Ad Image

Endpoint Security and Network Monitoring News for the Week of January 6; TrueFort, Blues Wireless, Hughes Network Systems, and More

Endpoint Security and Network Monitoring News for the Week of January 6

Endpoint Security and Network Monitoring News for the Week of January 6

The editors at Solutions Review have curated this list of the most noteworthy endpoint security and network monitoring news for the week of January 6. This curated list features endpoint security and network monitoring vendors such as TrueFort, Blues Wireless, Hughes Network Systems, and more.

Keeping tabs on all the most relevant endpoint security and network monitoring news can be a time-consuming task. As a result, our editorial team aims to provide a summary of the top headlines from the last month in this space. Solutions Review editors will curate vendor product news, mergers and acquisitions, venture capital funding, talent acquisition, and other noteworthy endpoint security and network monitoring news items.

Download Link to Endpoint Security Buyer's Guide

Endpoint Security and Network Monitoring News for the Week of January 6


TrueFort Achieves Coveted CIS Benchmarks Certification

TrueFort, a microsegmentation company, announced that it has been certified by CIS Benchmarks to provide test and validation services that compare an organization’s defensive configurations against the consensus-based best practice standards contained in the CIS Benchmarks. The TrueFort platform enables customers to assess their systems and comply with the industry’s most demanding standards for system hardening.

Read on for more.

IronNet Announces Enhancement Updates for its NDR Solution

IronNet, an network security solutions provider, announced enhanced capabilities of its network detection and response (NDR) solution, IronDefense. Recognized with the highest possible rating for Enterprise Advanced Security NDR Detection by SE Labs, IronDefense enables advanced and early visibility of unknown cyber threats that have slipped past endpoint and firewall detection and entered the network, whether on-premises or in the cloud.

Read on for more.

Blues Wireless Raises $32M To Accelerate Enterprise Adoption of Cellular IoT

Embedded connectivity startup Blues Wireless (Blues), announced a $32 million Series A1 funding round led by Positive Sum, and including new investors Four Rivers, Northgate, and Qualcomm. Previous backers Sequoia, Cascade, Lachy Groom and XYZ also participated. Blues will be exhibiting at CES in Las Vegas (Booth #10752, North Hall) from January 5-8 with the message that any company can cloud-connect their product using cellular.

Read on for more.

Netskope Nets Whopping $401M in Investment Round

Netskope, a leader in Secure Access Service Edge (SASE), on the heels of its recognition as Cloud Security Services Vendor of the Year, its sixth straight ranking on the Forbes Cloud 100 list of top cloud companies, and its recognition as a Leader in the 2022 Gartner Magic Quadrant for Security Service Edge (SSE), announced this week an oversubscribed investment round of $401M. This financing marks the latest among many recent business and financial milestones for Netskope and serves as another strong validation and indicator of the continued momentum and adoption of the company’s vision, team, products, culture, and market opportunity.

Read on for more.

Trend Micro Announces New Subsidiary for 5G Cybersecurity

Trend Micro, a global cybersecurity leader, has established CTOne, a new subsidiary focused on advancing 5G network security and beyond. The group’s intellectual capital and leadership come from In addition to private 5G network end-to-end security solutions, CTOne is also developing O-RAN and edge computing security solutions to assist enterprises in mitigating cyber risk when deploying related technologies.

Read on for more.

Hughes Launches New Managed Cybersecurity Services for Small to Mid-sized Enterprise Networks

This week, Hughes Network Systems, LLC, an EchoStar company, announced it has expanded its suite of managed cybersecurity services for distributed enterprises to include managed detection and response (MDR) and SOC as a service (SOCaaS). The new offerings bring network security expertise from Hughes, plus the benefits of in-house, enterprise-grade protections, to small and mid-sized enterprises, tailored and scaled to address their needs. With the addition of MDR and SOCaaS, Hughes now offers a robust suite of managed security services to help prevent, detect, and respond to threats targeting the smaller enterprise.

Read on for more.


Expert Insights Section

Watch this space each week as Solutions Review editors will use it to share new Expert Insights Series articles, Contributed Shorts videos, Expert Roundtable and event replays, and other curated content to help you gain a forward-thinking analysis and remain on-trend. All to meet the demand for what its editors do best: bring industry experts together to publish the web’s leading insights for enterprise technology practitioners.

Solutions Review Announces Call for Contributors: Expert Insights Series Q1, 2023

Solutions Review calls for contributing authors to participate in its Expert Insights Series Q1, 2023. Solutions Review’s Expert Insight Series is a collection of contributed articles written by industry experts in enterprise software categories. Solutions Review editors have published hundreds of expert insight articles from leading voices across 16 category-specific business software resource sites.

Read on for more.

Like a Moth to a Flame: Why the Browser Is Such a Tempting Target

Chrome, Safari, Firefox, and Edge – internet web browsers are so ubiquitous and essential to our personal and professional lives that we hardly give them a second thought. For enterprises, they are the backbone of day-to-day productivity, serving as the launch pad for many critical web applications and collaboration tools. But their key functions and widespread use makes them a prime target for hackers– growing digitization and remote work conditions have made web browsers even more susceptible to cyber-attacks. Yet their security architecture remained mostly unchanged.

Read on for more.


Download Link to Endpoint Security Buyer's Guide

Share This

Related Posts