logo
#

Latest news with #NHIs

Saviynt Showcases the Only Converged Identity Security Platform for All Identities – Human and Non-Human
Saviynt Showcases the Only Converged Identity Security Platform for All Identities – Human and Non-Human

Yahoo

time5 days ago

  • Business
  • Yahoo

Saviynt Showcases the Only Converged Identity Security Platform for All Identities – Human and Non-Human

The company will demonstrate its enhanced Identity Cloud capabilities that secures all identities and will present compelling industry insights in four speaking engagements at the conference LOS ANGELES, May 29, 2025--(BUSINESS WIRE)--Saviynt, a leading provider of cloud-native identity and governance solutions, announced today that it now protects all forms of organizational identities, including Non-Human Identities (NHI). The company has expanded its identity security cloud platform to protect NHIs such as workloads, bots, and credentials. This is in addition to the existing capability of supporting NHI service accounts. The announcement was made just before Identiverse 2025, set for June 3-6 in Las Vegas, where Saviynt executives will lead a workshop on NHI. "Our mission has been to secure every identity," said Paul Zolfaghari, president at Saviynt. "With Saviynt's Identity Cloud, we are delivering a converged platform that protects the entire modern enterprise – from their employee workforce to their external partners, from their cloud workloads to their AI agents. Saviynt has demonstrated it is a complete solution. We are agnostic about the type of identities, we manage them all. This is the future of identity security." As the authority in identity security, Saviynt will spotlight its latest innovations in NHI protection – integrated within its converged platform, The Identity Cloud. Attendees can visit booth #638 to see firsthand how Saviynt is redefining enterprise security by delivering converged, scalable protection through a single pane of glass for all digital identities – human and non-human – at scale. As organizations embrace automation, AI, and cloud-native development, NHIs now vastly outnumber human users – by as much as 100:1 in DevOps environments. Saviynt's Identity Cloud delivers full visibility, posture management, and actionable recommendations for all identities, enabling enterprises to discover and secure every NHI, including workloads, bots, and credentials. The platform extends its best-in-class controls to NHIs, offering deep insight into activity history, usage patterns, and prioritized risk insights – all without the need for additional tools or complex configurations. Saviynt's NHI capabilities are purpose-built to simplify and secure the most complex identity environments, helping organizations eliminate blind spots across cloud and hybrid ecosystems. The platform enables teams to: Discover all non-human identities and their access in a unified view: Get complete, real-time inventory of your non-human identity landscape. Understand security posture of non-human identities with deep analysis: Granular analysis of non-human identity activity and relationships to surface prioritized identity security and compliance issues. Visualize non-human identity activity with timeline view: Surfaces access events, as well as lifecycle changes, to enable faster response and ensure compliance. The growing demand for a converged, intelligent identity security platform has never been more urgent. With Agentic AI accelerating fast, organizations need a modern identity security foundation with the depth and flexibility to govern the right access for every identity — human or machine, known or emerging. Saviynt is at the forefront of delivering on that need. This leadership is reflected in the company's prominent presence at Identiverse, where five of Saviynt's top executives will share their expertise on the most pressing identity challenges and innovations, including how to drive the next wave of innovation to meet the significant identity challenges introduced by Agentic AI. Attendees can attend these expert-led sessions featuring Saviynt executives and customers: Non-Human Identity WorkshopEhud Amiri, vice president of product management and Henrique Teixeira, senior vice president of strategy | 9:00 a.m – 12:00 p.m. PT on June 3 | Mandalay Bay HAmiri and Teixeira will lead a deep-dive workshop exploring the critical importance of securing NHIs, such as workloads, bots, AI agents, and secrets. Participants will learn about the growing risks NHIs pose to enterprises, especially in light of generative AI developments, and gain practical insights on how to detect, manage, and remediate these risks using Saviynt's NHI Maturity Model and risk-based security approaches. GE Healthcare's Journey to Proactive Identity SecurityVibhuti Sinha, chief product officer, with GE Healthcare's Joey Tyler | 2:35 – 3:00 p.m. PT on June 4 | Breakers JSinha and Tyler share GE Healthcare's transformative approach to Identity Security Posture Management (ISPM). This session highlights how moving from reactive to proactive identity security significantly reduces risks and streamlines compliance efforts. Attendees will gain valuable insights into the practical application of ISPM and the benefits realized by one of the world's largest healthcare providers. B2B-IAM Smackdown: Defending the Future of Partner IdentityJeff Margolies, chief product and strategy officer | 10:30 – 11:20 a.m. PT on June 5Margolies presents a forward-looking session on partner identity security, a critical and often overlooked dimension of enterprise identity management. This talk explores emerging threats in B2B identity, challenges in securing third-party access, and how enterprises can proactively defend their partner ecosystems using Saviynt's converged identity platform. Identity: The Superhero No One Invited to the BoardroomDavid Lee, field chief technology officer | 4:00 – 4:25 p.m. PT on June 5 | Mandalay Bay DLee offers a candid look at why Identity and Access Management (IAM) is the foundational technology "glue" holding modern enterprises together—yet often remains undervalued. He discusses the "Identity Plot Twist" driven by AI, decentralized identity models, and machine identities, and makes a compelling case for elevating IAM's role and budget in enterprise security strategies. After a full day of thought leadership and innovation, join Saviynt at the IDMWorks Identity Happy Hour on Wednesday, June 4, from 6:30 to 8:30 p.m. PT at Flanker Kitchen and Sports Bar in Mandalay Bay. Unwind with craft cocktails, hors d'oeuvres, playoff hockey, and great conversation with identity experts and peers from across the industry. To learn more about Saviynt's presence at Identiverse, please visit the website and blog. About Saviynt Saviynt empowers enterprises to secure their digital transformation, safeguard critical assets, and meet regulatory compliance. With a vision to provide a secure and compliant future for all enterprises, Saviynt is recognized as an industry leader in identity security whose cutting-edge solutions protect the world's leading brands, Fortune 500 companies and government organizations. For more information, please visit View source version on Contacts Press Contact Jacklyn

This cloud stock could break above a 3-year resistance level, charts show
This cloud stock could break above a 3-year resistance level, charts show

CNBC

time06-05-2025

  • Business
  • CNBC

This cloud stock could break above a 3-year resistance level, charts show

We just added Okta to our "fast money" model at Inside Edge Capital ahead of a possible three-year technical resistance breakout, as the company is projected to also reach fundamental profitability this year. OKTA is a leader in the identity and access management (IAM) space. It offers products to secure access within cloud services and remote work, a trend that we now know is not going away. The company is investing in AI to enhance its offerings that safeguard generative AI systems and non-human identities. Specifically, OKTA announced capabilities to help businesses incorporate AI agents and other "non-human identities," or NHIs. Research from Deloitte forecasts that by 2027, 50% of companies using AI will also be using generative AI agents in some way. The company recently got a boost on news it would be added to the S & P 400 midcap index, sending the stock higher by 7%. That put it within reach of the three-year price ceiling around the $115 level. This resistance level has bested the stock 3 times. But in addition to being added to the midcap index, analyst now expect a sharp turnaround in earnings, signaling it might be time to buy. This stock also has an additional tailwind being part of the "Software & Services" group that has several cutting edge companies brining additional addition to these names. In the Active Opps portfolio at Inside Edge Capital, I'm holding a pretty sizable 5.26% allocation from $112.88. Should the broader market stabilize and push through the daily moving averages, I would look to increase my size to around 7% if we get a break through the $115 resistance level and trail stop losses to my original entry price. -Todd Gordon, Founder of Inside Edge Capital, LLC DISCLOSURES: Gordon owns OKTA in his wealth management company Inside Edge Capital, LLC All opinions expressed by the CNBC Pro contributors are solely their opinions and do not reflect the opinions of CNBC, NBC UNIVERSAL, their parent company or affiliates, and may have been previously disseminated by them on television, radio, internet or another medium. THE ABOVE CONTENT IS SUBJECT TO OUR TERMS AND CONDITIONS AND PRIVACY POLICY . THIS CONTENT IS PROVIDED FOR INFORMATIONAL PURPOSES ONLY AND DOES NOT CONSITUTE FINANCIAL, INVESTMENT, TAX OR LEGAL ADVICE OR A RECOMMENDATION TO BUY ANY SECURITY OR OTHER FINANCIAL ASSET. THE CONTENT IS GENERAL IN NATURE AND DOES NOT REFLECT ANY INDIVIDUAL'S UNIQUE PERSONAL CIRCUMSTANCES. THE ABOVE CONTENT MIGHT NOT BE SUITABLE FOR YOUR PARTICULAR CIRCUMSTANCES. BEFORE MAKING ANY FINANCIAL DECISIONS, YOU SHOULD STRONGLY CONSIDER SEEKING ADVICE FROM YOUR OWN FINANCIAL OR INVESTMENT ADVISOR. Click here for the full disclaimer.

SandboxAQ launches AQtive Guard to secure AI agent identities
SandboxAQ launches AQtive Guard to secure AI agent identities

Techday NZ

time22-04-2025

  • Business
  • Techday NZ

SandboxAQ launches AQtive Guard to secure AI agent identities

SandboxAQ has announced the launch of AQtive Guard, a platform designed to manage and secure Non-Human Identities (NHIs) and cryptographic assets used by AI agents across enterprise environments. The expansion of AI agents within business operations has created new vulnerabilities, with billions of such agents now operating within enterprise networks. These developments have led to increased risks posed by intelligent, adaptive cyber threats capable of evading existing security measures and exploiting system weaknesses more rapidly than previous technology could respond. AQtive Guard comprises two core components: the Discover module, which inventories NHIs and cryptographic assets including keys, certificates, algorithms, and libraries; and the Protect module, which enables automated remediation and policy enforcement such as credential rotation and certificate renewal. These features are designed to support compliance and help organisations meet regulatory requirements. The platform harnesses SandboxAQ's Large Quantitative Models (LQMs) to provide what the company describes as enhanced visibility, control, and remediation capabilities. This approach aims to address challenges associated with machine-to-machine communication security, increasing regulatory pressures, and the implementation of new NIST security standards. In conjunction with the launch, SandboxAQ announced that AQtive Guard will integrate with platforms operated by CrowdStrike and Palo Alto Networks. The integration with the CrowdStrike Falcon cybersecurity suite allows AQtive Guard to import data from CrowdStrike endpoints, providing customers with insight into their NHI and cryptographic inventories and vulnerabilities. "One-click ingestion translates to value from the first hour of use. AQtive Guard can then remediate the vulnerabilities as they are identified," the company stated. AQtive Guard also gains interoperability with Palo Alto Networks, ingesting firewall logs to improve visibility into network security posture and vulnerability detection, while supporting organisational compliance requirements. Speaking about the scale of the issue, Jack Hidary, Chief Executive Officer of SandboxAQ, said: "There will be more than one billion AI agents with significant autonomous power in the next few years." "Enterprises are giving AI agents a vastly increased range of capabilities to impact customers and real-world assets. This creates a dangerous attack surface for adversaries. AQtive Guard's Discover and Protect modules address this urgent issue." Marc Manzano, General Manager of Cybersecurity at SandboxAQ, emphasised the importance of the platform's real-time inventory and remediation capabilities: "As organisations accelerate AI adoption and the use of agents and machine-to-machine communication across all business domains and functions, maintaining a real-time, accurate inventory of NHIs and cryptographic assets is an essential cybersecurity practice." "Being able to automatically remediate vulnerabilities and policy violations identified is crucial to decrease time to mitigation and prevent potential breaches within the first day of use of our software." The core functions of AQtive Guard include: vulnerability detection and continuous inventory by integrating data from different sources and existing cybersecurity solutions, AI-powered insights for prioritisation and risk analysis, and automated lifecycle management of identities and cryptographic keys to reduce manual intervention and mitigate risks from outdated or compromised secrets. The platform also features an integrated GenAI assistant, which supports user compliance with standards and regulatory requirements. Additionally, the platform provides remediation recommendations specific to compliance and NIST standards, a query engine with pre-built and custom rulesets, and reporting tools intended to assist organisations in demonstrating compliance and accelerating migration to new NIST frameworks. AQtive Guard is available as a cloud-delivered platform and aims to offer rapid deployment and immediate impact for enterprise clients seeking to secure their cryptographic assets and NHIs.

How To Secure Non-Human Identities With Modern IAM
How To Secure Non-Human Identities With Modern IAM

Forbes

time01-04-2025

  • Business
  • Forbes

How To Secure Non-Human Identities With Modern IAM

Rajat Bhargava is an entrepreneur, investor, author and currently CEO and cofounder of JumpCloud. getty Every second, hundreds of automated processes and service accounts access sensitive data without human oversight. These non-human identities (NHIs)—spanning API keys, secrets, tokens and service accounts—operate behind the scenes to power cloud applications, automation and microservices. NHIs authenticate and execute automated processes between cloud applications and third-party integrations; they allow applications, virtual machines and scripts to access resources securely; and they can generate cryptographic credentials that encrypt and validate communications between automated processes—to name just a few of their uses. The number of NHIs is growing as organizations race to innovate—or just keep pace with digital transformation. NHIs now often outnumber human users, creating a sprawling network of identities that require immediate attention. Modern architectures—from DevOps pipelines to serverless computing—rely heavily on NHIs. This creates opportunities for bad actors, where multiple permissions, when exploited together, can lead to catastrophic breaches. Left unsecured, NHIs become prime targets for cyberattacks. OWASP released its 2025 top 10 risks associated with NHIs, highlighting that a lack of monitoring, excessive permissions and credential mismanagement are just a few of the key issues that can lead to unauthorized access, attacks on infrastructure and data breaches. Unauthorized or poorly managed NHIs can inadvertently grant attackers lateral movement across systems. Such shadow access invites attackers to exploit systems, exposing sensitive data and resources without anyone even knowing. Security teams often struggle to track these interactions due to the complexity of managing NHIs across cloud and on-premises resources. Legacy identity and access management (IAM) systems are typically ill-equipped to handle the nuances of NHIs. Designed primarily for human users, these systems have two key weaknesses in relation to NHI. • Lack Of Visibility: Legacy IAM systems fail to provide insight into how NHIs interact with resources, leaving organizations with significant blind spots. • Focus On A Reactive Approach (Versus Proactive): Vulnerabilities are detected only after exploitation, limiting the ability to proactively secure systems. Modern IAM must evolve to secure NHIs by leveraging automated detection, risk prioritization and real-time analytics to mitigate risks before they escalate. To address the growing risks associated with NHIs, here are five best practices for organizations to adopt proactive strategies: 1. Establish full visibility. Use tools like risk engines and query analytics to map IAM vulnerabilities across NHIs. This approach reveals patterns of cloud data exposure, excessive privileges or overlapping permissions and exploitability. SaaS management capabilities can help reveal which vulnerabilities carry the greatest potential impact. 2. Automate risk detection and remediation. Deploy automated detection mechanisms to identify and address lateral movement, chained access and other high-risk scenarios. Ensure continuous monitoring and timely alerts to reduce reaction times and strengthen overall security posture. 3. Establish governance for NHIs. Implement strict policies to govern NHIs, such as enforcing expiration dates for access keys and conducting regular audits of service accounts. Secure service principles and tokens by aligning with established frameworks that include governance recommendations. 4. Integrate proactive security measures. Adopt a risk-driven IAM strategy that prioritizes areas with the highest exposure and exploitability. Implement a system for monitoring SaaS usage and leverage operational data to predict vulnerabilities and prevent breaches before they occur. 5. Educate and empower security teams. As with all areas of cybersecurity, employees can be a robust bulwark or an extraordinary vulnerability. Regularly provide specialized training on the risks posed by NHIs and equip teams with tools that focus on high-priority threats to minimize alert fatigue. 6. Move to more modern security postures for NHIs. API keys are useful and easy, but there are better ways of providing secure authentication for NHIs. Leverage signed JSON Web Tokens (JWTs) for authentication so that they can't be reused if compromised. Use role-based access where you don't need to have a static credential. The rapid adoption of cloud technologies and automation has made securing NHIs a top priority. It has also made clear that traditional IAM approaches fail to meet the challenges they introduce. Organizations must evolve their strategies to gain visibility, automate remediation and establish robust governance frameworks. Securing NHIs isn't just about reducing risk; it's about future-proofing your organization in an increasingly automated world. Given the acceleration of automation and cloud adoption, adopting an IAM strategy that addresses NHI vulnerabilities isn't just a priority—it's mission critical. The question isn't whether your existing IAM approach is up to the task, but how quickly your organization can rise to the challenge. Forbes Technology Council is an invitation-only community for world-class CIOs, CTOs and technology executives. Do I qualify?

Saviynt to Showcase Cutting-Edge Identity Security Solutions at Gartner Identity & Access Management Summit 2025
Saviynt to Showcase Cutting-Edge Identity Security Solutions at Gartner Identity & Access Management Summit 2025

Yahoo

time20-03-2025

  • Business
  • Yahoo

Saviynt to Showcase Cutting-Edge Identity Security Solutions at Gartner Identity & Access Management Summit 2025

The Identity Authority to host spotlight session on opportunities and risks of using AI and its intersection with the security of non-human identities (NHIs) LOS ANGELES, March 20, 2025--(BUSINESS WIRE)--Saviynt, a leading provider of cloud-native identity and governance solutions, today announced its participation in the Gartner Identity & Access Management Summit 2025, taking place March 24-25 in London, U.K. The company will showcase its latest innovations in identity governance, privileged access management (PAM), and identity security, empowering organizations to achieve zero trust security and compliance at scale. As part of the summit, Saviynt will also host an exclusive spotlight session addressing one of the most pressing topics in cybersecurity today—the convergence of artificial intelligence (AI), non-human identities, and identity security. The session, titled "More Human than Human - A Riveting Story About Machines, AI, and Identity" will take place from 3:15 to 3:45 p.m GMT on March 24 in Room Arora 5. Henrique Teixeira, senior vice president of strategy, and Simon Gooch, field chief information officer at Saviynt, will lead the discussion. The session will explore how AI's rapid advancements are reshaping identity security and how organizations can balance the risks and benefits of AI in managing human and non-human identities. "The Gartner IAM Summit provides a crucial platform for industry leaders to collaborate and plan their strategies around identity for the rest of the year," said Teixeira. "We look forward to showcasing our new product announcements in identity security and intelligence and to facilitate engaging interactions with conference attendees, our clients, partners, and industry analysts." Saviynt's presence at the summit underscores its commitment to innovation in identity security, helping enterprises stay ahead of evolving threats and regulatory requirements. The company product leaders will be available at Booth 404 to connect with security professionals, provide live demonstrations, and discuss industry best practices. For more details on Saviynt's presence at the Gartner IAM Summit 2025, or to schedule a meeting with the team, visit the website. About Saviynt Saviynt empowers enterprises to secure their digital transformation, safeguard critical assets, and meet regulatory compliance. With a vision to provide a secure and compliant future for all enterprises, Saviynt is recognized as an industry leader in identity security whose cutting-edge solutions protect the world's leading brands, Fortune 500 companies and government organizations. For more information, please visit About the Gartner Identity & Access Management Summit 2025 Gartner analysts will provide additional analysis on identity and access technologies and strategies at the Gartner Identity & Access Management Summits taking place March 24-25 in London and December 8-10 in Grapevine. Follow news and updates from the conferences on X using #GartnerIAM. View source version on Contacts Media Contacts Jacklyn Gartner Contacts Public Relations Contact Laurence GoasduffDirector PR EMEA and Mobile: +33 6 45 29 03 49 Exhibitor Contact Sophie FordClient Success Mobile: + 44 7561872739 Sign in to access your portfolio

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into the world of global news and events? Download our app today from your preferred app store and start exploring.
app-storeplay-store