Endpoint

10/4/2017
12:50 PM
Dark Reading
Dark Reading
Products and Releases
0%
100%

Secdo Partners with ePlus for Automated Endpoint Security, Incident Response

NEW YORK, NY— (October 4, 2017) - Secdo, a pioneer in automated endpoint security and incident response technology, today announced a new partnership with consultative technology solutions provider, ePlus (Nasdaq: PLUS). Under the terms of this new partnership, ePlus is expanding the company’s growing IT security business with Secdo’s Automated Endpoint Security and Incident Response software. Through the partnership, Secdo solutions are now generally available to the company’s global customer base for the continuous monitoring, automated response, surgical remediation, and preemptive defense of endpoints against emerging threats.

According to a study by the Enterprise Strategy Group, “58% of information security professionals say that they would prefer to address their strategic endpoint security requirements with an integrated product suite from a single vendor.”[ Enterprise Strategy Group, Massive Enterprise Endpoint Security Opportunity, https://www.csoonline.com/article/2900306/cisco-subnet/massive-enterprise-endpoint-security-opportunity.html] Secdo is an agile endpoint security and incident response provider with a multi-faceted solution to counter and respond to today’s threat landscape. Deployment models of the Secdo platform are flexible, allowing the technology to be deployed on-premise or in the cloud.

“Organizations around the world are under significant pressure to safeguard computing assets as the IT landscape and environment for potential malware and other attacks has grown,” said Lee Waskevich, vice president at ePlus. “Secdo technology helps to automate common analyst tasks and can leverage investments in SIEM and other security operations technologies to provide significant reduction in the triage of incident handling as well as remediation without business interruption. Secdo complements the work ePlus performs in helping to build robust security programs for our customers as it provides reduction in security event noise and aids in addressing the security talent shortage through automation. We are pleased to offer our customers a more accurate and defensive approach to endpoint security.”

Secdo transforms the security workflow from reactive to proactive, thereby allowing incident response teams to address alerts and threats quickly and precisely. With a focus on supporting a global partner ecosystem, Secdo aligns with strategic solution providers, resellers, consulting firms, advisories, MSPs, MSSPs, MDRs, and other types of technology and service providers to deliver prompt, local support from leading experts in the field of IT security and compliance.

“Through both simple tactics and complex algorithms, cyber criminals determined to achieve their mission are accomplishing unprecedented results by attacking computing endpoints at every level. This deluge is overwhelming security teams with thousands of alerts daily, allowing real alerts to go unnoticed,” said Zion Zatlavi, VP, Alliances for Secdo. “We have set a new standard by replacing traditional, post-attack approaches with a thread-level proactive solution that monitors and defends every server and endpoint without manual intervention. Secdo complements the ePlus IT security solution portfolio for a more robust approach to endpoint security and incident response.”

Secdo Automated Endpoint Security and Incident Response
Security teams are overwhelmed with thousands of alerts daily, resulting in real threats getting overlooked. Investigating an alert is a laborious process that can take days or months. Even when a real breach is detected, response is tedious, imprecise, and can take weeks. Secdo modernizes endpoint security with the steady collection of all activities and actions from computers and servers at the thread level—the most granular view possible into activity on endpoints. The core of Secdo’s approach is the Causality Analysis Engine™, which continuously and automatically analyzes billions of historical endpoint transactions to identify the chain of events associated with any sub-process, host, user, connection or file, and the causality chain behind every threat, down to their root cause. The solution then provides advanced remediation techniques and allows security analysts to optimize the platform for the prevention of future incidents.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Microsoft President: Governments Must Cooperate on Cybersecurity
Kelly Sheridan, Staff Editor, Dark Reading,  11/8/2018
5 Reasons Why Threat Intelligence Doesn't Work
Jonathan Zhang, CEO/Founder of WhoisXML API and TIP,  11/7/2018
Why Password Management and Security Strategies Fall Short
Steve Zurier, Freelance Writer,  11/7/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Flash Poll
Online Malware and Threats: A Profile of Today's Security Posture
Online Malware and Threats: A Profile of Today's Security Posture
This report offers insight on how security professionals plan to invest in cybersecurity, and how they are prioritizing their resources. Find out what your peers have planned today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-16470
PUBLISHED: 2018-11-13
There is a possible DoS vulnerability in the multipart parser in Rack before 2.0.6. Specially crafted requests can cause the multipart parser to enter a pathological state, causing the parser to use CPU resources disproportionate to the request size.
CVE-2018-16471
PUBLISHED: 2018-11-13
There is a possible XSS vulnerability in Rack before 2.0.6 and 1.6.11. Carefully crafted requests can impact the data returned by the `scheme` method on `Rack::Request`. Applications that expect the scheme to be limited to 'http' or 'https' and do not escape the return value could be vulnerable to a...
CVE-2018-6980
PUBLISHED: 2018-11-13
VMware vRealize Log Insight (4.7.x before 4.7.1 and 4.6.x before 4.6.2) contains a vulnerability due to improper authorization in the user registration method. Successful exploitation of this issue may allow Admin users with view only permission to perform certain administrative functions which they...
CVE-2018-17614
PUBLISHED: 2018-11-13
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Losant Arduino MQTT Client prior to V2.7. User interaction is not required to exploit this vulnerability. The specific flaw exists within the parsing of MQTT PUBLISH packets. The issue results from th...
CVE-2018-8009
PUBLISHED: 2018-11-13
Apache Hadoop 3.1.0, 3.0.0-alpha to 3.0.2, 2.9.0 to 2.9.1, 2.8.0 to 2.8.4, 2.0.0-alpha to 2.7.6, 0.23.0 to 0.23.11 is exploitable via the zip slip vulnerability in places that accept a zip file.