data security - AI-Tech Park https://ai-techpark.com AI, ML, IoT, Cybersecurity News & Trend Analysis, Interviews Fri, 30 Aug 2024 05:24:02 +0000 en-US hourly 1 https://wordpress.org/?v=5.4.16 https://ai-techpark.com/wp-content/uploads/2017/11/cropped-ai_fav-32x32.png data security - AI-Tech Park https://ai-techpark.com 32 32 TerraMaster Launches BBS Integrated Backup Solution https://ai-techpark.com/terramaster-launches-bbs-integrated-backup-solution/ Thu, 29 Aug 2024 16:30:00 +0000 https://ai-techpark.com/?p=178124 Comprehensive Protection for Enterprise Data Security To address the challenge of global data security incidents, TerraMaster, a professional brand focusing on providing innovative storage products for families and businesses, officially launched its BBS integrated backup solution, offering comprehensive data backup solutions for small and medium-sized enterprises. This integrated backup solution combines a...

The post TerraMaster Launches BBS Integrated Backup Solution first appeared on AI-Tech Park.

]]>
Comprehensive Protection for Enterprise Data Security

To address the challenge of global data security incidents, TerraMaster, a professional brand focusing on providing innovative storage products for families and businesses, officially launched its BBS integrated backup solution, offering comprehensive data backup solutions for small and medium-sized enterprises.

This integrated backup solution combines a professional storage management system, a suite of backup software tools including Centralized Backup, TerraSync, Duple Backup, CloudSync, and Snapshot, and a hardware platform, achieving deep integration without the need for additional software costs. Backup tasks and storage capacity are unlimited. Whether the data is from employee PCs, physical servers, or virtual machines, the TerraMaster Backup Server offers a one-stop enterprise data backup service.

BBS Key Features

Flexible Combination and Full-Scenario Deployment
TerraMaster integrated backup solution allows for free combination based on different application scenarios and company sizes, enabling the implementation of various backup strategies. Additionally, its deployment is simple and efficient, featuring a graphical user interface that requires no learning curve, significantly reducing the management and maintenance costs for enterprises. Moreover, the solution boasts robust security features, capable of handling backup needs for millions of files and offering various security strategies.

For companies of different sizes, TerraMaster provides tailored solutions. Companies with fewer than 50 employees can use Centralized Backup or TerraSync to back up PCs to TNAS, with Duple Backup replicating the data to local or remote TNAS. Companies with 50-100 employees can synchronize branch office data to the central server at headquarters using TerraSync and continuously back up the data to remote TNAS servers and the cloud using Duple Backup. Large enterprises with 100-200 employees can use Centralized Backup to back up PCs, servers, and virtual machines tothe TNAS central server, with backups to a remote TNAS server as well.

The upcoming release of the next-generation TOS 6 system, integrated with the BBS full-scenario backup solution, delivering an unprecedented upgrade experience. This operating system features a brand-new user interaction model, offering a complete transformation from the inside out! Moreover, TOS 6 enhances security protection mechanisms by introducing the SPC function, ensuring that users’ data is stored more securely and reliably. Notably, TOS 6 is fully compatible with the Ubuntu root file system, making it a more familiar and easier-to-maintain operating system for a broad range of users.

Explore AITechPark for the latest advancements in AI, IOT, Cybersecurity, AITech News, and insightful updates from industry experts!

The post TerraMaster Launches BBS Integrated Backup Solution first appeared on AI-Tech Park.

]]>
Revolutionizing SMBs: AI Integration and Data Security in E-Commerce https://ai-techpark.com/ai-integration-and-data-security-in-e-commerce/ Wed, 28 Aug 2024 12:30:00 +0000 https://ai-techpark.com/?p=177819 Explore how AI-powered e-commerce platforms revolutionize SMBs by enhancing pricing analysis, inventory management, and data security through encryption and blockchain technology. AI-powered e-commerce platforms scale SMB operations by providing sophisticated pricing analysis and inventory management. Encryption and blockchain applications significantly mitigate concerns about data security and privacy by enhancing data...

The post Revolutionizing SMBs: AI Integration and Data Security in E-Commerce first appeared on AI-Tech Park.

]]>
Explore how AI-powered e-commerce platforms revolutionize SMBs by enhancing pricing analysis, inventory management, and data security through encryption and blockchain technology.

AI-powered e-commerce platforms scale SMB operations by providing sophisticated pricing analysis and inventory management. Encryption and blockchain applications significantly mitigate concerns about data security and privacy by enhancing data protection and ensuring the integrity and confidentiality of information.

A 2024 survey of 530 small and medium-sized businesses (SMBs) reveals that AI adoption remains modest, with only 39% leveraging this technology. Content creation seems to be the main use case, with 58% of these businesses leveraging AI to support content marketing and 49% to write social media prompts.

Despite reported satisfaction with AI’s time and cost-saving benefits, the predominant use of ChatGPT or Google Gemini mentioned in the survey suggests that these SMBs have been barely scratching the surface of AI’s full potential. Indeed, AI offers far more advanced capabilities, namely pricing analysis and inventory management. Businesses willing to embrace these tools stand to gain an immense first-mover advantage.

However, privacy and security concerns raised by many SMBs regarding deeper AI integration merit attention. The counterargument suggests that the e-commerce platforms offering smart pricing and inventory management solutions would also provide encryption and blockchain applications to mitigate risks. 

Regressions and trees: AI under the hood

Every SMB knows that setting optimal product or service prices and effectively managing inventory are crucial for growth. Price too low to beat competitors, and profits suffer. Over-order raw materials, and capital gets tied up unnecessarily. But what some businesses fail to realize is that AI-powered e-commerce platforms can perform all these tasks in real time without the risks associated with human error.

At the center is machine learning, which iteratively refines algorithms and statistical models based on input data to determine optimal prices and forecast inventory demand. The types of machine learning models employed vary across industries, but two stand out in the context of pricing and inventory management.

Regression analysis has been the gold standard in determining prices. This method involves predicting the relationship between the combined effects of multiple explanatory variables and an outcome within a multidimensional space. It achieves this by plotting a “best-fit” hyperplane through the data points in a way that minimizes the differences between the actual and predicted values. In the context of pricing, the model may consider how factors like region, market conditions, seasonality, and demand collectively impact the historical sales data of a given product or service. The resulting best-fit hyperplane would denote the most precise price point for every single permutation or change in the predictors (which could number in the millions).

What machine learning contributes to this traditional tried-and-true econometric technique is scope and velocity. Whereas human analysts would manually deploy this tool within Excel, using relatively simple data sets from prior years, machine learning conducts regression analysis on significantly more comprehensive data sets. Moreover, it can continuously adapt its analysis in real-time by feeding it the latest data. This eliminates the need for a human to spend countless hours every quarter redoing the work.

In summary, machine-learning regression ensures that price points are constantly being updated in real time with a level of precision that far surpasses human capability.

As for inventory management, an effective methodology within machine learning’s arsenal would be decision trees.

Decision trees resolve inventory challenges using a flowchart-like logic. The analysis begins by asking a core question, such as whether there is a need to order more products to prevent understocking. Next, a myriad of factors that are suspected to have an effect on this decision are fed to the model, such as current stock, recent sales, seasonal trends, economic influences, storage space, etc. Each of these factors become a branch in the decision tree. As the tree branches out, it evaluates the significance of each factor in predicting the need for product orders against historical data. For example, if data indicates that low stock levels during certain seasons consistently lead to stockouts, the model may prioritize the “current stock” branch and recommend ordering more products when stock levels are low during those seasons.

Ultimately, the tree reaches a final decision node where it determines whether to order more products. This conclusion is based on the cumulative analysis of all factors and their historical impact in similar situations.

The beauty of decision trees is that they provide businesses an objective decision-making framework that systematically and simultaneously weigh a large number of variables — a task that humans would struggle to replicate given the large volumes of data that must be processed.

The machine learning techniques discussed earlier are just examples for illustration purposes; real-world applications are considerably more advanced. The key takeaway is that e-commerce platforms offering AI-powered insights can scale any SMB— regardless of its needs.

Balancing AI with data security

With great power comes great responsibility, as the saying goes. An e-commerce platform harnesses the wondrous capabilities of AI must also guarantee the protection of its users and customers’ data. This is especially relevant given that AI routinely accesses large amounts of data, increasing the risk of data breaches. Without proper security measures, sensitive information can be exposed through cyber-attacks.

When customers are browsing an online marketplace, data privacy and security are top of mind. According to a PwC survey, 71% of consumers will not purchase from a business they do not trust. Along the same lines, 81% would cease doing business with an online company following a data breach, and 97% have expressed concern that businesses might misuse their data.

Fortunately, e-commerce platforms provide various cybersecurity measures, addressing security compromises and reassuring both customers and the SMBs that host their products on these platforms.

Encryption is a highly effective method for securing data transmission and storage. By transforming plaintext data into scrambled ciphertext, the process renders the data indecipherable to anyone without the corresponding decryption key. Therefore, even if hackers somehow manage to intercept data exchanges or gain access to databases, they will be unable to make sense of the data. Sensitive information such as names, birthdays, phone numbers, and credit card information will appear as meaningless jumble. Research from Ponemon Institute shows that encryption technologies can save businesses an average of $1.4 million per cyber-attack.

Block chain technology contributes an extra level of security to e-commerce platforms. Transaction data is organized into blocks, which are in turn linked together in a chain. Once a block joins the chain, it becomes difficult to tamper with the data within. Furthermore, copies of this “blockchain” are distributed across multiple systems worldwide so that the latter can detect any attempts to illegitimately access the data. An IDC survey suggests that American bankers are the biggest users of block chain, further underscoring confidence in this technology.

The argument here is that SMBs can enjoy the benefits of AI while maintaining data privacy and security. The right e-commerce platforms offer tried-and-true measures to safeguard data and prevent breaches.

Having your cake and eating it too

The potential of AI in SMBs remains largely untapped. As such, those daring enough to exploit machine learning to empower their business logics may reap a significant dividend over competitors who insist on doing things the old-fashioned way. By automating essential functions like pricing analysis and inventory management, businesses can achieve unprecedented levels of efficiency and accuracy. The e-commerce platforms providing these services are equipped with robust cybersecurity features, providing valuable peace of mind for SMBs.

Explore AITechPark for top AI, IoT, Cybersecurity advancements, And amplify your reach through guest posts and link collaboration.

The post Revolutionizing SMBs: AI Integration and Data Security in E-Commerce first appeared on AI-Tech Park.

]]>
AITech Interview with Robert Scott, Chief Innovator at Monjur https://ai-techpark.com/aitech-interview-with-robert-scott/ Tue, 27 Aug 2024 01:30:00 +0000 https://ai-techpark.com/?p=177657 Discover how Monjur’s Chief Innovator, Robert Scott, is revolutionizing legal services with AI and cloud technology in this insightful AITech interview. Greetings Robert, Could you please share with us your professional journey and how you came to your current role as Chief Innovator of Monjur? Thank you for having me....

The post AITech Interview with Robert Scott, Chief Innovator at Monjur first appeared on AI-Tech Park.

]]>
Discover how Monjur’s Chief Innovator, Robert Scott, is revolutionizing legal services with AI and cloud technology in this insightful AITech interview.

Greetings Robert, Could you please share with us your professional journey and how you came to your current role as Chief Innovator of Monjur?

Thank you for having me. My professional journey has been a combination of law and technology. I started my career as an intellectual property attorney, primarily dealing with software licensing and IT transactions and disputes.  During this time, I noticed inefficiencies in the way we managed legal processes, particularly in customer contracting solutions. This sparked my interest in legal tech. I pursued further studies in AI and machine learning, and eventually transitioned into roles that allowed me to blend my legal expertise with technological innovation. We founded Monjur to redefine legal services.  I am responsible for overseeing our innovation strategy, and today, as Chief Innovator, I work on developing and implementing cutting-edge AI solutions that enhance our legal services.

How has Monjur adopted AI for streamlined case research and analysis, and what impact has it had on your operations?

Monjur has implemented AI in various facets of our legal operations. For case research and analysis, we’ve integrated natural language processing (NLP) models that rapidly sift through vast legal databases to identify relevant case law, statutes, and legal precedents. This has significantly reduced the time our legal professionals spend on research while ensuring that they receive comprehensive and accurate information. The impact has been tremendous, allowing us to provide quicker and more informed legal opinions to our clients. Moreover, AI has improved the accuracy of our legal analyses by flagging critical nuances and trends that might otherwise be overlooked.

Integrating technology for secure document management and transactions is crucial in today’s digital landscape. Can you elaborate on Monjur’s approach to this and any challenges you’ve encountered?

At Monjur, we prioritize secure document management and transactions by leveraging encrypted cloud platforms. Our document management system utilizes multi-factor authentication and end-to-end encryption to protect client data. However, implementing these technologies hasn’t been without challenges. Ensuring compliance with varying data privacy regulations across jurisdictions required us to customize our systems extensively. Additionally, onboarding clients to these new systems involved change management and extensive training to address their concerns regarding security and usability.

Leveraging cloud platforms for remote collaboration and accessibility is increasingly common. How has Monjur implemented these platforms, and what benefits have you observed in terms of team collaboration and accessibility to documents and resources?

Monjur has adopted a multi-cloud approach to ensure seamless remote collaboration and accessibility. We’ve integrated platforms like Microsoft, GuideCX and Filevine to provide our teams with secure access to documents, resources, and collaboration tools from anywhere in the world. These platforms facilitate real-time document sharing, and project management, significantly improving team collaboration. We’ve also implemented granular access controls to ensure data security while maintaining accessibility. The benefits include improved productivity, as our teams can now collaborate efficiently across time zones and locations, and a reduced need for physical office space, resulting in cost savings.

In what ways is Monjur preparing for the future and further technological advancements? Can you share any upcoming projects or initiatives in this regard?

At Monjur, we’re constantly exploring emerging technologies to stay ahead. We continue to training our Lawbie document analyzer and are moving toward our goal of being able to provide real-time updates to our clients legal documents.  

As the Chief Innovator, what personal strategies do you employ to stay abreast of the latest technological trends and advancements in your field?

To stay current, I dedicate time each week to reading industry reports, academic papers, and blogs focused on AI, machine learning, and legal tech. I also attend webinars, conferences, and roundtable discussions with fellow innovators and ch leaders. Being part of several professional networks, provides me with valuable insights into emerging trends. Additionally, I engage in continuous learning through online courses and certifications in emerging technologies. Lastly, I maintain an open dialogue with our  team and regularly brainstorm with them to uncover new ideas and innovations.

What advice would you give to our readers who are looking to integrate similar technological solutions into their organizations?

My advice would be to start by identifying your organization’s pain points and evaluating how technology can address them. Engage your teams early in the process to ensure their buy-in and gather their insights. When selecting technology solutions, prioritize scalability and interoperability to future-proof your investments. Start small with pilot projects, measure their impact, and scale up based on results. It’s also crucial to foster a culture of continuous learning and innovation within your organization. Finally, don’t overlook the importance of data security and compliance, and ensure that your solutions align with industry standards and regulations.

With your experience in innovation and technology, what are some key factors organizations should consider when embarking on digital transformation journeys?

Embarking on a digital transformation journey requires a clear strategy and strong leadership. Here are some key factors to consider:

  1. Vision and Objectives: Clearly define your vision and set measurable objectives that align with your overall business goals.
  2. Change Management: Prepare for organizational change by fostering a culture that embraces innovation and training teams to adapt to new technologies.
  3. Stakeholder Engagement: Involve all stakeholders, including clients, to ensure their needs and concerns are addressed.
  4. Technology Selection: Choose technologies that offer scalability, interoperability, and align with your specific business requirements.
  5. Security and Compliance: Implement robust security measures and ensure compliance with relevant data protection laws.
  6. Continuous Improvement: Treat digital transformation as an ongoing process rather than a one-time project. Regularly assess the impact of implemented solutions and refine your strategy accordingly.

By considering these factors, organizations can navigate the complexities of digital transformation more effectively and reap the full benefits of their technological investments.

Robert Scott

Chief Innovator at Monjur

Robert Scott is Chief Innovator at Monjur.  He provides a cloud-enabled, AI-powered legal services platform allowing law firms to offer long-term recurring revenue services and unlock the potential of their legal templates and other firm IP. redefines legal services in managed services and cloud law. Recognized as Technology Lawyer of the Year, he has led strategic IT matters for major corporations,  in cloud transactions, data privacy, and cybersecurity. He has an AV Rating from Martindale Hubbell, is licensed in Texas, and actively contributes through the MSP Zone podcast and industry conferences. The Monjur platform was recently voted Best New Solution by ChannelPro SMB Forum. As a trusted advisor, Robert navigates the evolving technology law landscape, delivering insights and expertise.

The post AITech Interview with Robert Scott, Chief Innovator at Monjur first appeared on AI-Tech Park.

]]>
From Reactive To Proactive: DSPM’s Transformative Role in Data Security https://ai-techpark.com/from-reactive-to-proactive-dspms-transformative-role-in-data-security/ Mon, 26 Aug 2024 13:45:00 +0000 https://ai-techpark.com/?p=177618 New research reveals market expectations and planned adoption of Data Security Posture Management Normalyze, the pioneer of Data Security Posture Management (DSPM) solutions, today released new research by Omdia, commissioned by Normalyze, which sheds light on the growing importance of DSPM as a foundation for modern data strategies. This comprehensive...

The post From Reactive To Proactive: DSPM’s Transformative Role in Data Security first appeared on AI-Tech Park.

]]>
New research reveals market expectations and planned adoption of Data Security Posture Management

Normalyze, the pioneer of Data Security Posture Management (DSPM) solutions, today released new research by Omdia, commissioned by Normalyze, which sheds light on the growing importance of DSPM as a foundation for modern data strategies. This comprehensive analysis, based on a survey of 209 U.S.-based security decision-makers, underscores the significant gaps in data protection that DSPM is uniquely positioned to address, market requirements, and anticipated roadblocks.

According to the report, 89% of organizations expect a significant or moderate increase in data security budgets over the next 12 months, driven by the escalating threat landscape and stringent regulatory requirements like GDPR and HIPAA. Despite these investments, many organizations still struggle with the complexities of managing vast, unstructured data environments and ensuring compliance.

To underscore that point, respondents shared that their organizations’ top data security priorities over the next 12–24 months include reducing the opportunity for threats to infiltrate data stores (59%), improving data security posture (53%), and demonstrating ROI through improved reporting and business communication (42%).

The report delves into whether respondents have already adopted DSPM, plan to adopt it, or the reasons for not doing so.

  • DSPM adoption is on the rise, particularly among larger organizations, with 72% of companies with 10,000+ employees confident in DSPM’s capabilities.
  • 67% of organizations expressed confidence in DSPM’s ability to provide suitable data protection.
  • 76% of respondents who have already deployed a DSPM solution agree that DSPM provides visibility and security in data-heavy environments, essential for preventing data breaches and ensuring regulatory compliance.

With data breaches costing companies an average of $4.45 million per incident, according to IBM, the need for comprehensive data security measures has never been more pressing. The Omdia report reveals that many organizations still face challenges such as inadequate classification and labeling of data, leading to increased risks of unauthorized access and regulatory non-compliance.

“Organizations must prioritize data classification and governance to stay ahead of evolving threats and regulatory demands,” said Adam Strange, Principal Analyst at Omdia. “This research makes it clear that organizations are still struggling with data security and DSPM appears to be the next stop on many roadmaps.”

Respondents shared that the most common challenges in DSPM implementation include making new hires or lacking internal resources (61%), vendor/tool selection (51%), and obtaining executive buy-in (38%).

The economic implications of failing to secure data from the outset are staggering. “DSPM is a strategic enabler for a wide range of use cases, including AI initiatives, data migration projects, and data hygiene efforts. Data context and security must be the first step in these endeavors – without it, these projects are destined to fail,” said Amer Deeba, CEO and co-founder of Normalyze. “The economic value becomes clear when considering how many of these projects fail due to a lack of classified data, which stems from insufficient understanding and alignment among leadership to secure the necessary budget and resources from the outset.”

To learn more about the research, please join our webinar on Wednesday, August 28th at 9:00am Pacific. Register here.

To access these critical insights and prepare your organization for the future of data security, download the full Omdia report here.

Methodology
This report was drawn together using a commissioned study by Normalyze, surveying 209 US-based data security decision makers. Respondents were from organizations of at least 1,000 employees, across a variety of industries including retail, banking and financial services, technology services, healthcare, and SaaS. Respondents had to hold manager-level roles or more senior, with decision-making ability for their organization’s data security strategy/program, in order to qualify for the study. This study was conducted in April 2024.

This report also draws on the 2023 Omdia decision maker survey which analyzes responses from over 600 globally distributed IT decision makers and is repeated on an annual basis. Also a background source were several of the Omdia ‘On the Radar’ or ‘OTR’ reports into specific vendors and their respective DSPM propositions. These are all available from www.omdia.com.

Explore AITechPark for the latest advancements in AI, IOT, Cybersecurity, AITech News, and insightful updates from industry experts!

The post From Reactive To Proactive: DSPM’s Transformative Role in Data Security first appeared on AI-Tech Park.

]]>
Borneo’s integration with Confluent Kafka Stream Catalog available https://ai-techpark.com/borneos-integration-with-confluent-kafka-stream-catalog-available/ Mon, 26 Aug 2024 13:30:00 +0000 https://ai-techpark.com/?p=177615 Borneo Data Inc., the leader in AI-Native data security, announced the availability of Borneo’s integration with Confluent Kafka Stream Catalog. With this first ever integration of its kind, organizations leveraging the power of Kafka Streams for dynamic data processing and management can now observe and manage sensitive data in real-time and drastically...

The post Borneo’s integration with Confluent Kafka Stream Catalog available first appeared on AI-Tech Park.

]]>
Borneo Data Inc., the leader in AI-Native data security, announced the availability of Borneo’s integration with Confluent Kafka Stream Catalog. With this first ever integration of its kind, organizations leveraging the power of Kafka Streams for dynamic data processing and management can now observe and manage sensitive data in real-time and drastically improve compliance and data governance.

Achieving Governance at Scale with Borneo and Confluent Kafka

Borneo is designed to help organizations achieve continuous compliance and data protection through accurate and actionable real-time data discovery of even data-in-motion. When integrated with Confluent Kafka, Borneo automates the process of scanning Kafka data streams for sensitive information and feeding the identified infotypes into the Confluent Kafka Stream Catalog. This integration provides a seamless way to ensure data governance at scale in real-time. In addition, only Borneo can then also offer an additional layer of protection automatically by encrypting sensitive from end-to-end. By being able to automate these actions Borneo:

  • Ensures that organizations are more strictly following industry regulations and best practices regarding data protection to better achieve compliance
  • Protects against access to sensitive data by Confluent employees, including SRE and Engineering
  • Prevents exposing sensitive data through third-party tools we use, such as Amazon S3 and others

Key Benefits of Borneo-Confluent Kafka Integration

  1. Real-Time Data Observability: Enables continuous monitoring and tagging of sensitive data across Kafka streams.
  2. Automated Data Management: Reduces the need for manual tagging, minimizing errors and saving time.
  3. Enhanced Compliance: Ensures adherence to data privacy regulations with automated detection and tagging of sensitive data for standards such as HIPAA, PCI, GDPR, CCPA, DPDP, RBI, etc.
  4. Client -Side Field Level Encryption (CSFLE): Automatically safeguards sensitive data end-to-end throughout its entire lifecycle.
  5. Seamless Integration: Automatically integrates sensitive data findings into the Confluent Stream Catalog, enhancing data governance workflows.

“Processing of dynamic data by organizations is critical to their business and we are thrilled to offer the industry’s first data security and privacy solution for the Kafka stream library offered by Confluent”, said Prithvi Rai, CEO of Borneo Data, Inc. “Getting real-time observability into sensitive data when using stream libraries has been a challenge for organizations up until now. By working with Kafka Stream Catalog integrated with Borneo’s Data Risk Remediation platform, we are the first solution to solve this challenge and even provide automated response in the form of automated end-to-end encryption of sensitive data to accelerate our customers efforts in ensuring data governance and meeting compliance objectives.”

Explore AITechPark for the latest advancements in AI, IOT, Cybersecurity, AITech News, and insightful updates from industry experts!

The post Borneo’s integration with Confluent Kafka Stream Catalog available first appeared on AI-Tech Park.

]]>
Ontrak Health Secures HITRUST CSF® Certification for 2024 https://ai-techpark.com/ontrak-health-secures-hitrust-csf-certification-for-2024/ Mon, 19 Aug 2024 09:00:00 +0000 https://ai-techpark.com/?p=176785 Ontrak, Inc. (NASDAQ: OTRK), a leading AI-powered and telehealth-enabled behavioral healthcare company, announced the achievement of the HITRUST Risk-based, 2-year (r2) certification of the customer data exchange elements of its Ontrak Advanced Engagement System. This certification underscores Ontrak’s unwavering commitment to maintaining the highest standards of data security and regulatory...

The post Ontrak Health Secures HITRUST CSF® Certification for 2024 first appeared on AI-Tech Park.

]]>
Ontrak, Inc. (NASDAQ: OTRK), a leading AI-powered and telehealth-enabled behavioral healthcare company, announced the achievement of the HITRUST Risk-based, 2-year (r2) certification of the customer data exchange elements of its Ontrak Advanced Engagement System. This certification underscores Ontrak’s unwavering commitment to maintaining the highest standards of data security and regulatory compliance.

The HITRUST CSF certification for Ontrak’s Advanced Engagement System not only exemplifies our commitment to the gold standard in data protection and compliance but also ensures that our Ontrak Identify product suite, a core component of its WholeHealth+ solution, operates at the forefront of secure, AI-driven healthcare engagement, offering peace of mind to our partners and unparalleled care for our members.

The HITRUST CSF® certification is a comprehensive and flexible framework that combines healthcare-specific security, privacy, and regulatory requirements from existing frameworks such as HIPAA, NIST, ISO, and COBIT. Ontrak’s certification, valid for two years, is a testament to the company’s dedication to protecting sensitive health information, a crucial aspect in the healthcare industry.

“Ontrak’s ongoing commitment to customer data security is at the forefront of our operations,” said Arik Hill, the Company’s Chief Information Officer. “Achieving the HITRUST CSF certification is not just a badge of honor; it represents our promise to our customers that their data is safeguarded with the utmost care and according to the highest standards in the industry.”

The certification process involved a rigorous assessment by an Authorized External Assessor, validating the security and compliance of Ontrak’s Axiom TransSend platform, along with the AWS infrastructure, met the HITRUST CSF v11.0.1 Risk-based, 2-year (r2) certification criteria, ensuring a secure and compliant environment for handling customer data.

Explore AITechPark for the latest advancements in AI, IOT, Cybersecurity, AITech News, and insightful updates from industry experts!

The post Ontrak Health Secures HITRUST CSF® Certification for 2024 first appeared on AI-Tech Park.

]]>
Entrust is FIPS 140-3 Certified for nShield 5 HSM Product Suite https://ai-techpark.com/entrust-is-fips-140-3-certified-for-nshield-5-hsm-product-suite/ Wed, 14 Aug 2024 15:46:28 +0000 https://ai-techpark.com/?p=176465 Entrust HSMs with latest FIPS and Common Criteria certification enable the highest standards of security, compliance, and crypto-agility today and in a post-quantum future Entrust, a global leader in identity and data security, today announced that its high-performance, next generation nShield 5, hardware security modules (HSMs) have achieved Federal Information Processing...

The post Entrust is FIPS 140-3 Certified for nShield 5 HSM Product Suite first appeared on AI-Tech Park.

]]>
Entrust HSMs with latest FIPS and Common Criteria certification enable the highest standards of security, compliance, and crypto-agility today and in a post-quantum future

Entrust, a global leader in identity and data security, today announced that its high-performance, next generation nShield 5, hardware security modules (HSMs) have achieved Federal Information Processing Standards (FIPS) 140-3 certification. FIPS 140-3 is the latest version of the U.S. government computer security standard from the National Institute of Standards and Technology (NIST) used to validate cryptographic modules.

By achieving FIPS 140-3 Level 3 validation, Entrust becomes one of the few vendors that can meet the very stringent data security requirements of governments, financial institutions, and enterprises globally. Entrust nShield 5 HSMs feature an innovative new container-based architecture, and a crypto-agile programmable security processor. Entrust’s newest HSM is up to 40% faster than previous versions, making it able to support the accelerating demand from applications requiring the highest levels of data security. Additionally, earlier this year, nShield 5 HSMs achieved Common Criteria EAL4+ certification, meeting the latest industry standards for HSMs to comply with the European Union’s strict eIDAS requirements. Together with the FIPS 140-3 certification, Entrust is positioned to meet organizations’ increasing need for global regulatory compliance support.

“This is a critical milestone – FIPS 140-3 certification for Entrust nShield 5 HSMs provides customers with the security foundation that meets their most demanding protection and performance requirements, and future-proofs investments with the ability to be securely updated as cryptographic standards continue to evolve, for example with post-quantum algorithms,” said Giuseppe Damiano, VP of Product Management at Entrust. “By achieving this certification, along with the Common Criteria Standards certification, Entrust nShield 5 HSMs provide customers around the world with assurance their cryptographic modules deliver the highest standards of security and compliance to protect their most sensitive data.”

“To become FIPS 140-3 certified, there’s a great deal of analysis and testing that has to be done by an accredited, independent third-party laboratory,” said Jason Lawlor, President of Lightship Security. “Having an HSM with FIPS 140-3 certification is an essential next step for organizations as they work to protect their data now and into the future. We were thrilled to work with Entrust to achieve this certification and help their customers remain compliant.”

Crypto agility is the capability of organizations to seamlessly adopt new, emerging encryption methods. This is critical as the first waves of post-quantum cryptographic algorithms are standardized, and as additional algorithms continue to be introduced. The nShield 5 HSM offers crypto agility out of the box with its security processor, a field programmable gate array (FPGA) that can be readily reprogrammed via software updates. This reduces costly and time-consuming hardware refreshes and increases resilience against quantum computers that may compromise the encryption techniques we rely on today. As we prepare for the coming challenge of quantum computers, HSMs are essential to the security and trust of IT systems, the cloud, and the Internet.

“Our customers seek best in class, high assurance hardware security modules to protect their high value cryptographic keys. I’m delighted that the Entrust nShield family of HSMs are now validated to FIPS 140-3,” said Carl Persson, Sales Director Encryption at Verisec International AB. “Verisec is a long-standing partner of Entrust and we recognize the significance of achieving this new security validation for the nShield 5 HSM. Our joint customers will now be able to choose Entrust nShield HSMs to meet their high assurance needs knowing that it has the latest FIPS 140-3 validation in addition to Common Criteria certification and a number of other compelling features.”

nShield 5 HSMs are designed to seamlessly integrate with Entrust KeyControl, Entrust’s flagship enterprise key management service. KeyControl offers a unified dashboard for complete visibility, traceability, compliance tracking, and an immutable audit trail for cryptographic assets such as keys and secrets. Its decentralized vault architecture ensures keys remain secure within authorized endpoints, while also supporting a wide range of cryptographic use cases. As a root of trust, Entrust nShield 5 HSMs provide an additional layer of security protecting the keys and secrets managed by KeyControl.

Explore AITechPark for the latest advancements in AI, IOT, Cybersecurity, AITech News, and insightful updates from industry experts!

The post Entrust is FIPS 140-3 Certified for nShield 5 HSM Product Suite first appeared on AI-Tech Park.

]]>
Stellar Cyber’s AI Open XDR Supports LDASecure Cloud Migration to OCI https://ai-techpark.com/stellar-cybers-ai-open-xdr-supports-ldasecure-cloud-migration-to-oci/ Wed, 14 Aug 2024 15:36:50 +0000 https://ai-techpark.com/?p=176449 Stellar Cyber, an open, AI-driven security operations platform and a member of Oracle PartnerNetwork (OPN), announced today that Legacy Data Access (LDA) – which reduces the risk and costs of healthcare data management – has leveraged Stellar Cyber’s platform to help ensure data security in the migration of its cloud...

The post Stellar Cyber’s AI Open XDR Supports LDASecure Cloud Migration to OCI first appeared on AI-Tech Park.

]]>
Stellar Cyber, an open, AI-driven security operations platform and a member of Oracle PartnerNetwork (OPN), announced today that Legacy Data Access (LDA) – which reduces the risk and costs of healthcare data management – has leveraged Stellar Cyber’s platform to help ensure data security in the migration of its cloud environment to Oracle Cloud Infrastructure (OCI).

Stellar Cyber offers a SecOps platform powered by Open XDR technology for organizations using OCI that leverages AI to detect and neutralize cyberattacks. The company has near-seamless integration with OCI’s native security tools, including Oracle Cloud Guard. LDA provides health data management and clinical data integration solutions to healthcare organizations to help them securely store, manage, and access archived clinical, financial, and operational data.

LDA selected OCI to improve performance and for its ability to deliver innovative data access solutions to U.S. healthcare providers. “Because we serve the healthcare market, our move to OCI required a security operations solution that ensured our customers’ data was protected during and after the migration,” said Shawn Fichter, CEO and head of product, LDA. “Oracle’s field CISO team connected us with the team at Stellar Cyber, which met our security requirements so we could safely migrate to OCI.”

“LDA’s successful migration to OCI, working with Stellar Cyber, is an excellent example of how Oracle’s robust ecosystem of technology vendors can meet the needs of any organization looking to improve the performance, scalability, and security of their cloud infrastructure,” said David Hicks, group vice president, Worldwide ISV Cloud Business Development, Oracle.

Stellar Cyber’s AI-driven Open XDR platform integration with OCI also includes Oracle Government Cloud in addition to Oracle Cloud Guard.

  • For more information on LDA’s migration to OCI, click here.
  • For more about how Stellar Cyber and Oracle bring enhanced value to their customers, click here.

Explore AITechPark for the latest advancements in AI, IOT, Cybersecurity, AITech News, and insightful updates from industry experts!

The post Stellar Cyber’s AI Open XDR Supports LDASecure Cloud Migration to OCI first appeared on AI-Tech Park.

]]>
1touch.io Achieves Record-Breaking Growth in First Half of 2024 https://ai-techpark.com/1touch-io-achieves-record-breaking-growth-in-first-half-of-2024/ Wed, 14 Aug 2024 15:34:06 +0000 https://ai-techpark.com/?p=176443 Company Doubles Revenue, Secures Major Deals, and Launches Industry-First Enterprise DSPM Solution for All Environments 1touch.io, the leading provider of enterprise Data Security Posture Management (DSPM) solutions for all environments, today announced a record-breaking first half of 2024, doubling its revenue compared to the previous year. This growth was driven...

The post 1touch.io Achieves Record-Breaking Growth in First Half of 2024 first appeared on AI-Tech Park.

]]>
Company Doubles Revenue, Secures Major Deals, and Launches Industry-First Enterprise DSPM Solution for All Environments

1touch.io, the leading provider of enterprise Data Security Posture Management (DSPM) solutions for all environments, today announced a record-breaking first half of 2024, doubling its revenue compared to the previous year. This growth was driven by the addition of major new blue-chip customers in financial services, insurance, retail, and hospitality, as well as the successful launch of its groundbreaking Mainframe Security Posture Management product. The newly released product has already been adopted by a Fortune 100 multinational financial services organization, underscoring its market differentiation.

As enterprises confront increasing data sprawl and complex security challenges, 1touch.io’s Contextual AI-powered solutions deliver unmatched visibility, control, and protection across on-premises, mainframe, hybrid, and multi-cloud environments.

Exceptional Financial Performance

1touch.io’s financial performance in the first half of 2024 was exceptional. The company surpassed last year’s bookings within six months and closed the largest deal in its history in June. The acceleration in new revenue bookings highlights the growing demand for enterprise-grade DSPM solutions that address complex data security challenges.

“We are thrilled with our record-breaking growth and the strong market demand for our leading enterprise Data Security Posture Management solutions,” said Ashish Gupta, CEO and President of 1touch.io. “1touch.io’s unique approach to providing contextual visibility into sensitive data has transformed how Fortune 100 companies leverage our platform to orchestrate their digital transformation, responsible AI, compliance, privacy, governance, and security initiatives.”

Why Enterprise DSPM is Crucial Now

Gartner predicts that through 2027, 50% of critical applications will reside outside of centralized public cloud locations, complicating data management and security. As the market evolves, cloud-based DSPM providers are increasingly unable to meet comprehensive security needs. These solutions often provide limited visibility into structured cloud data, fail to manage unstructured data and data in motion, and leave gaps in data source coverage, scanning depth, and actionable insights. They also neglect critical enterprise data across on-premises systems, mainframes, and hybrid environments.

Key challenges with traditional DSPM solutions include:

  • Limited Coverage to Cloud-Only Data Sources: Leaves on-premises and mainframe data unprotected.
  • Lack of Contextual Intelligence: Results in high false positives within business processes.
  • Inadequate Real-Time Capabilities: Offers static snapshots that are stale the next day, creating risk.
  • Limited Integration with Installed Enterprise Security and Governance Tools: Creates operational silos and less effective business processes.

1touch.io’s Enterprise DSPM Approach

These shortcomings are driving the market toward more robust solutions, as evidenced by recent 1touch.io customer wins. 1touch.io’s enterprise DSPM approach uniquely provides contextualized visibility, enabling prioritized actions. Built on advanced data discovery and classification, deep AI-powered insights, and a robust policy engine for remediation, this comprehensive approach ensures enterprises can manage and secure their data across all environments, including on-premises, cloud, and mainframe.

Key advantages of 1touch.io’s enterprise DSPM approach:

  • Continuous Discovery of Any Data: Provides visibility and control across all data environments.
  • Contextual Classification: Utilizes advanced AI to enrich data with context and intelligence.
  • Dynamic Intelligence: Delivers real-time data discovery and classification.
  • Segment of One: Creates a single contextualized record for comprehensive data intelligence and orchestration of prioritized actions.
  • Fully Extensible: Offers out-of-the-box integration with existing enterprise tools for a cohesive strategy.

Customer Trust and Retention

The company also announced zero customer churn, with every customer renewing their license, highlighting the effectiveness, reliability, and value of 1touch.io’s solutions. “Our customers trust us to protect their most sensitive data, and our high renewal rate is a testament to the value we deliver,” Gupta added.

Delivers Product Innovation Where 68% of Mission-Critical Data Resides: Mainframes

Often overlooked but still highly relevant, mainframes are central to the AI revolution, processing 68% of the world’s critical production IT workloads. 1touch.io’s recently launched Mainframe Security Posture Management (MSPM) product expands the company’s enterprise-focused DSPM capabilities. MSPM seamlessly integrates core mainframe systems with modern hybrid cloud environments, managing all types of data, both at rest and in motion.

MSPM delivers industry-leading accuracy, continuous monitoring, and contextual insights, ensuring that mission-critical information managed by mainframes is fully leveraged in enterprise AI and generative AI initiatives. By unlocking and integrating mainframe data across all enterprise environments, MSPM enhances data visibility, security, and compliance.

Explore AITechPark for the latest advancements in AI, IOT, Cybersecurity, AITech News, and insightful updates from industry experts!

The post 1touch.io Achieves Record-Breaking Growth in First Half of 2024 first appeared on AI-Tech Park.

]]>
Keepit Platform Named Winner at the 2024 SaaS Awards https://ai-techpark.com/keepit-platform-named-winner-at-the-2024-saas-awards/ Tue, 13 Aug 2024 15:00:00 +0000 https://ai-techpark.com/?p=176258 Keepit, a global provider of a comprehensive cloud backup and recovery platform, announced today its success in the 2024 Cloud SaaS Awards program by being named a winner in the “Best Use of SaaS in a Cloud Ecosystem” category. Keepit was also a finalist in the “Best Security Innovation in...

The post Keepit Platform Named Winner at the 2024 SaaS Awards first appeared on AI-Tech Park.

]]>
Keepit, a global provider of a comprehensive cloud backup and recovery platform, announced today its success in the 2024 Cloud SaaS Awards program by being named a winner in the “Best Use of SaaS in a Cloud Ecosystem” category. Keepit was also a finalist in the “Best Security Innovation in a SaaS Product (SME)” and “Best Security Innovation in a SaaS Product (Enterprise)” category.

A long-established awards program spanning 56 categories, The SaaS Awards recognizes the leading innovations and applications of software-as-a-service solutions across a wide range of use cases and sectors. The program received entries from organizations worldwide, including North America, across Europe, and APAC.

“The Keepit platform is a must for companies looking to ensure cyber resiliency. We are honored to have been named as a winner at the 2024 SaaS Awards. This, alongside the slew of other recent accolades, underscores our cloud native roots and commitment to providing our customers with best-in-class data protection,” says Michele Hayes, CMO at Keepit.

CEO of The Cloud Awards, James Williams, said: “We’re thrilled to reveal the winners of the 2024 SaaS Awards after three intense rounds of judging. It’s been an outstanding edition of the awards this year, and the team and I would like to thank all those organizations that entered.

“Keepit has demonstrated an unwavering commitment to innovation and excellence and is a more than deserving winner of Best Use of SaaS in a Cloud Ecosystem. The caliber of the finalists this year was particularly high, which is a testament to this wonderful achievement.

“A huge congratulations to Keepit, and to all of 2024’s winners. We are extremely excited to see how they continue to drive the industry forwards in the coming years.”

Secure by design, the Keepit cloud is owned and run by Keepit. Customer data is kept in a separate, dedicated infrastructure, with the backed-up data stored fully isolated from the SaaS vendor’s cloud. With a user-friendly interface, robust data security, and the ability to adapt to your cloud environment, Keepit ensures your data is always accessible and protected.

Recognition for the Keepit platform

The Keepit platform has also been named “Best Cybersecurity Backup Service” by the Business Awards UK, 2024 Cybersecurity and Resilience Awards and “Best Security Solution for Data Management / Data Protection” by the Cloud Security Awards 2024. Keepit was recognized in four categories at the Global Infosec Awards 2024 (at RSA), including “Most Innovative Compliance”, “Publisher’s Choice Cyber Resilience”, “Best Product Data Recovery”, and “Hot Company Ransomware Recovery”.

Explore AITechPark for the latest advancements in AI, IOT, Cybersecurity, AITech News, and insightful updates from industry experts!

The post Keepit Platform Named Winner at the 2024 SaaS Awards first appeared on AI-Tech Park.

]]>