Ad Image

Endpoint Security and Network Monitoring News for the Week of June 28; Radiflow, Tata Communications, NETSCOUT, and More

Endpoint Security and Network Monitoring News for the Week of June 28

Endpoint Security and Network Monitoring News for the Week of June 28

The editors at Solutions Review have curated this list of the most noteworthy endpoint security and network monitoring news for the week of June 28. This curated list features endpoint security and network monitoring vendors such as Radiflow, Tata Communications, NETSCOUT, and more.

Keeping tabs on all the most relevant endpoint security and network monitoring news can be a time-consuming task. As a result, our editorial team aims to provide a summary of the top headlines from the last month in this space. Solutions Review editors will curate vendor product news, mergers and acquisitions, venture capital funding, talent acquisition, and other noteworthy endpoint security and network monitoring news items.

Endpoint Security and Network Monitoring News for the Week of June 28

Radiflow Announces Partnership with Garland

This week, Radiflow announced a partnership with Garland Technology, a critical infrastructure solutions provider, to deliver an improved OT security solution. The collaboration combines Radiflow’s expertise in OT cybersecurity with Garland’s packet visibility technology to deliver a cost-effective, enhanced, end-to-end security solution for critical infrastructure and industrial plants. “We are very pleased to be partnering with Garland,” said Ilan Barda, founder and CEO of Radiflow. “Their solution enables our customers to see and monitor every network event without requiring expensive investment in intrusive switches. The partnership helps put our customers on track toward NIS2 and IEC 62443 compliance.”

Read on for more.

Chinese Hackers Hijack to Serve Malware; Thousands of Websites Effected

Website administrators are being urged to remove the service immediately after it was found to be serving malware to site visitors. The service is quite popular, with more than 100,000 sites using it today– and it was sold in February 2024 to a Chinese company. Back then, the project’s original owners warned its users to remove the tool immediately, since they were now susceptible to a supply chain attack. Both Cloudflare and Fastly set up their own versions of the service, giving users a trusted service. “No website today requires any of the polyfills in the library,” tweeted the original Polyfills service project developer. “Most features added to the web platform are quickly adopted by all major browsers, with some exceptions that generally can’t be polyfilled anyway, like Web Serial and Web Bluetooth.”

Read on for more.

Tata Communications and Versa Networks Announce Partnership; Launch Hosted SASE Platform

Tata Communications announced this week the launch of its Unified/ Single-Vendor Hosted Secure Access Service Edge (SASE) for global enterprises. In partnership with Versa Networks, a leader in AI-powered Unified SASE, Tata Communications Hosted SASE, converges software-defined wide area networks (SD-WAN) and secure service edge (SSE) capabilities in a single pass technology enabling “future-ready businesses to fully harness the power and potential of cloud-based environments through exceptional performance, zero-trust security, ease of use, and cost effectiveness.”

Read on for more.

Auvik Appoints Mark Ralls as President and Bryan Getz as Chief Sales Officer

Auvik, an award-winning IT solutions provider, this week announced the appointment of Mark Ralls as President and Bryan Getz as Chief Sales Officer to accelerate company growth. “I am thrilled to welcome Mark and Bryan as the newest members of Auvik’s leadership team,” said Auvik CEO Doug Murray. “Their respective track records of building successful SaaS businesses are impressive, and their experience will play an instrumental role in Auvik’s next chapter. The addition of their skill sets accelerates our mission to reduce friction for IT teams depending on Auvik for managing diverse technology stacks.”

Read on for more.

Keeper Security Launches Remote Browser Isolation Component

Keeper Security, a cybersecurity solutions provider, introduced this week Remote Browser Isolation, a new component of Keeper Connection Manager. Remote Browser Isolation provides users with secure access to web-based assets such as internal web applications and cloud applications– using any standard web browser. With its latest update, Keeper Connection Manager now supports launching web sessions directly within the connection manager interface through the use of Remote Browser Isolation technology. Just like any other Keeper Connection Manager connection type, these sessions can be shared in real time, recorded and audited.

Read on for more.

WatchGuard Launches AI-Driven ThreatSync+ NDR Platform

WatchGuard Technologies, a global leader in cybersecurity solutions, announced this week the launch of ThreatSync+ NDR and WatchGuard Compliance Reporting. The first in a new ThreatSync+ family of products, ThreatSync+ NDR automates and simplifies continuous monitoring, detection, and remediation of threats using an advanced AI detection engine. WatchGuard Compliance Reporting puts the hundreds of network controls activated from ThreatSync+ NDR to work with automated or manual reporting. The network controls defined by NIST, ISO, CISA and Cyber Essential standards are easily enabled at deployment. WatchGuard Compliance Reporting allows IT and compliance teams to further report on the regulatory laws built from these standards. Compliance reports that come out-of-the-box include FFIEC, NIST-171, CMMC, GPDR, IEEE, and many more. Reports are also easily configured in compliance with custom standards imposed by a cyber insurer, industry standards like Motion Picture Association (MPA) compliance, or supply chain vendor third-party risk assessments.

Read on for more.

NETSCOUT Expands Into Canada with New Toronto Facility

NETSCOUT SYSTEMS, INC., a leading provider of DDoS attack protection solutions, this week announced it expanded its Arbor Cloud DDoS attack mitigation network to 16 scrubbing centers worldwide with the recent addition of a new Toronto facility. This network offers ISPs and enterprise customers more than 15 terabits per second (Tbps) of dedicated attack capacity. Canadian businesses and organizations will benefit from this new scrubbing center with lower latency because attack traffic takes less time to be diverted for mitigation and redirection to Canadian destinations. In addition, Canadian-originated and destined traffic and data remain within Canadian borders to help organizations comply with privacy and data sovereignty regulations at provincial and national levels.

Read on for more.

Expert Insights Section

Insight Jam logoWatch this space each week as our editors will share upcoming events, new thought leadership, and the best resources from Insight Jam, Solutions Review’s enterprise tech community for business software pros. The goal? To help you gain a forward-thinking analysis and remain on-trend through expert advice, best practices, trends and predictions, and vendor-neutral software evaluation tools.


Moving Away from VPN Solutions

CISA’s recent guidance on moving from VPNs to more granular zero trust controls like SSE and SASE solutions is a welcome first step in the security dialogue. The more granular, context-sensitive controls offered by such solutions offer additional layers of protection to organizations in the event of a breach and will help to both reduce the risk of and contain potential breaches by limiting the privileges of attackers who compromise an individual system.

More broadly speaking, however, SSE and SASE software retains a good deal of residual risk. Just as attackers found vulnerabilities to exploit in the Internet-facing attack interfaces of VPNs, so too will attackers find ways to subvert the software mechanisms enforcing the SSE and SASE controls. Zero trust controls will help to control the immediate damage from such exploits, but it’s likely that dedicated, sophisticated attackers will leverage even the smallest footholds to gain persistent presence until other vulnerable software is identified within the network. To counter these threats, the market must look toward verifiable, fixed-function security enforcement mechanisms – like those enforced by hardware security technologies – for critical security functions.

-Adam Maruyama, Field CTO at Garrison Technology 


Share This

Related Posts

Follow Solutions Review