Author name: Team Techbeat

Computer circuits shown with a red light instead of usual green
Featured, Security

Fortinet’s Finest: Exploring the Top Products in Cybersecurity

Fortinet is a multinational corporation that provides cybersecurity solutions and services. Founded in 2000 by brothers Ken and Michael Xie, along with their friend and fellow engineer, Yan Ke, Fortinet has grown to become one of the leading companies in the cybersecurity industry. The company is headquartered in Sunnyvale, California, USA. Fortinet’s primary focus is on developing and marketing a wide range of network security products and services, including firewalls, antivirus, intrusion prevention systems (IPS), endpoint security, and secure access solutions. These products are designed to protect organizations from various cyber threats, such as malware, ransomware, phishing attacks, and data breaches. In an age where cyber threats loom large and data security is paramount, Fortinet stands as a stalwart guardian of digital assets. With a commitment to innovation and a focus on delivering robust cybersecurity solutions, Fortinet has emerged as a leader in the industry. Let’s delve into some of the best products Fortinet has to offer, each playing a crucial role in fortifying the digital defenses of organizations worldwide. FortiGate Next-Generation Firewalls: At the forefront of Fortinet’s product lineup are the FortiGate Next-Generation Firewalls (NGFWs). These appliances are the cornerstone of network security, providing advanced threat protection, intrusion prevention, and application control capabilities. With high-performance throughput and a comprehensive suite of security features, FortiGate NGFWs empower organizations to safeguard their networks against a myriad of cyber threats. FortiAnalyzer: Effective cybersecurity requires not only robust defenses but also insightful analysis and visibility into network traffic and security events. Enter FortiAnalyzer, a centralized logging and reporting solution that provides organizations with the tools they need to monitor, analyze, and respond to security incidents. By aggregating and correlating data from across the network, FortiAnalyzer helps organizations gain actionable intelligence and enhance their overall security posture. FortiClient Endpoint Security: In today’s mobile and interconnected world, endpoint devices represent a critical frontier in the battle against cyber threats. FortiClient Endpoint Security offers comprehensive protection for desktops, laptops, smartphones, and other endpoints, guarding against malware, ransomware, and other advanced threats. With features such as real-time scanning, web filtering, and VPN capabilities, FortiClient ensures that endpoints remain secure, regardless of their location or connection status. FortiSIEM: Security Information and Event Management (SIEM) solutions play a vital role in detecting and responding to security incidents in real-time. FortiSIEM combines SIEM, log management, and threat intelligence capabilities into a single, integrated platform, enabling organizations to proactively monitor and mitigate security risks. By correlating data from diverse sources and applying advanced analytics, FortiSIEM helps organizations identify and neutralize threats before they can cause harm. FortiGate Secure SD-WAN: As organizations embrace digital transformation and adopt cloud-based services, the demand for secure and reliable connectivity has never been higher. FortiGate Secure SD-WAN offers a comprehensive solution that combines SD-WAN functionality with advanced security features, providing organizations with secure, high-performance connectivity across distributed networks. By integrating routing, firewalling, and SD-WAN capabilities into a single platform, FortiGate Secure SD-WAN simplifies network management and enhances overall security. In conclusion, Fortinet’s product portfolio represents a formidable arsenal in the ongoing battle against cyber threats. From Next-Generation Firewalls to Endpoint Security solutions, Fortinet offers a comprehensive suite of products designed to protect organizations of all sizes and industries. With a commitment to innovation, reliability, and customer satisfaction, Fortinet continues to set the standard for cybersecurity excellence in the digital age. For more info: https://www.fortinet.com/

Apps, Featured

MakeShift Sponsors SAP® Partner Summit with Keynote by Edurne Pasabán

Technological Advancements, Strategic Partnerships, and Legendary Inspiration at the SAP Partner Summit in Barcelona. CALGARY, AB, Feb. 13, 2024 /CNW/ – AppColony Inc., doing business as MakeShift, a leader in workforce management solutions, proudly announces its significant sponsorship of the 2024 SAP Partner Summit for SAP SuccessFactors. This event gathers SAP partners, industry leaders, and visionaries in Barcelona to forge the future of human capital management, emphasizing collaborative success and the strategic role of partnerships in unlocking new frontiers of opportunity, innovation, and efficiency. The summit will feature an extraordinary keynote by Edurne Pasabán, the celebrated mountaineer known for her remarkable achievements in conquering the world’s highest peaks. Pasabán’s story of resilience and strategic conquest mirrors MakeShift’s journey towards redefining workforce management through technological innovation and human-centric approaches. Adam Greenberg, CEO of MakeShift, reflects on the company’s growth and strategic vision: “As we amplify our engagement with SAP, our sponsorship at the SAP Partner Summit is a declaration of MakeShift’s commitment to transformative innovation and strategic expansion. By leveraging the partner ecosystem, we are not only expanding our global reach but also driving the next era of staff scheduling and human experience management with AI. Edurne Pasabán’s story of perseverance and success is a powerful metaphor for our journey and aspirations.” MakeShift’s vision for the future is rooted in being the vanguard of shift scheduling. The company champions the integration of advanced technology, such as its proprietary ShiftMate AI, with the essence of human-centric work experiences. This alignment signifies a disruption in traditional scheduling paradigms, recognizing it as a pivotal factor in enhancing work life. Asher Fredricks, Chief Revenue Officer of MakeShift, adds a new perspective on the company’s expansion: “Our growing global footprint, including a significant expansion within our existing client base with a leading Franco-Dutch airline group, showcases our dedication to addressing complex scheduling needs no matter where our clients reside. These include navigating labor union requirements, strict local regulations, and the intricacies of concurrent employments. Edurne’s story reminds us that growth demands unwavering determination and strategic partnerships. We are here to forge those connections and succeed together.” Recognized as a leader in scheduling technology by prestigious organizations like Gartner Digital Markets, G2, and Tech Times, MakeShift stands at the forefront of driving advancements in the industry. By optimizing workforce management, MakeShift gives people back valuable time to focus on what really matters, enhancing productivity and work-life balance. MakeShift is available on SAP Store® and is a part of SAP’s Industry Cloud Portfolio. It seamlessly integrates with SAP SuccessFactors Employee Central, SAP SuccessFactors Employee Central Payroll, and SAP SuccessFactors Time Tracking, while also complementing SAP Time and Attendance Management by Workforce Software. About MakeShift MakeShift (www.makeshift.ca) stands at the forefront of workforce management innovation, providing an award-winning, cloud-based solution for complex scheduling challenges. Renowned for its ability to navigate the intricate scheduling demands of regulated industries, MakeShift seamlessly adapts to stringent labor regulations, union agreements, and intense scheduling requirements. Since its launch in 2014, initially targeting the healthcare sector’s needs, MakeShift has broadened its impact, offering unparalleled ease of use, guided implementation, and robust features. Its commitment to excellence in functionality and customer support has garnered recognition from G2, Gartner Digital Markets, and Tech Times, establishing MakeShift as a leader in the scheduling technology arena. For more information on how MakeShift is transforming workforce management with its user-centric design and innovative platform, visit www.makeshift.ca. SAP and other SAP products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of SAP SE in Germany and other countries. Please see https://www.sap.com/copyright for additional trademark information and notices. All other product and service names mentioned are the trademarks of their respective companies.

Graph show is growth with Arrows
Events

Vancouver Board of Trade – Sales Performance Summit – March 14, 2024

A forum on sales success leveraging leadership, AI and sales best practices. Register Here: https://www.boardoftrade.com/events/individual-events/2464-7724 Keep your sales career and sales organization relevant and future-proof at our Sales Performance Summit. Leading sales speakers, sales leaders, sales enablement professionals and sales technology innovators have come together to give you and your sales organization an in-depth, full day program that will kickstart your sales transformation. Benefits: KEYNOTE 1: AI and The Future of Sales Gain insight into the latest trends in sales, AI for sales, and social selling. Shane GibsonChief Executive OfficerThe Professional Sales Academy PANEL 1: Sales Enablement Success Sales operations leaders share insights on enabling personal and sales team success. Panellists: Lesia Nikolaiveva, Head of Sales Enablement, GlobalLogic, a Hitachi Group CompanyShirley Quinn, CPSO, Director, Global Sales Operations, Rocky MountaineerMeena Sandhu, Chief Revenue Officer, SaaS Revenue ConsultingModerator: Claudia Mason, Senior Sales Trainer and Sales Enablement Consultant, The Professional Sales Academy KEYNOTE 2 : From Account Manager to Chief Revenue Officer Redefining sales leadership Meena SandhuChief Revenue OfficerSaaS Revenue Consulting Meena Sandhu is a Chief Revenue Officer with 20+ years of tech startup and SaaS revenue experience. She is a goals and results focused leader with a passion for growing technology companies. Having led sales, marketing, customer success, and product teams at a VP level or higher, Meena brings a unique multifaceted background to her work. This diversity allows her to lead and strategize in a way that unifies teams to work more collaboratively, breaking down silos and driving better results. Meena has helped take companies from 1 to 3 million in annual revenue, 5 to 10 million, and successful exits. She has built conferences from the ground up and has consistently been active in the technology community through teaching, advising, and public speaking. PANEL 2: The Future of Sales A sales leadership panel looking into present trends and how we position ourselves to be the sales organization of the future. Panellists: Colby Fackler, Vice President of Sales, BC Lions Football ClubTasi Gottschlag, Chief Revenue Officer, Copilot AIChristine Van, Head of Field Sales, Red Bull Canada LtdModerator: Shane Gibson, Chief Executive Officer, The Professional Sales Academy

Apps, Featured

Vezgo Surpasses Milestone with 300+ Integrations, Emerging as Premier Crypto Aggregator Amidst Shifting Industry Trends

TORONTO, Feb. 8, 2024 /CNW/ – Vezgo, the most comprehensive crypto API for crypto exchanges and wallets, is proud to announce a milestone in its journey to become the industry’s go-to aggregator. With an unwavering commitment to providing connectivity and comprehensive solutions, Vezgo has successfully integrated with 35 centralized exchanges, 21 blockchains, and over 300 self-custody wallets. “Crypto adoption continues to grow and is becoming a part of more and more investors. It is incredibly important that there is connectivity to these investments so that investors can track them, file their taxes, and receive appropriate advice from their financial advisors,” said Jeff Matte, Managing Director of Vezgo. “Initially, Vezgo was built to allow users to track their crypto investments within Wealthica, Canada’s largest portfolio tracker with over $33 billion in aggregated assets. We then made Vezgo available globally to provide a single solution for all crypto integrations. Today, we have over 40 customers including investment trackers, tax software and compliance tools.” Positive Shifts in Industry Dynamics Amidst the dynamic changes in the cryptocurrency landscape, a transformative narrative is unfolding. Industry titans such as PayPal and Circle have already made significant announcements ahead of the recent approval of exchange-traded funds (ETFs) in the United States. PayPal has ventured into stablecoin creation and 11 ETFs tied to spot bitcoin debut in the U.S. These macro trends, coupled with a surge in compliance-focused crypto projects, have created an opportune environment for Vezgo to thrive. Vezgo – One API, All Crypto Integration With its unique B2B value proposition, Vezgo empowers end-users to seamlessly track their self-directed crypto investments across both Centralized Exchanges (CEXs) and self-custody wallets. The API’s versatility becomes even more apparent as it adapts to the evolving crypto landscape. In line with this achievement, Vezgo’s sister company, Wealthica, a well-known Mint alternative, recently announced the release of its Canadian Wealth API. Recognized as the largest Canadian investment API, Wealthica‘s offering extends beyond traditional investments to include the tracking of cryptocurrencies invested in Canadian exchange-traded funds (ETFs). Most Popular Use Cases: Secure and Compliant Vezgo is SOC 2 Type II certified. Data security and compliance are paramount. The Crypto API is designed with robust security measures to safeguard sensitive financial information. How to Get Started: Interested fintechs can freely access Vezgo’s Crypto API for testing. Developers can review the API documentation and the list of integrations. To receive your trial API keys, sign up on the Vezgo Client Portal, and for partnership opportunities, contact the sales team at hello@vezgo.com. About Vezgo With over 40 global customers, Vezgo is one of the largest crypto APIs. The company was founded in 2021 by the Wealthica team and has received investment from major players in the financial space, including Flinks. The mission is simple: To be the fastest way to connect digital assets & web3 accounts to apps to track entire crypto portfolios in a compliant manner (we are SOC 2 Type 2 certified).

Featured, Start ups

CYBER101 – Free Cybersecurity training for businesses and individuals

MONTREAL, Feb. 12, 2024 /CNW/ – www.cyber101.com is a new platform launched by two Montreal-based entrepreneurs combining their respective expertise in cybersecurity and animation video. This educational website offers a brief and engaging certification process to raise employee awareness about cybersecurity issues in less than an hour. Rising Cybersecurity Incidents in Canada According to Statistics Canada, the proportion of Canadians victimized by cybersecurity incidents increased from 58% in 2020 to 70% in 2022. The most commonly reported incidents were receiving unsolicited emails and fraudulent content. This makes Cyber101’s mission more relevant than ever. According to Guillaume Bélanger, “Our platform provides essential tools to help you stay on top of threats in an increasingly hostile environment.” “When teaching at the McGill Executive Institute, cybersecurity consistently emerges as a critical issue,” emphasizes Benjamin Beauregard, cofounder of Cyber101. “Guillaume and I created this platform because we believe that education is the key to effectively countering cyber threats.” Free Training for Enhanced Cybersecurity Cyber101 offers companies a unique opportunity to educate their employees on best practices in cybersecurity, at no cost. Businesses and individuals can immediately improve their cybersecurity posture in less than an hour. Benefits for Organizations About Cyber101 Cyber101.com is the brainchild of childhood friends and entrepreneurs Guillaume Bélanger and Benjamin Beauregard. Guillaume, president of an IT services company, identified a crucial lack of easily accessible cybersecurity content for SMEs. He partnered with Benjamin, head of a video production agency, to combine their strengths. Cyber101 is committed to making cybersecurity training accessible to as many people as possible to protect organizations across Canada and beyond.

Featured, Security

The Top 2024 Cybersecurity Priorities for CISOs and Security Leaders Revealed in New Report by Info-Tech Research Group

Info-Tech’s Security Priorities 2024 report delves into the pressing issues that IT and security leaders must prioritize over the coming year, including the cybersecurity talent shortage, the rise of AI-driven threats, the integration of security risks with business risks, the adoption of zero-trust frameworks, and the increasing significance of automating security operations. The global IT research and advisory firm explains in the report that by addressing these priorities, organizations can better prepare themselves to face the evolving threat landscape. TORONTO, Feb. 12, 2024 /PRNewswire/ – With cyber threats becoming increasingly sophisticated, organizations are facing unprecedented challenges in safeguarding their digital assets. Recognizing the urgent need for robust and dynamic security strategies, Info-Tech Research Group has published its Security Priorities 2024 report. The report underscores the critical need for organizations to adapt their security measures in response to the constant changes in cyber threats in 2024 and beyond. The firm’s research highlights the importance of a strategic approach, emphasizing the need for clear oversight and effective implementation strategies to develop, deploy, and monitor security initiatives that enhance an organization’s resilience against threats “The threat landscape has been exacerbated by the various emerging attack vectors, such as credential-compromise attacks and cloud exploitation. The increase in supply chain risks and rise in deepfakes also showcase the shift of threat actors to improve the sophistication of their attacks,” says Ahmad Jowhar, research analyst and lead author of the report. “The rising costs of ransomware and cyber insurance premiums coupled with the continuous talent shortage depicts the challenges of efficiently fighting against these threats.” The Security Priorities 2024 report reveals the pressing issues that IT and security leaders must prioritize and advocates for a pivot from traditional, reactive security postures to proactive, predictive security strategies. The annual report emphasizes the importance of fostering a security-centric culture across the organization, enhancing collaboration between security teams and other business units, and developing agile security frameworks that can adapt to new threats and business needs. “The emergence of advanced technologies has created opportunities for organizations and security leaders to explore unique approaches to these challenges while also enhancing existing capabilities to better equip themselves with the right people, process, and technology this year,” says Jowhar. “These approaches include assessing the ability to address the talent shortage through upskilling, establishing a foundation to implement AI technologies, and evaluating an organization’s security risk management with respect to integrating with the enterprise.” Info-Tech’s latest report is based on comprehensive research, including insights from the firm’s Future of IT survey and in-depth interviews with IT and security professionals across various industries and regions. The diverse approach ensured that the experiences of leaders from both small and large organizations were incorporated into the report and covered a broad spectrum of security budgets. The insights collected and analyzed by the firm reflect the realities of managing cybersecurity in different organizational contexts, from multinational corporations to nimble startups, providing a well-rounded view of the challenges and strategies at play in the current security landscape. Leveraging the firm’s research findings and data, the Security Priorities 2024 report outlines the following five high-priority initiatives security leaders and their organizations should implement to confidently address security risks for 2024 and the years to come: The 2024 report also includes customizable templates that security leaders can utilize to effectively communicate their organization’s key security priorities to stakeholders and executives, ensuring a clear understanding of the required security measures. In the face of ever-evolving cyber threats, the Security Priorities 2024 report provides security leaders with a blueprint for safeguarding their digital environment. By implementing the priorities based on their unique organizational goals and needs, security leaders can enhance their security posture, proactively address and mitigate vulnerabilities, and build a culture of resilience against the cyber threats of the future. Those interested in exploring the specific 2024 security priorities recommended by Info-Tech Research Group are invited to register for the firm’s webinar on Wednesday, February 28, at 1:00 PM ET / 10:00 AM PT. About Info-Tech Research Group Info-Tech Research Group is one of the world’s leading information technology research and advisory firms, proudly serving over 30,000 professionals. The company produces unbiased and highly relevant research to help CIOs and leaders make strategic, timely, and well-informed decisions. For more than 25 years, Info-Tech has partnered closely with IT teams to provide them with everything they need, from actionable tools to analyst guidance, ensuring they deliver measurable results for their organizations. Media professionals can register for unrestricted access to research across IT, HR, and software and hundreds of industry analysts through the firm’s Media Insiders program. To gain access, contact pr@infotech.com. For information about Info-Tech Research Group or to view the latest research, visit infotech.com and connect via LinkedIn and X.

Featured, Security

Enhancing Cybersecurity and Productivity: How Cisco Duo Helps You

In the ever-evolving landscape of cybersecurity, protecting sensitive data and ensuring secure access to critical resources is paramount. Cisco Duo, a multi-factor authentication (MFA) and access security solution, has emerged as a powerful tool that helps individuals and organizations bolster their cybersecurity efforts while simultaneously improving productivity. In this article, we will explore how Cisco Duo can benefit you and your organization. 1. Strong Authentication with Multi-Factor Authentication (MFA): Cisco Duo strengthens your digital defenses by requiring multiple authentication factors, ensuring that only authorized users gain access to your systems and data. MFA typically combines something you know (e.g., a password), something you have (e.g., a mobile device), and something you are (e.g., fingerprint or facial recognition). This multi-layered approach significantly reduces the risk of unauthorized access. 2. Streamlined User Experience: While enhancing security, Cisco Duo also prioritizes user convenience. Its intuitive interface and user-friendly mobile app make MFA a seamless part of your daily routine. Users can quickly and easily confirm their identity through push notifications, one-time passcodes, or even biometrics, reducing friction and frustration. 3. Protecting Against Phishing and Account Takeover: Phishing attacks and account takeovers are common cybersecurity threats. Cisco Duo helps protect against these threats by verifying the legitimacy of login attempts. Even if attackers acquire usernames and passwords, they won’t be able to access accounts without the additional MFA verification. 4. Adaptive Access Policies: Cisco Duo goes beyond traditional MFA with its adaptive access policies. It evaluates contextual data, such as the user’s location, device, and network, to determine the level of access. This ensures that users have the right level of access based on their specific circumstances, further improving security. 5. Remote Work Enablement: In an increasingly remote work-oriented world, Cisco Duo empowers organizations to embrace flexible work arrangements without compromising security. It allows remote workers to access company resources securely, safeguarding data and systems from potential breaches. 6. Comprehensive Integration: Cisco Duo seamlessly integrates with a wide range of applications, services, and VPNs, making it a versatile solution for organizations of all sizes. Whether you’re using cloud-based services or on-premises applications, Cisco Duo can provide robust security. 7. Reporting and Analytics: To better understand your security posture, Cisco Duo offers reporting and analytics tools. These insights allow you to monitor access patterns, detect anomalies, and proactively address potential threats. 8. Regulatory Compliance: For organizations subject to industry regulations and compliance standards, such as HIPAA, GDPR, or PCI DSS, Cisco Duo helps meet these requirements by enhancing access security and providing audit trails. In conclusion, Cisco Duo is a powerful cybersecurity tool that not only strengthens your digital defenses but also improves the user experience and productivity. By implementing multi-factor authentication, protecting against phishing, enabling remote work, and offering adaptive access policies, Cisco Duo is a comprehensive solution that adapts to the evolving cybersecurity landscape. In a world where data security is paramount, Cisco Duo helps you protect your valuable assets and achieve peace of mind.

Featured, Security

5 Essential Strategies to Safeguard Against Cyberthreats

In today’s digital age, protecting yourself from cyberthreats has become more crucial than ever. Cybercriminals are constantly evolving and finding new ways to exploit vulnerabilities in our online activities. To help you stay one step ahead, we’ve compiled five essential strategies to safeguard yourself from these cyber dangers. 1. Strong Password Management: One of the simplest yet most effective ways to protect yourself from cyberthreats is to maintain strong and unique passwords for all your online accounts. Avoid using easily guessable combinations like “12345” or “password.” Instead, create complex passwords with a mix of uppercase and lowercase letters, numbers, and symbols. Consider using a reputable password manager to keep track of your credentials securely. 2. Keep Software Updated: Cybercriminals often target vulnerabilities in outdated software. To minimize these risks, ensure that your operating system, web browsers, and applications are regularly updated with the latest security patches. By staying current, you can close potential entry points for cyberattacks. 3. Install Reliable Antivirus Software: Invest in reputable antivirus and anti-malware software to add an extra layer of defense to your devices. These programs can detect and prevent various forms of cyber threats, such as viruses, spyware, and phishing attempts. Regularly update your antivirus software to ensure it’s equipped to handle emerging threats. 4. Educate Yourself and Stay Informed: Understanding common cyberthreats and their telltale signs is crucial for your protection. Educate yourself about phishing scams, social engineering tactics, and other malicious activities that cybercriminals employ. Stay informed by following cybersecurity blogs and news outlets to keep up with the latest trends and threats in the digital world. 5. Practice Safe Online Behavior: Your online behavior plays a significant role in your cybersecurity. Avoid clicking on suspicious links, downloading attachments from unknown sources, and sharing sensitive information with unverified contacts. Be cautious on social media and limit the personal information you share. By practicing safe online behavior, you reduce the chances of falling victim to cyberthreats. In conclusion, safeguarding yourself from cyberthreats requires a combination of proactive measures and a vigilant mindset. By adopting strong password management, keeping your software updated, using reliable antivirus software, educating yourself, and practicing safe online behavior, you can significantly reduce your vulnerability to cyberattacks. Protecting your digital life is an ongoing process, and staying informed and vigilant is key to staying safe in an increasingly connected world. Yugbodh (YB) is a contributing writer at TechBeat Canada, he skillfully weaves captivating stories. For him music and movies serves as an escape, and he finds them fascinating as they constantly evolve. If you have interesting tales to share, feel free to reach out via email at: info@theonside.com

Featured, Start ups

Vena Joins Cloud Security Alliance as a Trusted Cloud Provider

Strategic partnership strengthens company’s ongoing commitment to safeguarding customer data TORONTO, Oct. 19, 2023 /PRNewswire/ — Vena, the Complete Planning platform loved by finance and trusted by business, today announced that it has joined the Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining and raising awareness of best practices to help ensure a secure cloud computing environment. This strategic partnership underscores Vena’s unwavering commitment to safeguarding its customers’ data. As a Trusted Cloud Provider with the Cloud Security Alliance, Vena reinforces its dedication to the security of its cloud-based corporate performance management software—which is trusted by over 1,600 leading organizations worldwide. “Joining the Cloud Security Alliance further strengthens our commitment to data security at Vena,” said Steve Browning, VP of Data Privacy & Corporate Security at Vena. “In today’s rapidly evolving business landscape, data security is paramount. By collaborating with other CSA members and industry experts, Vena will have access to the latest insights, research and resources to continually enhance its security measures and foster knowledge exchange and innovation in cloud security.” Vena remains focused on providing its customers with secure, reliable and user-friendly CPM software. As a Trusted Cloud Provider with CSA, Vena will continue to refine its security posture and practices, ensuring the highest level of data protection for its customers. “This partnership exemplifies our dedication to providing our customers with the highest level of data protection, ensuring their trust and confidence in our services,” said Hugh Cumming, Chief Technology Officer at Vena. “Together, with other CSA members, we are shaping the future of secure cloud computing, setting new standards and reaffirming our promise to prioritize the privacy and security of our valued customers.” To learn more about Vena’s commitment to Customer Trust, please visit www.venasolutions.com/trust. About Vena Vena is the only Complete Planning platform that’s natively integrated with Microsoft 365, empowering teams to plan the way they think. Vena streamlines financial and operational planning, reporting and analysis processes, and provides advanced analytics and modeling capabilities to help business, finance and operations leaders make informed business decisions. With Vena, you can leverage the power of Excel and AI-powered insights in a unified, cloud-based platform that enhances collaboration, scalability and security. Over 1,600 of the world’s leading companies rely on Vena to power their planning. For more information, visit venasolutions.com. About the Cloud Security AllianceThe Cloud Security Alliance (CSA) is the world’s leading organization dedicated to defining and raising awareness of best practices to help ensure a secure cloud computing environment. CSA harnesses the subject matter expertise of industry practitioners, associations, governments, and its corporate and individual members to offer cloud security-specific research, education, certification, events and products. CSA’s activities, knowledge and extensive network benefit the entire community impacted by cloud—from providers and customers, to governments, entrepreneurs and the assurance industry—and provide a forum through which diverse parties can work together to create and maintain a trusted cloud ecosystem. For further information, visit us at www.cloudsecurityalliance.org, and follow us on Twitter @cloudsa.

Fintech

Canadian securities regulators clarify interim approach to value-referenced crypto assets

TORONTO, Oct. 5, 2023 /CNW/ – The Canadian Securities Administrators (CSA) is today providing further clarity and guidance to crypto asset trading platforms about its interim approach to the trading of value-referenced crypto assets (some of which are commonly referred to as “stablecoins”). On February 22, 2023, the CSA reaffirmed its view that value-referenced crypto assets, which are designed and promoted to maintain a stable value over time in relation to a reference asset, may constitute securities and/or derivatives. While crypto asset trading platforms operating in Canada are prohibited from trading crypto assets that are securities and/or derivatives, the CSA understands that value-referenced crypto assets may have certain uses for the Canadian clients of crypto asset trading platforms.   Accordingly, the CSA indicated that it may allow, subject to terms and conditions, the continued trading of certain value-referenced crypto assets that are referenced to the value of a single fiat currency (fiat-backed crypto assets). Today’s notice sets out interim terms and conditions that would apply to crypto asset trading platforms and the issuers of fiat-backed crypto assets if they wish to continue allowing Canadian clients to purchase or deposit these assets. “The transparency of value-referenced crypto assets about the composition and adequacy of their reserves and their governance are critical issues that must be addressed to protect Canadian investors and the integrity of our capital markets,” said Stan Magidson, CSA Chair and Chair and CEO of the Alberta Securities Commission. “This interim framework, which we will build upon in the future, sets certain standards to help ensure that investors receive the information they need about the assets they are purchasing, including the risks associated with them.” The interim terms and conditions were informed in part by comments from Canadian crypto market participants, as well as developing international standards and regulations. They are intended to address investor protection concerns presented by value-referenced crypto assets and include, among other things, the following provisions: The complete list of terms and conditions, as well as instructions for crypto asset trading platforms that wish to continue allowing clients to buy or deposit value-referenced crypto assets is available in CSA Staff Notice 21-333 Crypto Asset Trading Platforms: Terms and Conditions for Trading Value-Referenced Crypto Assets with Clients on CSA members’ websites. The CSA cautions Canadian investors that value-referenced crypto assets, including any fiat-backed crypto assets that satisfy the interim terms and conditions, are subject to various risks and are not the same as fiat currency. The fact that an asset satisfies these interim terms and conditions should not be viewed as an endorsement or approval of the asset, nor give any indication that the asset is risk-free. The CSA welcomes submissions regarding the appropriate long-term regulation of value-referenced crypto assets, such as alternative criteria for trading other types of value-referenced crypto assets. Crypto asset trading platforms and value-referenced crypto asset issuers should contact their Principal Regulator with any questions or to discuss further. The CSA, the council of the securities regulators of Canada’s provinces and territories, coordinates and harmonizes regulation for the Canadian capital markets. For investor inquiries, please contact your local securities regulator. SOURCE Canadian Securities Administrators

Scroll to Top