Endpoint Security and Network Monitoring News for the Week of May 10; Aptum, CrowdStrike, Akamai Technologies, and More
The editors at Solutions Review have curated this list of the most noteworthy endpoint security and network monitoring news for the week of May 10. This curated list features endpoint security and network monitoring vendors such as Aptum, CrowdStrike, Akamai Technologies, and more.
Keeping tabs on all the most relevant endpoint security and network monitoring news can be a time-consuming task. As a result, our editorial team aims to provide a summary of the top headlines from the last month in this space. Solutions Review editors will curate vendor product news, mergers and acquisitions, venture capital funding, talent acquisition, and other noteworthy endpoint security and network monitoring news items.
Endpoint Security and Network Monitoring News for the Week of May 10
Aptum Signs Agreement with XCV Partners
Aptum, a global infrastructure and cloud solutions provider specializing in technology consulting and managed services, today announced it has partnered with XCV Partners, a technology solution distributor that offers an alternative to traditional distribution by prioritizing partner needs and maximizing partner passthrough. The agreement enables XCV’s partners to offer Aptum’s portfolio of infrastructure and cloud management services to its clientele in the U.S., Canada, the UK, and around the world. “Partners are critical to our success and it’s a privilege to announce this agreement with XCV Partners, a visionary technology solution distributor that works with an elite selection of the partner ecosystem,” said Michael Stephens, Aptum’s Vice President of Partnerships and Strategic Alliances. “At Aptum, we’re focused on expanding and developing our partner and alliance program, and this is another step towards that goal. We look forward to working with XCV Partners to help customers find success on their journey to the cloud through our leading solutions.”
AttackIQ Partners with Cyber Poverty Line Institute to Provide Academy Courses to Underserved Communities
AttackIQ, a vendor of breach and attack simulation (BAS) solutions and founding research partner of the MITRE Engenuity Center for Threat-Informed Defense (CTID), this week announced a partnership with the Cyber Poverty Line Institute. To help address unequal access to cyber knowledge and cyber capabilities, the company will provide AttackIQ Academy courses to the Institute’s students in underserved communities. This initiative aims to empower individuals with the necessary tools to achieve cyber inclusion. The Cyber Poverty Line Institute is a global cyber enablement platform that provides solutions and services to bridge the digital divide and eradicate cyber poverty. As a part of the partnership, AttackIQ has signed the Cyber Poverty Line Institute’s Cyber Inclusion Pledge to underscore the company’s commitment to bridging the significant gap in cyber inclusion, ensuring that marginalized communities and under-served populations have access to vital cyber training.
CrowdStrike and NinjaOne Announce Strategic Partnership
CrowdStrike and NinjaOne, a leading IT platform for endpoint management, security and visibility, this week announced a strategic partnership to provide full-spectrum endpoint protection against modern cyber-attacks. By unifying the endpoint management from the NinjaOne platform with the “industry-leading endpoint protection” from the AI-native CrowdStrike Falcon XDR platform, organizations can rapidly detect, investigate and stop attacks targeting endpoints while bridging gaps between IT and security teams. “Today’s hybrid workforce and the wave of endpoint devices they bring with them make endpoint control and security more important than ever,” said Sal Sferlazza, co-founder and CEO at NinjaOne. “Customers want IT and security solutions that deliver more value with less work. By partnering with security leader CrowdStrike, we’re delivering enhanced and simplified security to give our customers the tools they need to secure all endpoints while reducing the time they must devote to endpoint management.”
Semperis and Trellix Announce Partnership
This week, cyber resilience solutions provider, Semperis, announced a new partnership with Trellix, an XDR platform. The Semperis-Trellix partnership combines AI-driven threat detection and response from the Trellix XDR Platform with hybrid Active Directory and Entra ID ML-based monitoring and change tracking from Semperis Directory Services Protector (DSP) to identify and address attacks that start with device compromise and move laterally through privilege escalation to the identity system— the common target in 90 percent of cyber-attacks. “By combining Trellix’s AI-powered XDR Platform with Semperis DSP’s continuous monitoring, change tracking, and automated remediation for hybrid AD environments, we’re enabling organizations to stop threat actors in their tracks,” said Sean Morton, SVP Strategy and Services, Trellix. “Our partnership with Semperis furthers our mission to secure customers and enable them to proactively prevent and quickly remediate attacks across the ecosystem— from endpoint to the identity system.”
Versa Networks Wins Global InfoSec Award and The GOVIES Government Security Award
Versa Networks, a global leader in AI/ML-powered Unified Secure Access Service Edge (SASE), this week announced that Versa Zero Trust Everywhere has won both a coveted Global InfoSec Award from Cyber Defense Magazine during RSA Conference 2024 and a 2024 The GOVIES Government Security Award from Security Today. “We are honored that Versa Zero Trust Everywhere has received a Global InfoSec Award from Cyber Defense Magazine and a GOVIES Government Security Award from Security Today,” said Dan Maier, Versa CMO. “Our industry-leading, integrated solution ensures that enterprises and governmental entities alike can eliminate duplicative security systems and disjointed policy islands in favor of a centrally managed, unified repository for consistently enforcing least-privilege security policies across all users wherever they choose to work.”
Akamai Technologies Announces Intent to Acquire API Security Company Noname
Akami Technologies, an SaaS and cloud app security solutions provider, announces that it has entered into a definitive agreement to acquire application programming interface (API) security company, Noname Security. Noname, one of the top API security vendors in the market, will enhance Akamai’s existing API Security solution and accelerate its ability to meet growing customer demand and market requirements as the use of APIs continues to expand. Akamai also expects to gain greater scale with Noname’s additional sales and marketing resources, and established channel and alliance relationships. “Applications run our world, but as applications and users proliferate, so do security risks,” said Mani Sundaram, executive vice president and general manager, Security Technology Group, Akamai Technologies. “Akamai has seen a growing need for API protection with our own data showing 109% year over year growth in API attacks. With the addition of Noname, Akamai believes it will have the breadth of integrations and deployment choices needed to deliver comprehensive API protection for customers across all environments.”
Expert Insights Section
Watch this space each week as our editors will share upcoming events, new thought leadership, and the best resources from Insight Jam, Solutions Review’s enterprise tech community for business software pros. The goal? To help you gain a forward-thinking analysis and remain on-trend through expert advice, best practices, trends and predictions, and vendor-neutral software evaluation tools.
Increasing Cyber Hygiene in Healthcare Environments
“One of the largest private healthcare systems in the country, Ascension, has moved systems offline following a potential cyberattack on Wednesday. The organization runs 140 hospitals across 19 states. The ‘cyber security event’ disrupted clinical operations and prompted Ascension to warn their business partners to temporarily suspend connection to the Ascension healthcare environment.
As cybersecurity experts gathered in San Francisco this week to attend the annual RSA Conference, the critical threat facing our healthcare systems and other critical infrastructure in the U.S. was a key theme, and for good reason. Since the Change Healthcare attack, we have seen disclosures of data breaches from Kaiser Permanente and MedStar Health, a cyberattack on Octapharma, and now Ascension.
These ongoing attacks on healthcare organizations reiterate the vulnerability inherent in the healthcare industry, a vulnerability that threat actors are exploiting to their advantage. The allure of targeting healthcare organizations lies in the vast troves of sensitive data and the intricate networks they operate within. Compounded by often confusing regulatory oversight and insufficient allocation of resources towards cybersecurity, healthcare entities remain prime targets.
To mitigate these threats, healthcare organizations must prioritize cyber hygiene and use these attacks as a learning opportunity to bolster their defenses. As threat actors persist in the healthcare and public health sector, proactive security measures are imperative to safeguard patient data and organizational operations.”
-Nick Tausek, Lead Security Automation Architect at Swimlane