Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Polar Security

7 Essentials Every Data Protection Strategy Requires

Data protection, once a marginalized subsection of the cybersecurity industry, has increasingly become a major concern, especially for companies deploying Cloud based applications. GDPR, CCPA, PIPEDA - The list goes on but they all have one thing in common - A focus by regulators worldwide on addressing the issues presented by the use of digital big data.

Introducing Data Security Posture Management (DSPM) Platform

You’re a cloud-based company, your entire business model relies on cloud data and your cloud environment is VERY precious to you, correct? That’s why you invest all of your resources into protecting this environment from the outside world. You want to make sure that the perimeter between your cloud data and the outside world is 100% safe, I get it. But what if I told you that your goal is to protect your crown jewels, a.k.a - the data itself?

Polar Security Launches Out Of Stealth With $8.5 Million Seed Round

Polar Security announced today it has raised an $8.5 million seed financing round and launched out of stealth. The funding round was led by Glilot Capital Partners with participation from IBI Tech Fund, as well as angel investors, including Co-founder & CEO of Cloud Security Alliance Jim Reavis, former RSA CTO Tim Belcher, former President of Qualys and Industry Executive Ann Johnson, Co-founder & CEO of Internet Security Systems and VP & GM of IBM Security Tom Noonan, among others.

Shining a Light on Shadow Data: What It Is and How to Minimize It

Shadow data can be defined as any data that is not available or subject to an organization’s centralized data management framework. Examples of shadow data include: Shadow data is, first and foremost, a problem for security and compliance teams. How can they take responsibility for the security and compliance of data stores they aren’t aware of or over which they have little or no control?