#1 Middle East & Africa Trusted Cybersecurity News & Magazine |

25 C
Dubai
Thursday, December 5, 2024
Cybercory Cybersecurity Magazine
HomeTechnology & TelecomProofpoint Acquires Normalyze to Bolster Human-Centric Data Security with Advanced DSPM Capabilities

Proofpoint Acquires Normalyze to Bolster Human-Centric Data Security with Advanced DSPM Capabilities

Date:

Related stories

#Interview: Misconceptions and Overcoming Challenges in Vulnerability Management

Vulnerability management is a cornerstone of cybersecurity, yet it...

Rockstar 2FA: A Driving Force in Phishing-as-a-Service (PaaS)

Phishing-as-a-Service (PaaS) is rapidly evolving into a significant cybersecurity...

Australia Cyber Security Bill 2024: Strengthening National Cyber Resilience

In an era where cyber threats are growing exponentially,...

AI in Cybersecurity: Market on the Rise with Projected Growth to $154.8 Billion by 2032

The integration of artificial intelligence (AI) into cybersecurity has...
spot_imgspot_imgspot_imgspot_img

To reinforce its data security posture, Proofpoint Inc., a prominent name in cybersecurity and compliance, has entered a definitive agreement to acquire Normalyze, a leader in Data Security Posture Management (DSPM). Announced on October 29, 2024, this acquisition will allow Proofpoint to integrate Normalyze’s AI-powered DSPM technology into its human-centric security platform. This addition will address data security risks across multifaceted data landscapes, from on-premises to cloud environments. Set to be finalized by November, this acquisition underscores Proofpoint’s commitment to safeguarding human-managed data from escalating cybersecurity threats.

Exploring the Proofpoint-Normalyze Synergy
As companies leverage cloud and AI technologies to drive innovation, the complexity of data environments has introduced critical security gaps, often exacerbated by human errors. Security teams face challenges as rapid deployment of cloud applications, combined with extensive third-party SaaS use, create a dispersed network of sensitive data. Normalyze’s DSPM technology aims to fill these security gaps, enhancing visibility and control, while enabling organizations to protect data across both human and machine interfaces.

Proofpoint’s acquisition of Normalyze will empower its platform to manage the entirety of data security challenges across SaaS, PaaS, on-premises, and hybrid environments. According to Mayank Choudhary, Executive Vice President and General Manager of Data Security & Compliance at Proofpoint, “Data is increasingly at risk due to human interactions within complex applications. Integrating Normalyze’s DSPM capabilities will provide our clients with the tools needed to address these vulnerabilities, giving them visibility and control over their data to effectively mitigate human-centric risks.”

Data Security Challenges in the Human-Driven Cloud Era
The rise in AI applications and interconnected data ecosystems has introduced new cybersecurity complexities:

  • Data discovery and classification: Many organizations struggle to locate and classify sensitive data, risking compliance failures and unauthorized access.
  • Prioritizing risk: Identifying and prioritizing security risks can be a daunting task, particularly in systems where developers and other non-IT personnel have extensive data access.
  • Human-centric vulnerabilities: With widespread use of CI/CD processes and cloud services, employees interact with data in ways that often bypass traditional security protocols, leading to unintended security exposures.

Normalyze’s DSPM Technology: Key Capabilities and Benefits
Normalyze’s DSPM technology addresses these challenges with its core features:

  1. AI-Powered Data Classification: Through Normalyze’s agentless One-Pass Scanner™, sensitive data is accurately classified and identified across cloud and on-premises environments.
  2. Comprehensive Risk Assessment: Normalyze’s DataValuator™ quantifies data risks, prioritizing assets based on their potential for data loss.
  3. Data Risk Visualization: The Data Access Graph provides insights into access and trust relationships, pinpointing areas of human-centric risk.
  4. Streamlined Compliance: Over 500 compliance benchmarks are integrated, simplifying adherence to data regulations.
  5. Effective Remediation: The platform integrates seamlessly with service management tools, providing recommendations and alerts to prevent over-permissioned data access.

Proofpoint aims to use these capabilities to help organizations understand their data risks comprehensively and implement targeted, efficient remediation strategies. The integration will enhance both visibility and governance, empowering security teams to address security risks before they can be exploited.

10 Practical Tips for Avoiding Data Security Threats
To prevent data security threats, organizations can adopt the following best practices:

  1. Implement DSPM Solutions: Use data security posture management solutions like Normalyze’s to gain complete visibility and control over sensitive data.
  2. Classify Sensitive Data Regularly: Periodically review and classify data to ensure sensitive data is managed and secured effectively.
  3. Apply the Principle of Least Privilege: Limit data access rights to only those who absolutely need them, reducing the risk of unauthorized data exposure.
  4. Conduct Continuous Monitoring: Keep an eye on data access patterns and immediately flag any unusual activity.
  5. Enforce Strong Access Controls: Implement multi-factor authentication (MFA) and role-based access control (RBAC) for sensitive data.
  6. Regularly Review Data Policies: As data evolves, so should policies. Ensure they are current with the latest security standards.
  7. Automate Data Compliance Checks: Use tools that automate compliance with data protection regulations, reducing the potential for oversight.
  8. Provide Security Awareness Training: Educate staff on data security best practices and the risks of unauthorized data access.
  9. Secure AI and CI/CD Pipelines: Protect these development tools to minimize the risk of sensitive data leaks during production.
  10. Perform Routine Vulnerability Assessments: Regularly assess your data environment for potential vulnerabilities and remediate them promptly.

Conclusion:
Proofpoint’s acquisition of Normalyze represents a powerful advancement in data security, positioning it to tackle the complex challenges of a human-centric data environment. As data continues to grow in volume and complexity, this acquisition reflects the industry’s shift toward integrated security solutions capable of securing data across diverse environments. Normalyze’s DSPM technology will enable Proofpoint’s clients to protect their data more effectively, maintaining compliance, and mitigating risks associated with human errors in data management.

Stay Informed!
Want to stay on top of cybersecurity news? Follow us on Facebook – X (Twitter) – Instagram – LinkedIn – for the latest threats, insights, and updates!

Ouaissou DEMBELE
Ouaissou DEMBELEhttps://cybercory.com
Ouaissou DEMBELE is an accomplished cybersecurity professional and the Editor-In-Chief of cybercory.com. He has over 10 years of experience in the field, with a particular focus on Ethical Hacking, Data Security & GRC. Currently, Ouaissou serves as the Co-founder & Chief Information Security Officer (CISO) at Saintynet, a leading provider of IT solutions and services. In this role, he is responsible for managing the company's cybersecurity strategy, ensuring compliance with relevant regulations, and identifying and mitigating potential threats, as well as helping the company customers for better & long term cybersecurity strategy. Prior to his work at Saintynet, Ouaissou held various positions in the IT industry, including as a consultant. He has also served as a speaker and trainer at industry conferences and events, sharing his expertise and insights with fellow professionals. Ouaissou holds a number of certifications in cybersecurity, including the Cisco Certified Network Professional - Security (CCNP Security) and the Certified Ethical Hacker (CEH), ITIL. With his wealth of experience and knowledge, Ouaissou is a valuable member of the cybercory team and a trusted advisor to clients seeking to enhance their cybersecurity posture.

Subscribe

- Never miss a story with notifications

- Gain full access to our premium content

- Browse free from up to 5 devices at once

Latest stories

spot_imgspot_imgspot_imgspot_img

LEAVE A REPLY

Please enter your comment!
Please enter your name here