13 March 2018 - Israel-based account security provider CyberArk (NASDAQ: CYBR) has acquired certain assets of Massachusetts, US-based cloud security
provider Vaultive, Inc.
This announcement marks the introduction of the first joint solution following McAfees acquisition of Skyhigh Networks , demonstrating the companys commitment to enhancing its Cloud Security
portfolio, which now includes McAfee Skyhigh Security Cloud, McAfee Virtual Network Security Platform (McAfee vNSP) and McAfee Cloud Workload Security (McAfee CWS).
The introduction of McAfee Cloud Security
Platform for Microsoft
VASCO Data Security International Inc (NASDAQ:VDSI) (VASCO), a digital solutions firm, has said that it has joined the Cloud Security
This is a great opportunity for partners to become specialised as Sophos Cloud Security
Providers and benefit from today's growing billion-dollar cloud marketplace.
The Multi-Tier Cloud Security
(MTCS) Singapore Standard (SS) 584 is the world's first cloud security
standard that covers multiple tiers of cloud security
and was developed under the Information Technology Standards Committee (ITSC) for Cloud Service Providers (CSPs) in Singapore.
The CCRMP credential is awarded based on actual demonstrated competencies evidenced by completion of cloud security
risk management projects.
The program enables its channel partners to capitalize on the growing adoption of cloud security
solutions by providing an industry-leading cloud security
solutions stack and unmatched SLA commitments.
As a scalable cloud security
solution, Armor Anywhere offers managed protection, detection, and 24/7/365 response for cloud platforms, including Azure and AWS(c), as well as private and hybrid clouds, and on-premise infrastructure.
After moving to our own AWS environment, we needed a cloud security
platform that would offer us complete visibility across our environment, said Dave Anderson, Director of Security & IT at Greenhouse.
Greatest Threats to Cloud Security
More than 2,000 professionals surveyed by Cloud Research Partners cited the following obstacles to cloud security
: Unauthorized access 53% Data leaking or loss 49% Data privacy 46% Hacking of accounts 44% Insecure interfaces/APIs 39% External access and sharing data 33% Percentage of Companies Storing These Data Types in the Cloud E-Mail 44% Customer, Sales/Marketing, Employee Data 30% Contracts, Invoices, Orders 26% Financial Data 19% Intellectual Property 18% Note: Table made from bar graph.
To help businesses reduce their exposure, Ooredoo has rolled-out a range of security upgrades in 2015, including enhancements to its popular cloud-based security solution, the first cloud security
solution in Qatar that integrates web, e-mail, mobile and the latest channels of communication to combat cyber-attacks.