Inside the Briefcase

Augmented Reality Analytics: Transforming Data Visualization

Augmented Reality Analytics: Transforming Data Visualization

Tweet Augmented reality is transforming how data is visualized...

ITBriefcase.net Membership!

ITBriefcase.net Membership!

Tweet Register as an ITBriefcase.net member to unlock exclusive...

Women in Tech Boston

Women in Tech Boston

Hear from an industry analyst and a Fortinet customer...

IT Briefcase Interview: Simplicity, Security, and Scale – The Future for MSPs

IT Briefcase Interview: Simplicity, Security, and Scale – The Future for MSPs

In this interview, JumpCloud’s Antoine Jebara, co-founder and GM...

Tips And Tricks On Getting The Most Out of VPN Services

Tips And Tricks On Getting The Most Out of VPN Services

In the wake of restrictions in access to certain...

Tala Ensures Data Privacy and Digital Supply Chain Control

March 16, 2021 No Comments

SOURCE: Tala Security

Industry-first solution specifically designed to inform, control and enforce privacy considerations for data originating on the modern web

Milpitas, Calif. March 16, 2021 — Numerous third-party integrations power the website supply chain. These integrations have access to critical and sensitive data and have become one of enterprise’s most glaring supply chain blind-spots. Tala Security, the global leader in web application data protection and client-side security, is pleased to announce Tala Detect. An industry-first platform solution specifically designed to secure and control critical, sensitive web data and enable compliance/risk management.

With the onset of regulations and the need for complete visibility, verification and control of private customer and business sensitive data, Tala Detect tracks data across three dimensions: exposure, capture and exfiltration/leakage and provides the means to control it.

– Sensitive Data Exposure: Which website integrations have access to what sensitive data?

– Sensitive Data Readers: Which website integrations read sensitive data?

– Sensitive Data Exfiltration: Which website integrations extract sensitive data?

The Tala Detect platform provides fine-grained data discovery, mapping and information flow analysis to identify sensitive data in forms, network requests, cookies and local/session storage. Synthetic JavaScript virtualization techniques also trace data, identifying complex workflows that can access, read and exfiltrate data, both intentionally and unintentionally. JavaScript risks are further enhanced with domain reputation analysis, leveraging internal and external threat feeds.

Tala Detect provides:

– Insights into the initiation chain or website calls that ultimately cause leakage of sensitive data

– Analytics on risk patterns and Magecart IOC markers, alerting on possible compliance violations, website supply chain risks and vulnerabilities

– Safeguarding of sensitive data from unauthorized access by both malicious and trusted third parties, ensuring compliance with data regulations as well as control over all data originating on enterprise web properties and applications.

– Tala provides invaluable reporting or Compliance/Risk management (CCPA/GDPR) and equips periodic audits, with insights, changes and patterns into website supply chain risk.

“Data Privacy Regulatory Compliance is driving enterprises to ensure they can control and safeguard data privacy for sensitive data originating on the web,” said Aanand Krishnan, Founder and CEO at Tala Security. “The modern website, powered by JavaScript, grants permissions and controls to a vast supply chain that very few enterprises have the ability to control. Tala Detect was designed specifically to assist enterprise website owners with ensuring continuous monitoring of data accessibility amongst this website supply chain together with the means to control it.”

With no need for integration into the customer environment, Tala’s actionable alerts and detailed reports ensure ongoing data privacy violation monitoring especially relevant for incident response, SOC, data protection and risk/compliance teams.

About Tala Security

Tala prevents sensitive data theft and client-side attacks like Magecart, XSS, code injections and session redirects. Our innovative solution is designed to secure customer data and ensure data privacy, without degrading site performance or top-line revenue. Tala’s technology automates policy generation, deployment and maintenance of powerful web standards, including CSP, SRI, Feature Policy, Referrer Policy, HSTS and others. Tala also leverages JavaScript virtualization synthetically to ensure data flow analysis of even the most complex workflows.

Tala’s comprehensive portfolio includes both Tala-Protect and Tala-Detect ensuring comprehensive data flow analysis together with the means to control it. This innovative combination of capabilities ensures attacks are prevented in real-time, data privacy and integrity are assured and the need for costly and continuous administration or incident response is minimized. Tala’s solutions have no impact on website performance or user experience – and no code integration is required.

Tala is led by industry veterans and successful entrepreneurs backed by an impressive collection of well-known tech investors, angels, former executives at Symantec and by the National Science Foundation (NSF). Our technology has garnered multiple awards including being named a Gartner Cool Vendor and an RSA Innovation Sandbox Finalist.

Learn more at https://www.talasecurity.io.

 

 

 

Sorry, the comment form is closed at this time.

ADVERTISEMENT

Gartner

WomeninTech