Endpoint Security and Network Monitoring News for the Week of September 15; BackBox, Plixer, Code Intelligence, and More
The editors at Solutions Review have curated this list of the most noteworthy endpoint security and network monitoring news for the week of September 15. This curated list features endpoint security and network monitoring vendors such as BackBox, Plixer, Code Intelligence, and more.
Keeping tabs on all the most relevant endpoint security and network monitoring news can be a time-consuming task. As a result, our editorial team aims to provide a summary of the top headlines from the last month in this space. Solutions Review editors will curate vendor product news, mergers and acquisitions, venture capital funding, talent acquisition, and other noteworthy endpoint security and network monitoring news items.
Endpoint Security and Network Monitoring News for the Week of September 15
BackBox Announces Strategic Partnership and Product Integration with Paessler AG
BackBox, a network automation solutions provider, this week announced a strategic partnership with Paessler AG, a monitoring solutions provider. In addition, BackBox and Paessler PRTG now work together seamlessly to support enterprise and MSP network operations teams. This integration will reduce the overall mean time to resolution when network issues are discovered.
Skybox Security Unveils Next-Generation of Continuous Exposure Management Platform
Skybox Security, a provider of Exposure Management solutions, this week announced the next generation of its Continuous Exposure Management Platform. Version 13.0 delivers significant new capabilities including a new attack surface map, enhanced attack path analysis, LDAP integration, SOAR integration, and cloud infrastructure integration. Updates to the Firewall and Network Assurance products encompass general user interface improvements and NIST 800-41 Access Policy updates. These enhancements expedite compliance testing, violation identification, and proactive resolution.
Checkly Expands Monitoring Capabilities with Introduction of Heartbeat Checks
Checkly, an app monitoring solutions provider, this week announced the introduction of Heartbeat Checks, a new feature that significantly expands the platform’s monitoring capabilities. Heartbeat Checks, also known as CRON monitoring or dead man’s switches, add a new dimension to Checkly’s monitoring capabilities. Contrary to Checkly’s active API and browser checks, Heartbeat checks monitor an application passively by waiting for a client to report back. Customers performing periodic actions such as sending daily status emails or monthly activity reports can now get alerted when their scheduled application actions fail. Checkly’s approach to Monitoring as Code, and their new check types now provide a 360-degree view of system health.
Plixer Introduces Tom McNamara as the New Chief Executive Officer
Plixer, a network detection and response (NDR) solutions provider, this week announced the appointment of Tom McNamara as its new Chief Executive Officer. McNamara, a highly experienced executive leader, brings over 30 years of expertise in steering organizations to new heights through aggressive business growth, organizational transformation, and mergers and acquisitions. With a history of managing substantial revenues and operating budgets, McNamara is set to lead Plixer–backed by global, technology-focused investment firm Battery Ventures –into “a promising new era.”
MetaGeek, an Auvik Company, Partners with Oscium
MetaGeek, an Auvik company, this week announced a technical integration with Oscium, a provider of test and diagnostics equipment. With this integration, MetaGeek’s Chanalyzer is now compatible with Oscium’s WiPry Clarity hardware, enabling tri-band spectrum analysis across the 2.4, 5 and 6 GHz bands. Customers can now plug their WiPry Clarity device into a laptop with Chanalyzer installed, and get Layer 1 and Layer 2 insights they’ve never before had access to. What’s more, the solution is highly portable for easy onsite troubleshooting.
CISA Releases Open Source Software Security Roadmap
The US Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday published a new document detailing its plan to support the open source software (OSS) ecosystem and to secure the use of OSS by federal agencies. CISA’s Open Source Software Security Roadmap details priorities in securing the OSS ecosystem, by establishing the agency’s role in this endeavor, driving visibility into the use and risks of open source software, reducing risks to federal agencies, and hardening the ecosystem. According to the agency, it is essential to secure the OSS infrastructure, which starts by understanding the relevant vulnerabilities and attacks.
DoControl Announces Integration with HRIS Platforms
DoControl, a leading SaaS Security Platform (SSP), this week announced integration with popular Human Resources Information System (HRIS) platforms such as Workday and HiBob. Through this integration, customers will have the ability to leverage metadata from these applications, enabling them to make smarter security decisions, support secure offboarding processes, as well as insider threat management for departing employees– both via resignation or termination covering more SaaS threat models.
Code Intelligence Launch LLM-Powered AI-Assistant CI Spark
Code Intelligence this week announced CI Spark, a new LLM-powered AI-assistant for software security testing. CI Spark automatically identifies attack surfaces and suggests test code for them, enabling developers to reduce the manual effort needed to generate powerful white-box tests from multiple hours down to a few minutes. As part of an ongoing collaboration with Google’s OSS-Fuzz, CI Spark already helped Code Intelligence engineers uncover over 50 CVES.
Expert Insights Section
Watch this space each week as Solutions Review editors will use it to share new Contributed Content Series articles, Contributed Shorts videos, Expert Roundtable and event replays, and other curated content to help you gain a forward-thinking analysis and remain on-trend. All to meet the demand for what its editors do best: bring industry thought leaders together to publish the web’s leading insights for enterprise technology practitioners.
Generative AI and the Workplace
Gil Pekelman of Atera shines a light on the shadow IT created by generative AI in the workplace and the importance of safely adopting it. It is abundantly clear to anyone reading the news or working an office job that 2023 is the year of generative AI. These generative tools have absolutely revolutionized the way we work, enabling users to get answers instantly, write professional statements in mere seconds, and empower people with much-needed information with the click of a button. While having access to this new technology has the potential to completely transform how we work, learn, and live, it can also pose significant challenges for companies and their IT departments that must be addressed. In fact, the majority (67 percent) of senior IT leaders are prioritizing generative AI for their business within the next 18 months, with one-third (33 percent) naming it as a top priority. But still, 79 percent of senior IT managers are concerned that these technologies bring the potential for security risks.
Uniting AppSec and Developers in The Age of Cloud-Native Applications
Shahar Man of Backslash Security explores the new world of Cloud-Native Applications, in an effort to unite AppSec teams and developers. The ever-evolving intersection of modern software development practices and the infrastructure they run on has underscored a growing friction between two critical groups within the software development arena– application security (AppSec) teams and software developers. On one hand, developers are tasked with delivering high-performing code quickly and frequently. On the other, AppSec teams are charged with maintaining stringent security measures to protect the very same software from a myriad of threats. This perceived tug-of-war has been a long-standing issue, with each party feeling somewhat impeded by the other. However, with the adoption of cloud-native architectures becoming increasingly widespread, this relationship’s importance is more critical than ever. The security of an enterprise’s crown jewels – its applications – is heavily reliant on the symbiosis between these two teams.
Decoding the Complexity of TLS 1.3 Implementation: A Deep Dive
Scott Aken of Axellio dissects the complexity and importance of implementing the newly introduced TLS 1.3 protocol. As the digital ecosystem expands and evolves at a rapid pace, data security becomes a cornerstone, ensuring the integrity and seamless transmission of information. The newly introduced Transport Layer Security (TLS) protocol, TLS 1.3, marks a new chapter in online security. However, its groundbreaking advancements usher in unique and challenging implementation issues that can significantly impair our ability to monitor traffic for both internal and external threats.