Workflow
Enterprise security
icon
Search documents
SAP SE (SAP) Partners With Uptycs
Yahoo Finance· 2026-03-11 15:32
Core Insights - SAP SE has announced a strategic partnership with Uptycs, a cybersecurity startup, to deploy verifiable AI analysts through Uptycs' Juno platform [1][3]. Group 1: Partnership and Technology - The partnership aims to enhance enterprise security teams with virtual employees focused on threat hunting and attack path analysis [2]. - Uptycs' Juno platform analyzes telemetry across cloud infrastructure, containers, and endpoints, allowing security teams to identify threats and generate strategic risk reports quickly [2]. - The platform's "glass box" architecture ensures that AI insights can be traced back to underlying evidence across 150,000 structured data fields, promoting transparency [2]. Group 2: Market Position and Adoption - SAP SE is positioned as a leading provider of enterprise applications and business AI, serving thousands of enterprise customers across more than 150 countries [3][4]. - The partnership is expected to facilitate large-scale enterprise adoption of AI systems in a secure and verifiable manner [3].
Palo Alto Networks CEO says the enterprise may not welcome agentic AI browsers
CNBC· 2025-09-04 22:48
Group 1: Agentic Browsers and Enterprise Concerns - The CEO of Palo Alto Networks, Nikesh Arora, expressed that enterprises may not be comfortable with agentic artificial intelligence browsers unless they have built-in controls for credentials and security [1][2] - Arora highlighted that while he appreciates the consumer benefits of agentic browsers, their autonomy raises concerns for enterprises, which may be hesitant to adopt them [2] - He predicted that major tech companies will invest billions in developing agentic browsers, but these technologies may conflict with enterprise security needs [2] Group 2: CyberArk Acquisition - Palo Alto Networks plans to acquire CyberArk, an Israeli identity security provider, in a deal valued at $25 billion, marking the largest acquisition in the company's history [3] - Arora noted that a significant majority of security breaches are due to credential theft, emphasizing the need for better protection of employee access to sensitive information [3] - The acquisition aims to enhance the management of privileged access with minimal intrusion and latency, addressing the security of "crown jewels" within organizations [4]