Corelight has cemented partnerships with incident response firms and extended its capabilities from large enterprises to midsized enterprises to further the reach of its technology. Corelight allows its product to be used by CrowdStrike's incident response team during network-based investigations.
Microsoft and CrowdStrike once again dominate Gartner's Magic Quadrant for Endpoint Protection. Cybereason has risen to the leaders quadrant and Trellix has fallen to a niche player. The endpoint protection market has rapidly matured in recent years - 50% of organizations have already adopted EDR.
77% of organizations say MDR providers improved overall security according to ESG’s Report “What Security Teams Want from MDR Providers”. Many security leaders are using MDR services so they can respond to threats 24/7, gain assurance that sophisticated adversaries have not obtained access to their systems and...
Managed detection and response titan Deepwatch has received a $180 million investment to strengthen its threat analytics, user interface and security scoring for clients. The money from Splunk, Springcoast and Vista will allow Deepwatch to invest in R&D, platform innovation and threat intelligence.
Secureworks has axed roughly 210 employees, and CFO Paul Parrish and Chief Threat Intelligence Officer Barry Hensley are leaving their posts. Secureworks revealed plan to reduce its 2,351-person staff by approximately 9% to help balance continued growth with improved operating margins.
Companies can be blinded by their inside-out view and often benefit from another set of eyes that see their business the same way an attacker would, says IBM's Mary O'Brien. IBM's acquisition of attack surface management firm Randori gives clients another view of areas that need to be remediated.
Incumbent XDR platforms target large enterprises with access to a full security operations center, threat hunters and incident response teams, says Bitdefender CEO Florin Talpes. But firms looking to successfully serve the SMB market need to modify their XDR tools to address the skills shortage.
Trellix will debut a console that offers endpoint, security operations and data protection capabilities and a plug-in for network detection and response. The company has moved FireEye's best-in-class detection engines to the cloud for NDR and examined how to address areas such as packet capture.
eSentire has used the $325 million it received in February to leverage data from its Atlas XDR platform and strengthen customers' positions around cyber resiliency. The Kitchener, Canada-based company has shifted its focus from alerts and data to business worries and business risk.
Cybereason has gone all-in on helping customers mitigate threats beyond the endpoint to minimize the impact of ongoing SOC staffing challenges, CEO Lior Div says. The company's focus on tracking and following malicious operations sets Cybereason's approach to XDR apart from rivals.
Although small to medium enterprises - SMEs - do not have the security resources larger enterprise possess, they face the same risks. Here are five reasons you should consider consolidating your tech as you strive to find an effective, sustainable security stack that also keeps costs in check.
In a world where the adversary has historically had the upper hand, Cortex and IBM have partnered together to flip the script for their clients by combining best in breed technology with extraordinary services.
Palo Alto Networks and IBM today announced that IBM Security's X-Force will use Palo Alto Networks'...
Businesses should capitalize on AI, ML and robotic process automation to address every event rather than just ignoring the ones deemed unimportant by a SIEM. Palo Alto Networks founder and CTO Nir Zuk says AI can be used to probe security incidents in real time rather than waiting for a breach.
Cybersecurity megatrends witnessed in the past few years –zero trust, XDR, the pandemic-induced increase in remote workers, and the move to public cloud– have led organizations to rethink their existing endpoint security strategy.
An in-depth survey by ESG was conducted with 359 IT and cybersecurity...
Experiencing an attack is only a matter of time. Most organizations are unaware when a breach is made, and threats go undetected for months at a time due to a global lack of visibility, especially when it concerns endpoints. But there are X5 firewall practices to prevent a data breach.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.