logo
TrueFort Recognized as a Leader in Microsegmentation at the 2025 Global InfoSec Awards

TrueFort Recognized as a Leader in Microsegmentation at the 2025 Global InfoSec Awards

Business Wire28-04-2025
SAN FRANCISCO--(BUSINESS WIRE)-- TrueFort, the lateral movement protection company, today announced it has been named a Trailblazer for Microsegmentation in the 2025 Global InfoSec Awards by Cyber Defense Magazine (CDM), unveiled today at the RSAC Conference. TrueFort is redefining microsegmentation for the modern enterprise, delivering next-generation cybersecurity that addresses today's most sophisticated threats, including compromised credentials, ransomware, supply chain attacks, and insider threats.
Lateral movement continues to be a leading technique for successful cyber attacks. By combining deep application intelligence with behavioral analytics and automated policy enforcement, TrueFort helps enterprises mitigate business risk by stopping attacks.
'We're honored to be recognized once again as a leader in microsegmentation by Cyber Defense Magazine,' said Sameer Malhotra, CEO of TrueFort. 'Lateral movement continues to be a leading technique for successful cyber attacks. By combining deep application intelligence with behavioral analytics and automated policy enforcement, TrueFort helps enterprises mitigate business risk by stopping attacks before they spread—ensuring critical workloads remain secure and operations resilient across even the most complex hybrid and multi-cloud environments.'
'TrueFort embodies three major features we judges look for to become winners: understanding tomorrow's threats today, providing a cost-effective solution, and innovating in unexpected ways that help mitigate cyber risk and stay a step ahead of the next breach,' said Gary S. Miliefsky, Publisher of Cyber Defense Magazine.
The TrueFort Platform enforces Zero Trust security across complex environments—spanning bare metal servers, virtual machines, containers, Kubernetes, and cloud-native architectures. The platform provides security teams with unparalleled visibility into application behavior and communication flows. Built to address the dynamic nature of hybrid and multi-cloud environments, TrueFort blocks unauthorized lateral movement and enforces automated policies without disrupting operations. Its open ecosystem integrates seamlessly with leading endpoint and security tools such as CrowdStrike and SentinelOne, while supporting its own proprietary agent for fine-grained policy enforcement.
A trusted partner to some of the world's most security-focused Fortune 500 companies, TrueFort delivers application-centric Zero Trust protection that scales across the most complex IT environments—from containers and Kubernetes to legacy systems and cloud-native architectures.
The judges, certified security professionals (CISSP, FMDHS, CEH), evaluated submissions based on an independent review of materials such as data sheets, white papers, and product literature. CDM prioritizes innovation over market size, always asking 'What's Next?' in search of next-generation InfoSec solutions.
About TrueFort
TrueFort puts you in control of lateral movement across the data center and cloud. The TrueFort Cloud extends protection beyond network activity by shutting down the abuse of service accounts. Founded by former IT executives from Bank of America and Goldman Sachs, leading global enterprises trust TrueFort to deliver unmatched application environment discovery and microsegmentation for both identity and activity. For more information, visit https://truefort.com and follow us on LinkedIn and Twitter.
Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

5 Signs Your Company Needs a Kubernetes Consultant Right Now
5 Signs Your Company Needs a Kubernetes Consultant Right Now

Time Business News

time3 minutes ago

  • Time Business News

5 Signs Your Company Needs a Kubernetes Consultant Right Now

Kubernetes is the go-to solution for container orchestration. However, in the case of many businesses, the passage into making it big is not as rosy as it is written on paper. Having the right expertise can be the solution whether your company is in the middle of growing pains, security problems, or performance bottlenecks. In case your group cannot quite make the most out of Kubernetes, then it is perhaps time to have a specialist on board. These five indicators show you that your company is in need of a Kubernetes consultant: Although Kubernetes is easy to learn, it can be complicated especially when your infrastructure expands. Namespaces, pods, services, ingress controllers, network policies, more names. In case your team is too exhausted with configurations or spends more time dealing with clusters rather than work on features, then consultants can intervene and clean up your architecture. A knowledgeable Kubernetes consultant can perform the evaluation of your current environment, de-technical-debt it, and apply best-practices scaling, monitoring, and automation. This not only simplifies, but also gives a concrete base of future development. Is your application unexpectedly crashing, responding slowly or is it going down during deployment? Kubernetes is only prepared to manage high availability and zero-downtime rollouts as long as it is correctly configured. A consultant can diagnose the underlying issue in your performance problems and optimize your cluster to have a better use of resources, autoscaling, and resiliency. A combination of adequate tuning lets your team perform less firefighting and more building. Most organizations start using Kubernetes clusters without a well-paved security plan. Your infrastructure may be under attack due to unattended RBAC roles, vulnerable services and depleted components. Kubernetes security is also multi-layered and subtle, and an expert can help you find the weak spots in your configuration. They will aid in the enforcement of role-based access control (RBAC), network policy, secrets management, and audit logs essential in compliance and in peace of mind. This is where consulting for your Kubernetes strategy becomes not just helpful, but essential. You'll gain expert guidance on building secure, compliant, and reliable systems from the ground up. Modern development requires Continuous Integration and Continuous Deployment (CI/CD), however, integration of such tools with Kubernetes is not an easy process. When your team continues to deploy in a manual way and pipelines are breaking all the time, then obviously, it is a red flag. The expense of clouds may inflate tremendously on the off chance that your Kubernetes group is not enhanced. Autoscaling or underuse of services, nodes that are over-provisioned or lying unused can also devour your budget without you noticing. A consultant may evaluate how you use it, trim your clusters and install autoscaling and cost control processes. The result? Improved result to reduced cost. Kubernetes is an effective platform, and any platform is not always easy to explore on your own. Whether you are just making your first steps in Kubernetes, or already run production loads, hiring a consultant can speed your development, and help you not to make expensive mistakes. TIME BUSINESS NEWS

CrowdStrike Named a Leader in the 2025 Gartner® Magic Quadrant™ for Endpoint Protection Platforms for Sixth Consecutive Time
CrowdStrike Named a Leader in the 2025 Gartner® Magic Quadrant™ for Endpoint Protection Platforms for Sixth Consecutive Time

Business Wire

timea day ago

  • Business Wire

CrowdStrike Named a Leader in the 2025 Gartner® Magic Quadrant™ for Endpoint Protection Platforms for Sixth Consecutive Time

AUSTIN, Texas--(BUSINESS WIRE)-- CrowdStrike (NASDAQ: CRWD) today announced it has been named a Leader in the 2025 Gartner® Magic Quadrant™ for Endpoint Protection Platforms (EPP) 1 for the sixth consecutive time. For the third time in a row, CrowdStrike was positioned furthest right for Completeness of Vision and highest for Ability to Execute among all vendors evaluated. The AI-native CrowdStrike Falcon® platform continues to define endpoint protection for the AI era, delivering industry-leading prevention, detection, and response. CrowdStrike's single-agent platform architecture meets growing customer demand to consolidate cybersecurity, unifying best-in-class endpoint, identity, cloud, data protection, and next-gen SIEM. With breakthrough agentic AI innovations, Falcon automates decisions and completes tasks to supercharge SOC personnel and accelerate security outcomes. 'As the pioneer of AI-native endpoint protection, CrowdStrike continues to lead the industry in delivering the outcome that matters most: stopping breaches,' said Elia Zaitsev, chief technology officer, CrowdStrike. 'The Falcon platform's unified architecture drives relentless innovation across the modern attack surface – consolidating point products, closing protection gaps, and simplifying operations. By wiring AI-driven automation into security workflows, Falcon autonomously makes critical decisions and drives real-time action, delivering the next evolution of AI-powered security operations. We believe this recognition validates Falcon as the platform of choice for modern cybersecurity.' Cybersecurity's Platform Innovator for the AI Era CrowdStrike continues to innovate its endpoint and platform capabilities to keep customers ahead of evolving threats and transform security operations. The company recently unveiled File System Containment for endpoint, which prevents ransomware from spreading over the network via Windows Server Message Block (SMB) and stops mass encryption as early as possible. Agentic AI innovations – including Charlotte AI Agentic Detection Triage and Charlotte AI Agentic Response and Agentic Workflows – transcend 'ask-and-respond' co-pilots, delivering autonomous reasoning and action on first- and third-party data, without human prompts. Advancements in Falcon Cloud Security protect every layer of cloud risk – from AI models to runtime data. Falcon Data Protection innovations unify data security across endpoints, cloud, GenAI, and SaaS. Falcon Identity Protection now secures the entire identity attack lifecycle – from initial access to privilege escalation and lateral movement – across hybrid environments. With every module managed from a single console, Falcon delivers AI-driven protection – trained on trillions of daily events and frontline intelligence – across the entire platform, without relying on stitched-together data or disconnected systems. 2 In May 2025, CrowdStrike was named a Customers' Choice in the 2025 Gartner Peer Insights™ 'Voice of the Customer' for Endpoint Protection Platforms report, with the most 5-star ratings (450) of any Customers' Choice vendor. To learn more about CrowdStrike's recognition in the 2025 Gartner® Magic Quadrant™ for Endpoint Protection Platforms (EPP), please visit our website and read our blog. 1. Gartner, 2025 Gartner® Magic Quadrant™ for Endpoint Protection Platforms (EPP), Evgeny Mirolyubov, Franz Hinner, Deepak Mishra, July 14, 2025 2. Gartner, Voice of the Customer for Endpoint Protection Platforms, Peer Editors, May 23, 2025 GARTNER is a registered trademark and service mark, Magic Quadrant and PEER INSIGHTS are a registered trademark, of Gartner Inc. and/or its affiliates in the U.S. and internationally and are used herein with permission. All rights reserved. Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose. Gartner Peer Insights content consists of the opinions of individual end users based on their own experiences with the vendors listed on the platform, should not be construed as statements of fact, nor do they represent the views of Gartner or its affiliates. About CrowdStrike CrowdStrike (NASDAQ: CRWD), a global cybersecurity leader, has redefined modern security with the world's most advanced cloud-native platform for protecting critical areas of enterprise risk – endpoints and cloud workloads, identity and data. Powered by the CrowdStrike Security Cloud and world-class AI, the CrowdStrike Falcon® platform leverages real-time indicators of attack, threat intelligence, evolving adversary tradecraft and enriched telemetry from across the enterprise to deliver hyper-accurate detections, automated protection and remediation, elite threat hunting and prioritized observability of vulnerabilities. Purpose-built in the cloud with a single lightweight-agent architecture, the Falcon platform delivers rapid and scalable deployment, superior protection and performance, reduced complexity and immediate time-to-value. CrowdStrike: We stop breaches. © 2025 CrowdStrike, Inc. All rights reserved. CrowdStrike and CrowdStrike Falcon are marks owned by CrowdStrike, Inc. and are registered in the United States and other countries. CrowdStrike owns other trademarks and service marks and may use the brands of third parties to identify their products and services.

Veza Simplifies Oracle Access Governance with Unified Access Visibility, Intelligence, and Least Privilege Management
Veza Simplifies Oracle Access Governance with Unified Access Visibility, Intelligence, and Least Privilege Management

Yahoo

timea day ago

  • Yahoo

Veza Simplifies Oracle Access Governance with Unified Access Visibility, Intelligence, and Least Privilege Management

Veza now supports access controls across 300+ integrations, with 41% built self-service via OAA and new support for Oracle HCM, CyberArk, SAP SuccessFactors, and Microsoft 365 REDWOOD SHORES, Calif., July 17, 2025--(BUSINESS WIRE)--Veza, the identity security company, today announced the launch of Veza for Oracle Applications, a new offering to unify and secure access governance across complex Oracle environments, including Oracle E-Business Suite (EBS), JD Edwards EnterpriseOne (JDE), Oracle Fusion Cloud ERP and Oracle Databases addressing long-standing gaps in Oracle access governance, risk and compliance (GRC). With more than 70,000 organizations depending on Oracle platforms, from ERP to cloud infrastructure, identity access risk is business-critical. According to Enlyft, over 22,000 companies run Oracle ERP, and nearly 30,000 rely on Oracle Database, underscoring the widespread complexity of managing permissions and privileges. "Solving the identity problem is the top priority for every organization and security leader—and for good reason," said Pradeep Kumar, Director, Identity and Access Management (IAM), Crowdstrike. "Traditional identity governance is fundamentally broken. Veza has cracked the code by shifting the focus from directories to what truly matters: permissions and entitlements. With Veza's Access Platform, we've adopted a unified approach that gives us complete visibility and control across SaaS systems, cloud, and custom environments. The ability to integrate seamlessly with both widely used SaaS systems and our own internal systems has been critical — it's what enables us to understand over-permissioned access, enforce least privilege, streamline audits, and consistently govern access across the entire technology stack." System specific permissions and entitlements across legacy Oracle environments lead to over-permissioning, audit risk and policy violations. Without centralized identity visibility, dormant accounts and toxic role combinations can persist undetected, exposing organizations to SOX, PCI-DSS and GDPR violations. Veza's new integrations address these issues head-on, helping organizations move from reactive fire drills around audit findings to proactive risk reduction: Eliminate Blind Spots: Gain centralized visibility across all Oracle applications, uncovering hidden access risks. Manage Least Privilege at Scale: Detect privilege sprawl and right-size roles to reduce insider threats and compliance violations. Catch Risks in Near Real Time: Monitor critical changes to roles and permissions and get alerted to policy violations as they happen. Accelerate Compliance: Automate access reviews and generate audit-ready reports in minutes, not weeks. Veza integrates with Oracle environments via native APIs and secure, agentless connections, eliminating the need for custom code or downtime. Oracle's diverse and fragmented tech stack makes integration notoriously difficult; there's no magic key for universal access. Legacy applications like EBS often demand deep domain expertise. With Veza, Oracle customers can—for the first time—help unify identity across their Oracle ecosystem and understand exactly what users can do. With auto-discovery of roles and entitlements, intuitive workflows and near real-time alerting, organizations can operationalize access governance quickly and without disruption. "IAM transformation starts with understanding access permissions and entitlements, not just users and groups," said Tarun Thakur, CEO and Co-Founder of Veza. "With over 300 integrations and over 20 billion permissions analyzed, Veza goes beyond SCIM to map fine-grained entitlements across enterprise systems. Our Access Graph normalizes this data into effective access, giving teams the clarity to reduce risk, enforce least privilege and prove compliance without operational drag. To meet customer demand, we're scaling to more than 3,000 integrations by 2026, accelerated by LLM-based AI for faster development and app onboarding delivery." Battle-Tested Veza Integrations for Enterprise Systems Veza has made significant strides in strengthening our integration ecosystem, delivering on our commitment to build new integrations and enhance existing integrations. With support for extended attributes and new identity data entities across enterprise platforms, Veza makes it easier than ever for customers to unlock value from their identity and data systems for identity security use cases of next-gen IGA, cloud PAM, ISPM, NHI, and identity security for AI agents. New capabilities include: Microsoft: Active Directory (AD), Teams, Office 365 Kerberos authentication support for AD Filtering for disabled users for AD Substring-based identity mapping for AD Custom attributes for groups and users for AD Foreign Security Principal Objects for AD userAccountControl and manager_principal_name support for AD users Integration with Microsoft Teams Integration with Exchange Online Filtering for Sharepoint Sites for Sharepoint support Azure Entra ID support, including extension attributes, extension properties and MFA information Allow identity mapping from SAP user to Azure AD user Certificate-only authentication for Azure Entra ID ERP integration for Dynamics 365 Azure CosmosDB support Enforce HTTPS for M365 URLs Secrets management via external secret vaults Support access keys and SAS tokens for Azure Storage Accounts Discover Azure resources' inherited access permissions through Subscription/Management Group/Resource Group IAM permissions Azure Active Directory Devices support Okta Credential Provider support for Okta users Support Auth Server and private key JWT for authentication last_sign_in support for Okta users Mapping from Active Directory groups to Okta Expanded support for Okta Apps with additional NHI properties Amazon Web Services (AWS) Support for 40+ AWS services, with new integrations with AWS Secrets Manager, EKS secrets, AWS RDS Aurora Postgres, AWS RDS Oracle, AWS Identity Center, Support for AWS KMS and Non-Human Identity (NHI) entities (API keys and tokens, etc) and attributes (active status of API keys) AWS Control Tower Integration support Allow per-database "DB User" setting for each supported AWS Database Google Cloud Platform (GCP) Cross-org impersonation via Google Service Accounts Prebuilt admin role for Workspace Support for system service accounts, API keys and tokens Support Integration with Workload Identity Federation Support GCP Cloud Run Oracle OracleDB standalone Oracle JDE Oracle EBS Oracle HCM Oracle EPM Oracle Fusion Cloud GitHub Deeper access to secrets, deploy keys, API keys and repositories Personal Access Token (PAT) support Custom field for identity mapping HashiCorp Vault Extended metadata for secrets (e.g., last_used_at, created_at) and NHI support Salesforce API keys and tokens Support for permission set groups, profiles, permission sets Support for custom objects and properties New Salesforce objects (e.g., Billing Installment, Price List Item, Business Case) NHI-specific attributes like created_at for Connected Applications SAP New integration with SuccessFactors Workday Support for organizational structures and roles Option to omit sensitive worker fields (e.g., Gender) Support custom attribute types such as "Self referencing instance" and "Currency" Ability to exclude Default entity attributes Expanded support for system accounts and NHI Add created_at and updated_at for security groups Snowflake Support private link URL Snowflake native application Advanced activity monitoring for Snowflake - last_used_at, last_resource_used_at, etc. Support export of audit and event logs to Snowflake Flexible identity mapping using non-email fields Visibility into organizations, network/password policies, and row access policies Expanded coverage of NHI entities and properties OAA (Open Authorization API) Full support for SCIM, including custom attributes, OAuth 2.0, bring your own certificate for authentication ○Support OAA custom permissions Support path_values as a key in the api_post method for oaaclient Python SDK Add Veza Event when OAA App is pushed Flexible CSV uploader Role-based access controls across integrations Identity mapping between OAA integrations Bi-directional risk score exchange with CrowdStrike Resources: Veza Integrations: Veza for Oracle: Veza Open Authorization APIs: Veza Gartner Peer Insights: About Veza Veza is the leader in identity security, helping organizations secure access across the enterprise. Veza's Access Platform goes beyond identity governance and administration (IGA) tools to visualize, monitor, and control entitlements so that organizations can stay compliant and achieve least privilege. Global enterprises like Wynn Resorts, Expedia, and Blackstone trust Veza to manage identity security use cases, including privileged access monitoring, non-human identity (NHI) security, access entitlement management, data system access, SaaS access security, identity security posture management (ISPM), next-generation IGA, and Agentic AI identity security. Founded in 2020, Veza is headquartered in Los Gatos, California, and is funded by Accel, Bain Capital, Ballistic Ventures, Google Ventures (GV), New Enterprise Associates (NEW), Norwest Venture Partners, and True Ventures. Visit us at and follow us on LinkedIn, X, and YouTube. View source version on Contacts Media Contact Alex DaigleVeza@ Sign in to access your portfolio

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store