Delinea acquires Authomize to help organizations reduce identity-related risk

Delinea announced it has acquired Authomize, an innovator in the detection and elimination of identity-based threats across the cloud.
The continuous discovery and visibility capabilities of Authomize, married with Delinea's SaaS solutions for PAM, will extend the Delinea Platform's reach for comprehensive privileged controls in the cloud while expanding its role to provide a strong defense against identity-based attacks such as account takeovers, insider threats, and lateral movement.
CIEM and ITDR capabilities will be delivered through the cloud-native Delinea Platform, adding depth to its execution of the company's vision to extend PAM across the modern enterprise.
The acquisition of Authomize also establishes a Delinea research and development centre in Israel.
Osterman Research indicates that 80% of enterprises now use multiple clouds, while 76% lack complete visibility into access policies and applications across multiple clouds, increasing the threat landscape.
CIEM extends controls to SaaS applications and public cloud infrastructure to minimize the risk of overprivileged cloud identities.
A June 2022 report by the Identity Defined Security Alliance revealed that 84% of organizations experienced an identity-related breach over the previous year, with 96% stating they could have prevented or minimized the breach by implementing identity-focused outcomes.
ITDR works across all identities to detect threats and mitigate risk with better visibility and remediation.
Broaden least privilege in the cloud, detect threats and reduce risks for all identities.
Authomize CIEM empowers enterprises to extend least privilege controls into their cloud environments by continuously monitoring access privileges, usage changes, and connections between cloud services, SaaS applications, and IAM solutions.
Adding Authomize ITDR will increase protection against threats across all identities by detecting abuse and responding to attacks.
On the Delinea Platform, the enhanced capabilities will identify and address issues such as stale accounts, over-privileged identities, and privilege escalation paths, significantly bolstering cloud security by proactively detecting and mitigating threats while maintaining operational continuity.
This approach will most effectively safeguard assets and data while reducing risk, all without introducing complexity.


This Cyber News was published on www.helpnetsecurity.com. Publication date: Tue, 09 Jan 2024 14:43:04 +0000


Cyber News related to Delinea acquires Authomize to help organizations reduce identity-related risk

Delinea acquires Authomize to help organizations reduce identity-related risk - Delinea announced it has acquired Authomize, an innovator in the detection and elimination of identity-based threats across the cloud. The continuous discovery and visibility capabilities of Authomize, married with Delinea's SaaS solutions for PAM, ...
9 months ago Helpnetsecurity.com
Delinea Acquires Authomize to Tackle Identity-Based Threats - Silicon Valley access management vendor Delinea on Tuesday announced the acquisition of Israeli startup Authomize, a deal that adds identity threat detection and response technologies to its product portfolio. The private equity-owned Delinea, formed ...
9 months ago Securityweek.com
Taking the complexity out of identity solutions for hybrid environments: Identity Fabric and orchestration - For the past two decades, businesses have been making significant investments to consolidate their identity and access management platforms and directories to manage user identities in one place. Instead, businesses must learn how to consistently and ...
10 months ago Securityintelligence.com
Master Security by Building on Compliance with A Risk-Centric Approach - In recent years, a confluence of circumstances has led to a sharp rise in IT risk for many organizations. That's why a proactive approach to seeing, understanding, and acting on risk is key to improving the effectiveness of defenses in place to meet ...
9 months ago Cyberdefensemagazine.com
Identity as a Service - Let us introduce Identity as a Service, a revolutionary identity management strategy that aims to improve security, simplify user interfaces, and enable frictionless access to online resources. Organizations can use IDaaS platforms to access identity ...
9 months ago Feeds.dzone.com
Delinea Fixes Flaw After Analyst Goes Public With Disclosure First - A critical flaw in Delinea's Secret Server SOAP API disclosed this week sent security teams racing to roll out a patch. A researcher claims he contacted the privileged access management provider weeks ago to alert them to the bug, only to be told he ...
6 months ago Darkreading.com
Reducing credential complexity with identity federation - Help Net Security - Organizations also need to ensure compatibility between different platforms and protocols, and effectively merge user identities across multiple IdPs to avoid security gaps or identity conflicts. From a security perspective, federated authentication ...
2 weeks ago Helpnetsecurity.com
How Healthcare Organizations can use ASPM to Fill CSPM Coverage Gaps and Save Money - In recent years, healthcare organizations have increasingly moved their healthcare information systems applications and infrastructure to the cloud to take advantage of its scalability, flexibility and cost-effectiveness. To mitigate these risks, ...
9 months ago Securityboulevard.com
SailPoint unveils two sets of new offerings to help companies grow their identity security program - SailPoint unveiled two sets of new offerings designed to give customers options as they build their identity program, while driving customer success throughout their identity journey. First, the company is extending the family of SailPoint Identity ...
8 months ago Helpnetsecurity.com
16 top ERM software vendors to consider in 2024 - Enterprise risk management software helps organizations identify, mitigate and remediate business risks, which can lead to improved business performance. The risk management market is rapidly evolving from separate tools across different risk domains ...
9 months ago Techtarget.com
How Strata Identity and Microsoft Entra ID solve identity challenges in mergers and acquisitions - In particular, there is an immediate and profound impact on the identity and access management postures of both companies. While most combined organizations aspire to eventually consolidate their identity systems, this is a challenging and ...
9 months ago Microsoft.com
What is Azure Identity Protection and 7 Steps to a Seamless Setup - As a result, tools such as Microsoft's Azure Identity Protection have become a staple in protecting against compromised identities, account takeover, and misuse of privileges. Azure Identity Protection is a security service that provides a robust ...
4 months ago Securityboulevard.com
ProcessUnity Introduces Industry's All-In-One Third-Party Risk Management Platform - PRESS RELEASE. BOSTON-(BUSINESS WIRE)- ProcessUnity, provider of comprehensive end-to-end third-party risk management and cybersecurity solutions to leading enterprises, today announced the completed integration of the Global Risk Exchange. The newly ...
8 months ago Darkreading.com
A Cybersecurity Risk Assessment Guide for Leaders - Now more than ever, keeping your cyber risk in check is crucial. In the first half of 2022's Cyber Risk Index, 85% of the survey's 4,100 global respondents said it's somewhat to very likely they will experience a cyber attack in the next 12 months. ...
1 year ago Trendmicro.com
Cybersecurity Performance Goals: Assessing How CPGs Help Organizations Reduce Cyber Risk - In October 2022, CISA released the Cybersecurity Performance Goals to help organizations of all sizes and at all levels of cyber maturity become confident in their cybersecurity posture and reduce business risk. Earlier this summer, CISA outlined ...
10 months ago Cisa.gov
The ONE Thing All Modern SaaS Risk Management Programs Do - Reducing SaaS risk is, without a doubt, a difficult challenge. Gaining visibility into all the SaaS apps used across an enterprise is hard enough, but it becomes an even greater challenge when only a portion of the apps go through the company's ...
6 months ago Securityboulevard.com
Three Things to Know About the New SEC Rules on Sharing Information and Breach Disclosure Deadlines - Recently, the Securities and Exchange Commission adopted rules about the handling and reporting of cyber risks and breaches. With these new guidelines and regulations, public companies and organizations must disclose cybersecurity incidents ...
8 months ago Cyberdefensemagazine.com
Key elements for a successful cyber risk management strategy - In this Help Net Security interview, Yoav Nathaniel, CEO at Silk Security, discusses the evolution of cyber risk management strategies and practices, uncovering common mistakes and highlighting key components for successful risk resolution. Nathaniel ...
9 months ago Helpnetsecurity.com
Third-Party Security Assessments: Vendor Risk Management - As businesses rely more heavily on external vendors to provide critical services and support, the importance of effective vendor risk management strategies becomes paramount. This article explores the significance of third-party security assessments, ...
8 months ago Securityzap.com
The Role of Identity Data Management in Achieving CISA'S Strategic Goals - At the heart of this growing risk is identity, with over 60% of all breaches today involving identity exploitation. As organizations continue to expand their digital footprints, driven by a move towards cloud resources and remote systems, their ...
6 months ago Cyberdefensemagazine.com
What is identity management? Definition from SearchSecurity - Identity management is the organizational process for ensuring individuals have the appropriate access to technology resources. Identity management is an essential component of security. Identity management includes authenticating users and ...
6 months ago Techtarget.com
The Latest Identity Theft Methods: Essential Protection Strategies Revealed - Identity theft has evolved far beyond the days of stolen mail and dumpster diving. Today's identity thieves employ sophisticated techniques, including account takeovers and government benefit fraud, making it essential for you to stay vigilant to ...
8 months ago Hackread.com
Unseen Threats: Identity Blind Spots and Misconfigurations in Cybersecurity - It's rather obvious to most in the IT sector that cybercriminals consistently and successfully exploit stolen or weak online identities to gain unauthorized access to businesses of all types. It's these identities in an enterprise that are clearly ...
8 months ago Cybersecurity-insiders.com
The Latest Delinea Secret Server Release Boosts Usability With New Features - PRESS RELEASE. San Francisco, CA - November 30, 2023 - Delinea, a leading provider of solutions that seamlessly extend Privileged Access Management, today announced new features for Secret Server to improve usability and increase PAM ...
10 months ago Darkreading.com
31 Alarming Identity Theft Statistics for 2024 - Identity theft is a prevalent issue that affects millions of people annually. Although the numbers are startling, we've selected the 31 most concerning identity theft statistics to help you understand how to secure your identity. In 2022, the FTC ...
9 months ago Pandasecurity.com

Latest Cyber News


Cyber Trends (last 7 days)


Trending Cyber News (last 7 days)