Weekly News Roundup – Around The Channel

It was snow shovel time in many parts of the U.S. this week, with East Aurora, New York, the big winner with around 34 inches. If you snuck off for some early season skiing, you can still catch up on all the channel news here, like a new offering from SonicWall and CrowdStrike specifically for MSPs, some new features in the Josys SaaS management platform, and more product announcements. Plus, check out who bought who. And we also have the top cybersecurity predictions for next year from the Global Cyber Alliance—see if anything surprises you!

Products

SonicWall And CrowdStrike Launch MDR Offering For MSPs

SonicWall and CrowdStrike launched a new managed detection and response (MDR) offering that combines SonicWall’s managed security services with the endpoint detection and response (EDR) capabilities from the CrowdStrike Falcon cybersecurity platform. The AI-native security solution is designed for MSPs serving SMBs.

“This collaboration underscores SonicWall’s commitment to empowering MSPs with the right blend of advanced security tools, expert support, and streamlined processes, enabling them to protect their SMB customers effectively and efficiently in today’s evolving threat landscape,” said SonicWall CEO and President Bob VanKirk, in a press statement.

Cato Networks Introduces SASE-native IoT/OT Security Solution

Cato Networks’ new Cato IoT/OT Security extends SASE-based protection into IoT/OT environments. It converges device discovery and classification, policy enforcement, and threat prevention in a SASE platform. Cato IoT/OT Security is a native feature in the Cato SASE Cloud Platform and can be activated with a click of a button. There is no additional hardware or software to install or configure.

Cato IoT/OT Security is the fifth major expansion of the Cato SASE Cloud Platform in 2024, following the releases of Cato XDR and Cato EPP in January, Cato MSASE in June, and Cato DEM in October.

The solution is generally available for customers globally.

Josys Unveils New Access Governance and SaaS Security Features

Josys, a SaaS management platform, rolled out new tools for streamlining user access reviews for known SaaS applications under management and shadow apps surfaced via the Josys Discovery Engine. These new surveying capabilities will help MSPs and IT teams collect critical information regarding app and user-level requirements to ensure access and permission levels are in line with corporate policies.

From any dedicated app page within Josys, admins can create a new access review questionnaire, select the appropriate recipients, populate it with relevant questions, customize an accompanying message to provide context for the request, and send the surveys directly to end users from within Josys.

Responses are consolidated into a unified dashboard, which also provides an audit trail for all organizational access decisions. Admins have one-click access to adjust licenses, permissions, roles, and plans based on collected feedback.

Josys has also developed a dedicated Security Configuration module to spotlight which apps are deficient in single sign-on (SSO) enablement and MFA authentication adoption. Additionally, Josys provides more granular reporting so admins can identify the specific users for each app that haven’t adopted the required authentication protocols. Embedded email capabilities enable admins to take action from inside the platform to drive behavior change. 

Also, Josys now integrates with SSO provider Okta.

Hornetsecurity Adds Self-Service Support, OneNote Backup And Recovery 

Cybersecurity provider Hornetsecurity unveiled an upgraded version of its 365 Total Backup solution, introducing self-service support for end users plus full backup and recovery support for Microsoft OneNote. This new functionality is also available with 365 Total Protection Plans 3 and 4.

The new self-service functionality allows end users to independently recover their mailbox, OneDrive, and OneNote data through the Hornetsecurity User Panel. End users can select and recover a selected object or all the data contained within their mailbox, OneDrive account, and OneNote as needed. This data is searchable and easily restored.

And with Microsoft OneNote backup and recovery, MSPs and customers can automatically back up their OneNote notebooks without having to rely on manual data protection methods. Along with the self-service component, this enhancement is a free update and follows the recent addition of backup and recovery for Microsoft Planner.

Zerto Introduces Cloud Vault Solution to Simplify Cyber Recovery

Zerto, a Hewlett Packard Enterprise company, launched Zerto Cloud Vault, which delivers Zerto’s cyber resilience capabilities as a service through MSPs. Zerto’s security-focused MSP partners at launch include Assurestor, Converge, LincolnIT, and Verinext. Built on the capabilities of the Zerto Cyber Resilience Vault, the Zerto Cloud Vault is a cloud-based, fully managed solution that offers logical air-gapping, immutability, and clean room recovery.  

With Zerto Cloud Vault, customers can leverage MSPs that deliver tailored cyber resilience strategies to meet the specific requirements of their organizations. Cloud Vault is the latest offering in HPE’s cyber resilience portfolio and complements the existing Zerto Cyber Resilience Vault, which is deployed as a self-hosted, on-premises stack.  

Zerto Cloud Vault capabilities include: real-time encryption detection; retention of data for up to 12 months and protection against ransomware attacks through immutable copies; clean room recovery; non-disruptive testing; and the ability to run different security postures within product and vault environments, fully isolated from production environment. 

“Leveraging our cyber resilience capabilities, MSPs will be able to bring fully managed Cloud Vault services to even more organizations, helping them thwart the plans of attackers and keep precious business assets safe,” said Jim O’Dorisio, senior vice president and general manager, HPE Storage, in a press statement. 

Trellix Encryption Solutions Protect Data From Insider Threats

Cybersecurity company Trellix announced Trellix Drive Encryption upgrades for on-premises and SaaS management. The new self-protection capabilities address threats from privilege escalations. Organizations can deploy protection for employee devices to prevent data breaches, produce reports on the encryption status of devices inside and outside the network, and administer policies in a single console.

Additionally, this release enables a simplified migration process for customers who want to transition from on-premises to SaaS management, maintaining their encryption keys throughout the deployment.

GoTo Introduces New AI, Automation, And Management Features

GoTo, a business communications, IT management, and support company, enhanced GoTo Resolve and LogMeIn Rescue with new advanced AI capabilities, improved device management, and streamlined workflows. 

The GoTo Resolve updates include:  

AI-powered automatic summaries, suggested replies, and a user-facing troubleshooting assistant; an AI-enhanced knowledge base to automatically create, manage, and retrieve essential IT information and troubleshooting guides; automated Windows patch management; a new script library and prebuilt automation templates; and the ability to automatically link and manage related tickets.

Enhancements for Rescue include a redesigned device manager to organize and manage unattended devices at scale with a more intuitive and efficient interface; and the ability to protect sensitive data during remote support sessions with enhanced privacy controls including screen blanking and mouse locking. 

Tenable Security Center Delivers Focused Vulnerability Prioritization

Tenable, an exposure management company, announced new vulnerability intelligence, risk prioritization, and web application scanning features for Tenable Security Center. The Security Center identifies, investigates, and prioritizes vulnerabilities, providing a risk-based view of security and compliance posture for on-premises environments. The Tenable Vulnerability Intelligence curated database provides enhanced visibility and threat context necessary to close critical risk. 

Additional new features available in Tenable Security Center include: a threat landscape overview to proactively surface threats that warrant further review; and natural language and advanced search, enabling teams to build queries by combining criteria, such as Common Vulnerability Scoring System (CVSS) metrics, key drivers of the Tenable Vulnerability Priority Rating (VPR), and other Tenable Research metadata.

In addition, in a single Security Center console you can now support thousands of web applications and fully qualified domain names (FQDN), manage large web environments, reduce hardware needs, and minimize complexity for faster and more efficient scanning.

Finally, you can prioritize vulnerabilities using the latest CVSSv4 and EPSS models.

Bitwarden Now Offers Access To Advanced Provisioning Tools And Functionality

Password management provider Bitwarden has expanded its Teams plan to include support for SCIM (System for Cross-domain Identity Management) user provisioning. SCIM enables real-time user synchronization with identity providers (IdPs). It integrates with IdPs such as Azure Active Directory, Okta, OneLogin, and JumpCloud. This compatibility also ensures consistency and efficiency for MSPs managing Teams and Enterprise plans.

The SCIM integration simplifies directory management by automating user lifecycle processes, from provisioning to succession. For example, SCIM enables MSPs to implement consistent user workflows in both Teams and Enterprise plans. Additional capabilities include the automation of user creation, updates, and removal, ensuring permissions remain aligned with workforce changes.

Distribution/Marketplaces

Clerk Chat, a provider of secure and compliant business texting and AI agents, is now available on the Pax8 Marketplace, enabling MSPs to offer Clerk Chat’s SMS, WhatsApp, and RCS for Business capabilities to customers. Clerk Chat aims to bridge the gap between platforms like Microsoft Teams, Zoom, and Webex, and the world of SMS, allowing businesses to text-enable their existing numbers on these platforms. Businesses can also integrate Clerk Chat with their existing phone systems. In addition, Clerk Chat’s security and compliance features meet industry standards, according to the company.

M&A – Vendors

Citrix, a business unit of Cloud Software Group, acquired deviceTRUST and strong.network. The deviceTRUST technology enables real-time contextual access for VDI and DaaS environments.  Strong.network protects against data breaches with features like data loss prevention and patented data infiltration detection, which guard against phishing, malware, and credential theft.

TeamViewer, a remote connectivity vendor, is acquiring 1E, a provider of digital employee experience (DEX) management tools. Together with 1E, TeamViewer aims to offer a one-stop-shop for IT operations, intelligent endpoint management, and enhanced user experience in the digital workplace.

People

Security vendor Forcepoint hired Rick Hanson as president of go-to-market, a newly created role reporting directly to CEO Ryan Windham. Most recently, Hanson served as president at Delinea. His previous roles include CRO at Brightcove with executive positions at CA Technologies, Hewlett-Packard, Symantec, and RSA. Hanson began his career in the U.S. Air Force.

Ivanti, an IT and security management provider, named current Ivanti COO Dennis Kozak as CEO in a planned transition, effective January 1, 2025. He succeeds Jeff Abbott, who will remain on the company’s board of directors. Prior to joining Ivanti, Kozak served in leadership roles at Avaya, and before that spent 22 years with CA Technologies, where he led several organizations.

By The Numbers

Global Cyber Alliance’s Top 5 Cybersecurity Predictions for 2025

Here’s what the Global Cyber Alliance, a nonprofit organization dedicated to improving internet security, is predicting for next year:

  1. AI-Powered Cyberdefense Reaches a Milestone – Artificial Intelligence (AI) systems will play a transformative role in detecting and mitigating cyberattacks before they cause harm. However, adoption will be slowed by deployment and interoperability challenges.
  2. The Rise of Passkeys for Authentication – The use of passkeys will soar, replacing traditional passwords. Technology will increasingly overcome usability barriers which will enhance security for individuals and organizations alike.
  3. The First $25 Billion Cyber Incident – A single cyber breach will cause unprecedented damage, emphasizing the critical need for robust and comprehensive preventative measures.
  4. Global Push for Secure-by-Design – There will be much more focus around the world on ensuring products are created with security in mind from the get-go, making them less vulnerable to cyberattacks and minimizing the impact of any breaches that do occur.
  5. Addressing the Cyber Workforce Gap – There will be more emphasis on equipping all staff – not just the engineering team – with the skills and analytical tools they need to actively protect the company’s digital assets.

If you missed last week’s news roundup, check it out here.

Share:

Author:

Colleen Frye

Colleen Frye is executive editor of MSP Success. A veteran of the B2B publishing industry, she has been covering the channel for the last 17 years.

RELATED ARTICLES

Get The #1 Media Source For MSPs!
Thousands Of MSPs Trust
MSP Success Magazine
For The Best Industry News, Trends And Business Growth Strategies. Subscribe now!
 

Upcoming Events

Stay Up To Date

Thousands Of MSPs Trust
MSP Success Magazine
For The Best Industry News, Trends and Business Growth Strategies

Never Miss An Update