#1 Middle East & Africa Trusted Cybersecurity News & Magazine |

30 C
Dubai
Sunday, June 1, 2025
HomeTechnology & TelecomProofpoint Acquires Normalyze to Bolster Human-Centric Data Security with Advanced DSPM Capabilities

Proofpoint Acquires Normalyze to Bolster Human-Centric Data Security with Advanced DSPM Capabilities

Date:

Related stories

spot_imgspot_imgspot_imgspot_img

To reinforce its data security posture, Proofpoint Inc., a prominent name in cybersecurity and compliance, has entered a definitive agreement to acquire Normalyze, a leader in Data Security Posture Management (DSPM). Announced on October 29, 2024, this acquisition will allow Proofpoint to integrate Normalyze’s AI-powered DSPM technology into its human-centric security platform. This addition will address data security risks across multifaceted data landscapes, from on-premises to cloud environments. Set to be finalized by November, this acquisition underscores Proofpoint’s commitment to safeguarding human-managed data from escalating cybersecurity threats.

Exploring the Proofpoint-Normalyze Synergy
As companies leverage cloud and AI technologies to drive innovation, the complexity of data environments has introduced critical security gaps, often exacerbated by human errors. Security teams face challenges as rapid deployment of cloud applications, combined with extensive third-party SaaS use, create a dispersed network of sensitive data. Normalyze’s DSPM technology aims to fill these security gaps, enhancing visibility and control, while enabling organizations to protect data across both human and machine interfaces.

Proofpoint’s acquisition of Normalyze will empower its platform to manage the entirety of data security challenges across SaaS, PaaS, on-premises, and hybrid environments. According to Mayank Choudhary, Executive Vice President and General Manager of Data Security & Compliance at Proofpoint, “Data is increasingly at risk due to human interactions within complex applications. Integrating Normalyze’s DSPM capabilities will provide our clients with the tools needed to address these vulnerabilities, giving them visibility and control over their data to effectively mitigate human-centric risks.”

Data Security Challenges in the Human-Driven Cloud Era
The rise in AI applications and interconnected data ecosystems has introduced new cybersecurity complexities:

  • Data discovery and classification: Many organizations struggle to locate and classify sensitive data, risking compliance failures and unauthorized access.
  • Prioritizing risk: Identifying and prioritizing security risks can be a daunting task, particularly in systems where developers and other non-IT personnel have extensive data access.
  • Human-centric vulnerabilities: With widespread use of CI/CD processes and cloud services, employees interact with data in ways that often bypass traditional security protocols, leading to unintended security exposures.

Normalyze’s DSPM Technology: Key Capabilities and Benefits
Normalyze’s DSPM technology addresses these challenges with its core features:

  1. AI-Powered Data Classification: Through Normalyze’s agentless One-Pass Scanner™, sensitive data is accurately classified and identified across cloud and on-premises environments.
  2. Comprehensive Risk Assessment: Normalyze’s DataValuator™ quantifies data risks, prioritizing assets based on their potential for data loss.
  3. Data Risk Visualization: The Data Access Graph provides insights into access and trust relationships, pinpointing areas of human-centric risk.
  4. Streamlined Compliance: Over 500 compliance benchmarks are integrated, simplifying adherence to data regulations.
  5. Effective Remediation: The platform integrates seamlessly with service management tools, providing recommendations and alerts to prevent over-permissioned data access.

Proofpoint aims to use these capabilities to help organizations understand their data risks comprehensively and implement targeted, efficient remediation strategies. The integration will enhance both visibility and governance, empowering security teams to address security risks before they can be exploited.

10 Practical Tips for Avoiding Data Security Threats
To prevent data security threats, organizations can adopt the following best practices:

  1. Implement DSPM Solutions: Use data security posture management solutions like Normalyze’s to gain complete visibility and control over sensitive data.
  2. Classify Sensitive Data Regularly: Periodically review and classify data to ensure sensitive data is managed and secured effectively.
  3. Apply the Principle of Least Privilege: Limit data access rights to only those who absolutely need them, reducing the risk of unauthorized data exposure.
  4. Conduct Continuous Monitoring: Keep an eye on data access patterns and immediately flag any unusual activity.
  5. Enforce Strong Access Controls: Implement multi-factor authentication (MFA) and role-based access control (RBAC) for sensitive data.
  6. Regularly Review Data Policies: As data evolves, so should policies. Ensure they are current with the latest security standards.
  7. Automate Data Compliance Checks: Use tools that automate compliance with data protection regulations, reducing the potential for oversight.
  8. Provide Security Awareness Training: Educate staff on data security best practices and the risks of unauthorized data access.
  9. Secure AI and CI/CD Pipelines: Protect these development tools to minimize the risk of sensitive data leaks during production.
  10. Perform Routine Vulnerability Assessments: Regularly assess your data environment for potential vulnerabilities and remediate them promptly.

Conclusion:
Proofpoint’s acquisition of Normalyze represents a powerful advancement in data security, positioning it to tackle the complex challenges of a human-centric data environment. As data continues to grow in volume and complexity, this acquisition reflects the industry’s shift toward integrated security solutions capable of securing data across diverse environments. Normalyze’s DSPM technology will enable Proofpoint’s clients to protect their data more effectively, maintaining compliance, and mitigating risks associated with human errors in data management.

Stay Informed!
Want to stay on top of cybersecurity news? Follow us on Facebook – X (Twitter) – Instagram – LinkedIn – for the latest threats, insights, and updates!

Ouaissou DEMBELE
Ouaissou DEMBELEhttp://cybercory.com
Ouaissou DEMBELE is a seasoned cybersecurity expert with over 12 years of experience, specializing in purple teaming, governance, risk management, and compliance (GRC). He currently serves as Co-founder & Group CEO of Sainttly Group, a UAE-based conglomerate comprising Saintynet Cybersecurity, Cybercory.com, and CISO Paradise. At Saintynet, where he also acts as General Manager, Ouaissou leads the company’s cybersecurity vision—developing long-term strategies, ensuring regulatory compliance, and guiding clients in identifying and mitigating evolving threats. As CEO, his mission is to empower organizations with resilient, future-ready cybersecurity frameworks while driving innovation, trust, and strategic value across Sainttly Group’s divisions. Before founding Saintynet, Ouaissou held various consulting roles across the MEA region, collaborating with global organizations on security architecture, operations, and compliance programs. He is also an experienced speaker and trainer, frequently sharing his insights at industry conferences and professional events. Ouaissou holds and teaches multiple certifications, including CCNP Security, CEH, CISSP, CISM, CCSP, Security+, ITILv4, PMP, and ISO 27001, in addition to a Master’s Diploma in Network Security (2013). Through his deep expertise and leadership, Ouaissou plays a pivotal role at Cybercory.com as Editor-in-Chief, and remains a trusted advisor to organizations seeking to elevate their cybersecurity posture and resilience in an increasingly complex threat landscape.

Subscribe

- Never miss a story with notifications

- Gain full access to our premium content

- Browse free from up to 5 devices at once

Latest stories

spot_imgspot_imgspot_imgspot_img

LEAVE A REPLY

Please enter your comment!
Please enter your name here