Cutting-Edge InfoSec Tools Unveiled: AI Guard, RiskOS, and More Revolutionize Security Landscape

February 21, 2025
Cutting-Edge InfoSec Tools Unveiled: AI Guard, RiskOS, and More Revolutionize Security Landscape
  • Veeam Software introduced its Recovery Orchestrator for Microsoft Hyper-V customers, automating disaster recovery planning and execution to ensure effective data recovery during outages.

  • Fortinet has enhanced its FortiAnalyzer platform, improving threat hunting and incident response capabilities, which allows organizations to scale their security operations with centralized visibility.

  • 1Password launched the MSP Edition of its Enterprise Password Manager, specifically designed for Managed Service Providers to bolster client data security and operational efficiency.

  • Netwrix has released an add-on for its Privilege Secure product, enabling secure remote access for distributed teams and third-party vendors while minimizing the attack surface by eliminating traditional VPN dependencies.

  • Socure introduced RiskOS, a platform that enhances identity verification and fraud prevention through rapid real-time computations and a no-code interface for easy adjustments.

  • EchoMark's new API enables organizations to apply invisible forensic watermarks to their data, facilitating effective detection and investigation of data leaks.

  • Privacera has updated its AI Governance (PAIG) platform to align with the NIST AI Risk Management Framework, which helps enterprises identify, assess, and address AI-related risks while promoting innovation.

  • Recent innovations in information security have been highlighted, showcasing new products released during the week of February 21, 2025.

  • Pangea has unveiled AI Guard and Prompt Guard, designed to protect AI applications from threats such as prompt injection and sensitive information leaks, thereby enhancing security for user interactions.

  • Armor has unveiled Nexus, a tool that provides organizations with real-time visibility into their security operations center activities and offers tailored recommendations for protecting critical assets.

Summary based on 2 sources


Get a daily email with more Tech stories

More Stories