Entro Security Introduces OCR, Employees Tokens Blast Radius Features

Entro Security states that its platform provides high levels of security to protect important information and NHI management with real-time detection and response.

LAS VEGAS—During the Black Hat USA event, Entro Security, the developer of Non-Human Identity (NHI) and Secrets Management platform, has announced two new features: Optical Character Recognition (OCR) support for secret scanning and Employees Tokens Blast Radius as part of its NHI platform for the modern enterprise.

The new OCR feature will enable organizations to discover exposed NHIs and secrets embedded in images, such as screenshots, giving security teams the ability to scan for hidden NHI potential exposures.

Entro Security explains the new Employees Tokens Blast Radius feature will allow security teams to review and comprehend the NHIs accessible to each employee, how these identities are used and the potential reach of the damage they can cause if misused. According to the company, this insight helps security teams mitigate current and future risks. The OCR and Employees Tokens Blast Radius features are unique and exclusive to Entro’s platform.

Entro’s executive team will be at Black Hat USA to demonstrate its new OCR support capabilities for secret scanning and Employees Tokens Blast Radius capabilities.

Since its emergence in the NHI and secrets management space a year and a half ago, Entro Security notes that its platform has been implemented in dozens of enterprise customer environments.

OCR, Employees Tokens Blast Radius Feature Benefits

Entro boasts that its platform empowers security teams to implement and automate strong governance for secrets and NHI management with real-time detection and response. The company asserts that through features such as OCR and Employees Tokens Blast Radius provide a bird’s-eye and granular view of all NHIs, centralizing and contextualizing NHIs and secrets security data. Entro also points out that its platform gives universal coverage across cloud services, SaaS applications and on-premises systems, allowing security teams to:

  • Gain complete visibility at creation, storage and exposure locations, scattered across various systems and environments
  • Enrich and add business context to understand owners, permissions, usage, enablement, rotation time and more
  • Identify and prioritize security risks, remediate vulnerabilities and prevent unauthorized access to critical systems and data
  • Apply detection and response to prevent attacks and misuse in real time by monitoring any abnormal behavior
  • Automate the remediation of identified security risks, saving time and resources for the security and development teams
  • Ensure compliance with regulatory requirements such as SOC2, GDPR and others by maintaining robust access controls and security measures

More news from Security Sales: Going Deeper and Wider with Commercial Clients: Bringing Together Security and AV

If you enjoyed this article and want to receive more valuable industry content like this, click here to sign up for our FREE digital newsletters!

Security Is Our Business, Too

For professionals who recommend, buy and install all types of electronic security equipment, a free subscription to Commercial Integrator + Security Sales & Integration is like having a consultant on call. You’ll find an ideal balance of technology and business coverage, with installation tips and techniques for products and updates on how to add to your bottom line.

A FREE subscription to the top resource for security and integration industry will prove to be invaluable.

Subscribe Today!

Leave a Reply

Your email address will not be published. Required fields are marked *

Get Our Newsletters