Microsoft Corporation News

Fingerprint Cards AB experiences growing demand for its biometric authentication solutions

Biometrics company, Fingerprint Cards AB (Fingerprints) has experienced growing demand for its biometric authentication solutions, with over 1.5 billion sensors shipped worldwide since 2014. Fingerprints was a pioneer in biometric solutions for Android smartphones before beginning a program of strategic diversification into the PC, access control, and payments markets. In November 2021, Fingerprints formed two subsidiaries to further enhance their strategic and financial opportunities in the co...

Cohesity named a leader and outperformer in two GigaOm radars on hybrid cloud data protection

Cohesity, a provider of next-gen data management, announced it was named a Leader and an Outperformer in two GigaOm Radar reports: the GigaOm Radar for Hybrid Cloud Data Protection: Large Enterprises and the GigaOm Radar for Hybrid Cloud Data Protection: Small and Medium-Sized Enterprises. This is the third time Cohesity was named a Leader in the Large Enterprises report. Cohesity is acclaimed for offering “strongly differentiated cyber resiliency features,” “great data manag...

Johnson Controls named as Microsoft’s Global Sustainability Changemaker and US IoT Partner for 2022

Johnson Controls, the globally renowned company for smart, healthy and sustainable buildings, was named Global Sustainability Changemaker and U.S. IoT Partner of the Year at the Microsoft’s annual awards. The Sustainability award was made for the significant societal impact that Johnson Controls OpenBlue Enterprise Manager is having on boosting sustainability in buildings, improving ESG scores and enabling data-driven decision-making by customers. IoT Partner award for Johnson Controls...

Finding the right integrator for enterprise organisations

Enterprise security directors often count on an integration firm to handle jobs ranging from day-to-day activities to long-term, technology-laden projects. However, before entering a relationship, you must know what's reasonable to expect from an integrator – as not all are created equal. Here are some tips that might make the selection process easier. Completing comprehensive classwork An integrator's experience working in an enterprise environment is an obvious consideration. Ideally...

Bold Group launches a solution to help transform business management for security and alarm companies

Bold Group, part of EverCommerce's Security & Alarm solutions, a provider of alarm monitoring and integrated business management software for the security industry, announces the launch of Managely™, a business management solution designed for the unique needs of the security industry. The new software platform, which was introduced at Converge 2022, the company’s inaugural customer conference dedicated to transformation and innovation within the industry, helps security compani...

Lumeo announces the integration of the Microsoft Azure Face Service with vision AI models and analytics

Lumeo, a designer of computer vision solutions, announces the integration of the Microsoft Azure Face Service with its ever-growing library of vision AI (Artificial Intelligence) models and analytics. The Azure Face Service provides AI algorithms that detect, recognise, and analyse human faces in images. Lumeo is an open and flexible video analytics platform that addresses the specific business challenge of bridging the latest AI models and techniques with a growing audience attempting to bring...

Vicon Industries, Inc. set to exhibit their centralised end-to-end security solutions at the ISC West 2022 event

Vicon Industries, Inc., a subsidiary of Cemtrex Inc., designer and manufacturer of video surveillance and access control software, hardware, and components, is set to exhibit at ISC West 2022 which will be held from March 22 to March 25, 2022, at the Venetian Expo, in Las Vegas, Nevada, USA. Attendees are warmly invited to visit the company, at booth #7083, at ISC West 2022 the exhibition venue. The Vicon exhibit will focus on Vicon’s centralised video management, access control, and lice...

Fingerprint Cards AB promotes ‘Never trust, always verify’ philosophy and explains how biometrics helps move towards Zero Trust strategy

Today’s enterprises are being challenged to stay one step ahead of security threats. Data shows that in 2021, the average cost of a data breach reached US$ 4.24 million, up from US$ 3.86 million in 2020, and the highest in 17 years. The surge in flexible and hybrid working arrangements (Working From Anywhere – WFA) is making an already challenging situation even more complex. Leaders now need to decide how to combine enterprise-level security with current working models. The timing...

IDEMIA collaborates with Microsoft to enhance connectivity options for consumer and M2M/IoT devices

IDEMIA, the provider of Augmented Identity has entered into a global collaboration with Microsoft aimed at delivering next-generation eSIM and connectivity solutions for consumer and M2M/IoT devices. The collaboration will bring together IDEMIA’s advanced connectivity solutions and longstanding industry expertise with Microsoft’s trusted cloud platform to improve support of eSIM services around the world. Geo-redundancy capacities IDEMIA provides connectivity solutions that enable...

Device Authority and Trusted Objects announce integration on end-to-end software security solution for all Edge IoT devices

Device Authority, a globally renowned company in identity and access management (IAM) for the Internet of Things (IoT), and Trusted Objects, a global player in cyber security technologies for embedded systems and cloud device management platforms, have announced their integration between TO-protect software root-of-trust (RoT) and KeyScaler IoT platform. Last year, Trusted Objects joined the KeyScaler Ready programme, which enabled both teams to work closely together to provide a combined solut...

HID Global simplifies lifecycle management of digital certificates for mobile devices

HID Global, a pioneer in trusted identity solutions, announces that users of its cloud-based PKIaaS offering can now automate the lifecycle management of digital certificates used with devices managed via the Microsoft Intune mobile device and application management service. The HID solution eliminates the need for human intervention when issuing and renewing certificates that enable employees to use their mobile devices to easily access their organisation’s resources through Wi-Fi networ...

Inner Range and Antron Security deliver secure access control and robust security at Grade A London office building, The Bailey

Type of site: Grade A multi-tenant office Location: The Bailey, 16 Old Bailey, London, UK Site size: 115,000 sq. ft over ten floors Client needs: Easy access for users Touch-free and digital sign-in Free flowing movement through reception, avoiding crowds and queues Fast access to other floors via lifts Visitor management system that can be used by multiple tenants and reception staff easily Secure and clear intercom/entry phone and door automation for out-of-hours, deliveries and tra...

Allegion announces integration of its Overtur digital environment with Software for Hardware’s platform, prior to DHI conNextions 2021 event

Allegion, a global provider of security products and solutions, has announced the first integration between Overtur, Allegion’s digital environment connecting all building phases in opening design, construction and ongoing management, and Software for Hardware, an industry-renowned software developed for door, frame and hardware distributors. Software integration The partnership announcement comes in advance of the DHI conNextions 2021 conference, where both companies will be demonstrati...

Fugue brings Kubernetes security checks to their SaaS Platform and Open Source Regula Project

Fugue, a cloud security SaaS company, announces support for Kubernetes security prior to deployment. Using policy as code automation built on the open source Regula policy engine, Fugue provides a unified platform for securing infrastructure as code (IaC) and cloud runtime environments using a single set of policies, saving cloud teams significant time and ensuring consistent policy enforcement across the development life cycle. With this release, organisations can now use Fugue to secure infra...

Robo Shadow launches cyber security platform which offers software reporting for all the devices

UK-based cyber security start-up, Robo Shadow, launches their initial product set as they attempt to take on the big guns in cyber security. The platform boasts a range of features including vulnerability scanning, hardware and software reporting for all the devices, reporting on Windows Defender centrally (removing the need for third-party anti-virus) and much more. Terry Lewis, CEO and Prolific Tech Investor, states that "We want to democratise cyber security, by removing the cost and the com...

Cymulate launches Attack Surface Management and Vulnerability Prioritization Technology solutions to enhance security posture validation

Cymulate, the industry standard for SaaS-based Continuous Security Validation, has announced the launch of two new solutions, to enable businesses to validate their security technologies and policies. Attack Surface Management (ASM) discovers exploitable external assets, and Vulnerability Prioritization Technology (VPT) that integrates with vulnerability scanners, to reduce risk exposure time on internal assets. These new offerings empower security teams, to efficiently prioritise vulnerabiliti...

Fingerprint Cards AB launches new biometric solution for the PC to be integrated into the power button of Dell’s Latitude series laptops

Fingerprint Cards AB (Fingerprints™) announces that the company’s new biometric solution for the PC market is integrated in the power button of the Latitude 5000 and 7000 Series of laptops from Dell. Thus far, Fingerprints has been awarded design wins with three of the world’s top five PC manufacturers. Consequently, they expect to be able to announce further PC models in the near future, which feature Fingerprints’ new biometric PC solution. Supporting different design...

Strengthening the physical and cyber barriers around critical infrastructure

It has long been recognised that no one is safe from cyber-attacks, but some sectors face a much higher level of threat than others. Critical infrastructure sectors such as utilities, energy and industrial manufacturing are some of those that face an intense level of interest from cyber criminals and nation-state groups across the globe. The impacts of a successful attack can have detrimental consequences, for both the cyber and physical side of the business, in terms of business disruption, ec...

Aqua Security announces the release of the new Aqua unified cloud native security platform

Aqua Security, the pure-play cloud-native security solutions company, has announced the availability of its new Aqua Platform, with a unified console to ease the journey from scanning and visibility to workload protection in cloud-native environments. Aqua Platform The new Aqua platform reduces administrative burden and allows security teams to start with scanning and cloud security posture management (CSPM) capabilities, then add in sandboxing capabilities and workload protection as needed. T...

Vectra AI and Microsoft Corporation announce partnership on Zero Trust Security Framework

Vectra AI, a globally renowned company in threat detection and response, has announced that the Vectra Cognito platform delivers key Zero Trust capabilities for Microsoft 365 and Microsoft Azure customers. Vectra AI Vectra AI is uniquely positioned as an integral part of the model, which assumes breaches by investigating the behaviour of users, workloads, networks, and devices as though they originate from an untrusted network by leveraging its analytics and understanding of users and accounts...

Fugue announces the release of Regula version 1.0 for open source infrastructure as code (IaC) security

Fugue, the company helping organisations innovate faster and more securely in the Cloud, announced a 1.0 release for Regula, an open source policy engine for infrastructure as code (IaC) security. The release includes comprehensive support for common IaC tools, such as Terraform and AWS CloudFormation, pre-built libraries with hundreds of policies that validate Amazon Web Services (AWS), Microsoft Azure, and Google Cloud resources, and new developer tooling to support custom rules development a...

ProdataKey and Microsoft Azure Active Directory integration ensures employee databases are in perfect synchronisation

ProdataKey (PDK), manufacturer of the renowned cloud access control platform built for mobile, now offers integration between its Pdk io software and Microsoft Azure Active Directory. IT departments that rely on Active Directory to simplify user and rights management across their corporate network may now use that same interface to seamlessly manage permissions within Pdk io software. System administrators can fully control the physical access of people and groups, as well as issue mobile and t...

How has security industry training changed in the last year?

In-person training sessions were mostly canceled during the worst of the COVID-19 pandemic. However, the need for training continued, and in some cases increased, as the security industry sought to adapt to the changing business climate of a global emergency. So how well did we as an industry adjust? We asked this week’s Expert Panel Roundtable: How has security industry training changed in the last year?

Abnormal Security offers key inputs on how to stop zero-day phishing attacks, such as the USAID attack

The threat actor behind the SolarWinds attack, the Russian-based Nobelium, has orchestrated another successful vendor email compromise attack, this time targeting the United States Agency for International Development (USAID). According to the Microsoft Threat Intelligence Center (MSTIC), Nobelium compromised the USAID’s Constant Contact account, so as to send phishing emails that included links containing malware. Zero-day phishing attacks The incident highlights how zero-day, never-se...

Senstar launches their Symphony common operating platform with sensor fusion engine for security management

Senstar, a pioneer in video management and perimeter intrusion detection solutions, announces the launch of its Senstar Symphony common operating platform with sensor fusion engine, a modular solution for security management and data intelligence. In addition to being an open, highly scalable video management system with built-in video analytics, it includes full-featured access control and perimeter intrusion detection modules. “What truly sets Senstar Symphony apart from other systems i...

Clavister launches the next-gen virtualised solution for securing 5G networks, NetShield Virtual

Clavister, a globally renowned company in high-performance cyber security solutions, has announced the launch of the latest generation of Clavister NetShield Virtual, highly regarded as one of the world's fastest virtualised solution for securing 5G networks. With data rates of over 600 Gbps on a single Intel Xeon-based server, Clavister sets a new high-water mark for 5G Security capacity. Virtualised solution for 5G networks With the proliferation of virtualisation, there has been a steady i...

Combat brute force attacks with SaaS data security

In the current world, a vast majority of a company’s sensitive data resides in Software as a Service (SaaS) applications like Office 365, Google Workspace, Salesforce, Dropbox, etc. In the recent 2020 State of SaaSOps report by BetterCloud, their data suggests that 85% of all application usage by 2025 will be via SaaS. For those who’re an MSP or IT service provider reading this, they should be thinking, “Oh snap!!! What can I be doing to better protect the sensitive data in th...

Fugue adds support for Google cloud to their multi-cloud security platform

Fugue, the company transforming cloud security to help organisations innovate faster, announces it has added support for Google cloud to its multi-cloud security platform. With Fugue, cloud engineering and security teams can secure their entire cloud development lifecycle (CDLC)—from infrastructure as code to production—across their Amazon Web Services (AWS), Microsoft Azure, and now Google cloud environments using the same Cloud Security Posture Management (CSPM) solution. Multipl...

Check Point Research reports hundreds of exploitation attempts on organisations due to Microsoft Exchange Server vulnerabilities

Check Point Research (CPR) reports that since the recently disclosed vulnerabilities on Microsoft Exchange Servers, a race has started between hackers and security professionals. CPR is seeing hundreds of exploitation attempts against organisations world-wide that are related to the four zero-day vulnerabilities currently affecting the Microsoft Exchange Server. In the past 24 hours alone, CPR has observed that the number of exploitation attempts on organisations it tracks doubled every two to...

Vectra reports high sales and strongest quarter in company history in 2020

Vectra (Vectra AI), a globally renowned company in network detection and response (NDR), has reported that in calendar 2020, sales continued to grow at a compound annual rate exceeding 100 percent and sales of Cognito Detect for Microsoft Office 365 accelerated, growing at a rate of 340 percent. These trends were driven in part by the rapid adoption of Microsoft Office 365 productivity applications, such as Microsoft Teams and heightened cyber security concerns, in the wake of numerous high-pro...

Quick poll
Which AI-powered capability will dominate in the years ahead?