Endpoint

10/4/2017
12:50 PM
Dark Reading
Dark Reading
Products and Releases
0%
100%

Secdo Partners with ePlus for Automated Endpoint Security, Incident Response

NEW YORK, NY— (October 4, 2017) - Secdo, a pioneer in automated endpoint security and incident response technology, today announced a new partnership with consultative technology solutions provider, ePlus (Nasdaq: PLUS). Under the terms of this new partnership, ePlus is expanding the company’s growing IT security business with Secdo’s Automated Endpoint Security and Incident Response software. Through the partnership, Secdo solutions are now generally available to the company’s global customer base for the continuous monitoring, automated response, surgical remediation, and preemptive defense of endpoints against emerging threats.

According to a study by the Enterprise Strategy Group, “58% of information security professionals say that they would prefer to address their strategic endpoint security requirements with an integrated product suite from a single vendor.”[ Enterprise Strategy Group, Massive Enterprise Endpoint Security Opportunity, https://www.csoonline.com/article/2900306/cisco-subnet/massive-enterprise-endpoint-security-opportunity.html] Secdo is an agile endpoint security and incident response provider with a multi-faceted solution to counter and respond to today’s threat landscape. Deployment models of the Secdo platform are flexible, allowing the technology to be deployed on-premise or in the cloud.

“Organizations around the world are under significant pressure to safeguard computing assets as the IT landscape and environment for potential malware and other attacks has grown,” said Lee Waskevich, vice president at ePlus. “Secdo technology helps to automate common analyst tasks and can leverage investments in SIEM and other security operations technologies to provide significant reduction in the triage of incident handling as well as remediation without business interruption. Secdo complements the work ePlus performs in helping to build robust security programs for our customers as it provides reduction in security event noise and aids in addressing the security talent shortage through automation. We are pleased to offer our customers a more accurate and defensive approach to endpoint security.”

Secdo transforms the security workflow from reactive to proactive, thereby allowing incident response teams to address alerts and threats quickly and precisely. With a focus on supporting a global partner ecosystem, Secdo aligns with strategic solution providers, resellers, consulting firms, advisories, MSPs, MSSPs, MDRs, and other types of technology and service providers to deliver prompt, local support from leading experts in the field of IT security and compliance.

“Through both simple tactics and complex algorithms, cyber criminals determined to achieve their mission are accomplishing unprecedented results by attacking computing endpoints at every level. This deluge is overwhelming security teams with thousands of alerts daily, allowing real alerts to go unnoticed,” said Zion Zatlavi, VP, Alliances for Secdo. “We have set a new standard by replacing traditional, post-attack approaches with a thread-level proactive solution that monitors and defends every server and endpoint without manual intervention. Secdo complements the ePlus IT security solution portfolio for a more robust approach to endpoint security and incident response.”

Secdo Automated Endpoint Security and Incident Response
Security teams are overwhelmed with thousands of alerts daily, resulting in real threats getting overlooked. Investigating an alert is a laborious process that can take days or months. Even when a real breach is detected, response is tedious, imprecise, and can take weeks. Secdo modernizes endpoint security with the steady collection of all activities and actions from computers and servers at the thread level—the most granular view possible into activity on endpoints. The core of Secdo’s approach is the Causality Analysis Engine™, which continuously and automatically analyzes billions of historical endpoint transactions to identify the chain of events associated with any sub-process, host, user, connection or file, and the causality chain behind every threat, down to their root cause. The solution then provides advanced remediation techniques and allows security analysts to optimize the platform for the prevention of future incidents.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Valentine's Emails Laced with Gandcrab Ransomware
Kelly Sheridan, Staff Editor, Dark Reading,  2/14/2019
High Stress Levels Impacting CISOs Physically, Mentally
Jai Vijayan, Freelance writer,  2/14/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
5 Emerging Cyber Threats to Watch for in 2019
Online attackers are constantly developing new, innovative ways to break into the enterprise. This Dark Reading Tech Digest gives an in-depth look at five emerging attack trends and exploits your security team should look out for, along with helpful recommendations on how you can prevent your organization from falling victim.
Flash Poll
How Enterprises Are Attacking the Cybersecurity Problem
How Enterprises Are Attacking the Cybersecurity Problem
Data breach fears and the need to comply with regulations such as GDPR are two major drivers increased spending on security products and technologies. But other factors are contributing to the trend as well. Find out more about how enterprises are attacking the cybersecurity problem by reading our report today.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-8419
PUBLISHED: 2019-02-17
VNote 2.2 has XSS via a new text note.
CVE-2019-8421
PUBLISHED: 2019-02-17
upload/protected/modules/admini/views/post/index.php in BageCMS through 3.1.4 allows SQL Injection via the title or titleAlias parameter.
CVE-2019-8422
PUBLISHED: 2019-02-17
A SQL Injection vulnerability exists in PbootCMS v1.3.2 via the description parameter in apps\admin\controller\content\ContentController.php.
CVE-2019-7649
PUBLISHED: 2019-02-17
global.encryptPassword in bootstrap/global.js in CMSWing 1.3.7 relies on multiple MD5 operations for password hashing.
CVE-2019-8418
PUBLISHED: 2019-02-17
SeaCMS 7.2 mishandles member.php?mod=repsw4 requests.