Endpoint

10/4/2017
12:50 PM
Dark Reading
Dark Reading
Products and Releases
0%
100%

Secdo Partners with ePlus for Automated Endpoint Security, Incident Response

NEW YORK, NY— (October 4, 2017) - Secdo, a pioneer in automated endpoint security and incident response technology, today announced a new partnership with consultative technology solutions provider, ePlus (Nasdaq: PLUS). Under the terms of this new partnership, ePlus is expanding the company’s growing IT security business with Secdo’s Automated Endpoint Security and Incident Response software. Through the partnership, Secdo solutions are now generally available to the company’s global customer base for the continuous monitoring, automated response, surgical remediation, and preemptive defense of endpoints against emerging threats.

According to a study by the Enterprise Strategy Group, “58% of information security professionals say that they would prefer to address their strategic endpoint security requirements with an integrated product suite from a single vendor.”[ Enterprise Strategy Group, Massive Enterprise Endpoint Security Opportunity, https://www.csoonline.com/article/2900306/cisco-subnet/massive-enterprise-endpoint-security-opportunity.html] Secdo is an agile endpoint security and incident response provider with a multi-faceted solution to counter and respond to today’s threat landscape. Deployment models of the Secdo platform are flexible, allowing the technology to be deployed on-premise or in the cloud.

“Organizations around the world are under significant pressure to safeguard computing assets as the IT landscape and environment for potential malware and other attacks has grown,” said Lee Waskevich, vice president at ePlus. “Secdo technology helps to automate common analyst tasks and can leverage investments in SIEM and other security operations technologies to provide significant reduction in the triage of incident handling as well as remediation without business interruption. Secdo complements the work ePlus performs in helping to build robust security programs for our customers as it provides reduction in security event noise and aids in addressing the security talent shortage through automation. We are pleased to offer our customers a more accurate and defensive approach to endpoint security.”

Secdo transforms the security workflow from reactive to proactive, thereby allowing incident response teams to address alerts and threats quickly and precisely. With a focus on supporting a global partner ecosystem, Secdo aligns with strategic solution providers, resellers, consulting firms, advisories, MSPs, MSSPs, MDRs, and other types of technology and service providers to deliver prompt, local support from leading experts in the field of IT security and compliance.

“Through both simple tactics and complex algorithms, cyber criminals determined to achieve their mission are accomplishing unprecedented results by attacking computing endpoints at every level. This deluge is overwhelming security teams with thousands of alerts daily, allowing real alerts to go unnoticed,” said Zion Zatlavi, VP, Alliances for Secdo. “We have set a new standard by replacing traditional, post-attack approaches with a thread-level proactive solution that monitors and defends every server and endpoint without manual intervention. Secdo complements the ePlus IT security solution portfolio for a more robust approach to endpoint security and incident response.”

Secdo Automated Endpoint Security and Incident Response
Security teams are overwhelmed with thousands of alerts daily, resulting in real threats getting overlooked. Investigating an alert is a laborious process that can take days or months. Even when a real breach is detected, response is tedious, imprecise, and can take weeks. Secdo modernizes endpoint security with the steady collection of all activities and actions from computers and servers at the thread level—the most granular view possible into activity on endpoints. The core of Secdo’s approach is the Causality Analysis Engine™, which continuously and automatically analyzes billions of historical endpoint transactions to identify the chain of events associated with any sub-process, host, user, connection or file, and the causality chain behind every threat, down to their root cause. The solution then provides advanced remediation techniques and allows security analysts to optimize the platform for the prevention of future incidents.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Want Your Daughter to Succeed in Cyber? Call Her John
John De Santis, CEO, HyTrust,  5/16/2018
New Mexico Man Sentenced on DDoS, Gun Charges
Dark Reading Staff 5/18/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Flash Poll
[Strategic Security Report] How Enterprises Are Attacking the IT Security Problem
[Strategic Security Report] How Enterprises Are Attacking the IT Security Problem
Enterprises are spending more of their IT budgets on cybersecurity technology. How do your organization's security plans and strategies compare to what others are doing? Here's an in-depth look.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-11354
PUBLISHED: 2018-05-22
In Wireshark 2.6.0, the IEEE 1905.1a dissector could crash. This was addressed in epan/dissectors/packet-ieee1905.c by making a certain correction to string handling.
CVE-2018-11355
PUBLISHED: 2018-05-22
In Wireshark 2.6.0, the RTCP dissector could crash. This was addressed in epan/dissectors/packet-rtcp.c by avoiding a buffer overflow for packet status chunks.
CVE-2018-11356
PUBLISHED: 2018-05-22
In Wireshark 2.6.0, 2.4.0 to 2.4.6, and 2.2.0 to 2.2.14, the DNS dissector could crash. This was addressed in epan/dissectors/packet-dns.c by avoiding a NULL pointer dereference for an empty name in an SRV record.
CVE-2018-11357
PUBLISHED: 2018-05-22
In Wireshark 2.6.0, 2.4.0 to 2.4.6, and 2.2.0 to 2.2.14, the LTP dissector and other dissectors could consume excessive memory. This was addressed in epan/tvbuff.c by rejecting negative lengths.
CVE-2018-11358
PUBLISHED: 2018-05-22
In Wireshark 2.6.0, 2.4.0 to 2.4.6, and 2.2.0 to 2.2.14, the Q.931 dissector could crash. This was addressed in epan/dissectors/packet-q931.c by avoiding a use-after-free after a malformed packet prevented certain cleanup.