Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cloud Security

Satori Cyber Emerges From Stealth With Data Protection, Governance Platform

Satori Cyber on Tuesday emerged from stealth mode with a data protection and governance platform, and $5.25 million in seed funding from YL Ventures.

Satori Cyber on Tuesday emerged from stealth mode with a data protection and governance platform, and $5.25 million in seed funding from YL Ventures.

Satori aims to provide organizations continuous visibility and granular control over data flows across their cloud and hybrid environments through a platform it has named Secure Data Access Cloud.

Satori is based in Israel and it was founded by former Imperva senior executives Eldad Chai, who serves as CEO, and Yoav Cohen, who serves as the company’s CTO.

According to Satori, its platform is easy to deploy — it only requires a host name change — and it allows security teams to determine where data is stored and how it flows within their infrastructure, find out what type of data is being accessed and moved, identify who is accessing data and determine if their access complies with security and privacy policies, and discover potential data loss and exposure risks.

Secure Data Access Cloud provides data visibility and mapping, data classification and discovery, data security, and policy monitoring and enforcement capabilities. Data security is provided through granular, field-level access controls and anomaly detection features.

“When you take into consideration the sheer volume of the data and access requests security teams contend with today, implementing proper data protection isn’t just difficult, it’s nearly impossible,” Chai said.

He added, “Until now, security teams have relied on a combination of highly segregated and restrictive data access and one-off technology-specific access controls within each data store, which has only slowed enterprises down. The Satori Cyber platform streamlines this process, accelerates data access and provides a holistic view across all organizational data flows, data stores and access, as well as granular access controls, to accelerate an organization’s data strategy without those constraints.”

Satori’s Secure Data Access Cloud platform is currently available only to qualified customers, and is expected to become generally available in the third quarter of 2020.

Advertisement. Scroll to continue reading.

Related: Vulcan Cyber Emerges From Stealth With $4 Million Seed Round

Related: Cloud Visibility Firm Orca Security Emerges From Stealth Mode

Related: Hunters.AI Emerges From Stealth With $5.4M in Seed Funding

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Shay Mowlem has been named CMO of runtime and application security company Contrast Security.

Attack detection firm Vectra AI has appointed Jeff Reed to the newly created role of Chief Product Officer.

Shaun Khalfan has joined payments giant PayPal as SVP, CISO.

More People On The Move

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Data Protection

The cryptopocalypse is the point at which quantum computing becomes powerful enough to use Shor’s algorithm to crack PKI encryption.

CISO Strategy

SecurityWeek spoke with more than 300 cybersecurity experts to see what is bubbling beneath the surface, and examine how those evolving threats will present...

CISO Conversations

Joanna Burkey, CISO at HP, and Kevin Cross, CISO at Dell, discuss how the role of a CISO is different for a multinational corporation...

Artificial Intelligence

The CRYSTALS-Kyber public-key encryption and key encapsulation mechanism recommended by NIST for post-quantum cryptography has been broken using AI combined with side channel attacks.

CISO Conversations

In this issue of CISO Conversations we talk to two CISOs about solving the CISO/CIO conflict by combining the roles under one person.

CISO Conversations

SecurityWeek talks to Billy Spears, CISO at Teradata (a multi-cloud analytics provider), and Lea Kissner, CISO at cloud security firm Lacework.