Ad Image

Endpoint Security and Network Monitoring News for the Week of April 21; Lookout, IRONSCALES, Lumu, and More

Endpoint Security and Network Monitoring News for the Week of April 21

Endpoint Security and Network Monitoring News for the Week of April 21

The editors at Solutions Review have curated this list of the most noteworthy endpoint security and network monitoring news for the week of April 21. This curated list features endpoint security and network monitoring vendors such as Lookout, IRONSCALES, Lumu, and more.

Keeping tabs on all the most relevant endpoint security and network monitoring news can be a time-consuming task. As a result, our editorial team aims to provide a summary of the top headlines from the last month in this space. Solutions Review editors will curate vendor product news, mergers and acquisitions, venture capital funding, talent acquisition, and other noteworthy endpoint security and network monitoring news items.

Download Link to Data Integration Buyers Guide

Endpoint Security and Network Monitoring News for the Week of April 21


Lookout Launches Mobile Endpoint Detection and Response for MSSPs

Lookout, Inc., an endpoint security solutions provider, this week announced the availability of Lookout Mobile Endpoint Security, the industry’s most advanced mobile endpoint detection and response (EDR) offering for managed security service providers (MSSPs). This solution enables MSSPs to deliver a complete turn-key program for identifying risk, protecting sensitive data and securing their customers’ mobile devices. With Lookout’s Mobile EDR, MSSPs can help organizations reduce the risk of a data breach through mobile phishing, ransomware and exploitation of device and app vulnerabilities.

Read on for more.

Corelight to Expand AI Usage Across Portfolio, Including GPT-Driven Integrations

Corelight, a network detection and response (NDR) solutions provider, this week announced a broad expansion in the integration of artificial intelligence (AI) technologies across its portfolio. AI is now used to detect a wider range of sophisticated attacks, to enrich security data with contextual insight, and to provide SOC analysts with new capabilities for understanding and reacting to security alerts. Corelight now offers a full range of advanced machine learning (ML) models across all form factors, from SaaS, to the network edge, to the datacenter. In addition to Corelight’s existing coverage across a wide range of TTPs, organizations can now leverage both supervised and deep learning techniques for identifying and responding to malicious URLs and domains, as well as targeted phishing attacks. These models play a critical role in detection and analytics within Corelight’s Open NDR platform. The platform also allows SOC analysts to view and understand ML determinations, providing critical explainability and visibility.

Read on for more.

IRONSCALES Unveils New E-Mail Security Capabilities to Platform

IRONSCALES, an email security platform, announced this week a collection of new capabilities to aid in the fight against business email compromise (BEC). The new capabilities build upon IRONSCALES’ approach of combining artificial intelligence (AI) and human insights (HI) to deliver enterprise-level protection against BEC and other forms of advanced phishing attacks. These new capabilities will be on display at the IRONSCALES booth (#5215) at this year’s RSA Conference, from April 24-27.

Read on for more.

Akamai Technologies To Acquire API Security Company Neosec

Akamai Technologies, Inc., a cybersecurity solutions provider, this week announced that it has entered into a definitive agreement to acquire Neosec, an API detection and response platform based on data and behavioral analytics. Neosec’s API security solution will complement Akamai’s  application and API security portfolio by dramatically extending Akamai’s visibility into the rapidly growing API threat landscape. The combination is designed to make it easy for customers to secure their API’s by helping them discover all of their APIs, assess their risk, and respond to vulnerabilities and attacks.

Read on for more.

Noname Security Partners with Wiz; Combine Efforts on Cloud API Security

Noname Security, a provider API security solutions, this week announced its partnership with Wiz, a cloud security platform. Noname’s API Security Platform ties together all the critical capabilities in API security in one platform. Wiz’s cloud security platform connects in minutes to scan the full cloud environment without agents, finds combinations of exposure that represent real risk and delivers accurate risk prioritization. Noname Security collects and processes findings from Wiz and displays them on the Noname platform to provide customers with a comprehensive view of an organization’s APIs. Together, Noname Security and Wiz enable complete visibility, context, and control of infrastructure hosting mission-critical and highly sensitive APIs to minimize and remediate risk.

Read on for more.

Lumu Technologies Announces SecOps Platform

Lumu Technologies, a cybersecurity solutions provider, will debut Lumu for SecOps, at the RSA Conference 2023. Lumu for SecOps is built to enable security teams to efficiently operate cybersecurity by dynamically identifying and responding to threats in the network. Attack surfaces are growing exponentially and the number of alerts and logs that cybersecurity teams need to respond to is heightened. Lumu for SecOps will help strapped cybersecurity teams implement a solution that responds to threats faster and more efficiently.

Read on for more.


Expert Insights Section

expert insight badgeWatch this space each week as Solutions Review editors will use it to share new Expert Insights Series articles, Contributed Shorts videos, Expert Roundtable and event replays, and other curated content to help you gain a forward-thinking analysis and remain on-trend. All to meet the demand for what its editors do best: bring industry experts together to publish the web’s leading insights for enterprise technology practitioners.

4 Key Cybersecurity Courses Available on Udacity in 2023

The growing importance of cybersecurity best practices and techniques for protecting against hackers is becoming paramount in the enterprise. The cybersecurity landscape is evolving in real-time, which has organizations scrambling to fortify their IT architectures soundly. Coupled with this, security engineering and analysis are becoming priorities no company can ignore, as they complement the threat hunting and threat intelligence gathering initiatives. With this in mind, the editors at Solutions Review have compiled this list of cybersecurity courses on Udacity to consider. Udacity is perfect for those looking to take multiple courses or acquire skills in multiple different areas, or for those who want the most in-depth experience possible through access to entire course libraries or learning paths. In sum, Udacity is home to more than 160,000 students in more than 190 countries.

Read on for more.

AI In Cybersecurity: The Villain and the Hero

The recent rise in popularity of artificial intelligence (AI) large language models (LLMs), including OpenAI’s ChatGPT and Google’s Bard, has sparked feelings ranging from shock and excitement to fear across multiple industries. Some sectors, including education, have condemned these types of software due to their ability to enable users to easily and accurately generate fraudulent content. In the cybersecurity world, industry professionals fear that hackers can leverage these models in the same way. In this case, enhancing human-centric cyber-attack methods against employees, including social engineering-based techniques like phishing, scareware, and baiting. However, AI isn’t solely a villain. For cybersecurity, it contains beneficial abilities capable of bolstering security leaders’ cyber defense strategies. In fact, AI has the potential to assist security leaders with strengthening various tactics, such as enhancing access control and authentication measures across an organization’s digital landscape. To further understand AI’s potential within the cybersecurity world, let’s dive into its capacity to act both as the villain and the hero.

Read on for more.

Download Link to Data Integration Buyers Guide

Share This

Related Posts

Follow Solutions Review