News – May 22, 2026

News for today:

  • [Anthropic] Updates to the Claude Compliance API. Anthropic updated its Compliance API for Claude Enterprise and Claude Platform, adding audit log events and integrations for security tools. A long list of security firms announced integrations. Anthropic
  • [Varonis] Integration with Claude Compliance API. Varonis announced a new integration that brings activity from Claude Enterprise and Claude Platform into the Varonis Atlas AI Security Platform, for monitoring AI usage and misuse. For Claude Enterprise: Varonis Atlas ingests Claude Enterprise activity and administrative events, enabling security and governance teams to: [1] Monitor conversational content, including chats, uploaded files, and projects; [2] Detect anomalies and misuse in real time; and [3] Maintain audit records to support internal governance and compliance assessments. Varonis
  • [Cribl] Integration with Claude Compliance API. Cribl integrated with the Compliance API for customers using Claude Enterprise. As enterprises deploy Claude at scale, security and compliance teams need the same visibility into Claude usage that they have for every other enterprise application in their stack. Available now to joint customers, this integration lets organizations extend the data loss prevention, monitoring, retention, and audit workflows they already run to Claude. Cribl
  • [Mimecast] Ditto, for conversation context. Mimecast integrated with the Compliance API, too, for governance of conversations. With this integration, Mimecast customers can now preserve, search, produce and archive Claude Enterprise conversations, file attachments, projects, and generated artifacts — using the same workflows and legal hold controls they rely on for every other data source. No new interface. No retraining. Just one unified governance experience that now includes enterprise AI. Mimecast
  • [Tenable] Ditto. Tenable, too. The integration with the Claude Compliance API will leverage visibility into user interactions to detect malicious and suspicious activity. This capability allows organizations to safely adopt Claude Enterprise across the organization without losing visibility into how users engage with it. Organizations can monitor for compliance and threats by auditing interactions to ensure alignment with corporate acceptable-use policies and global regulations like the EU AI Act. It also improves overall visibility into how users utilize AI platforms, specifically Claude, and it provides customers with a better understanding of which identities are accessing and employing Claude as well as the exposure and attack paths these identities are a part of. Tenable
  • [CrowdStrike] Ditto, Falcon. CrowdStrike integrated with the API, too, for its SIEM and SOAR platforms. The integration ingests activity data from Claude’s Compliance API into Falcon Next-Gen SIEM and Charlotte Agentic SOAR, making Claude activity part of the broader security dataset. By unifying AI signals with Falcon platform data across endpoint, identity, and cloud, organizations can extend existing security operations to cover AI usage at scale. CrowdStrike
  • [SailPoint] And SailPoint for identity governance and visibility. SailPoint’s on the list. The SailPoint Claude Compliance API connector extends SailPoint’s enterprise-grade identity security to Anthropic’s Claude Enterprise, enabling organizations to confidently adopt AI while maintaining stringent security and compliance standards. SailPoint
  • [Netskope] And again. Netskope’s One platform is now connected to Claude Enterprise. By surfacing Claude activity within the Netskope One Platform, organizations can govern Claude using the same risk frameworks, DLP profiles, and compliance controls they already operate, without adding operational overhead. Netskope
  • [MIND] Joined Anthropic’s Cyber Verification Program. MIND said that it’s now part of Anthropic’s Cyber Verification Program, and will be using Claude to improve its AI-native DLP platform. For MIND, this means developing advanced data classification methods, data exfiltration patterns, insider threat behavior and threat modeling that mirrors how attackers target sensitive information. MIND

Discover more from Osterman Research

Subscribe now to keep reading and get access to the full archive.

Continue reading