Endpoint

10/4/2017
12:50 PM
Dark Reading
Dark Reading
Products and Releases
0%
100%

Secdo Partners with ePlus for Automated Endpoint Security, Incident Response

NEW YORK, NY— (October 4, 2017) - Secdo, a pioneer in automated endpoint security and incident response technology, today announced a new partnership with consultative technology solutions provider, ePlus (Nasdaq: PLUS). Under the terms of this new partnership, ePlus is expanding the company’s growing IT security business with Secdo’s Automated Endpoint Security and Incident Response software. Through the partnership, Secdo solutions are now generally available to the company’s global customer base for the continuous monitoring, automated response, surgical remediation, and preemptive defense of endpoints against emerging threats.

According to a study by the Enterprise Strategy Group, “58% of information security professionals say that they would prefer to address their strategic endpoint security requirements with an integrated product suite from a single vendor.”[ Enterprise Strategy Group, Massive Enterprise Endpoint Security Opportunity, https://www.csoonline.com/article/2900306/cisco-subnet/massive-enterprise-endpoint-security-opportunity.html] Secdo is an agile endpoint security and incident response provider with a multi-faceted solution to counter and respond to today’s threat landscape. Deployment models of the Secdo platform are flexible, allowing the technology to be deployed on-premise or in the cloud.

“Organizations around the world are under significant pressure to safeguard computing assets as the IT landscape and environment for potential malware and other attacks has grown,” said Lee Waskevich, vice president at ePlus. “Secdo technology helps to automate common analyst tasks and can leverage investments in SIEM and other security operations technologies to provide significant reduction in the triage of incident handling as well as remediation without business interruption. Secdo complements the work ePlus performs in helping to build robust security programs for our customers as it provides reduction in security event noise and aids in addressing the security talent shortage through automation. We are pleased to offer our customers a more accurate and defensive approach to endpoint security.”

Secdo transforms the security workflow from reactive to proactive, thereby allowing incident response teams to address alerts and threats quickly and precisely. With a focus on supporting a global partner ecosystem, Secdo aligns with strategic solution providers, resellers, consulting firms, advisories, MSPs, MSSPs, MDRs, and other types of technology and service providers to deliver prompt, local support from leading experts in the field of IT security and compliance.

“Through both simple tactics and complex algorithms, cyber criminals determined to achieve their mission are accomplishing unprecedented results by attacking computing endpoints at every level. This deluge is overwhelming security teams with thousands of alerts daily, allowing real alerts to go unnoticed,” said Zion Zatlavi, VP, Alliances for Secdo. “We have set a new standard by replacing traditional, post-attack approaches with a thread-level proactive solution that monitors and defends every server and endpoint without manual intervention. Secdo complements the ePlus IT security solution portfolio for a more robust approach to endpoint security and incident response.”

Secdo Automated Endpoint Security and Incident Response
Security teams are overwhelmed with thousands of alerts daily, resulting in real threats getting overlooked. Investigating an alert is a laborious process that can take days or months. Even when a real breach is detected, response is tedious, imprecise, and can take weeks. Secdo modernizes endpoint security with the steady collection of all activities and actions from computers and servers at the thread level—the most granular view possible into activity on endpoints. The core of Secdo’s approach is the Causality Analysis Engine™, which continuously and automatically analyzes billions of historical endpoint transactions to identify the chain of events associated with any sub-process, host, user, connection or file, and the causality chain behind every threat, down to their root cause. The solution then provides advanced remediation techniques and allows security analysts to optimize the platform for the prevention of future incidents.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
5 Reasons the Cybersecurity Labor Shortfall Won't End Soon
Steve Morgan, Founder & CEO, Cybersecurity Ventures,  12/11/2017
Oracle Product Rollout Underscores Need for Trust in the Cloud
Kelly Sheridan, Associate Editor, Dark Reading,  12/11/2017
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: Gee, these virtual reality goggles work great!!! 
Current Issue
The Year in Security: 2017
A look at the biggest news stories (so far) of 2017 that shaped the cybersecurity landscape -- from Russian hacking, ransomware's coming-out party, and voting machine vulnerabilities to the massive data breach of credit-monitoring firm Equifax.
Flash Poll
[Strategic Security Report] How Enterprises Are Attacking the IT Security Problem
[Strategic Security Report] How Enterprises Are Attacking the IT Security Problem
Enterprises are spending more of their IT budgets on cybersecurity technology. How do your organization's security plans and strategies compare to what others are doing? Here's an in-depth look.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.