Loop Insights Releases Its AI Cloud Software Platform

LOOP Insights Inc. | June 29, 2020

Loop Insights Inc. (the "Company" or "Loop"), a provider of transformative artificial intelligence ("AI") solutions announced it is set to launch its latest product "Loop Cloud", an Application Programming Interface ("API") cloud software product.

In addition to delivering all the traditional benefits of Loop's Fobi hardware device, Loop Cloud bolsters many exciting new features and capabilities such as remote onboarding and monitoring capabilities and scheduled maintenance and service.

Loop CSO David Salisbury: "Brick and mortar retailers struggle to make sense of their data and Loop solves this problem. Not only that, we provide an automated tool that creates actionable strategies for curating a better shopper experience and increasing operational efficiencies."

The addition of Loop Cloud delivers a high margin revenue-generating power to Loop's current Software as a Service revenue model. It will also eliminate the friction and challenges faced with traditional hardware implementations, allowing for fast scalability.

Spotlight

This white paper is authored by the founders of the Mobile-edge Computing (MEC) industry initiative. The objectives of this paper are to introduce the concept of Mobile-edge Computing and the related key market drivers, and to discuss the business, consumer and technical value/benefits that this technology offers. The paper discusses the enablers, the requirements and challenges for Mobile-edge Computing as well as the objectives of the MEC initiative. This white paper presents the high-level architectural blueprint of Mobile-edge Computing which, together with the scope of work, will form the basis for the first release of the work in the initiative. In addition, it highlights the relationships between and the interfaces with other industry efforts.


Other News
CLOUD STORAGE

Votiro Cloud Integrates With Box Content Cloud to Provide Zero Trust Content Security

Votiro | October 20, 2022

Votiro, the category leader in Content Disarm and Reconstruction (CDR) technology, today announced its integration with Box’s leading Content Cloud to prevent ransomware and other evasive file-borne threats from entering users’ content collaboration applications and environments. Available today, users can seamlessly connect Votiro Cloud to Box to provide an essential layer of security needed to prevent new and unknown threats by sanitizing content before adding it in Box. Digital content collaboration capabilities have been paramount in the new hybrid work environment, where bad actors are targeting content and data management platforms, primarily through hidden threats in files. Many of these threats leverage advanced obfuscation techniques that can easily evade detection through traditional security technologies. Through this integration with Box, Votiro Cloud can easily be downloaded and deployed within the customers’ environment, and begin immediately eliminating all malware threats. Preventing Threats without Ruining Files Instead of scanning for known malware signatures, Votiro Cloud proactively disarms weaponized files before they enter the network and prevents virtually all attacks, ranging from evasive commodity attacks to zero-day attacks, including ransomware. In addition, Votiro’s solution prioritizes secure collaboration, increasing productivity without compromising security. All incoming files to Box Content Cloud from remote employees, contractors, and 3rd party partners are sanitized and reconstructed to preserve the integrity and functionality of the original file, allowing users to collaborate securely. "Organizations today need products that are inherently secure to support employees working from anywhere, At Box, we continuously strive to improve our integrations with third-party apps so that it's easier than ever for customers to use Box alongside best-in-class solutions. With today's integration with Votiro, we are providing customers with even more options for additional security controls to further minimize the risk of potential incidents.” Fred Klein, Vice President of Business and Corporate Development at Box Votiro applies Zero Trust principles to a customer’s interactions with digital files, automated file processing, or application-to-application file transfer process. Votiro’s scalability, speed, and depth and breadth of accepted file formats best positions them to help enterprises collaborate with third-parties safely while keeping business flowing. Files are processed at scale for high volume operations and within milliseconds, completely transparent to the end user. The company’s cloud-based, open application programming interface (API), and auto-scaling functionality allows for limitless scalability to seamlessly accommodate surges in file throughput. Votiro Cloud is easy to use and the open API fits into existing file flows seamlessly, including to and from content-rich applications and services like customer-facing portals deployed in public cloud platforms, machine-to-machine transfer to cloud content platforms such as AWS S3, Snowflake, and Box. “Enterprises no longer have to implicitly trust the users interacting with files in the cloud content platforms, but explicitly ensure safe content at all times. As a result, building out a data protection strategy and investing in technologies that adhere to the Zero Trust model is a great way to ensure secure content collaboration,” said Ravi Srinivasan, CEO at Votiro. “Digital collaboration services, like Box, create amazing efficiencies for businesses and - with the right safeguards - also provide a high level of security. We’re proud to integrate with Box to offer an essential layer of security to protect the content and data that organizations’ exchange on a daily basis without inhibiting user productivity.” About Votiro Votiro is a zero-trust content security company serving hundreds of commercial and government organizations worldwide. Votiro Cloud is an open, API-centric Content Disarm and Reconstruction (CDR) solution to deliver safe content and eliminate file-borne threats targeting your remote workers, content-rich apps, data lakes, supply chain and B2C digital interactions. Votiro is headquartered in the United States, with offices in Australia, Israel, and Singapore.

Read More

CLOUD SECURITY

Sigma Computing Partners with Snowflake to Launch Solution on Healthcare & Life Sciences Data Cloud

Sigma | September 15, 2022

Forescout Technologies, the global leader in automated cybersecurity, today announced a new healthcare cybersecurity partnership with First Health Advisory, a leader in healthcare IT risk management. The partnership creates an innovative approach to connected asset risk management by automating the technical data collection, mitigation and risk reduction measures for a healthcare organization’s entire network that encompasses IT, IoT, OT, and IoMT assets. Healthcare organizations’ networks are under constant attack and often do not have the necessary human capital to oversee the work necessary to thwart a potential threat or attack through quick response. This challenge places added importance on the need to obtain highly skilled outside expertise to operationalize a program and execute ongoing asset risk assessments across the network. “Cybersecurity risk assessments for healthcare organizations are incredibly time consuming, static in nature, and mandated by regulatory requirements. Moreover, the steps to mitigate assessment findings and lower risk are difficult to complete with the current cyber skills shortage, This partnership and new approach that combines intuitive risk assessment and automated mitigation technology will allow healthcare organizations to not only make risk assessments easier and faster to complete, but also free up internal resources to support other critical aspects of the patient experience.” Tamer Baker, vice president, global healthcare, Forescout The audit experience will also see a major transformation through this new partnership. Organizations will have an ability to automate evidence collection and receive ongoing mitigation and vulnerability management support from First Health Advisory staff year-round. “Our partnership delivers the optimal solution healthcare organizations are looking for – the right balance of highly skilled, multi-disciplinary risk assessment personnel with deep understanding of the regulatory landscape together with a dependable cybersecurity platform that can automate risk reduction actions,” said Will Long, CSO of Enterprise Security & Technology at First Health Advisory. “We’re excited about this collaboration and together with Forescout, look forward to helping more healthcare organizations improve their security posture.” About Forescout Forescout Technologies, Inc. delivers cybersecurity automation across the digital terrain, maintaining continuous alignment of customers’ security frameworks with their digital realities, including all asset types – IT, OT, IoT, IoMT. The Forescout Continuum Platform provides complete asset visibility, continuous compliance, network segmentation and a strong foundation for Zero Trust. For more than 20 years, Fortune 100 organizations and government agencies have trusted Forescout to provide automated cybersecurity at scale. Forescout arms customers with data-powered intelligence to accurately detect risks and quickly remediate cyberthreats without disruption of critical business assets.

Read More

CLOUD DEPLOYMENT MODELS

CoreStack Participates in AWS Marketplace Vendor Insights Preview

CoreStack | September 07, 2022

CoreStack, a global cloud governance provider that empowers enterprises to unleash the power of the cloud by enabling continuous and autonomous cloud governance at scale, today announced that it is participating in the Amazon Web Services (AWS) Marketplace Vendor Insights preview, which streamlines the complex third-party software risk assessment process by enabling sellers to make security and compliance information available through AWS Marketplace, a curated digital catalog that customers can use to find, buy, deploy, and manage third-party software, data, and services to build solutions and run their businesses. CoreStack’s NextGen Cloud Governance solutions — FinOps, SecOps and CloudOps — are now available via a unified web-based dashboard as part of AWS Marketplace Vendor Insights to give customers access to security and compliance information. AWS Marketplace Vendor Insights helps streamline the procurement process by granting buyers access to evidence made available by sellers related to data privacy and residency, application security, and access control. “We created AWS Marketplace Vendor Insights to serve customers that need help validating third-party software that meets their compliance needs, We are glad to see CoreStack participating in the Vendor Insights preview and their commitment to trust and transparency. Companies like CoreStack work with AWS to showcase their validated security profile, saving customers months of effort, reducing the software risk assessment lead time for customers while assuring them of continuous monitoring of vendor security.” Jason Timmes, General Manager, AWS Marketplace Seller Services Using Vendor Insights can help buyers reduce assessment lead time to a few hours by allowing buyers to access the vendor’s validated security profile, saving months of effort from questionnaires and back-and-forth with vendors. The dashboard also provides evidence backed by AWS Config and AWS Audit Manager assessments, external audit reports, and software vendor self-assessments to help customers perform continual compliance monitoring. "Vendor Insights provides ongoing visibility and alerts about the vendor’s security hygiene,” said Satyam Patel, Vice President & Chief Information Security Officer at [24]7.ai. “Using Vendor Insight notifications helps us remove the need for periodic reassessments and brings in agility in the procurement process.” The CoreStack platform, built on cloud-native services, empowers AWS customers to achieve security and compliance, enhance cloud operational efficiencies as well as optimize costs. It applies a unique cloud-as-code approach that leverages deep artificial intelligence (AI) / machine learning (ML), declarative definitions, and a patented cloud service-chaining technology. Customers can leverage CoreStack’s powerful NextGen Cloud Governance offerings — FinOps, SecOps and CloudOps — to govern operations, security, cost, access, and resources across multiple cloud accounts. “We take pride in helping customers embrace, expand and enhance cloud through our NextGen Cloud Governance, and we are proud to showcase our validated and strong security story with customers through Vendor Insights,” said Parul Chheda, Vice President of Strategic Alliances at CoreStack. “Security is a shared responsibility, and we are happy that AWS Marketplace customers can directly monitor and inspect configuration of our technology resources and collect other critical information to deliver up-to-date security posture metrics and artifacts. We look forward to working with AWS to fast-track due diligence and further the value we can offer to our customers.” About CoreStack CoreStack is a NextGen cloud business accelerator that empowers enterprises to predictably increase top-line revenues, improve bottom-line efficiencies, and gain a competitive edge through AI-powered real-time cloud governance on autopilot. CoreStack's FinOps, SecOps and CloudOps solutions embrace, enhance, and extend native-cloud, enable reporting, recommendation, remediation and provide single pane-of-glass governance across multi-cloud. Through executive dashboards for comprehensive real-time insights, CoreStack delivers transformative value such as 40% increase in operational efficiencies, 50% decrease in cloud costs, and 100% security assurance and compliance. CoreStack helps 500+ global enterprises govern $2B+ in annual cloud consumption.

Read More

CLOUD SECURITY

Lacework Brings Its CNAPP Solution To Google Cloud's Chronicle Security Operations

Lacework | October 27, 2022

Lacework, the data-driven cloud security company, today announced a new integration with Google Cloud's Chronicle Security Operations, bringing its cloud-native application protection platform (CNAPP) capabilities to Chronicle deployments. By tapping into rich multicloud runtime alerts from the Lacework Polygraph Data Platform, organizations using Chronicle Security Operations gain better insight into cloud threats, helping them understand, respond to, and remediate incidents more effectively than ever before. Lacework fully integrates multicloud runtime telemetry with Chronicle Security Operations. SOC teams that rely on legacy security solutions, which are based on static, manually-written rules, can't keep up with the rate and scale of changes in cloud environments. They are then forced to spend an increasing amount of analyst time and energy sifting through an overwhelming volume of low-context alerts. SOC teams need a modern threat management solution that can keep up with the constantly changing nature of the cloud, and allows them — and their company overall — to operate and innovate effectively at scale. With this integration, organizations using Chronicle Security Operations can now access runtime alerts and anomalous activity from multicloud environments, generated by the Lacework Polygraph Data Platform. The Lacework Polygraph Data Platform uses automation to provide teams with an improved signal-to-noise ratio compared to traditional solutions that are not built for the cloud, without the need for manual intervention. The addition of these high-context alerts allows SOC teams to quicken investigation and remediation, and closes the gap between SOC and security teams by embedding Lacework into security playbooks. "Enterprises transforming their security strategies for the cloud require technologies that easily deliver comprehensive visibility across their multicloud environments, Lacework's integration with Chronicle Security Operations enables organizations to detect and address the right threats via contextual insights that matter the most across their diverse environments." Sunil Potti, VP/GM of Security, Google Cloud Key capabilities of this integration include: Anomaly detections from Lacework, including the cloud control plane, audit logs, cloud, and container instances for Google Cloud, AWS, and Microsoft Azure are all shared with Chronicle Security Operations. Using Chronicle's Universal Data Model parsers, customers can easily onboard this integration within their existing Chronicle instance. Customers will be able to create automation, orchestration and response playbooks using Chronicle SOAR to quickly react to and address issues. "Cloud threats are only becoming more sophisticated over time, so it's critical for security teams to have the right context to make the right decisions to remediate issues quickly," said Jay Parikh, co-CEO, Lacework. "Through our continued partnership with Google Cloud, we're making it easier for joint customers to take advantage of the richness of Lacework data so they can get a better understanding of what's happening across their multicloud environments and continue to innovate with confidence." The Lacework integration with Chronicle Security Operations will be available to organizations via Google Cloud Marketplace About Lacework Lacework is the data-driven security company for the cloud. The Lacework Polygraph Data Platform automates cloud security at scale so our customers can innovate with speed and safety. Only Lacework can collect, analyze, and accurately correlate data across an organization's cloud and Kubernetes environments, and narrow it down to the handful of security events that matter. Customers all over the globe depend on Lacework to drive revenue, bring products to market faster and safer, and consolidate point security solutions into a single platform. Founded in 2015 and headquartered in San Jose, Calif., Lacework is backed by leading investors like Sutter Hill Ventures, Altimeter Capital, D1 Capital Partners, Tiger Global Management, Counterpoint Global (Morgan Stanley), Franklin Templeton, Durable Capital, GV, General Catalyst, XN, Coatue, Dragoneer, Liberty Global Ventures, and Snowflake Ventures, among others.

Read More

Spotlight

This white paper is authored by the founders of the Mobile-edge Computing (MEC) industry initiative. The objectives of this paper are to introduce the concept of Mobile-edge Computing and the related key market drivers, and to discuss the business, consumer and technical value/benefits that this technology offers. The paper discusses the enablers, the requirements and challenges for Mobile-edge Computing as well as the objectives of the MEC initiative. This white paper presents the high-level architectural blueprint of Mobile-edge Computing which, together with the scope of work, will form the basis for the first release of the work in the initiative. In addition, it highlights the relationships between and the interfaces with other industry efforts.

Resources