<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Cloud Security Archives - ITDigest</title>
	<atom:link href="https://itdigest.com/topic/cloud-computing-mobility/cloud-security/feed/" rel="self" type="application/rss+xml" />
	<link>https://itdigest.com/topic/cloud-computing-mobility/cloud-security/</link>
	<description>IT Explained</description>
	<lastBuildDate>Tue, 14 Apr 2026 12:29:09 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://itdigest.com/wp-content/uploads/2025/07/cropped-ITDIGEST-LOGO-01-1-copy-1-32x32.png</url>
	<title>Cloud Security Archives - ITDigest</title>
	<link>https://itdigest.com/topic/cloud-computing-mobility/cloud-security/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Orca Security Expands Cloud Security Reach with TD SYNNEX Partnership</title>
		<link>https://itdigest.com/quick-byte/orca-security-expands-cloud-security-reach-with-td-synnex-partnership/</link>
		
		<dc:creator><![CDATA[ITDigest Bureau]]></dc:creator>
		<pubDate>Tue, 14 Apr 2026 12:29:09 +0000</pubDate>
				<category><![CDATA[Cloud Computing & Mobility ]]></category>
		<category><![CDATA[Cloud Security]]></category>
		<category><![CDATA[Quick Byte]]></category>
		<category><![CDATA[Cloud Computing]]></category>
		<category><![CDATA[cloud security]]></category>
		<category><![CDATA[go-to-market strategy]]></category>
		<category><![CDATA[IT ecosystem]]></category>
		<category><![CDATA[ITDigest]]></category>
		<category><![CDATA[news]]></category>
		<category><![CDATA[Orca Security]]></category>
		<category><![CDATA[TD SYNNEX]]></category>
		<guid isPermaLink="false">https://itdigest.com/?p=79503</guid>

					<description><![CDATA[<p>Orca Security announced a new distribution agreement with TD SYNNEX. This deal aims to speed up the use of its AI-driven cloud security platform in North America. The partnership shifts Orca’s strategy from reselling to distribution. This change will boost partner engagement, improve financial choices, and strengthen regional support. By using TD SYNNEX’s vast network, [&#8230;]</p>
<p>The post <a href="https://itdigest.com/quick-byte/orca-security-expands-cloud-security-reach-with-td-synnex-partnership/" data-wpel-link="internal">Orca Security Expands Cloud Security Reach with TD SYNNEX Partnership</a> appeared first on <a href="https://itdigest.com" data-wpel-link="internal">ITDigest</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Orca Security announced a new distribution agreement with TD SYNNEX. This deal aims to speed up the use of its AI-driven cloud security platform in North America. The partnership shifts Orca’s strategy from reselling to distribution. This change will boost partner engagement, improve financial choices, and strengthen regional support. By using TD SYNNEX’s vast network, Orca makes it easier for partners to get procurement, credit support, and technical help. This support will help partners use Orca’s agentless cloud security solutions across multi-cloud settings. The collaboration aims to boost new customer acquisition and enhance long-term customer success.</p>
<h4><strong>Also Read: <a class="p-url" href="https://itdigest.com/quick-byte/onix-expands-google-cloud-partnership-to-accelerate-enterprise-ai-and-cloud-transformation/" target="_self" rel="bookmark" data-wpel-link="internal">Onix Expands Google Cloud Partnership to Accelerate Enterprise AI and Cloud Transformation</a></strong></h4>
<p>It will do this by providing better visibility and risk management. “Our agreement with TD SYNNEX represents a critical milestone in scaling the Orca Security ecosystem,” said Gil Geron, CEO of Orca Security. “By aligning with a global leader in distribution, we are equipping our partners to deliver our AI-powered cloud security platform at scale…” Cheryl Day added, “By integrating Orca Security into our North American partner ecosystem, we are enabling our customers to offer comprehensive visibility and prioritized risk management…”</p>
<h4><strong>Read More: <a href="https://www.businesswire.com/news/home/20260413623845/en/Orca-Security-Accelerates-AI-Driven-Cloud-Security-Growth-with-TD-SYNNEX-Partnership" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer sponsored ugc">Orca Security Accelerates AI-Driven Cloud Security Growth with TD SYNNEX Partnership</a></strong></h4>
<p>The post <a href="https://itdigest.com/quick-byte/orca-security-expands-cloud-security-reach-with-td-synnex-partnership/" data-wpel-link="internal">Orca Security Expands Cloud Security Reach with TD SYNNEX Partnership</a> appeared first on <a href="https://itdigest.com" data-wpel-link="internal">ITDigest</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Onix Expands Google Cloud Partnership to Accelerate Enterprise AI and Cloud Transformation</title>
		<link>https://itdigest.com/quick-byte/onix-expands-google-cloud-partnership-to-accelerate-enterprise-ai-and-cloud-transformation/</link>
		
		<dc:creator><![CDATA[ITDigest Bureau]]></dc:creator>
		<pubDate>Tue, 07 Apr 2026 11:25:09 +0000</pubDate>
				<category><![CDATA[Artificial Intelligence]]></category>
		<category><![CDATA[Cloud Security]]></category>
		<category><![CDATA[Quick Byte]]></category>
		<category><![CDATA[Agentic AI Transformation]]></category>
		<category><![CDATA[artificial intelligence]]></category>
		<category><![CDATA[Cloud Computing]]></category>
		<category><![CDATA[cloud transformation]]></category>
		<category><![CDATA[Enterprise AI]]></category>
		<category><![CDATA[Google Cloud]]></category>
		<category><![CDATA[ITDigest]]></category>
		<category><![CDATA[news]]></category>
		<category><![CDATA[Onix]]></category>
		<guid isPermaLink="false">https://itdigest.com/?p=79303</guid>

					<description><![CDATA[<p>Onix has announced a major expansion of its strategic collaboration with Google Cloud, aimed at accelerating enterprise-scale cloud, data, and agentic AI transformation. Leveraging its proprietary Wingspan platform, which includes the Semantic Twin model and structured AI Innovation Hub, Onix enables enterprises to move from concept to production up to three times faster than traditional [&#8230;]</p>
<p>The post <a href="https://itdigest.com/quick-byte/onix-expands-google-cloud-partnership-to-accelerate-enterprise-ai-and-cloud-transformation/" data-wpel-link="internal">Onix Expands Google Cloud Partnership to Accelerate Enterprise AI and Cloud Transformation</a> appeared first on <a href="https://itdigest.com" data-wpel-link="internal">ITDigest</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Onix has announced a major expansion of its strategic collaboration with Google Cloud, aimed at accelerating enterprise-scale cloud, data, and agentic AI transformation. Leveraging its proprietary Wingspan platform, which includes the Semantic Twin model and structured AI Innovation Hub, Onix enables enterprises to move from concept to production up to three times faster than traditional consulting approaches. The platform automates data modernization and AI enablement, allowing organizations to operationalize AI-ready data across industries including telecom, retail, healthcare, and financial services. “AI success is defined by what runs at scale, solving business workflows,” said Sanjay Singh, CEO of Onix.</p>
<h4><strong>Also Read: <a class="p-url" href="https://itdigest.com/quick-byte/exl-and-google-cloud-partner-to-accelerate-enterprise-ai-transformation/" target="_self" rel="bookmark" data-wpel-link="internal">EXL and Google Cloud Partner to Accelerate Enterprise AI Transformation</a></strong></h4>
<p>The collaboration focuses on three pillars: joint go-to-market and vertical investment to expand Onix’s Google Cloud business, unified platform capabilities for faster AI adoption, and an outcome-based enterprise delivery model emphasizing strict business KPIs and measurable ROI. Victor Morales, VP of GSI and Consulting Partnerships at Google Cloud, noted, “By utilizing Google Cloud&#8217;s leading gen AI capabilities, Onix can help customers unlock new insights that improve operations and productivity,” supporting a scalable, AI-driven enterprise strategy.</p>
<h4><strong>Read More: <a href="https://www.prnewswire.com/news-releases/onix-deepens-strategic-collaboration-with-google-cloud-to-help-accelerate-enterprise-scale-cloud-data-and-agentic-ai-transformation-302734706.html" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer sponsored ugc">Onix Deepens Strategic Collaboration with Google Cloud to Help Accelerate Enterprise-Scale Cloud, Data, and Agentic AI Transformation</a></strong></h4>
<p>The post <a href="https://itdigest.com/quick-byte/onix-expands-google-cloud-partnership-to-accelerate-enterprise-ai-and-cloud-transformation/" data-wpel-link="internal">Onix Expands Google Cloud Partnership to Accelerate Enterprise AI and Cloud Transformation</a> appeared first on <a href="https://itdigest.com" data-wpel-link="internal">ITDigest</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>NeuBird AI Expands into Autonomous Operations with Predictive Production Agent</title>
		<link>https://itdigest.com/cloud-computing-mobility/cloud-security/neubird-ai-expands-into-autonomous-operations-with-predictive-production-agent/</link>
		
		<dc:creator><![CDATA[ITDigest Bureau]]></dc:creator>
		<pubDate>Tue, 07 Apr 2026 11:25:02 +0000</pubDate>
				<category><![CDATA[Cloud Computing & Mobility ]]></category>
		<category><![CDATA[Cloud Security]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[autonomous operations]]></category>
		<category><![CDATA[Autonomous Production Operations Agent]]></category>
		<category><![CDATA[cloud security]]></category>
		<category><![CDATA[incident management]]></category>
		<category><![CDATA[Incident Response]]></category>
		<category><![CDATA[IT operations]]></category>
		<category><![CDATA[ITDigest]]></category>
		<category><![CDATA[NeuBird AI]]></category>
		<category><![CDATA[news]]></category>
		<category><![CDATA[Preventive Risk Insights]]></category>
		<guid isPermaLink="false">https://itdigest.com/?p=79297</guid>

					<description><![CDATA[<p>NeuBird AI has launched an autonomous production operations agent. This change moves us from reactive incident management to proactive, AI-driven operations. The new Falcon engine provides ongoing intelligence in cloud, on-premises, and hybrid settings. It helps organizations anticipate issues, resolve incidents quickly, and optimize performance at scale. The solution adds new features, like Preventive Risk [&#8230;]</p>
<p>The post <a href="https://itdigest.com/cloud-computing-mobility/cloud-security/neubird-ai-expands-into-autonomous-operations-with-predictive-production-agent/" data-wpel-link="internal">NeuBird AI Expands into Autonomous Operations with Predictive Production Agent</a> appeared first on <a href="https://itdigest.com" data-wpel-link="internal">ITDigest</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>NeuBird AI has launched an autonomous production operations agent. This change moves us from reactive incident management to proactive, AI-driven operations. The new Falcon engine provides ongoing intelligence in cloud, on-premises, and hybrid settings. It helps organizations anticipate issues, resolve incidents quickly, and optimize performance at scale.</p>
<p>The solution adds new features, like Preventive Risk Insights. These insights spot potential failures before they happen. It also has an Advanced Context Map. This map shows real-time insights into infrastructure dependencies and system health. NeuBird Desktop, a command-line interface tool, allows engineers to directly interact with the AI agent, while FalconClaw, a newly launched skills hub, enables teams to operationalize institutional knowledge into reusable workflows.</p>
<p>“AI adoption in enterprise operations has accelerated, but existing AI solutions lack the operational context and domain expertise required to deliver reliable outcomes.” said Gou Rao, co-founder and CEO of NeuBird AI.</p>
<h4><strong>Also Read: <a class="p-url" href="https://itdigest.com/cloud-computing-mobility/cloud-security/sentinelone-and-google-cloud-deepen-alliance-to-advance-ai-native-cybersecurity/" target="_self" rel="bookmark" data-wpel-link="internal">SentinelOne and Google Cloud Deepen Alliance to Advance AI-Native Cybersecurity</a></strong></h4>
<p>The launch addresses persistent challenges in IT operations, where fragmented tools and alert overload hinder efficiency. According to NeuBird’s 2026 State of Production Reliability and AI Adoption Report, 83% of organizations rely on four or more tools during incidents, and engineering teams spend nearly 40% of their time managing disruptions rather than building products. Additionally, 78% of organizations reported incidents without alerts, while 44% experienced outages tied to ignored signals.</p>
<p>NeuBird’s agent is designed to unify these processes by correlating telemetry data, mapping dependencies, and automating root cause analysis. It enables teams to reduce alert noise by over 78%, resolve incidents in minutes, and reclaim more than 200 engineering hours per month.</p>
<p>Rao added, “Production issues often go undetected until they impact services. Platform, SRE and DevOps teams need the ability to anticipate problems before they happen, across organizations of all sizes. <a href="https://neubird.ai/" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer sponsored ugc">NeuBird AI</a> enables teams to see around corners, identify risks ahead of impact, prevent incidents before they affect services and resolve incidents in minutes. We deliver an AI teammate that production teams can actually trust. This is the future of enterprise production operations.”</p>
<p>With the addition of FalconClaw, organizations can further codify operational expertise into scalable, AI-driven processes, reinforcing a transition toward predictive, self-optimizing production environments.</p>
<p>The post <a href="https://itdigest.com/cloud-computing-mobility/cloud-security/neubird-ai-expands-into-autonomous-operations-with-predictive-production-agent/" data-wpel-link="internal">NeuBird AI Expands into Autonomous Operations with Predictive Production Agent</a> appeared first on <a href="https://itdigest.com" data-wpel-link="internal">ITDigest</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>HENNGE Launches Endpoint &#038; Managed Security to Strengthen Cloud Security Portfolio</title>
		<link>https://itdigest.com/cloud-computing-mobility/cloud-security/hennge-launches-endpoint-managed-security-to-strengthen-cloud-security-portfolio/</link>
		
		<dc:creator><![CDATA[ITDigest Bureau]]></dc:creator>
		<pubDate>Fri, 03 Apr 2026 11:31:18 +0000</pubDate>
				<category><![CDATA[Cloud Computing & Mobility ]]></category>
		<category><![CDATA[Cloud Security]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[cloud security]]></category>
		<category><![CDATA[Cloud Security Portfolio]]></category>
		<category><![CDATA[Endpoint & Managed Security]]></category>
		<category><![CDATA[endpoint detection and response]]></category>
		<category><![CDATA[Endpoint Protection]]></category>
		<category><![CDATA[Endpoint Security]]></category>
		<category><![CDATA[HENNGE]]></category>
		<category><![CDATA[ITDigest]]></category>
		<category><![CDATA[managed security]]></category>
		<category><![CDATA[news]]></category>
		<category><![CDATA[threat detection]]></category>
		<guid isPermaLink="false">https://itdigest.com/?p=79241</guid>

					<description><![CDATA[<p>HENNGE Inc. is enlarging its cloud security portfolio by unveiling Endpoint &#38; Managed Security, a new product aimed at providing not only endpoint protection but also integrated threat detection and managed response features. The company is leveraging their existing HENNGE One platform to develop this product. This move is also their formal entry into the [&#8230;]</p>
<p>The post <a href="https://itdigest.com/cloud-computing-mobility/cloud-security/hennge-launches-endpoint-managed-security-to-strengthen-cloud-security-portfolio/" data-wpel-link="internal">HENNGE Launches Endpoint &#038; Managed Security to Strengthen Cloud Security Portfolio</a> appeared first on <a href="https://itdigest.com" data-wpel-link="internal">ITDigest</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>HENNGE Inc. is enlarging its cloud security portfolio by unveiling Endpoint &amp; Managed Security, a new product aimed at providing not only endpoint protection but also integrated threat detection and managed response features. The company is leveraging their existing HENNGE One platform to develop this product. This move is also their formal entry into the endpoint detection and response (EDR) and managed detection and response (MDR) markets.</p>
<p>The newly released product combines several security features within a single package, including endpoint protection, immediate threat detection, vulnerability discovery, and managed continuous monitoring. Through the integration of these capabilities, HENNGE is aiming to not only reduce the burden on IT departments but also to upgrade the security of businesses against cyber threats which are constantly becoming more ingenious and sophisticated.</p>
<p>A major distinguishing aspect of the platform is that it concentrates on securing the entire chain of the user journeyfrom prevention to response. Apart from detecting threats, the solution is also performing ongoing vulnerability scans on both the endpoints and external-facing assets, thereby enabling the help of organizations in risk identification and mitigation. This sort of proactive method is in line with zero-trust security models which maintain an emphasis on continuous monitoring and danger reduction at all points of access.</p>
<p>The security offering goes further still, by helping to ease a very real issue of enterprise security today: the lack of adequately skilled cybersecurity professionals. Actually, many organizations are faced with such a high volume of alerts being generated by traditional EDR tools, that it becomes difficult to effectively deal with them in time, thereby increasing the risk exposure as well. In this regard, HENNGE&#8217;s fully managed service model puts those tasks aside for the experienced team who, on a 24/7 basis monitor analyze, and respond to threats.</p>
<h3>Implications for the IT Industry</h3>
<p>HENNGE&#8217;s introduction is a case of how the whole IT industry is moving towards integrated, managed security platforms. Cyber crimes are becoming more and more complex, widely spread and hybrid working and cloud adoption are making things even worse. So, traditional point solutions are no longer enough.</p>
<p>Their entry into EDR and MDR further points to the fact that security ecosystems that combine detection, prevention, and response in one single framework are the future. IT executives will now have to think about automation, real-time monitoring, and zero-trust architecture implementation as part of their new security strategy.</p>
<p>Managed services, on the other hand, reveal another major change in the industry: security operations are being delegated to specialized providers. As globally there is a shortfall in cybersecurity professionals, managed detection and response solutions are turning out to be a necessity for organizations to be able to defend well without adding too many internal employees.</p>
<p>The combination of vulnerability assessment and attack surface management with endpoint security is yet another indication of a change in mentality toward cybersecurity that is one step ahead. To be clear, instead of merely doing damage control after the fact, IT personnel have to step up their game to predict and prevent risk even before the breach has occurred.</p>
<h3>Business Impact and Strategic Value</h3>
<p>Endpoint Managed Security is a big step forward for businesses wanting to streamline their cybersecurity efforts. By integrating various security measures within one platform, enterprises can ease complexity, cut down operating expenses, and uplift their security status.</p>
<p>Real-time threat detection and response mean lesser interference and cyber-attack-related damages both monetarily and in terms of one&#8217;s reputation. Industries that require safeguarding their data, such as banking, medical, and online shopping areas, especially find this feature indispensable.</p>
<p>In addition, the managed service approach makes it possible for companies to increase their security measures without the need for highly skilled personnel inside. Small and medium businesses, which especially do not have any cybersecurity specialists but encounter the same threats as bigger companies, would greatly benefit from this.</p>
<h3>Advancing Toward Proactive, Managed Security</h3>
<p><a href="https://hennge.com/global/" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer sponsored ugc">HENNGE</a>’s expansion into endpoint managed security highlights a key transformation in enterprise technology: the move from fragmented, reactive defenses to holistic, proactive security ecosystems. By combining endpoint intelligence, continuous monitoring, and expert-led response, the company is positioning its platform as a comprehensive solution for modern cybersecurity challenges.</p>
<p>As organizations continue to embrace cloud-first strategies and distributed work environments, solutions like this will play a critical role in enabling secure, resilient operations—reshaping how both IT teams and businesses approach cybersecurity in an increasingly complex digital landscape.</p>
<p>The post <a href="https://itdigest.com/cloud-computing-mobility/cloud-security/hennge-launches-endpoint-managed-security-to-strengthen-cloud-security-portfolio/" data-wpel-link="internal">HENNGE Launches Endpoint &#038; Managed Security to Strengthen Cloud Security Portfolio</a> appeared first on <a href="https://itdigest.com" data-wpel-link="internal">ITDigest</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Token Launches TokenCore Node: Setting a New Standard for Biometric Identity Assurance</title>
		<link>https://itdigest.com/cloud-computing-mobility/cloud-security/token-launches-tokencore-node-setting-a-new-standard-for-biometric-identity-assurance/</link>
		
		<dc:creator><![CDATA[News Desk]]></dc:creator>
		<pubDate>Mon, 30 Mar 2026 12:44:13 +0000</pubDate>
				<category><![CDATA[Cloud Computing & Mobility ]]></category>
		<category><![CDATA[Cloud Security]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Biometric Identity Assurance]]></category>
		<category><![CDATA[cloud dependency]]></category>
		<category><![CDATA[cloud security]]></category>
		<category><![CDATA[ITDigest]]></category>
		<category><![CDATA[New York]]></category>
		<category><![CDATA[Token]]></category>
		<category><![CDATA[TokenCore Node]]></category>
		<guid isPermaLink="false">https://itdigest.com/?p=79063</guid>

					<description><![CDATA[<p>Token, the biometric identity assurance company, announced the TokenCore Node at RSA Conference 2026 – a compact biometric authenticator designed for organizations that require local cryptographic processing, zero cloud dependency, and support for air-gapped environments. Founded in 2014 and backed by Grand Oaks Capital, Token has spent over a decade building identity infrastructure for government [&#8230;]</p>
<p>The post <a href="https://itdigest.com/cloud-computing-mobility/cloud-security/token-launches-tokencore-node-setting-a-new-standard-for-biometric-identity-assurance/" data-wpel-link="internal">Token Launches TokenCore Node: Setting a New Standard for Biometric Identity Assurance</a> appeared first on <a href="https://itdigest.com" data-wpel-link="internal">ITDigest</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Token, the biometric identity assurance company, announced the TokenCore Node at RSA Conference 2026 – a compact biometric authenticator designed for organizations that require local cryptographic processing, zero cloud dependency, and support for air-gapped environments.</p>
<p>Founded in 2014 and backed by Grand Oaks Capital, Token has spent over a decade building identity infrastructure for government and enterprise organizations operating in high-security environments.</p>
<p>Credential compromise remains the leading cause of enterprise breaches – and the rise of agentic AI is accelerating the problem. For defense contractors, critical infrastructure operators, and highly regulated institutions, the risk is even greater: their most sensitive systems cannot depend on cloud-based authentication. The shift to biometric identity assurance is already underway, because credential-based authentication can no longer adequately protect the systems that matter most.</p>
<p>“AI isn’t creating new weaknesses – it’s exposing the ones we’ve always had,” said Kevin Surace, Chief Executive Officer of Token. “The TokenCore Node brings easy-to-use cryptographic biometric identity assurance into air-gapped and classified environments for the first time. Organizations should not have to choose between the strongest authentication available and the constraints of their most critical systems. The shift is already underway, and the organizations moving now will be the ones best protected.”</p>
<h4><strong>Also Read: <a class="p-url" href="https://itdigest.com/cloud-computing-mobility/cloud-security/iboss-introduces-ai-powered-casb-to-address-security-risks-in-the-vibe-coding-era/" target="_self" rel="bookmark" data-wpel-link="internal">iboss Introduces AI-Powered CASB to Address Security Risks in the “Vibe Coding” Era</a></strong></h4>
<p>Surace holds 95 worldwide patents and has been named Inc. Magazine’s Entrepreneur of the Year, a CNBC Top Innovator of the Decade, and a World Economic Forum Tech Pioneer.</p>
<p>The TokenCore Node measures 31mm in diameter and 7.3mm thin and weighs only 13 grams, with a ceramic top cover, integrated fingerprint sensor, battery and LED status indicators. It connects via encrypted Bluetooth low energy and is designed for everyday carry-in badge holders, retractable reels, back-of-phone and keychain accessories. It is dust- and water-resistant. The Node is a testament to Token’s commitment to launching market defining technology with leading-edge biometric identity assurance.</p>
<p>Unlike traditional MFA, which layers additional factors onto credential-based systems, TokenCore binds access directly to a verified, physically present individual through on-device biometric authentication enforced by secure hardware. Fingerprints never leave the device. Cryptographic keys are generated and stored on-device and are never exported – eliminating credentials that can be phished, stolen, or replayed. And the user must be within 3 feet of the device logging in. No remote activation is possible.</p>
<p>With the addition of the TokenCore Node, Token’s product line now includes:</p>
<p class="bwmarginl1"><b>— TokenCore Wearable: </b>Ring form factor. Wireless biometric authentication for privileged users, executives, and remote teams requiring fast, frictionless access across multiple workstations.</p>
<p class="bwmarginl1"><b>— TokenCore Portable: </b>Wireless “stick” form factor with integrated fingerprint sensor, Bluetooth, and NFC. Biometric assurance in a portable format for environments where wearing a ring is not desired or operationally practical.</p>
<p class="bwmarginl1"><b>— TokenCore Node: </b>Small disc form factor with ceramic construction and secure local wireless. Designed for lanyard, badge holder, and keychain carry in any environment including air-gapped, high-security, and mobile environments.</p>
<p class="bwmarginl1"><b>— </b><b>TokenCore Control: </b>SaaS solution manages 1000’s of Token devices in all form factors across the enterprise or agency and can be installed securely on-prem.</p>
<p>The <a href="https://www.tokencore.com/" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer sponsored ugc">TokenCore</a> product line integrates with existing IAM, SSO, and PAM infrastructure. It does not replace the identity stack; it completes it.</p>
<p><strong>Source: <a href="https://www.businesswire.com/news/home/20260326285406/en/Token-Launches-TokenCore-Node-Setting-a-New-Standard-for-Biometric-Identity-Assurance" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer sponsored ugc">BusinessWire</a></strong></p>
<p>The post <a href="https://itdigest.com/cloud-computing-mobility/cloud-security/token-launches-tokencore-node-setting-a-new-standard-for-biometric-identity-assurance/" data-wpel-link="internal">Token Launches TokenCore Node: Setting a New Standard for Biometric Identity Assurance</a> appeared first on <a href="https://itdigest.com" data-wpel-link="internal">ITDigest</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>SentinelOne and Google Cloud Deepen Alliance to Advance AI-Native Cybersecurity</title>
		<link>https://itdigest.com/cloud-computing-mobility/cloud-security/sentinelone-and-google-cloud-deepen-alliance-to-advance-ai-native-cybersecurity/</link>
		
		<dc:creator><![CDATA[ITDigest Bureau]]></dc:creator>
		<pubDate>Thu, 26 Mar 2026 11:09:08 +0000</pubDate>
				<category><![CDATA[Cloud Computing & Mobility ]]></category>
		<category><![CDATA[Cloud Security]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[AI-native cybersecurity]]></category>
		<category><![CDATA[cloud security]]></category>
		<category><![CDATA[Google Cloud]]></category>
		<category><![CDATA[Google Security Operations]]></category>
		<category><![CDATA[Google Threat Intelligence]]></category>
		<category><![CDATA[ITDigest]]></category>
		<category><![CDATA[news]]></category>
		<category><![CDATA[SentinelOne]]></category>
		<category><![CDATA[threat intelligence.]]></category>
		<guid isPermaLink="false">https://itdigest.com/?p=78999</guid>

					<description><![CDATA[<p>SentinelOne has announced an expanded multi-year collaboration with Google Cloud to deliver autonomous, AI-powered security solutions designed for global enterprise environments. The partnership builds on an existing relationship, with integrations already spanning Google Security Operations, Google Threat Intelligence, and Chrome Enterprise. The enhanced collaboration will combine SentinelOne’s endpoint detection and response (EDR) capabilities, AI security [&#8230;]</p>
<p>The post <a href="https://itdigest.com/cloud-computing-mobility/cloud-security/sentinelone-and-google-cloud-deepen-alliance-to-advance-ai-native-cybersecurity/" data-wpel-link="internal">SentinelOne and Google Cloud Deepen Alliance to Advance AI-Native Cybersecurity</a> appeared first on <a href="https://itdigest.com" data-wpel-link="internal">ITDigest</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>SentinelOne has announced an expanded multi-year collaboration with Google Cloud to deliver autonomous, AI-powered security solutions designed for global enterprise environments. The partnership builds on an existing relationship, with integrations already spanning Google Security Operations, Google Threat Intelligence, and Chrome Enterprise.</p>
<p>The enhanced collaboration will combine SentinelOne’s endpoint detection and response (EDR) capabilities, AI security for applications and agents, and its AI-native Singularity Platform with Google Cloud’s large-scale infrastructure and advanced threat intelligence. The goal is to provide organizations with a unified approach to defending increasingly complex digital ecosystems while supporting secure AI adoption.</p>
<p>&#8220;Security teams are under growing pressure to defend increasingly complex environments and protect their highly sensitive data while reducing operational friction,&#8221; said Melissa Smith, SVP of Global Strategic Partnerships &amp; Initiatives at SentinelOne. &#8220;With Google Cloud, we have chosen a highly secure and sophisticated platform for a data sovereignty strategy, and a strategic partner for intelligence sharing. By bringing together Google&#8217;s renowned global threat intelligence, leading AI innovation and world-class cloud data infrastructure with SentinelOne&#8217;s autonomous security platform and AI-powered runtime protection, we can give customers the ultimate operating advantage for the AI era.&#8221;</p>
<h4><strong>Also Read: <a class="p-url" href="https://itdigest.com/cloud-computing-mobility/cloud-security/zero-networks-unveils-kubernetes-access-matrix-to-strengthen-cluster-security-and-reduce-risk/" target="_self" rel="bookmark" data-wpel-link="internal">Zero Networks Unveils Kubernetes Access Matrix to Strengthen Cluster Security and Reduce Risk</a></strong></h4>
<p>As part of this partnership, SentinelOne is extending the footprint of its solution in major Google Cloud regions such as North America, Frankfurt, and Saudi Arabia. This is intended to enable enterprises to achieve their data sovereignty needs while maintaining consistent security coverage.</p>
<p>&#8220;“Our collaboration with <a href="https://www.sentinelone.com/" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer sponsored ugc">SentinelOne</a> focuses on delivering integrated solutions that support data sovereignty requirements and enable the secure adoption of generative AI,” said Satish Thomas, VP of <a href="https://cloud.google.com/" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer sponsored ugc">Google Cloud</a>. “By combining Google Cloud&#8217;s global scale, deep threat intelligence, and advanced AI with SentinelOne&#8217;s AI-native security platform, we can help customers to strengthen their cyber defense and innovate securely.”</p>
<p>The partnership shows a shift away from old security tools. These tools often can&#8217;t keep up with AI-driven threats. The companies aim to help organizations upgrade their security systems. They do this by combining autonomous detection, real-time intelligence, and cloud-native scalability. This will reduce complexity and improve protection for endpoints and AI systems.</p>
<p>The post <a href="https://itdigest.com/cloud-computing-mobility/cloud-security/sentinelone-and-google-cloud-deepen-alliance-to-advance-ai-native-cybersecurity/" data-wpel-link="internal">SentinelOne and Google Cloud Deepen Alliance to Advance AI-Native Cybersecurity</a> appeared first on <a href="https://itdigest.com" data-wpel-link="internal">ITDigest</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>P0 Security and Zscaler Partner to Strengthen Zero Trust with Dynamic Authorization</title>
		<link>https://itdigest.com/quick-byte/p0-security-and-zscaler-partner-to-strengthen-zero-trust-with-dynamic-authorization/</link>
		
		<dc:creator><![CDATA[ITDigest Bureau]]></dc:creator>
		<pubDate>Wed, 25 Mar 2026 11:38:50 +0000</pubDate>
				<category><![CDATA[Cloud Computing & Mobility ]]></category>
		<category><![CDATA[Cloud Security]]></category>
		<category><![CDATA[Quick Byte]]></category>
		<category><![CDATA[cloud infrastructure]]></category>
		<category><![CDATA[cloud security]]></category>
		<category><![CDATA[Dynamic Authorization]]></category>
		<category><![CDATA[identity-based connectivity]]></category>
		<category><![CDATA[ITDigest]]></category>
		<category><![CDATA[news]]></category>
		<category><![CDATA[P0 Security]]></category>
		<category><![CDATA[Zero Trust]]></category>
		<category><![CDATA[Zscaler]]></category>
		<guid isPermaLink="false">https://itdigest.com/?p=78962</guid>

					<description><![CDATA[<p>P0 Security has announced a technology partnership with Zscaler to extend Zero Trust access to modern production environments, combining identity-based connectivity with dynamic, policy-driven authorization. The collaboration, part of the Zscaler Technology Alliances Program, aims to help organizations reduce standing privilege across on-premises and cloud infrastructure by governing what users, workloads, and AI agents are [&#8230;]</p>
<p>The post <a href="https://itdigest.com/quick-byte/p0-security-and-zscaler-partner-to-strengthen-zero-trust-with-dynamic-authorization/" data-wpel-link="internal">P0 Security and Zscaler Partner to Strengthen Zero Trust with Dynamic Authorization</a> appeared first on <a href="https://itdigest.com" data-wpel-link="internal">ITDigest</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>P0 Security has announced a technology partnership with Zscaler to extend Zero Trust access to modern production environments, combining identity-based connectivity with dynamic, policy-driven authorization. The collaboration, part of the Zscaler Technology Alliances Program, aims to help organizations reduce standing privilege across on-premises and cloud infrastructure by governing what users, workloads, and AI agents are allowed to do once access is established. “Zero Trust must extend beyond verifying who can connect to an application or environment. Organizations also need confidence in what users and services are authorized to do once access is established,” said Omer Ansari, Sr. Director, Technology Alliances at Zscaler.</p>
<h4><strong>Also Read: <a class="p-url" href="https://itdigest.com/quick-byte/rafay-systems-and-ddn-collaborate-to-simplify-enterprise-ai-infrastructure-deployment/" target="_self" rel="bookmark" data-wpel-link="internal">Rafay Systems and DDN Collaborate to Simplify Enterprise AI Infrastructure Deployment</a></strong></h4>
<p>Traditional static permission models often rely on persistent credentials, broad IAM roles, or shared accounts, creating security risks and operational inefficiencies. P0 Security’s Authz Control Plane<img src="https://s.w.org/images/core/emoji/17.0.2/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" /> enables short-lived, task-specific permissions that are automatically revoked when work is complete. “Modern infrastructure moves too quickly for static access models – especially as we enter this agentic era,” said Neha Duggal, Chief Product Officer at P0 Security. The partnership provides enterprises with stronger, real-time control over sensitive resources while supporting Zero Standing Privilege for humans and autonomous systems alike.</p>
<h4><strong>Read More: <a href="https://www.businesswire.com/news/home/20260324217847/en/P0-Security-Announces-Technology-Partnership-with-Zscaler-to-Advance-Zero-Trust-for-Private-Resources" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer sponsored ugc">P0 Security Announces Technology Partnership with Zscaler to Advance Zero Trust for Private Resources</a></strong></h4>
<p>The post <a href="https://itdigest.com/quick-byte/p0-security-and-zscaler-partner-to-strengthen-zero-trust-with-dynamic-authorization/" data-wpel-link="internal">P0 Security and Zscaler Partner to Strengthen Zero Trust with Dynamic Authorization</a> appeared first on <a href="https://itdigest.com" data-wpel-link="internal">ITDigest</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Zero Networks Unveils Kubernetes Access Matrix to Strengthen Cluster Security and Reduce Risk</title>
		<link>https://itdigest.com/cloud-computing-mobility/cloud-security/zero-networks-unveils-kubernetes-access-matrix-to-strengthen-cluster-security-and-reduce-risk/</link>
		
		<dc:creator><![CDATA[ITDigest Bureau]]></dc:creator>
		<pubDate>Wed, 25 Mar 2026 11:38:42 +0000</pubDate>
				<category><![CDATA[Cloud Computing & Mobility ]]></category>
		<category><![CDATA[Cloud Security]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[cloud security]]></category>
		<category><![CDATA[Cluster Security]]></category>
		<category><![CDATA[ITDigest]]></category>
		<category><![CDATA[Kubernetes Access Matrix]]></category>
		<category><![CDATA[Kubernetes connectivity]]></category>
		<category><![CDATA[news]]></category>
		<category><![CDATA[operational risk]]></category>
		<category><![CDATA[Reduce Risk]]></category>
		<category><![CDATA[Zero Networks]]></category>
		<guid isPermaLink="false">https://itdigest.com/?p=78956</guid>

					<description><![CDATA[<p>Zero Networks has introduced its Kubernetes Access Matrix, a visual control layer intended to assist security and DevOps teams in comprehending and managing Kubernetes connectivity on a large scale. This additional feature immediately displays permitted and prohibited traffic paths within clusters, helping teams get a clearer picture of access relationships without the need for YAML [&#8230;]</p>
<p>The post <a href="https://itdigest.com/cloud-computing-mobility/cloud-security/zero-networks-unveils-kubernetes-access-matrix-to-strengthen-cluster-security-and-reduce-risk/" data-wpel-link="internal">Zero Networks Unveils Kubernetes Access Matrix to Strengthen Cluster Security and Reduce Risk</a> appeared first on <a href="https://itdigest.com" data-wpel-link="internal">ITDigest</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Zero Networks has introduced its Kubernetes Access Matrix, a visual control layer intended to assist security and DevOps teams in comprehending and managing Kubernetes connectivity on a large scale. This additional feature immediately displays permitted and prohibited traffic paths within clusters, helping teams get a clearer picture of access relationships without the need for YAML parsing, manual configuration, or guesswork.</p>
<p>According to the company, Kubernetes security generally ends up disconnected as the implementation of network policy, which is a centralized security team&#8217;s responsibility, hands over to DevOps and developers. With an increasing number of clusters, the expansion of namespaces, labels, and various policies, it gets more difficult to figure out what is actually being enforced and what extent an attacker could move if a system is compromised. The Access Matrix aims to eliminate this visibility gap by converting complicated Kubernetes Network Policies into one single and very easy-to-read matrix, which depicts how namespaces, applications, and workloads interaction occurs.</p>
<p>“Kubernetes doesn’t fail security teams because it is inherently insecure,” said Benny Lakunishok, CEO at Zero Networks. “It fails because access becomes opaque at scale. When you cannot clearly see what can talk to what, you cannot control blast radius. The Kubernetes Access Matrix makes every connection visible and understandable in seconds, so organizations can reduce risk before an attacker exploits it. Built for InfoSec, SecOps, NetOps, and DevSecOps, it bridges the communication gap between groups to turn fragmented oversight into shared accountability.”</p>
<h4><strong>Also Read: <a class="p-url" href="https://itdigest.com/cloud-computing-mobility/cloud-security/iboss-introduces-ai-powered-casb-to-address-security-risks-in-the-vibe-coding-era/" target="_self" rel="bookmark" data-wpel-link="internal">iboss Introduces AI-Powered CASB to Address Security Risks in the “Vibe Coding” Era</a></strong></h4>
<p>The launch comes as threat actors increasingly target new clusters within minutes of deployment. Research done by Zero Networks indicates that an attacker can scan an AKS cluster within 18 minutes of its creation and an EKS cluster within 28 minutes. Gartner has also pointed out that Kubernetes is being slowed by skills gaps and immature DevOps practices.</p>
<p>According to <a href="https://zeronetworks.com/" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer sponsored ugc">Zero Networks</a>, the Access Matrix automatically detects existing policies shortly after onboarding and displays namespace-to-namespace, workload-to-workload, and egress flows with color-coded indicators for full access, partial access, explicit deny, and no policy. Teams can drill into each connection to see the exact policies, labels, workloads, and ports involved.</p>
<p>Beyond visibility, the tool is intended to serve as an enforcement foundation, allowing organizations to validate policy changes before deployment and reduce risky access paths before they reach production.</p>
<p>The post <a href="https://itdigest.com/cloud-computing-mobility/cloud-security/zero-networks-unveils-kubernetes-access-matrix-to-strengthen-cluster-security-and-reduce-risk/" data-wpel-link="internal">Zero Networks Unveils Kubernetes Access Matrix to Strengthen Cluster Security and Reduce Risk</a> appeared first on <a href="https://itdigest.com" data-wpel-link="internal">ITDigest</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>iboss Introduces AI-Powered CASB to Address Security Risks in the “Vibe Coding” Era</title>
		<link>https://itdigest.com/cloud-computing-mobility/cloud-security/iboss-introduces-ai-powered-casb-to-address-security-risks-in-the-vibe-coding-era/</link>
		
		<dc:creator><![CDATA[ITDigest Bureau]]></dc:creator>
		<pubDate>Tue, 24 Mar 2026 11:55:52 +0000</pubDate>
				<category><![CDATA[Cloud Computing & Mobility ]]></category>
		<category><![CDATA[Cloud Security]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[application development]]></category>
		<category><![CDATA[Cloud Access Security Broker]]></category>
		<category><![CDATA[cloud applications]]></category>
		<category><![CDATA[cloud environments]]></category>
		<category><![CDATA[cloud security]]></category>
		<category><![CDATA[iboss]]></category>
		<category><![CDATA[ITDigest]]></category>
		<category><![CDATA[news]]></category>
		<category><![CDATA[security risks]]></category>
		<category><![CDATA[Vibe Code Era]]></category>
		<guid isPermaLink="false">https://itdigest.com/?p=78923</guid>

					<description><![CDATA[<p>iboss has unveiled a new AI-powered Cloud Access Security Broker (CASB), designed to secure rapidly evolving cloud environments shaped by the rise of generative AI-driven application development. Announced at the RSA Conference, the solution targets what the company describes as the “vibe coding” era—where users can create functional cloud applications in minutes using AI tools, [&#8230;]</p>
<p>The post <a href="https://itdigest.com/cloud-computing-mobility/cloud-security/iboss-introduces-ai-powered-casb-to-address-security-risks-in-the-vibe-coding-era/" data-wpel-link="internal">iboss Introduces AI-Powered CASB to Address Security Risks in the “Vibe Coding” Era</a> appeared first on <a href="https://itdigest.com" data-wpel-link="internal">ITDigest</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p data-start="89" data-end="510">iboss has unveiled a new AI-powered Cloud Access Security Broker (CASB), designed to secure rapidly evolving cloud environments shaped by the rise of generative AI-driven application development. Announced at the RSA Conference, the solution targets what the company describes as the “vibe coding” era—where users can create functional cloud applications in minutes using AI tools, often outside traditional IT oversight.</p>
<p data-start="512" data-end="940">This surge in AI-generated applications has exposed limitations in conventional CASB models, which rely heavily on predefined app catalogs and API-based integrations. These approaches struggle to detect or secure newly created applications that lack established signatures or interfaces. iboss’s new CASB aims to overcome these constraints with a signatureless architecture that identifies and governs applications in real time.</p>
<p data-start="942" data-end="1331">“The era of the app catalog is over,” said Paul Martini, CEO of iboss. “Our AI-Powered CASB reads fully-rendered page content, identifies every file upload field, every form, every share button, and dynamically controls them in real time. We protect from the network to the app — whether that application was built by a Fortune 500 company or vibe-coded into existence thirty seconds ago.”</p>
<h4 data-start="942" data-end="1331"><strong>Also Read: <a class="p-url" href="https://itdigest.com/cloud-computing-mobility/cloud-security/coralogix-and-skyflow-partner-to-deliver-privacy-safe-observability-for-ai-driven-enterprises/" target="_self" rel="bookmark" data-wpel-link="internal">Coralogix and Skyflow Partner to Deliver Privacy-Safe Observability for AI-Driven Enterprises</a></strong></h4>
<p data-start="1333" data-end="1779">The platform uses machine learning to analyze traffic patterns and discover applications as they emerge, assigning risk scores based on both legitimacy and potential data exposure. It also introduces real-time control at the Document Object Model (DOM) level, enabling organizations to enforce policies such as blocking file uploads, restricting data sharing, and preventing sensitive information from being pasted into unauthorized applications.</p>
<p data-start="1781" data-end="2062">Additionally, the solution offers comprehensive monitoring of interactions with generative AI platforms, including chat-based tools. It captures and analyzes conversations across major AI services while applying data loss prevention (DLP) policies to protect sensitive information.</p>
<p data-start="2064" data-end="2227">The platform also identifies “shadow AI” usage and embedded AI features within applications, providing unified visibility across cloud, endpoint, and API layers.</p>
<p data-start="2229" data-end="2469" data-is-last-node="" data-is-only-node="">With its AI-native design, <a href="https://www.iboss.com/" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer sponsored ugc">iboss</a> positions the new CASB as a response to the growing complexity of cloud security, enabling enterprises to maintain control and compliance in an increasingly decentralized and AI-driven application landscape.</p>
<p>The post <a href="https://itdigest.com/cloud-computing-mobility/cloud-security/iboss-introduces-ai-powered-casb-to-address-security-risks-in-the-vibe-coding-era/" data-wpel-link="internal">iboss Introduces AI-Powered CASB to Address Security Risks in the “Vibe Coding” Era</a> appeared first on <a href="https://itdigest.com" data-wpel-link="internal">ITDigest</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Netacea launches Trust Layer for enterprises operating in the agentic economy</title>
		<link>https://itdigest.com/cloud-computing-mobility/cloud-security/netacea-launches-trust-layer-for-enterprises-operating-in-the-agentic-economy/</link>
		
		<dc:creator><![CDATA[News Desk]]></dc:creator>
		<pubDate>Tue, 24 Mar 2026 11:55:48 +0000</pubDate>
				<category><![CDATA[Cloud Computing & Mobility ]]></category>
		<category><![CDATA[Cloud Security]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[agentic economy]]></category>
		<category><![CDATA[AI Agents]]></category>
		<category><![CDATA[bot management]]></category>
		<category><![CDATA[Cloud Computing & Mobility]]></category>
		<category><![CDATA[cloud security]]></category>
		<category><![CDATA[ITDigest]]></category>
		<category><![CDATA[Netacea]]></category>
		<category><![CDATA[news]]></category>
		<category><![CDATA[Trust Layer]]></category>
		<guid isPermaLink="false">https://itdigest.com/?p=78920</guid>

					<description><![CDATA[<p>Netacea has launched a new Trust Layer to help enterprises operate more safely and effectively as AI agents and other forms of automation become a more common part of the web. The launch reflects a broader shift in how organisations need to think about digital traffic. Where bot management has traditionally focused on malicious automation, enterprises are now [&#8230;]</p>
<p>The post <a href="https://itdigest.com/cloud-computing-mobility/cloud-security/netacea-launches-trust-layer-for-enterprises-operating-in-the-agentic-economy/" data-wpel-link="internal">Netacea launches Trust Layer for enterprises operating in the agentic economy</a> appeared first on <a href="https://itdigest.com" data-wpel-link="internal">ITDigest</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Netacea has launched a new Trust Layer to help enterprises operate more safely and effectively as AI agents and other forms of automation become a more common part of the web.</p>
<p>The launch reflects a broader shift in how organisations need to think about digital traffic. Where bot management has traditionally focused on malicious automation, enterprises are now dealing with a wider mix of automated actors, including AI agents, crawlers, scrapers, partner automation, and malicious bots, each with different levels of legitimacy, risk, and operational impact.</p>
<p>For years, Netacea has helped enterprises classify web traffic server-side, distinguish between legitimate and malicious automation, and apply appropriate controls without disrupting genuine users. The Trust Layer builds on that foundation, extending the same visibility and governance model into an internet increasingly shaped by machine-driven interaction.</p>
<p>Netacea analyses billions of behavioural signals in real time to help organisations reduce fraud, account takeover, scraping, abuse, and distorted digital signals, while giving them a clearer understanding of who, or what, is interacting with their services.</p>
<h4><strong>Also Read: <a class="p-url" href="https://itdigest.com/cloud-computing-mobility/cloud-security/red-access-turns-any-firewall-into-an-ai-ready-security-platform/" target="_self" rel="bookmark" data-wpel-link="internal">Red Access Turns Any Firewall Into an AI-Ready Security Platform</a></strong></h4>
<p>Built for large-scale ecommerce, financial services, media, and other digital-first environments, Netacea&#8217;s server-side approach allows automated traffic to be classified before it reaches the application. This gives enterprises a stronger basis for decision-making, allowing them to permit and optimise access for trusted automation, increase scrutiny where trust is not yet established, and mitigate against malicious or unwanted activity.</p>
<p>The Trust Layer is supported by Netacea&#8217;s threat intelligence capabilities and by the recently updated BLADE, the Business Logic Abuse Definition Framework. Originally created by Netacea with support from leading industry specialists and donated to OWASP, BLADE provides a shared framework for understanding how automated activity and business logic abuse affect modern digital services.</p>
<p>&#8220;At its core, this is still the problem <a href="https://netacea.com/" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer sponsored ugc">Netacea</a> has always solved, understanding who, or what, is interacting with a digital service, and helping enterprises decide what to trust, what to challenge, and what to control,&#8221; said Andy Still, Chief Technology Officer and Co-Founder at Netacea. &#8220;What has changed is the nature of the web. Enterprises are now seeing a broader mix of automated actors, including AI agents, crawlers, scrapers, and malicious automation, all interacting with systems in different ways and for different purposes. Because Netacea has been classifying web traffic server-side for years, we are well placed to help customers extend that same visibility and governance into the agentic era.&#8221;</p>
<p><strong>Source: <a href="https://www.prnewswire.com/news-releases/netacea-launches-trust-layer-for-enterprises-operating-in-the-agentic-economy-302722280.html" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer sponsored ugc">PRNewswire</a></strong></p>
<p>The post <a href="https://itdigest.com/cloud-computing-mobility/cloud-security/netacea-launches-trust-layer-for-enterprises-operating-in-the-agentic-economy/" data-wpel-link="internal">Netacea launches Trust Layer for enterprises operating in the agentic economy</a> appeared first on <a href="https://itdigest.com" data-wpel-link="internal">ITDigest</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
