Headlines

Intel Capital: Investing in Zenity to Revolutionize Low-Code/No-Code Security

Intel Capital: Investing in Zenity to Revolutionize Low-Code/No-Code Securitywordpress,IntelCapital,investing,Zenity,low-code,no-code,security,revolutionize

Israeli Security Startup Zenity Secures $16.5 Million in Venture Capital Funding

Israeli security startup Zenity has raised $16.5 million in Series A financing to develop technology aimed at securing the “low-code/no-code” development ecosystem. The funding round was led by Intel Capital and also included new investors such as Gefen Capital and B5, as well as existing backers Vertex Ventures and Upwest. This brings the total amount raised by Zenity to $21.5 million since its emergence from stealth in November 2021.

Securing the Low-Code/No-Code Development Environment

Zenity, headquartered in Tel Aviv, is focused on providing organizations with continuous visibility and risk assessment across all applications, automations, workflows, and connections built on different low-code/no-code platforms. The company’s product allows security teams to set automated guardrails and risk mitigation through policies, playbooks, and customizations.

Low-code/no-code tools have gained popularity in the enterprise as they allow businesses to build applications and services without the need for traditional developers who write code. However, these tools also introduce new risks, as less technical users may create applications and automations that are susceptible to data leaks, implicit sharing, and identity misuse. Furthermore, the integration of Generative AI into these platforms adds additional complications and challenges for security leaders.

Market Potential and Expansion Plans

Zenity and its investors are betting on a significant market opportunity for securing the low-code/no-code development environment. The company plans to use the new capital to hire more talent across engineering, security, and product teams in Tel Aviv and expand its go-to-market activities in North America.

Editorial: The Growing Importance of Application Security

The investment in Zenity and its focus on securing the low-code/no-code development environment highlights the increasing importance of application security in today’s digital landscape. With the proliferation of software applications across industries and the reliance on cloud computing, cybersecurity threats have become more prevalent and sophisticated.

The rise of low-code/no-code development platforms has brought about new challenges for security professionals. While these platforms democratize the development process and enable non-technical users to create applications, they also introduce new risks that need to be addressed. The ability to secure and protect these applications is crucial to maintaining the confidentiality, integrity, and availability of data.

Philosophical Discussion: Balancing Efficiency and Security

The adoption of low-code/no-code development platforms can significantly improve efficiency and productivity in organizations. These platforms allow businesses to quickly develop and deploy applications, automate processes, and streamline workflows. However, security cannot be compromised in favor of speed and convenience.

It is essential to strike a balance between efficiency and security. Businesses should prioritize investing in security measures and technologies that can protect low-code/no-code applications and mitigate the associated risks. This includes implementing continuous monitoring, risk assessment, and automation of security controls. Additionally, security training and awareness programs should be provided to users of these platforms to promote responsible and secure application development practices.

Advice: Protecting Low-Code/No-Code Applications

As more organizations adopt low-code/no-code development platforms, it is crucial to prioritize the security of these applications. Here are some recommendations to protect low-code/no-code applications:

1. Conduct Regular Vulnerability Assessments

Regularly assess the security vulnerabilities in your low-code/no-code applications. Use automated tools and manual testing techniques to identify potential weaknesses and vulnerabilities that could be exploited by attackers.

2. Implement Secure Coding Practices

Provide training and guidance on secure coding practices to users of low-code/no-code platforms. Emphasize the importance of validating inputs, sanitizing user data, and implementing proper authentication and authorization mechanisms.

3. Ensure Secure Integration with Third-Party Services

When integrating low-code/no-code applications with third-party services and APIs, conduct thorough security assessments of these services. Validate their security controls, encryption practices, and data handling procedures to ensure the integrity and confidentiality of your data.

4. Regularly Update and Patch Applications

Stay up to date with the latest security patches and updates for your low-code/no-code applications. Regularly review security bulletins and advisories from the platform providers and apply necessary patches to address any identified vulnerabilities or weaknesses.

5. Implement Access Controls and User Permissions

Enforce access controls and user permissions to limit the privileges of low-code/no-code application users. Only grant necessary permissions to perform their required tasks, and regularly review and revoke unnecessary privileges.

6. Monitor and Respond to Security Events

Implement a robust monitoring and incident response system to detect and respond to security events in real-time. Configure logs and alerts to notify security teams of any unauthorized access attempts, suspicious activities, or unusual patterns that could indicate a potential breach.

Conclusion

The investment in Zenity by Intel Capital and other investors demonstrates the growing need to secure low-code/no-code applications in the modern enterprise. While these development platforms bring efficiency and agility, they also introduce new risks that organizations must address. By prioritizing application security, implementing secure coding practices, and conducting regular vulnerability assessments, businesses can effectively protect their low-code/no-code applications and safeguard their data from cyber threats.

InvestmentorTechnology-wordpress,IntelCapital,investing,Zenity,low-code,no-code,security,revolutionize


Intel Capital: Investing in Zenity to Revolutionize Low-Code/No-Code Security
<< photo by Zo Razafindramamba >>
The image is for illustrative purposes only and does not depict the actual situation.

You might want to read !