Amazon Web Services News
Touchless technology enables users to complete transactions or perform actions with systems touch-free. It leverages optical and biometric sensing capabilities, enabling computer systems to receive instructions through user behavior or physical movement. Touchless technology helps improve and manage access to financial services and institutions in a number of ways. Types of Touchless Technologies Touchless Sensing Touch-free sensors can detect the presence or movement of a person or obje...
Cohesity, a provider of next-gen data management, announced it was named a Leader and an Outperformer in two GigaOm Radar reports: the GigaOm Radar for Hybrid Cloud Data Protection: Large Enterprises, and the GigaOm Radar for Hybrid Cloud Data Protection: Small and Medium-Sized Enterprises. This is the third time Cohesity was named a Leader in the Large Enterprises report. Cohesity is acclaimed for offering “strongly differentiated cyber resiliency features,” “great data mana...
Currently and unfortunately, there is no such thing as Cloud Police. If there were, two-thirds or more of the companies using ‘cloud’ in their advertising and documentation would be in Cloud Jail for seriously misusing the word in their marketing. The term ‘Cloud’ is over-used and misused—sometimes intentionally and knowingly, but also often in ignorance. It’s just a word—but in the context of cloud computing technology, it does have a specific meaning...
Rekor Systems, Inc, a global AI technology company with a mission to make communities around the world safer, smarter and more efficient by providing actionable, data-driven insights through intelligent infrastructure, announces the availability of its cloud-based Transportation Management Platform within the Amazon Web Services (AWS) Partner Network (APN). The Platform has been certified as ‘Well-Architected’ to function in a cloud-based environment. APN is a global community of pa...
In the ever-evolving business landscape, this national direct marketing firm recognized the importance of technology to not only stay in front of their customers but to continually optimize internally for their business as well. After many years working with the Ntirety team, the direct marketing firm knew they would get the insights and recommendations to keep the firm competitive and cost-effective. Runaway cloud costs The direct marketing firm quickly adapted and learned to harness technol...
SailPoint Technologies Holdings, Inc, a pioneer in identity security for the modern enterprise, announces its new Amazon Web Services (AWS) region in Tokyo. This is the seventh region for the company, with other locations in Frankfurt, London, Montreal, Sydney, and two in the United States of America (USA). The launch highlights the growing global demand for SailPoint’s cloud identity security offerings and the company’s focus on helping customers achieve their data residency requir...
Device Authority, a globally renowned company in identity and access management (IAM) for the Internet of Things (IoT), and Trusted Objects, a global player in cyber security technologies for embedded systems and cloud device management platforms, have announced their integration between TO-protect software root-of-trust (RoT) and KeyScaler IoT platform. Last year, Trusted Objects joined the KeyScaler Ready program, which enabled both teams to work closely together to provide a combined solutio...
Quickly becoming an industry pioneer, the supply chain and Parts Management Company (AKA PCM) improved the parts supply-chain for a consistent and accurate flow of parts so shops can get customers back on the road. This business sought to provide marketing, support, and safety certification training to collision repair shops and automotive parts suppliers. Situation-Supply chain issues becoming problematic As technology in the supply-chain industry advanced and supply chain issues becam...
Veriff, a global identity verification (IDV) provider announced that it has joined the Amazon Web Services (AWS) Partner Network (APN). By joining the APN as an AWS Advanced Technology Partner, Veriff becomes part of the global community of Partners leveraging the network to build cloud-based solutions and services for customers across several industries. Veriff analyses more than 10,000 variations of government-issued IDs from over 190 countries in 40 different languages via machine learning a...
Pindrop, a global technology company that offers security, identity, and intelligence for every voice, has announced that VeriCall Technology, a solution offered by its wholly owned subsidiary, Next Caller, is now the first ANI validation and spoof detection platform, available on Amazon Marketplace for Amazon Connect, a cloud-based contact center service platform. VeriCall Technology This offering will enhance call verification and spoof detection, while enabling businesses to personalize the...
Fugue, a cloud security SaaS company, announces support for Kubernetes security prior to deployment. Using policy as code automation built on the open source Regula policy engine, Fugue provides a unified platform for securing infrastructure as code (IaC) and cloud runtime environments using a single set of policies, saving cloud teams significant time and ensuring consistent policy enforcement across the development life cycle. With this release, organizations can now use Fugue to secure infra...
Security contractors can no longer afford to simply complete a project and move on to the next job without creating recurring service revenues and an ongoing commitment to the customer. iDter, which stands for intelligent and immediate deterrence of crime, recently launched a complete commercial security solution and partnership program with the ability to generate RMR streams through its unique technology footprint. A fully integrated and automated security solution, iDter is proven to foil 98...
UK-based cyber security start-up, Robo Shadow, launches their initial product set as they attempt to take on the big guns in cyber security. The platform boasts a range of features including vulnerability scanning, hardware and software reporting for all the devices, reporting on Windows Defender centrally (removing the need for third-party anti-virus) and much more. Terry Lewis, CEO and Prolific Tech Investor, states that "We want to democratize cyber security, by removing the cost and the com...
Dahua Technology, a video-centric, provider of smart IoT solutions, is introducing version 8.0 of their DSS Video Management Software (VMS) to its North American market. The software upgrade incorporates a smaller file size for the installation package, faster startup time, and an easy-to-deploy secure design. It also boasts high scalability and performance to maximize the investment of DSS users. DSS 8.0 is designed for ease of use, efficiency, and flexibility. Multiple deployment methods allo...
Fast-paced innovation is the order of the day. This is especially true for businesses operating in the telecom industry – an industry is known for its disruptive, transformative nature. Frequently facing issues in optimizing networks and upgrading technology, telecom companies, or telcos need to continually reinvent themselves to stay ahead of the competition and provide a better experience to end-users. Business transformation Beyond Technology employs the most effective and relevant t...
Fast-paced innovation is the order of the day. This is especially true for businesses operating in the telecom industry – an industry known for its disruptive, transformative nature. Frequently facing issues in optimizing networks and upgrading technology, telecom companies, or telcos need to continually reinvent themselves to stay ahead of the competition and provide a better experience to end-users. State-of-the-art technology Enabling business transformation for both telco...
ISC West 2021, in collaboration with premier sponsor, Security Industry Association (SIA), took place last week from July 19-21, 2021, at the Sands Expo & Convention Center, in Las Vegas, serving to accelerate market recovery and re-define the roadmap ahead for the security & public safety industry, after a year-plus hiatus of large scale, in-person events. ISC West 2021 Noting the buzz of positive energy, enthusiasm and excitement throughout the three-day event, ISC West customers tes...
Aqua Security, the pure-play cloud-native security solutions company, has announced the availability of its new Aqua Platform, with a unified console to ease the journey from scanning and visibility to workload protection in cloud-native environments. Aqua Platform The new Aqua platform reduces administrative burden and allows security teams to start with scanning and cloud security posture management (CSPM) capabilities, then add in sandboxing capabilities and workload protection as needed. T...
Fugue, the company helping organizations innovate faster and more securely in the Cloud, announced a 1.0 release for Regula, an open source policy engine for infrastructure as code (IaC) security. The release includes comprehensive support for common IaC tools, such as Terraform and AWS CloudFormation, pre-built libraries with hundreds of policies that validate Amazon Web Services (AWS), Microsoft Azure, and Google Cloud resources, and new developer tooling to support custom rules development a...
Vectra AI, a pioneer in threat detection and response, announces the introduction of Vectra Detect for Amazon Web Services, Inc. (AWS). Detect for AWS is a cloud-native SaaS solution that provides continuous, scalable agentless threat detection, prioritization, investigation, and response to attacks targeting applications running on AWS, as well as users, compute, and storage instances, including the use on AWS of the control plane itself. Detect for AWS works both at runtime and holistically a...
The Student Loans Company (SLC) has spent over 76,800 pounds on cyber security training for its staffers, over the two most recent financial years (FY 19/20, FY 20/21), according to official figures. The data obtained and analyzed using the Freedom of Information (FOI) Act by Griffin Law, the niche litigation practice, shows that nearly 20,000 specialist courses were completed in areas, such as phishing, password protection, bribery, corruption, and privacy standards. The data shows that 9,334...
Industry-renowned video surveillance outfit, Cloudview, has unveiled its latest state-of-the-art, cloud-based solution to the CCTV market. Buoyed by two successful funding rounds, Cloudview’s latest cloud video recording system (CVR) is now ready for launch. Cloud video recording system (CVR) This next-generation technology unifies, manages, and securely consolidates smart-triggered events from IP CCTV cameras in any location. Data is stored safely and is always accessible. Built from th...
Installers and integrators are set to benefit from Dahua Technology’s new Partner app, which is available to download free of charge. Partner app The app is loaded with information to help installers specify the most appropriate products for their projects. This includes detailed product specifications and comparisons, a range of ‘how to’ videos and documents exploring common technical issues, which are searchable by category, and the latest news about Dahua products and serv...
Ping Identity, the Intelligent Identity solution for the enterprise, partners with ProofID to successfully simplify identity security for Tesco Bank, the banking division of the supermarket retailer, to enable a more secure and customer-centric banking experience. Since its formation in 1997, the more than five million customer identities managed by Tesco Bank had become siloed across its products and services, adding unwanted friction to the customer experience. Inflexible security posture T...
Blue Prism® announced the availability of Blue Prism Service Assist on Amazon Web Services (AWS) – a comprehensive, no-code, intelligent automation contact center solution that combines intelligent digital workers and native AWS services so enterprises can deliver faster, more efficient, and more engaging customer experiences. Blue Prism Service Assist for AWS combines the capabilities of Amazon Connect and Amazon ElastiCache with Blue Prism’s Servi...
The Connectivity Standards Alliance (CSA), formerly known as the Zigbee Alliance, an organization of hundreds of companies creating, maintaining, and delivering open, global standards for the Internet of Things (IoT), announces Matter – the interoperable, secure connectivity standard for the future of the smart home. The proliferation of connected objects continues to change the way one lives, works and plays. From homes to offices, factories to hospitals, connected objects enable one to...
Could the data that the access control system generates reveal priceless business insights? In many businesses, the answer is affirmative. The problem is how to analyze that data quickly and accurately to bring valuable, digestible business benefits. As reported by the Houston Chronicle, ‘Data is at the core of nearly every business decision made. A new Reporting & Analytics Tool for CLIQ access control systems enables security and facility managers to extract, visualize and analyze t...
Clavister, a globally renowned company in high-performance cyber security solutions, has announced the launch of the latest generation of Clavister NetShield Virtual, highly regarded as one of the world's fastest virtualized solution for securing 5G networks. With data rates of over 600 Gbps on a single Intel Xeon-based server, Clavister sets a new high-water mark for 5G Security capacity. Virtualized solution for 5G networks With the proliferation of virtualization, there has been a steady i...
Fugue, the company transforming cloud security to help organizations innovate faster, announces it has added support for Google cloud to its multi-cloud security platform. With Fugue, cloud engineering and security teams can secure their entire cloud development lifecycle (CDLC)—from infrastructure as code to production—across their Amazon Web Services (AWS), Microsoft Azure, and now Google cloud environments using the same Cloud Security Posture Management (CSPM) solution. Multipl...
Aqua Security, a pure-play cloud native security pioneer, announces that its cloud native security platform now protects containers and Virtual Machine (VM) workloads at runtime on Arm®-powered devices. This enables Aqua customers to take advantage of the high density and cost-effectiveness provided by Arm-powered hosts and devices across cloud infrastructure, edge and IoT platforms, including the new AWS Graviton2 instances from Amazon Web Services (AWS). As the number of Arm-powered servi...