{"id":15917,"date":"2026-03-07T00:40:54","date_gmt":"2026-03-07T00:40:54","guid":{"rendered":"https:\/\/newestek.com\/?p=15917"},"modified":"2026-03-07T00:40:54","modified_gmt":"2026-03-07T00:40:54","slug":"identity-management-and-information-security-news-for-the-week-of-march-6th-delinea-mimecast-predactiv-and-more","status":"publish","type":"post","link":"https:\/\/newestek.com\/?p=15917","title":{"rendered":"Identity Management and Information Security News for the Week of March 6th: Delinea, Mimecast, Predactiv, and More"},"content":{"rendered":"<div>\n<p style=\"text-align: justify;\"><em><strong>The editors at Solutions Review have curated this list of the most noteworthy Identity Management and Information Security news from the week of March 6th. This round-up covers announcements and updates from Delinea, Mimecast, Predactiv, <\/strong><\/em><em><strong>and more.<\/strong><\/em><\/p>\n<p style=\"text-align: justify;\">Keeping tabs on all the most relevant\u00a0<strong><a href=\"https:\/\/solutionsreview.com\/identity-management\/\" target=\"_blank\" rel=\"noopener\">Identity Management<\/a><\/strong>\u00a0and\u00a0<strong><a href=\"https:\/\/solutionsreview.com\/security-information-event-management\/\" target=\"_blank\" rel=\"noopener\">Information Security<\/a><\/strong> news can be time-consuming. As a result, our editorial team aims to summarize some of the top headlines in the space by curating a collection of the latest vendor product news, mergers and acquisitions, venture capital funding, talent acquisition, and other noteworthy news. With that in mind, here is some of the top identity management and information security news from the week of March 6th.<\/p>\n<p style=\"text-align: justify;\">\n<div class=\"box box3\">For early access to all the expert insights published on Solutions Review, <strong><em><a class=\"article-editor-content__link article-editor-content__link\" href=\"https:\/\/insightjam.com\/feed\" target=\"_blank\" rel=\"noopener noreferrer\">join Insight Jam<\/a><\/em><\/strong>, a community dedicated to enabling the human conversation on AI.<\/div>\n<h2 style=\"text-align: center;\"><strong>Identity Management and Information Security News for the Week of March 6th<\/strong><\/h2>\n<hr>\n<h3><a href=\"https:\/\/checkr.com\/resources\/articles\/checkr-identity-verification\" target=\"_blank\" rel=\"noopener\"><strong>Checkr Announces a New Identity Verification Service<\/strong><\/a><\/h3>\n<p style=\"text-align: justify;\">Checkr, an employee background screening service provider, has introduced a new identity verification service that integrates government ID checks, biometrics, and knowledge-based authentication to streamline remote employee onboarding and compliance. The new offering addresses the rising demand for secure, scalable identity proofing amid hybrid work and regulatory pressures, including those from the FTC and the EU. Unlike general-purpose identity solutions, Checkr\u2019s service is embedded directly into the hiring workflow and can run alongside background checks or at key moments in the candidate journey.<\/p>\n<p><a href=\"https:\/\/checkr.com\/resources\/articles\/checkr-identity-verification\" target=\"_blank\" rel=\"noopener\"><strong>Read on for more.<\/strong><\/a><\/p>\n<hr>\n<h3><a href=\"https:\/\/www.businesswire.com\/news\/home\/20260303546965\/en\/DataDome-Launches-Enhanced-Partner-Program-Built-for-Depth\" target=\"_blank\" rel=\"noopener\"><strong>DataDome Launches an Enhanced Partner Program<\/strong><\/a><\/h3>\n<p style=\"text-align: justify;\">DataDome, a bot and agent trust management provider, has launched an enhanced partner program with tiered reseller levels\u2014Authorized, Growth, and Strategic. The company also announced a referral track that links resellers to its bot management tech and cloud alliances via a new portal for deal registration and resources. Cynthia Dunphy, Director of Channel Sales at DataDome, says, \u201cWe built this program around quality and connection, not just scale, to be more intentional and more connected, so resellers can plug into a broader ecosystem and collaborate around what customers actually need.\u201d<\/p>\n<p><a href=\"https:\/\/www.businesswire.com\/news\/home\/20260303546965\/en\/DataDome-Launches-Enhanced-Partner-Program-Built-for-Depth\" target=\"_blank\" rel=\"noopener\"><strong>Read on for more.<\/strong><\/a><\/p>\n<hr>\n<h3><a href=\"https:\/\/delinea.com\/news\/delinea-acquires-strongdm-to-secure-ai-with-continuous-authorization\" target=\"_blank\" rel=\"noopener\"><strong>Delinea Completes Its Acquisition of StrongDM<\/strong><\/a><\/h3>\n<p style=\"text-align: justify;\">Delinea, a company focused on securing human and machine identities through centralized authorization, has completed its acquisition of StrongDM, an access management company purpose-built for modern engineering, DevOps, and AI-driven environments. Now that the acquisition is complete, Delinea can merge enterprise PAM with just-in-time runtime authorization to enforce zero standing privilege across human and machine identities in AI-driven infrastructures. This will help security teams in finance and cloud-native ops achieve real-time governance via Delinea Iris AI, balancing developer speed with compliance.<\/p>\n<p><a href=\"https:\/\/delinea.com\/news\/delinea-acquires-strongdm-to-secure-ai-with-continuous-authorization\" target=\"_blank\" rel=\"noopener\"><strong>Read on for more.<\/strong><\/a><\/p>\n<hr>\n<h3><a href=\"https:\/\/www.prnewswire.com\/news-releases\/keeper-security-launches-native-jira-integrations-to-unify-security-incident-response-and-privileged-access-governance-302703481.html\" target=\"_blank\" rel=\"noopener\"><strong>Keeper Security Debuts Two Native Jira Apps<\/strong><\/a><\/h3>\n<p style=\"text-align: justify;\">Keeper Security, a zero-trust and zero-knowledge identity security and Privileged Access Management (PAM) platform, has released two Forge-based Jira apps. The apps include the Jira ITSM integration, which handles security events and incidents, and the Jira Workflow integration, which governs how access is requested and granted in response to those events or broader operational needs. Together, these tools can connect detection, response, and access enforcement in Jira, while ensuring Keeper remains the system of record for security controls. The Jira Workflow integration can also leverage Keeper\u2019s Commander Service Mode to keep cryptographic operations within the customer\u2019s environment.<\/p>\n<p><a href=\"https:\/\/www.prnewswire.com\/news-releases\/keeper-security-launches-native-jira-integrations-to-unify-security-incident-response-and-privileged-access-governance-302703481.html\" target=\"_blank\" rel=\"noopener\"><strong>Read on for more.<\/strong><\/a><\/p>\n<hr>\n<h3><a href=\"https:\/\/www.mimecast.com\/resources\/press-releases\/sohr-26\/\" target=\"_blank\" rel=\"noopener\"><strong>Mimecast Releases the 2026 State of Human Risk Report<\/strong><\/a><\/h3>\n<p style=\"text-align: justify;\">Mimecast, a global company committed to managing human risk, has released its 2026 State of Human Risk Report. The report\u2019s findings show that 42 percent of organizations experienced increases in both malicious and negligent insider incidents last year, with six monthly incidents costing $13.1M each on average. Findings also showed that AI threat preparation lags despite inevitable attacks; a critical coordination gap often undermines defenses; governance failures create regulatory time bombs; and most organizations remain reliant solely on native security controls.<\/p>\n<p><a href=\"https:\/\/www.mimecast.com\/resources\/press-releases\/sohr-26\/\" target=\"_blank\" rel=\"noopener\"><strong>Read on for more.<\/strong><\/a><\/p>\n<hr>\n<h3><a href=\"https:\/\/www.prnewswire.com\/news-releases\/predactiv-launches-secure-pii-onboarding--identity-integration-with-liveramp-302703546.html\" target=\"_blank\" rel=\"noopener\"><strong>Predactiv Reveals an Integration with LiveRamp<\/strong><\/a><\/h3>\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\" style=\"text-align: justify;\">Predactiv, a data and technology company, has announced an integration with LiveRamp, a data collaboration provider. The integration will enable data owners to onboard PII\u2014names, emails, phone numbers\u2014and convert it into privacy-safe IDs, such as HEMs and MAIDs, for use in its platform\u2019s modeling, analytics, and activation. For example, the integration allows data owners and Predactiv clients to securely send PII to LiveRamp for identity resolution, translate it into privacy-compliant identifiers, and seamlessly onboard those identifiers into The Predactiv Data Platform.<\/p>\n<p><a href=\"https:\/\/www.prnewswire.com\/news-releases\/predactiv-launches-secure-pii-onboarding--identity-integration-with-liveramp-302703546.html\" target=\"_blank\" rel=\"noopener\"><strong>Read on for more.<\/strong><\/a><\/p>\n<hr>\n<h3><a href=\"https:\/\/www.businesswire.com\/news\/home\/20260303243859\/en\/RecordPoint-Expands-AI-Governance-Capabilities-with-New-MCP-Server-Integration\" target=\"_blank\" rel=\"noopener\"><strong>RecordPoint Announces a Model Context Protocol Server<\/strong><\/a><\/h3>\n<p style=\"text-align: justify;\">RecordPoint, a platform for data and AI governance, has launched a Model Context Protocol (MCP) Server to provide enterprises with a secure, standardized way to expose governed data to external AI agents and platforms. The new Server is designed to allow any AI system\u2014copilots, agents, or custom LLM apps\u2014to safely access governed, compliant data from the RecordPoint platform without custom integrations or elevated permissions. Joseph Pearce, RecordPoint\u2019s Head of Product, says, \u201cIf you\u2019re building AI agents, deploying AI platforms, or scaling AI adoption across the enterprise, the RecordPoint MCP Server gives you the governed data connectivity you need without the security and compliance headaches.\u201d<\/p>\n<p><a href=\"https:\/\/www.businesswire.com\/news\/home\/20260303243859\/en\/RecordPoint-Expands-AI-Governance-Capabilities-with-New-MCP-Server-Integration\" target=\"_blank\" rel=\"noopener\"><strong>Read on for more.<\/strong><\/a><\/p>\n<hr>\n<h2 style=\"text-align: center;\"><strong>Expert Insights Section<\/strong><\/h2>\n<hr>\n<p style=\"text-align: justify;\">Watch this space each week as our editors will share upcoming events, new thought leadership, and the best resources from\u00a0<i>Insight Jam<\/i>, Solutions Review\u2019s <a class=\"fui-Link ___10kug0w f3rmtva f1ewtqcl fyind8e f1k6fduh f1w7gpdv fk6fouc fjoy568 figsok6 f1hu3pq6 f11qmguv f19f4twv f1tyq0we f1g0x7ka fhxju0i f1qch9an f1cnd47f fqv5qza f1vmzxwi f1o700av f13mvf36 f1cmlufx f9n3di6 f1ids18y f1tx3yz7 f1deo86v f1eh06m1 f1iescvh fhgqx19 f1olyrje f1p93eir f1nev41a f1h8hb77 f1lqvz6u f10aw75t fsle3fq f17ae5zn external\" title=\"https:\/\/insightjam.com\/share\/8qpqn88mnqikpnxu?utm_source=manual\" href=\"https:\/\/insightjam.com\/feed\" target=\"_blank\" rel=\"noreferrer noopener nofollow\" aria-label=\"Link enterprise tech community for business software pros\"><strong><u>enterprise tech community for business software pros<\/u><\/strong><\/a>. The goal? To help you gain a forward-thinking analysis and remain on-trend through expert advice, best practices, trends, predictions, and vendor-neutral software evaluation tools.<\/p>\n<hr>\n<h3><a href=\"https:\/\/www.youtube.com\/watch?v=oj4shm_-xpE\" target=\"_blank\" rel=\"noopener\"><strong>Why Traditional Security Frameworks Can\u2019t Handle AI | The Cyber Circuit<\/strong><\/a><\/h3>\n<p style=\"text-align: justify;\">AI governance has become the defining challenge for security leaders in 2026, and most organizations are making up the rules as they go. For this episode of The Cyber Circuit, Michael Morgenstern sits down with Manju Mude, a cybersecurity executive with over 25 years of experience, to explore why traditional compliance frameworks are breaking down in the age of autonomous agents, how auditors are overwhelmed by machine-speed decision-making, and why waiting for regulations to catch up is a losing strategy.<\/p>\n<p><a href=\"https:\/\/www.youtube.com\/watch?v=oj4shm_-xpE\" target=\"_blank\" rel=\"noopener\"><strong>Watch Here.<\/strong><\/a><\/p>\n<hr>\n<h3><a href=\"https:\/\/solutionsreview.com\/business-intelligence\/what-to-expect-at-insight-jams-expert-briefing-with-donald-farmer-on-march-31\/\" target=\"_blank\" rel=\"noopener\"><strong>What to Expect at Insight Jam\u2019s Expert Briefing with Donald Farmer on March 31st<\/strong><\/a><\/h3>\n<p style=\"text-align: justify;\">In this inaugural session, renowned analytics authority Donald Farmer joins Insight Jam to examine why analytics leadership represents the \u201clast mile\u201d of successful AI adoption\u2014where data strategy, organizational readiness, and human judgment ultimately determine whether AI delivers real business value. Designed for analytics, BI, and data leaders responsible for translating AI potential into operational impact, this briefing offers a practitioner-level perspective on what it actually takes to move from AI ambition to durable enterprise outcomes.<\/p>\n<p><a href=\"https:\/\/solutionsreview.com\/business-intelligence\/what-to-expect-at-insight-jams-expert-briefing-with-donald-farmer-on-march-31\/\" target=\"_blank\" rel=\"noopener\"><strong>Read on for more.<\/strong><\/a><\/p>\n<hr>\n<h3><a href=\"https:\/\/solutionsreview.com\/identity-management\/from-visibility-to-action-where-the-leverage-lives-in-modern-security-operations\/\" target=\"_blank\" rel=\"noopener\"><strong>From Visibility to Action: Where the Leverage Lives in Modern Security Operations<\/strong><\/a><\/h3>\n<p style=\"text-align: justify;\">Ivan Dwyer, a Senior Product Marketing Strategist at Axonius, examines where the leverage lives in modern security operations. He says, \u201cOrganizations have built impressive security stacks, each tool serving controls for a specific domain: endpoint protection, identity management, cloud security, vulnerability scanning, and network monitoring. These investments are working. The coverage is broad, the telemetry is rich, and the compensating controls are doing their jobs. But here\u2019s the catch: exposures don\u2019t respect domain boundaries.\u201d<\/p>\n<p><a href=\"https:\/\/solutionsreview.com\/identity-management\/from-visibility-to-action-where-the-leverage-lives-in-modern-security-operations\/\" target=\"_blank\" rel=\"noopener\"><strong>Read on for more.<\/strong><\/a><\/p>\n<hr>\n<p style=\"text-align: center;\"><em style=\"text-align: center;\">For consideration in future news round-ups, send your announcements to wjepma@solutionsreview.com.<\/em><\/p>\n<p>The post <a href=\"https:\/\/solutionsreview.com\/identity-management\/identity-management-and-information-security-news-for-the-week-of-march-6th-delinea-mimecast-predactiv-and-more\/\">Identity Management and Information Security News for the Week of March 6th: Delinea, Mimecast, Predactiv, and More<\/a> appeared first on <a href=\"https:\/\/solutionsreview.com\/identity-management\">Best Identity Access Management (IAM) Software, Tools, Vendors, Solutions, &amp; Services<\/a>.<\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>The editors at Solutions Review have curated this list of the most noteworthy Identity Management and Information Security news from the week of March 6th. This round-up covers announcements and updates from Delinea, Mimecast, Predactiv, and more. Keeping tabs on all the most relevant\u00a0Identity Management\u00a0and\u00a0Information Security news can be time-consuming. As a result, our editorial team aims to summarize some of the top headlines in&#8230; <\/p>\n<p class=\"more\"><a class=\"more-link\" href=\"https:\/\/newestek.com\/?p=15917\">Read More<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-15917","post","type-post","status-publish","format-standard","hentry","category-uncategorized","is-cat-link-borders-light is-cat-link-rounded"],"_links":{"self":[{"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/posts\/15917","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=15917"}],"version-history":[{"count":0,"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/posts\/15917\/revisions"}],"wp:attachment":[{"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=15917"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=15917"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=15917"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}