Canon Dumps Perimeter Security for Vera's Data-centric Approach

New relationship takes aim at data leaks and protects digital information processed by multi-function devices and digital imaging solutions.


Data-centric security startup Vera continues to branch out and provide its second layer of security to enterprise cloud platform makers.

The latest one belongs to Canon Solutions America, Inc., a wholly owned subsidiary of Canon USA, which has more than 78,000 customers. The two companies announced Feb. 13 that Canon is effectively junking its perimeter-based security system and moving to the data-centric approach Vera has deployed for the three years of its existence.

By enabling multi-factor authentication and supporting multiple identity management (IDM) solutions, Vera’s job is to bolster users’ ability to ensure that only trusted individuals can access sensitive information in real time, regardless of its location. Insider-based breaches are estimated to represent 60 to 80 percent of all enterprise security breaches, according to several industry analysts.

Vera's flexibility in both authentication protocol and second-factor method allows customers to integrate Vera into their existing infrastructure and preferred single-sign-on (SSO) solution. Vera also works with any provider that supports SAML 2.0, oAuth, Okta, Ping, Centrify, OneLogin and Microsoft.

Breaks Down Security to Protection of Each File

The Palo Alto, Calif.-based startup, whose product went GA (general availability) in April 2015, literally breaks down IT security to its most basic component: the protection of each file individually by putting it into a secure wrapper. No matter where the file goes, it cannot be viewed by a hacker inside any IT system without the key for the file.

Vera gives Canon’s customers the ability to encrypt, track and control how content is used, no matter where it’s stored, or how it’s shared. As part of this strategic partnership, Canon will integrate Vera’s data security solution across its product portfolio to protect sensitive data as soon as it’s captured by a Canon device. Additionally, Canon’s sales force will offer Vera products and services as a core part of its Security Solutions and Services portfolio.

Melville, N.Y.-based Canon Solutions America will use Vera to:

  • Secure content and file sharing: From local storage to cloud content management, Vera ensures that only authorized parties can access sensitive data. The platform can seamlessly boost the security of any file that leaves an organization with additional encryption, file-level usage rights and document classification--and maintain that control anywhere the file travels.
  • Provide dynamic authentication for critical information: Vera’s policy-driven multi-factor authentication protects highly-classified information, ensuring that only authorized partners can access it. Based on the sensitivity of a document, where it’s been stored and who has access, Vera automatically requires additional authentication factors to confirm they are the right party to access sensitive data.
  • Comply with EU regulations and protect customer data by default: Vera accelerates enterprises’ ability to comply with a complex web of state, federal and international regulations, including the EU’s impending General Data Protection Regulation (GDPR). Vera provides the 360-degree audit trail and chain of custody necessary for global risk and compliance officers to precisely control what users can and cannot do with enterprise data while simultaneously preserving their privacy, across all applications, devices, and platforms.

“By fully embracing a data-centric approach to information security, we’ve entered into a new and exciting era where the old paradigm of perimeter-based security is no longer the unquestioned norm,” Canon Solutions America president Peter Kowalczuk said in a media advisory.

For more information, go here.

Chris Preimesberger

Chris J. Preimesberger

Chris J. Preimesberger is Editor-in-Chief of eWEEK and responsible for all the publication's coverage. In his 15 years and more than 4,000 articles at eWEEK, he has distinguished himself in reporting...