Weekly News Roundup: Around The Channel

What happened this week in cybersecurity, remote management and collaboration, backup and disaster recovery and acquisitions? MSP Success can catch you up! 

SentinelOne’s New Singularity Threat Intelligence Is Designed To Deliver Deep Insights  

SentinelOne launched Singularity Threat Intelligence, a threat intelligence solution that provides security teams with an end-to-end view of the threat landscape, along with deep insights they can use to combat adversaries and minimize risk directly within the SentinelOne Singularity Platform.  

Singularity Threat Intelligence contextualizes security alerts by attributing them to specific adversaries, active campaigns and malware strains, empowering security organizations to investigate threats more efficiently and effectively, according to the company. 

Singularity Threat Intelligence also allows security teams to proactively hunt for threats across all their data and security tools with industry-leading threat intelligence from multiple sources, including Mandiant, and act before they cause harm. 

In limited preview now, Singularity Threat Intelligence is expected to be generally available by the end of the year.  

GoTo Announces IT Asset Management, Logitech Integration And AI Advancements 

GoTo, formerly LogMeIn, a provider of cloud-based remote work tools for collaboration and IT management, released about 60 new product updates across its portfolio, including GoTo Resolve Asset Management for tracking, monitoring and managing IT hardware assets. 

New AI and automation features announced include: 

  • GoTo Resolve Helpline generates AI-powered troubleshooting tips while users wait for an agent. 
  • AI Chat Analysis for GoTo Connect assesses customer satisfaction and generates summaries.  
  • GoTo Connect SMS call flow delivers SMS messaging into communication flow with a drag and drop.  
  • Dynamic contact matching in GoTo Connect better manages contact information with delete, search, and sort functionality. 

GoTo said it will release two additional AI-enhanced features later this year: A new AI assistant for GoTo Resolve will analyze device health and provide recommendations for follow-up actions to resolve issues; and building from AI Chat Analysis, an AI-powered GoTo Contact Center offering will provide topic and sentiment analysis, interaction summaries and real-time conversation recovery. 

Also announced, GoTo Resolve now integrates with Logitech for CollabOS to provide built-in remote access for videoconferencing hardware.  

To learn about additional enhancements for GoTo’s portfolio, go to www.goto.com

Veeam Partners With Sophos To Integrate Managed Detection And Response 

Veeam Software, a provider of data protection and ransomware recovery solutions, has partnered with cybersecurity vendor Sophos to integrate Sophos Managed Detection and Response (MDR) with the Veeam Data Platform

“Keeping businesses running, no matter what happens, is central to Veeam’s overall mission, and by uniting with Sophos to create an end-to-end approach, we take another step in protecting customers from bad actors by strengthening their overall security posture and enabling radical resilience,” said Danny Allan, CTO at Veeam, in a press statement. 

Veeam Data Platform monitors an organization’s environment to detect potential threats against customers’ production workloads and their backup environment. Should a threat be identified, such as an attacker attempting to tamper with backups, Veeam sends an alert to Sophos MDR—a fully-managed 24/7 threat hunting, detection and response service.  

In the event of ransomware, advanced threat detection and prevention capabilities from Sophos, with immutable backups and versioning provided by Veeam, ensure backup data remains secure and recoverable. 

This Veeam Data Platform and Sophos MDR integration is expected to be available later this year.  

In other news, Veeam announced the Veeam Data Platform 23H2 update, including the new Veeam Backup & Replication v12.1 release, during the global VeeamON Resiliency Summit. 

Zyxel Networks Announces Ultra-High Performance Security Firewalls For SMBs 

Networking vendor Zyxel Networks launched its USG FLEX H Series Security Firewalls for small- and medium-sized businesses (SMBs). The high-performance firewalls combine ultra-fast firewall/UTM/VPN throughput, multi-gigabit and PoE+ interfaces, and advanced best-of-breed network security for multilayered protection. 

The USG FLEX H series defense systems include reputation filters, device insight, sandboxing, anti-malware, DNS/IP/URL filtering, IPS and application patrol. The firewalls support widely used VPN protocols, such as IKEv2/EAP and SSL VPN, across multiple OS platforms. 

Features include next-generation multi-core hardware and Fastpath technology to minimize packet processing time, reduce latency and accelerate traffic flows; user-definable ports ranging from 2.5 to 10 Gbps that can be configured as WAN or LAN; and a new operating system that has been tuned for faster response to configuration changes and a faster firmware update process. 

In addition, the firewalls support a zero-trust model, with Zyxel’s AI-powered cloud intelligence blocking both outside malicious threats and inappropriate internal user behaviors. Zyxel cloud AI can identify unknown threats and update USG FLEX H devices to defend against evolving cyberattacks. 

The firewalls can be managed as standalone or centrally managed devices through Zyxel’s Nebula Cloud Management.  

Searchlight Cyber Enhances Its DarkIQ Dark Web Traffic Monitoring Capabilities 

Searchlight Cyber, the dark web intelligence company, released enhancements to its Dark Web Traffic Monitoring capabilities, part of its dark web monitoring solution, DarkIQ.  

Searchlight’s Dark Web Traffic Monitoring feature in DarkIQ delivers data on the connections between an organization’s infrastructure and the dark web network, The Onion Router (Tor). Live traffic data can provide organizations with early warning to a potential cyber-attack, while historic traffic data stored in the platform can be used by threat intelligence and incident response teams to investigate an incident. 

Enhancements to Searchlight’s Dark Web Traffic Monitoring include enhanced greater granularity, such as detailed information on package sizes and the number of connections from the dark web; new visualizations, with the ability to dissect and analyze data from multiple angles; and the ability to segment data by incoming and outgoing traffic, simplifying the identification of potential threats and unusual patterns. 

Deep Instinct Takes A Prevention-First Approach To Storage Protection 

Cybersecurity company Deep Instinct rolled out Deep Instinct Prevention for Storage (DPS), which applies a prevention-first approach to storage protection wherever data is stored — network-attached storage (NAS), hybrid or public cloud environments — and integrates into existing environments to deliver efficacy, accuracy, and scalability. According to Deep Instinct, DPS provides >99% efficacy in preventing unknown threats, a <0.1% false positive rate and <20 milliseconds’ file scan time. 

Part of the Deep Instinct Prevention Platform, DPS applies a deep learning (DL) framework dedicated to cybersecurity. Whenever a file is added or changed in a storage environment, it is scanned immediately. Malicious files are either quarantined or deleted to prevent execution.  

DPS natively integrates with platforms such as Dell EMC (CAVA) and NetApp (VScan) and is managed via a single console alongside Deep Instinct for Endpoints (DPE) and Deep Instinct Prevention for Applications (DPA). 

DPS proactively enables organizations to meet compliance requirements, including the recent SEC guidelines that require organizations to provide annual cybersecurity risk management, strategy and disclosures of any cybersecurity incidents. All file scans are logged for easy tracking and reporting. For each malicious file, detailed events are sent to the management console, allowing further investigation of prevented attacks. 

WatchGuard Launches MDR Service Purpose-Built For MSPs  

WatchGuard Technologies, a global cybersecurity provider, announced WatchGuard MDR, a new 24/7 cybersecurity managed detection and response (MDR) service purpose-built for managed service providers (MSPs).  

Customizable and scalable, this new MDR service strengthens WatchGuard’s Unified Security Platform architecture, providing advanced threat detection and response capabilities on top of WatchGuard EDR, EPDR and Advanced EPDR. It comes with the support of WatchGuard’s automated Zero-Trust Application Service, Threat Hunting Service, advanced security analytics, threat intelligence and a dedicated team of skilled cybersecurity analysts.  

“As a 100% channel-driven company, we wanted to deliver an enterprise-class MDR solution that would allow our MSP partners to expand their business without the expense of building their own SOC or adding to the challenges they already face in finding cybersecurity talent,” said Andrew Young, chief product officer at WatchGuard Technologies, in a press statement.  

Key features of WatchGuard MDR include 24/7 endpoint activity monitoring and data collection; proactive hunting and detection; investigation and validation; immediate incident notification; options for mitigation and guidelines for remediation; and weekly security health status reports and monthly activity. 

Bitdefender Adds Pen Testing And Red Teaming To MDR Portfolio 

Global cybersecurity provider Bitdefender added Bitdefender Offensive Services to its managed detection and response portfolio. The new services are designed to proactively assess, identify and remediate security gaps in an organization’s environment (on premises, cloud, hybrid) through penetration testing and red team simulated attacks. 

The services are led by Bitdefender’s team of cybersecurity analysts, researchers, threat hunters and CREST-accredited ethical hackers enhanced by the Bitdefender Global Protective Network, an extensive network of hundreds of millions of sensors continuously collecting threat data worldwide. 

Additionally, Bitdefender’s new services support organizations adopting continuous threat exposure management (CTEM), a cybersecurity process that employs controlled attack simulations for identifying and mitigating threats to networks, systems and supply chain environments. This allows stress testing security posture and identifying vulnerabilities before they are exploited by real attackers. 

Bitdefender Offensive Services are available now. 

Ooma Acquires 2600Hz 

Ooma, a unified communications provider, acquired 2600Hz, a turnkey white-label business communications provider for resellers and carriers, for approximately $33 million in cash, subject to customary purchase price adjustments.  

2600Hz has a global customer base leveraging Kazoo, an open-source communications solution, and a suite of proprietary applications through open APIs to provide unified communications-as-a-service (UCaaS), communications platform-as-a-service (CPaaS), call center-as-a-service (CCaaS) and AI tools and applications. As a proponent end user of 2600Hz open-source applications for more than 10 years, Ooma has extensively integrated its intellectual property with 2600Hz.  

According to Ooma, the acquisition advances the company’s integrated business service through the addition of call center, CPaaS and AI capabilities. It will also expand Ooma’s customer base to include service providers and resellers utilizing 2600Hz for their bespoke offerings. For 2600Hz, the acquisition will strengthen its solution by leveraging Ooma’s low-cost telecom infrastructure and scale, as well as its mobile, web, desktop and other applications. 

Share:
ABOUT THE AUTHOR
Colleen Frye is executive editor of MSP Success. A veteran of the B2B publishing industry, she has been covering the channel for the last 17 years.

RELATED ARTICLES

Categories

Upcoming Events

Stay Up To Date

Thousands Of MSPs Trust
MSP Success Magazine
For The Best Industry News, Trends and Business Growth Strategies

Never Miss An Update