New IRM-as-a-Service Platform Helps Developers Build Data Security Into Applications
Just weeks after announcing that it had closed a $17 million Series B funding round, data protection startup Vera has officially launched its new cloud-based Information Rights Management (IRM) platform.
The company calls its new offering a “IRMaaS” or IRM-as-a-Service, which enables developers to use its platform to build encryption, tracking, policy enforcement, and access control into applications.
According to the Palo Alto, Calif.-based company, developers can use the platform to implement data security features into new applications from the start, or retrofit older applications with added protections.
“By using Vera’s new software development kit (SDK) and RESTful APIs, enterprises can directly protect and manage access to any data generated by custom-built business applications,” the company explained. “Once protected, security teams can use Vera to gain full visibility into how that data is used, anywhere it travels.
Developers can leverage the Vera client SDK to grant custom applications the ability to secure data, set IRM policy and permissions, and revoke file access.
The SDK and APIs were designed to support applications on multiple platforms, including Mac OS X, Linux, and Windows, in addition to applications written in C++ and Java.
“In today’s world, we can no longer afford to treat data security as an add-on or afterthought. Instead, we must establish a security model that can be woven directly into the enterprise software and hardware stack,” Ajay Arora, CEO and co-founder of Vera, said in a statement.
IRM-as-a-Service is available immediately through Vera’s SDK to customers and developers through the Vera Dashboard.
Since launching in April 2015, the company says it has brought on customers that have resulted in more than a quarter million users being protected by its technology.
The startup, which has raised more than $31 million in funding to date, has established partnerships with technology firms, such as Dropbox, Okta, and Centrify, and has integrations with Box, VMware, and Microsoft.

For more than 10 years, Mike Lennon has been closely monitoring the threat landscape and analyzing trends in the National Security and enterprise cybersecurity space. In his role at SecurityWeek, he oversees the editorial direction of the publication and is the Director of several leading security industry conferences around the world.
More from Mike Lennon
- ‘No Evidence’ of Cyberattack Related to FAA Outage, White House Says
- SecurityWeek to Host 2022 ICS Cybersecurity Conference October 24-27 in Atlanta
- Google Completes $5.4 Billion Acquisition of Mandiant
- Cybersecurity Firm ZeroFox Begins Trading on Nasdaq via SPAC Deal
- HUMAN Security and PerimeterX Merge on Mission to Combat Bots
- Last Call: CFP for ICS Cybersecurity Conference Closes July 15th
- Johnson Controls Acquires Tempered Networks to Shield Buildings From Cyberattacks
- Snowflake Launches Cybersecurity Workload to Find Threats Across Massive Data Sets
Latest News
- Big China Spy Balloon Moving East Over US, Pentagon Says
- Former Ubiquiti Employee Who Posed as Hacker Pleads Guilty
- Cyber Insights 2023: Venture Capital
- Atlassian Warns of Critical Jira Service Management Vulnerability
- High-Severity Privilege Escalation Vulnerability Patched in VMware Workstation
- Exploitation of Oracle E-Business Suite Vulnerability Starts After PoC Publication
- China Says It’s Looking Into Report of Spy Balloon Over US
- GoAnywhere MFT Users Warned of Zero-Day Exploit
