Identity Management and Information Security News for the Week of June 7; Sentra, ConnectWise, Tarsal, and More
The editors at Solutions Review have curated this list of the most noteworthy identity management and information security news for the week of June 7. This curated list features identity management and information security vendors such as Sentra, ConnectWise, Tarsal, and more.
Keeping tabs on all the most relevant identity management and information security news can be a time-consuming task. As a result, our editorial team aims to provide a summary of the top headlines from the last month, in this space. Solutions Review editors will curate vendor product news, mergers and acquisitions, venture capital funding, talent acquisition, and other noteworthy identity management and information security news items.
Identity Management and Information Security News for the Week of June 7
Sentra Announces Appointment of Gil Segev to Vice President of Global Sales
Sentra, a data security solutions provider, this week announced that the company has appointed Gil Segev, a veteran sales leader to vice president of global sales. Segev brings over 10 years of extensive experience in regional and global cybersecurity sales roles, and will be responsible for driving revenue growth, increasing the worldwide customer base and expanding the company’s channel strategy and partner ecosystem. An experienced sales executive, Segev has served in a number of leadership roles throughout his career. Most recently, he was vice president of global sales for env0, where he was responsible for the company’s sales strategy. Earlier in his career, while at Bridgecrew, Segev led the sales organization through the company’s acquisition by Palo Alto Networks, and maintained revenue over $20 million following the transaction. Previously, he led a team at Spot.io, and drove more than tens of millions in annual recurring revenue in North America, a contributing factor to the company’s acquisition by NetApp.
Check-in Terminals Used by Thousands of Hotels Leak Guest Info
Ariane Systems self check-in systems installed at thousands of hotels worldwide are vulnerable to a kiosk mode bypass flaw that could allow access to guests’ personal information and the keys for other rooms. These terminals allow people to book and check into the hotel themselves, handle the payment process via a POS subsystem, print invoices, and provision RFID transponders used as room keys. Back in March, Pentagrid security researcher Martin Schobert discovered that he could easily bypass the Ariane Allegro Scenario Player running in kiosk mode on the self check-in terminal at the hotel he was staying, and access the underlying Windows desktop with all customer details. Despite multiple attempts to alert the vendor, the researcher has yet to receive a proper response from the vendor about the firmware version that addresses the issue.
ConnectWise Announces Massive Updates Across Product Line
ConnectWise, a vendor for Managed Service Provider (MSP) technology, revealed a broad range of product innovations and enhancements across the company’s cybersecurity and data protection portfolio during this week’s IT Nation Secure event. “Cyber adversaries evolve their tactics, techniques, and procedures almost weekly,” said Ameer Karim, EVP and GM Cybersecurity and Data Protection at ConnectWise. “As a trusted partner of the MSP community and their hundreds of thousands of clients, ConnectWise feels obligated to constantly evolve the tools and services needed to defend against today’s dynamic threats. All the product advancements we highlighted at IT Nation this week are proof of our commitment to providing expertise, streamlining processes, and delivering innovative solutions.”
Tarsal Releases Open-Source eBPF Solution
Tarsal, the security data movement company, today launched kflow, an open-source project based on the extended Berkeley Packet Filter (eBPF). kflow creates a new classification of security data, bridging the gap between network traffic and encrypted data, providing a real-time stream of Linux kernel activity. eBPF is a kernel-level technology for monitoring and manipulation on Linux operating systems, expanding the operating system’s abilities by tapping into the kernel without harming the active operating system. With kflow, security teams can broaden the range of data types that can be ingested and collected beyond just network data. The technology enhances organizations’ ability to collect, process and analyze security data in real-time.
Expert Insights Section
Watch this space each week as our editors will share upcoming events, new thought leadership, and the best resources from Insight Jam, Solutions Review’s enterprise tech community for business software pros. The goal? To help you gain a forward-thinking analysis and remain on-trend through expert advice, best practices, trends and predictions, and vendor-neutral software evaluation tools.
Now On Demand: Passkeys: The Great ‘Password Killer’?
Access management and authentication solutions providers have been chasing the “password killer” dream since MFA, and right now, passkeys are at the front and have experts on both sides of the discussion answering the question, “Is this the password killer or just another tool in a growing list of tools?”
The Nuances of BYOK and HYOK
Min-Hank Ho of Baffle offers commentary on the nuances of BYOK and HYOK, and which one might be right for your enterprise’s needs.
A modern data security posture is more complex than ever because the way companies use data is multifaceted. Data analytics has transformed data from something that must be stored away and protected to an asset that yields market-differentiating insight. But, as we know, it must still be protected. In fact, industry and governmental privacy regulations stipulate clear mandates for more stringent data security. Two emerging data security methods that reflect the evolving nature of data use are Bring Your Own Key (BYOK) and Hold Your Own Key (HYOK). Both ensure that data is encrypted and decrypted using a key management system. Using keys, organizations can feel confident that only those with access to encryption keys will be able to access data. While BYOK and HYOK share similarities, the two methods have very different use cases. Understanding the difference between BYOK and HYOK will help organizations determine which approach makes the most sense, depending on their specific needs.