CIO Influence
CIO Influence News Security

Cleo Advances Risk Management Agenda for CIOs with Latest Platform Updates

Cleo Advances Risk Management Agenda for CIOs with Latest Platform Updates

Compliance, privacy, security, and enterprise scalability take center stage in Cleo Integration Cloud

Cleo, the pioneer and global leader of the Ecosystem Integration software category and provider of the Cleo Integration Cloud (CIC) platform, announced a major platform update geared to support CIOs and IT leadership in better meeting their supply chain commitments by reducing their security risk profile when connecting and transacting with their B2B ecosystems.

CIO INFLUENCE News: Sevilla FC Transforms the Player Recruitment Process with the Power of IBM watsonx Generative AI

“Given the unfortunate rise in targeted malware, ransomware, and phishing attacks supply chain dependent enterprises have experienced in recent years, Cleo has bolstered security and risk management capabilities across the entire CIC platform, because our customers expect and demand nothing less.”

Disruptions caused by security threats (malware and ransomware), fragility in supplier and sourcing networks, and heightened expectations coming from customers and trading partners have been causing angst for CIOs and technology executives for years, pushing them to seek more controllable ways to protect their supply chains. Often, these risks can be mitigated through a modern integration platform that prioritizes compliance, privacy, security, and enterprise scalability – empowering teams to proactively manage risks that can disrupt supply chain operations.

Cleo’s complete and scalable ecosystem integration platform advances the CIO and technology executive’s risk management agenda and strengthens their supply chain operations by delivering control mechanisms for three critical pillars of enterprise supply chain risk management:

  • Compliance & Privacy
  • Identity Access and Control
  • Certificate Management

The latest release of Cleo Integration Cloud demonstrates the company’s dedication to strengthening the information security posture for its customers and partners:

Compliance & Privacy –

Cleo has achieved certifications and attestations with proven compliance and privacy programs commonly deployed by leading enterprises globally. All certifications and attestations were completed with a formal audit process with A-LIGN, the industry’s leading security and compliance solutions provider, or The Drummond Group, the leader in interoperability testing and compliance.

  • ISO-27001
    • International standard for maintaining the highest standards of information security management.
  • SOC 2 and SOC 3
    • Commitment to data security, availability, processing integrity, and confidentiality.
  • Drummond Certified
    • Ensures secure data exchange and integration of applicability standard protocols.
  • California Consumer Privacy Act (CCPA)
    • With the increasing number of state-level mandates, Cleo stays on top of assuring data compliance for customers operating under these unique requirements.

Read More : Deloitte and UiPath Expand Strategic Alliance With New SAP Delivery Framework

Identity and Access Control –

Cleo has implemented a framework to enable organizations to deploy best-practices in identity and access control.

  • OAuth 2.0 to provide secure and authorized access to your data.
  • Robust data integrity algorithms protect your data from corruption or unauthorized modification.
  • Enhanced encryption algorithms to support data-in-transit encryption during transmission of data.
  • Receipts to provide visibility into data transactions, enhancing transparency and non-repudiation.
  • Single Sign-On (SSO) integration to simplify user access and makes managing security easier by enabling use of existing identity and access control capabilities.

Certificate Management –

Cleo has enhanced the certificate management capabilities natively available within Cleo Integration Cloud to provide users ease of use.

  • Certificate and key generation enable users to create X509 certificates and SSH/PGP private and public key pairs.
  • Bolstered infrastructure security ensures single trust and no duplicate trusted certificates.

“Supply chain ecosystems are complex and dynamic, involving numerous applications, trading partners, customers, and service providers. In an interconnected digital system, your supply chain is often only as secure as your weakest link,” said Mahesh Rajasekharan, President and CEO of Cleo. “Given the unfortunate rise in targeted malware, ransomware, and phishing attacks supply chain dependent enterprises have experienced in recent years, Cleo has bolstered security and risk management capabilities across the entire CIC platform, because our customers expect and demand nothing less.”

Cleo is committed to transparency and accessibility for all its 4,200+ customers and with that in mind has recently launched the Cleo Trust Center Portal to provide access to our most recent documentation.

Read More: Top and Bottom Software Companies Perceived for Data Security Ranked for 2024

[To share your insights with us as part of editorial or sponsored content, please write to sghosh@martechseries.com]

Related posts

SCADAfence Partners With Keysight Technologies To Provide Visibility And Industrial Cyber Security For OT Infrastructures

CIO Influence News Desk

Atos Joins Microsoft Intelligent Security Association (MISA) to Bring More Security, More Simplicity to Customers

CIO Influence News Desk

Cyient Recognized as a Major Contender in the Inaugural Everest Group PEAK Matrix for 5G Engineering Services

CIO Influence News Desk