Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Data Protection

Vera Launches IRM-as-a-Service Platform

New IRM-as-a-Service Platform Helps Developers Build Data Security Into Applications

New IRM-as-a-Service Platform Helps Developers Build Data Security Into Applications

Just weeks after announcing that it had closed a $17 million Series B funding round, data protection startup Vera has officially launched its new cloud-based Information Rights Management (IRM) platform. 

The company calls its new offering a “IRMaaS” or IRM-as-a-Service, which enables developers to use its platform to build encryption, tracking, policy enforcement, and access control into applications.

Vera Logo

According to the Palo Alto, Calif.-based company, developers can use the platform to implement data security features into new applications from the start, or retrofit older applications with added protections.

“By using Vera’s new software development kit (SDK) and RESTful APIs, enterprises can directly protect and manage access to any data generated by custom-built business applications,” the company explained. “Once protected, security teams can use Vera to gain full visibility into how that data is used, anywhere it travels.

Developers can leverage the Vera client SDK to grant custom applications the ability to secure data, set IRM policy and permissions, and revoke file access.

The SDK and APIs were designed to support applications on multiple platforms, including Mac OS X, Linux, and Windows, in addition to applications written in C++ and Java.  

“In today’s world, we can no longer afford to treat data security as an add-on or afterthought. Instead, we must establish a security model that can be woven directly into the enterprise software and hardware stack,” Ajay Arora, CEO and co-founder of Vera, said in a statement.

Advertisement. Scroll to continue reading.

IRM-as-a-Service is available immediately through Vera’s SDK to customers and developers through the Vera Dashboard.

Since launching in April 2015, the company says it has brought on customers that have resulted in more than a quarter million users being protected by its technology.

The startup, which has raised more than $31 million in funding to date, has established partnerships with technology firms, such as Dropbox, Okta, and Centrify, and has integrations with Box, VMware, and Microsoft.

Written By

For more than 15 years, Mike Lennon has been closely monitoring the threat landscape and analyzing trends in the National Security and enterprise cybersecurity space. In his role at SecurityWeek, he oversees the editorial direction of the publication and is the Director of several leading security industry conferences around the world.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Cody Barrow has been appointed as CEO of threat intelligence company EclecticIQ.

Shay Mowlem has been named CMO of runtime and application security company Contrast Security.

Attack detection firm Vectra AI has appointed Jeff Reed to the newly created role of Chief Product Officer.

More People On The Move

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Data Protection

The cryptopocalypse is the point at which quantum computing becomes powerful enough to use Shor’s algorithm to crack PKI encryption.

Artificial Intelligence

The CRYSTALS-Kyber public-key encryption and key encapsulation mechanism recommended by NIST for post-quantum cryptography has been broken using AI combined with side channel attacks.

Compliance

The three primary drivers for cyber regulations are voter privacy, the economy, and national security – with the complication that the first is often...

Data Protection

While quantum-based attacks are still in the future, organizations must think about how to defend data in transit when encryption no longer works.

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...

Cybersecurity Funding

Los Gatos, Calif-based data protection and privacy firm Titaniam has raised $6 million seed funding from Refinery Ventures, with participation from Fusion Fund, Shasta...