Ad Image

Identity Management and Information Security News for the Week of November 1st: Oasis Security, Abstract Security, Jumio, and More

Identity Management and Information Security News for the Week of November 1st

Identity Management and Information Security News for the Week of November 1st

The editors at Solutions Review have curated this list of the most noteworthy Identity Management and Information Security news from the week of November 1st. This round-up covers announcements and updates from Oasis Security, Abstract Security, Jumio, and more.

Keeping tabs on all the most relevant Identity Management and Information Security news can be time-consuming. As a result, our editorial team aims to summarize some of the top headlines in the space by curating a collection of the latest vendor product news, mergers and acquisitions, venture capital funding, talent acquisition, and other noteworthy news. With that in mind, here is some of the top identity management and information security news from November 1st.

For early access to all the expert insights published on Solutions Review, join Insight Jam, a community dedicated to enabling the human conversation on AI.

Identity Management and Information Security News for the Week of November 1st


Abstract Security Raises $15 Million in a Series A Funding Round

Abstract Security, a security data fabric and analytics solution, has closed an oversubscribed Series A funding round, raising $15 million. Munich Re Ventures led the funding and received participation from existing investors Crosslink Capital and Rally Ventures. With this financing round, Abstract Security will expand its impact on the cybersecurity industry and accelerate its mission of “revolutionizing” the security analytics and data fabric markets by enabling customers to take control of their security data and gain deeper visibility across their environments.

Read on for more.


Claro Enterprise Solutions Launches a Collaboration Security Management Solution

Claro Enterprise Solutions, a single-source technology provider for growing companies, has launched a Collaboration Security Management solution. It announced the launch during the inaugural session of its virtual summit, “Shaping the Cyber-Physical Future: Trends, Challenges, and Opportunities for 2025.” The service offers comprehensive data risk assessments, audit readiness evaluations, and guided remediations. It will also provide expert oversight of implementation, continuous monitoring, and management by security specialists.

Read on for more.


Entrust Reveals a Solution to Help Banks Improve Security

Entrust, an identity-centric security solution provider, has announced an “all-in-one” consumer banking platform designed to help banks and credit unions provide high-assurance security throughout customer lifecycles, from account opening to financial credential issuance. The solution will integrate AI-driven identity verification technology with physical and digital card issuance capabilities, transforming the consumer banking experience, reducing the chance of fraud at account opening, and providing continuous account protection.

Read on for more.


Jumio Reveals a New Liveness Detection Solution

Jumio—an automated, AI-driven identity verification, risk signal, and compliance solution provider—has revealed details on Jumio Liveness, an in-house technology designed to address sophisticated fraud tactics. The tool aims to take fraud detection to “the next level” by checking to see if more than one person is present during the selfie-capture process or if someone is forced to undergo an identity verification process. It will also prevent the registration of unconscious individuals, adding another layer of security to ensure only genuine, consenting users can access services.

Read on for more.


LogicGate Releases New Tools for its Spark AI Solution Suite

LogicGate—a global SaaS company that helps companies manage and scale their cyber risk and control, third-party risk management, compliance controls, enterprise risk, and operational resilience programs—has released two new AI features for its Spark AI lineup. The latest tools include AI Text Assistant and Record Linking Recommendations (RLR), which can help teams streamline the control mapping process, reduce complexity and labor, automatically generate multi-step mitigation plans, produce step-by-step form instructions for risk assessment, and more. These features are included for free to Risk Cloud subscribers.

Read on for more.


Oasis Security Debuts an NHI Ownership Discovery Engine

Oasis Security, a Non-Human Identity Management (NHIM) solution provider, has announced an industry-first NHI Ownership Discovery Engine. This AI-powered engine will allow Oasis Security users to automatically discover human owners of NHIs without pre-existing knowledge, even if metadata is missing. It’s powered by purpose-built AI and ML algorithms to suggest and assign NHI owners in a user’s environment. It also enables users to safely implement remediation and lifecycle actions, respond to incidents faster, ensure compliance,  and reduce the complexities of managing thousands of NHIs.

Read on for more.


Ping Identity Shares Details on its Upcoming Helix Initiative

Ping Identity, an identity security solution, has shared details on Helix, a new strategic initiative that aims to improve identity management in the AI era. The initiative will empower AI agents with unique identities of their own, which will equip them with the resources they need to ensure every interaction is authenticated and authorized. Andre Durand, CEO of Ping Identity, says, “With Helix, Ping’s clients can harness the productivity benefits offered by AI while skillfully navigating and effectively countering the evolving threats prevalent in today’s digital landscape.”

Read on for more.


Skyhigh Security Expands its Global Cloud Infrastructure Footprint

Skyhigh Security, a global provider of data-focused security, has expanded its global cloud infrastructure footprint. With this expansion, Skyhigh Security now safeguards over ten million nodes across a comprehensive network, including more than one hundred PoPs worldwide. Vishal Rao, CEO of Skyhigh Security, says, “By investing in cloud security infrastructure expansion across regions, we are able to assist our customers in meeting local regulatory standards while benefiting from world-class data protection and performance.”

Read on for more.


Expert Insights Section

Insight Jam logoWatch this space each week as our editors will share upcoming events, new thought leadership, and the best resources from Insight Jam, Solutions Review’s enterprise tech community for business software pros. The goal? To help you gain a forward-thinking analysis and remain on-trend through expert advice, best practices, trends and predictions, and vendor-neutral software evaluation tools.


A Matter of National (Data) Security – Information Risk with David Loshin

David and Doug talk about when (and how) data breaches become a geopolitical concern. They also dissect the 2024 US executive order on protecting sensitive American data from foreign threats. From state-sponsored cyber-attacks to the implications of social media influence campaigns, they explore how countries of concern are exploiting data vulnerabilities. Tune in for government breaches, security requirements, and other insights into data collection practices.

Watch Here.


What’s Next After Generative AI? – The Digital Analyst

In this episode of The Digital Analyst, host John Santaferraro sits down with Mike Ferguson—CEO of Intelligent Business Strategies and chair of Big Data London—to talk about the rapid evolution of AI in enterprise tech. They discuss the explosive growth of generative AI across various business domains, the emergence of AI agents and their impact on automation, and the critical importance of implementing AI governance early.

Watch Here.


To Secure Active Directory, Think Like an Attacker

Craig Birch, a Technology Evangelist and Principal Security Engineer at Cayosoft, shares his take on how companies can secure their Active Directory solutions by thinking like a cyber-criminal. In the article, Birch talks about mapping the attack surface of Active Directory and Entra ID, unmasking misconfiguration, and the importance of passwords.

Read on for more.


For consideration in future news round-ups, send your announcements to wjepma@solutionsreview.com.

Share This

Related Posts

Insight Jam Ad

Insight Jam Ad

Follow Solutions Review