3fe83409079e87b2e658bf8fa9fc23.jpeg?width=2000&#x26;format=webply&#x26;optimize=medium" media="(min-width: 600px)"> <source type="image/webp" srcset="./media_12585106cba3fe83409079e87b2e658bf8fa9fc23.jpeg?width=750&#x26;format=webply&#x26;optimize=medium"> <source type="image/jpeg" srcset="./media_12585106cba3fe83409079e87b2e658bf8fa9fc23.jpeg?width=2000&#x26;format=jpeg&#x26;optimize=medium" media="(min-width: 600px)"> <img loading="lazy" alt="" src="./media_12585106cba3fe83409079e87b2e658bf8fa9fc23.jpeg?width=750&#x26;format=jpeg&#x26;optimize=medium" width="611" height="458"> </picture> </p> <p><strong>Rubrik</strong></p> <p><strong>Bipul Sinha</strong></p> <p><strong>Co-Founder, CEO</strong></p> <p>Rubrik rolled out a GenAI powered tool, Ruby, that aims to enhance detection of data security threats as well as recovery and resilience for security operations professionals. The offering, available in the Rubrik Security Cloud platform, utilizes Microsoft’s Azure OpenAI technology as well as Rubrik’s Data Threat Engine.</p> </div> <div> <p> <picture> <source type="image/webp" srcset="./media_18da374762ec485e430b03b6db99669bff9e6ab46.png?width=2000&#x26;format=webply&#x26;optimize=medium" media="(min-width: 600px)"> <source type="image/webp" srcset="./media_18da374762ec485e430b03b6db99669bff9e6ab46.png?width=750&#x26;format=webply&#x26;optimize=medium"> <source type="image/png" srcset="./media_18da374762ec485e430b03b6db99669bff9e6ab46.png?width=2000&#x26;format=png&#x26;optimize=medium" media="(min-width: 600px)"> <img loading="lazy" alt="" src="./media_18da374762ec485e430b03b6db99669bff9e6ab46.png?width=750&#x26;format=png&#x26;optimize=medium" width="610" height="456"> </picture> </p> <p><strong>SailPoint</strong></p> <p><strong>Mark McClain</strong></p> <p><strong>Founder, CEO</strong></p> <p>SailPoint's new next-generation multi-tenant identity security platform, Atlas, offers enhanced management and automation of access decisions. Meanwhile, SailPoint bolstered its platform through the acquisitions of third-party identity security provider SecZetta and access privileged management firm Osirium.</p> </div> <div> <p> <picture> <source type="image/webp" srcset="./media_1f19a69e97a0857d6105ce84b5fb7bf21323e03c2.png?width=2000&#x26;format=webply&#x26;optimize=medium" media="(min-width: 600px)"> <source type="image/webp" srcset="./media_1f19a69e97a0857d6105ce84b5fb7bf21323e03c2.png?width=750&#x26;format=webply&#x26;optimize=medium"> <source type="image/png" srcset="./media_1f19a69e97a0857d6105ce84b5fb7bf21323e03c2.png?width=2000&#x26;format=png&#x26;optimize=medium" media="(min-width: 600px)"> <img loading="lazy" alt="" src="./media_1f19a69e97a0857d6105ce84b5fb7bf21323e03c2.png?width=750&#x26;format=png&#x26;optimize=medium" width="611" height="458"> </picture> </p> <p><strong>Saviynt</strong></p> <p><strong>Sachin Nayyar</strong></p> <p><strong>Founder, Chairman, CEO</strong></p> <p>Saviynt, which offers what it calls a “converged” identity platform, extended its capabilities through an integration with AWS Identity and Access Management Access Analyzer. This will enable enhanced visibility around user activity and access, as well as improved privileged access management.</p> </div> <div> <p> <picture> <source type="image/webp" srcset="./media_19dfc3a334910cde1a325f842b624f7058964acdc.png?width=2000&#x26;format=webply&#x26;optimize=medium" media="(min-width: 600px)"> <source type="image/webp" srcset="./media_19dfc3a334910cde1a325f842b624f7058964acdc.png?width=750&#x26;format=webply&#x26;optimize=medium"> <source type="image/png" srcset="./media_19dfc3a334910cde1a325f842b624f7058964acdc.png?width=2000&#x26;format=png&#x26;optimize=medium" media="(min-width: 600px)"> <img loading="lazy" alt="" src="./media_19dfc3a334910cde1a325f842b624f7058964acdc.png?width=750&#x26;format=png&#x26;optimize=medium" width="610" height="456"> </picture> </p> <p><strong>Semperis</strong></p> <p><strong>Mickey Bresman</strong></p> <p><strong>Co-Founder, CEO</strong></p> <p>Semperis unveiled the extension of its tool for analyzing and managing attacks, Forest Druid, to include support for Microsoft’s Entra ID (formerly known as Azure Active Directory). Other key updates included the debut of a new security-centric offering for migration and consolidation of Active Directory systems.</p> </div> <div> <p> <picture> <source type="image/webp" srcset="./media_1908a902f029a54e7a7d895a8ce17c2e195980818.png?width=2000&#x26;format=webply&#x26;optimize=medium" media="(min-width: 600px)"> <source type="image/webp" srcset="./media_1908a902f029a54e7a7d895a8ce17c2e195980818.png?width=750&#x26;format=webply&#x26;optimize=medium"> <source type="image/png" srcset="./media_1908a902f029a54e7a7d895a8ce17c2e195980818.png?width=2000&#x26;format=png&#x26;optimize=medium" media="(min-width: 600px)"> <img loading="lazy" alt="" src="./media_1908a902f029a54e7a7d895a8ce17c2e195980818.png?width=750&#x26;format=png&#x26;optimize=medium" width="610" height="456"> </picture> </p> <p><strong>Skyhigh Security</strong></p> <p><strong>Gee Rittenhouse</strong></p> <p><strong>CEO</strong></p> <p>Skyhigh’s recent product updates included the launch of capabilities for enabling secure usage of GenAI apps. Using a centralized enforcement console, the technology offers data protection and threat prevention across websites and SaaS apps, as well as IaaS environments and shadow IT.</p> </div> <div> <p> <picture> <source type="image/webp" srcset="./media_10fd538485f93181d8ba1197a3aefe577f788fecd.png?width=2000&#x26;format=webply&#x26;optimize=medium" media="(min-width: 600px)"> <source type="image/webp" srcset="./media_10fd538485f93181d8ba1197a3aefe577f788fecd.png?width=750&#x26;format=webply&#x26;optimize=medium"> <source type="image/png" srcset="./media_10fd538485f93181d8ba1197a3aefe577f788fecd.png?width=2000&#x26;format=png&#x26;optimize=medium" media="(min-width: 600px)"> <img loading="lazy" alt="" src="./media_10fd538485f93181d8ba1197a3aefe577f788fecd.png?width=750&#x26;format=png&#x26;optimize=medium" width="610" height="457"> </picture> </p> <p><strong>Varonis</strong></p> <p><strong>Yaki Faitelson</strong></p> <p><strong>Co-Founder, Chairman, President, CEO</strong></p> <p>Varonis recently introduced third-party app risk management while expanding its data security posture management capabilities, including with deeper support for object storage and cloud databases in AWS and Microsoft Azure. It also added GenAI-powered capabilities to its platform with the introduction of Athena AI.</p> </div> <div> <p> <picture> <source type="image/webp" srcset="./media_148b61fb9111e442cc4ac4db63f178a2ec654b482.png?width=2000&#x26;format=webply&#x26;optimize=medium" media="(min-width: 600px)"> <source type="image/webp" srcset="./media_148b61fb9111e442cc4ac4db63f178a2ec654b482.png?width=750&#x26;format=webply&#x26;optimize=medium"> <source type="image/png" srcset="./media_148b61fb9111e442cc4ac4db63f178a2ec654b482.png?width=2000&#x26;format=png&#x26;optimize=medium" media="(min-width: 600px)"> <img loading="lazy" alt="" src="./media_148b61fb9111e442cc4ac4db63f178a2ec654b482.png?width=750&#x26;format=png&#x26;optimize=medium" width="611" height="458"> </picture> </p> <p><strong>Zscaler</strong></p> <p><strong>Jay Chaudhry</strong></p> <p><strong>Founder, Chairman, CEO</strong></p> <p>Zscaler expanded its portfolio with new offerings including Zscaler Resilience, which offers the ability to keep interconnections to apps intact during a major security incident. The company also updated its data loss prevention product to thwart potential leakage of data into GenAI apps.</p> </div> <div></div> </main> <footer></footer> </body> </html>

Pages: 1 2 3 4 5 6 7 8 9 10