CFOtech New Zealand - Technology news for CFOs & financial decision-makers

Access Control stories - Page 6

Enterprise soc monitoring unified security shield email cloud onprem ai

Proofpoint unifies email & AI data security platform

Last month
#
data protection
#
hybrid cloud
#
digital transformation
Proofpoint unveils unified platform to secure email and govern AI data access, extending visibility across cloud and on-premises environments.
Beyondtrust

BeyondTrust expands Pathfinder to secure AI agents

Last month
#
endpoint protection
#
digital transformation
#
pam
BeyondTrust expands Pathfinder to discover, govern and lock down proliferating enterprise AI agents, identities, privileges and secrets.
Bits ai  2

Datadog launches AI security analyst for Cloud SIEM

Last month
#
siem
#
digital transformation
#
cloud security
Datadog rolls out Bits AI Security Analyst for Cloud SIEM, promising to slash alert investigation times by up to 98% for security teams.
Devvret rishi x annekagupta

Rubrik deepens identity security & AI governance push

Last month
#
data protection
#
dr
#
pam
Rubrik links Microsoft Defender with new AI governance engine SAGE to speed identity attack recovery and tighten control of autonomous agents.
Ai dashboard workspace laptop chat publish rearrange blocks

WordPress.com adds AI write tools for site control

Last month
#
digital transformation
#
ecm
#
martech
WordPress.com now lets AI agents draft, edit and publish content directly to sites via conversation, expanding beyond read-only integrations.
Anneka

Rubrik adds Google Workspace backup for faster recovery

Last month
#
saas
#
data protection
#
dr
Rubrik launches data protection for Google Workspace, promising immutable backups and faster recovery for Gmail and Google Drive users.
Email attachment20260323 1556700 bfylf6

Oracle NetSuite rolls out AI upgrades for ANZ users

Last month
#
devops
#
data analytics
#
digital transformation
NetSuite unveils AI-powered tools and connectors for ANZ customers, promising automation across finance, inventory, warehousing and eCommerce.
Editorial security key human approval robotic hand ai server control panels

Yubico & Delinea link AI actions to human approval

Last month
#
data protection
#
hybrid cloud
#
pam
Yubico and Delinea unite hardware keys with identity checks to ensure each high‑risk AI agent action is explicitly approved by a human.
Focused software security analyst ai assistant code monitor oversight

OpenAI monitors internal coding agents for risky conduct

Last month
#
devops
#
physical security
#
apm
OpenAI unveils a GPT-5.4-powered system that audits its own coding agents for rule-bending behaviour, flagging suspicious sessions to humans.
Secure enterprise data center digital agents access gates ops room

Oasis raises USD $120 million for AI access control

Last month
#
saas
#
digital transformation
#
pam
Oasis raises USD $120 million to expand its AI-first access control platform for non-human identities across large enterprises.
Editorial secure cloud data platform ai governance shield access

Snowflake backs Bedrock Data in AI governance push

Last month
#
data protection
#
data analytics
#
digital transformation
Snowflake invests in Bedrock Data to tighten AI data governance, linking Horizon and Cortex AI with Bedrock's classification and masking tools.
Editorial enterprise ai risk oversight control room ai governance

Bedrock expands ArgusAI for AI agent risk oversight

Last month
#
data protection
#
hyperscale
#
cloud security
Bedrock expands ArgusAI to map AI agents, MCP servers and Snowflake Cortex access, promising unified oversight of enterprise AI risk.
It security ops room analysts monitoring cloud map ai agent icons identity gaps

Delinea warns AI adoption is widening identity gaps

Last month
#
data protection
#
digital transformation
#
pam
Delinea warns that rapid AI rollout is eroding identity controls, leaving machine accounts exposed and widening security blind spots.
Hybrid it security control room cloud mac okta github network

BloodHound expands identity attack path mapping reach

Last month
#
data protection
#
encryption
#
pam
SpecterOps broadens BloodHound Enterprise to map identity attack paths across Okta, GitHub and Jamf-managed Macs in hybrid environments.
Modern security operations room copenhagen analytics video access control

Milestone unveils app platform & faster BriefCam AI

Last month
#
virtualisation
#
smart cities
#
digital transformation
Milestone debuts XProtect App Platform and a faster on-premise BriefCam engine, promising smoother AI video analytics and fewer disruptions.
Mathivanan v

ManageEngine adds EDR & Zero Trust access to platform

Last month
#
malware
#
firewalls
#
vpns
ManageEngine folds EDR and Zero Trust private access into Endpoint Central, unifying endpoint management and security in one console.
Corporate security ops room network map ai agents permissions governance

Entro launches AI agent governance tool for enterprises

Last month
#
data protection
#
digital transformation
#
cloud security
Entro launches AGA to map, monitor and control AI agents in enterprises, tackling shadow AI and non-human identity risks at scale.
Enterprise it security control room ai agents zero trust gateways

Token Security unveils intent-based AI agent controls

Last month
#
digital transformation
#
cloud security
#
advanced persistent threat protection
Token Security launches intent-based controls to govern AI agents' access by purpose, aiming to curb over-privileged, autonomous system behaviour.
Mobile kubernetes container security edge shield network globe

Zenarmor expands SASE platform for mobile & containers

Last month
#
virtualisation
#
firewalls
#
digital transformation
Zenarmor extends its SASE platform to mobile endpoints and containers, touting distributed, sovereign security without central cloud inspection.
Moody soc night cybersecurity analyst ai threat maps hidden agents

Coalfire launches AI threat hunting for shadow agents

Last month
#
firewalls
#
data protection
#
digital transformation
Coalfire's new DivisionHex service hunts shadow AI and rogue agents as most firms report AI-driven security incidents without proper oversight.