SentinelOne plans to ax approximately 105 workers after a significant drop in data usage for products with consumption-based pricing caused revenue to fall short of expectations. The company revealed plans to reduce its staff by 5% to remain on track with achieving non-GAAP profitability next year.
Learn about best practices for privileged access management (PAM) in the context of how you’d secure valuables in your own home. In this episode of The Drawing Board, our experts discuss three PAM controls for guarding the pathways leading to the most sensitive resources in your house:
Relying on basic endpoint protection is a recipe for stress and anxiety for your SecOps team. As threats become more complex, move to a platform that:
Uniquely combines network and endpoint detection technologies.
Provides elite prevention, detection and response efficacy.
Offers a multitude of managed services...
As technology progresses, breaches progress and with hybrid work environments as the new norm, this means more devices are outside of the corporate network.
The question organizations must ask is how can users securely perform their work with a set of least privileges while preventing business disruption?
The...
In the latest weekly update, ISMG editors discuss how Russia's invasion of Ukraine upended the cybercrime ecosystem, a lawsuit against a U.S. cardiovascular clinic that seeks a long list of security improvements, and the latest endpoint protection technology trends in the Gartner Magic Quadrant.
Rapid7 has purchased a ransomware prevention vendor founded by a former Israel Defense Forces captain to strengthen its managed detection and response muscle. The Minerva Labs purchase will allow Rapid7 to deliver advanced ransomware prevention across cloud resources and traditional infrastructure.
Mason Swenson, vice president of product management, CrashPlan
Endpoint detection and response is a great defense - but not entirely enough to protect all data in the event of a devastating cyberattack. Enter endpoint backups, which provide extra levels of resiliency, recovery and compliance, says Mason Swenson of...
CrowdStrike hopes to capture more small and midsized organizations through a new product bundle, revamped e-commerce portal and renewed partnership with Dell. CEO George Kurtz says becoming the exclusive endpoint security partner of PC giant Dell will help CrowdStrike reach small businesses.
Cybereason has gone all-in on helping customers mitigate threats beyond the endpoint to minimize the impact of ongoing SOC staffing challenges, CEO Lior Div says. The company's focus on tracking and following malicious operations sets Cybereason's approach to XDR apart from rivals.
Many of today’s cybercriminals can bypass traditional defenses at will. This leaves businesses exposed to ransomware, credential harvesting and other types of attacks that can cost $8,000 per hour from the time of the
known attack to remediation.
Download this eBook to learn about:
Managing Risk and...
After years of digital transformation, cloud migration and deployment of hybrid workforces, enterprises have more endpoints than ever, which makes it important to take endpoint security to a whole new level. Pat Correia of Cisco Security shares five tips for choosing endpoint security.
SentinelOne plans to go after more Fortune 500 and Global 2000 organizations as the economic downturn prompts customers to shrink the size of their purchases. Over the past year, the company doubled the number of clients spending at least $100,000 and $1 million with SentinelOne annually.
A longer sales cycle for small businesses and delayed subscription start dates for large enterprises have forced CrowdStrike to lower its sales forecast going forward. The Austin-based endpoint security company says deals with SMB clients took 11% longer to close in the fiscal quarter ended Oct. 31.
As they turn their attention to identity-focused attack surfaces, threat actors are identifying on-premise and cloud-hosted Active Directory (AD) environments as primary targets.
For most enterprises, AD is the central repository for all accounts and systems within the network, and it is responsible for all...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.