Endpoint Security and Network Monitoring News for the Week of June 7; SentinelOne, Backslash, Have I Been Pwned … – Solutions Review

3 minutes, 32 seconds Read

The editors at Solutions Review have curated this list of the most noteworthy endpoint security and network monitoring news for the week of June 7. This curated list features endpoint security and network monitoring vendors such as SentinelOne, Backslash, Have I Been Pwned, and more.

Keeping tabs on all the most relevant endpoint security and network monitoring news can be a time-consuming task. As a result, our editorial team aims to provide a summary of the top headlines from the last month in this space. Solutions Review editors will curate vendor product news, mergers and acquisitions, venture capital funding, talent acquisition, and other noteworthy endpoint security and network monitoring news items.

Endpoint Security and Network Monitoring News for the Week of June 7


SentinelOne and Ooredoo Group Announce Partnership

Ooredoo Group announced this week a Managed Security Service Provider (MSSP) agreement with SentinelOne, a global leader in cybersecurity solutions.  As part of this partnership, Ooredoo will integrate Singularity Endpoint, SentinelOne’s endpoint detection and response solution, into its comprehensive suite of cybersecurity offerings. The MSSP agreement will cover all Ooredoo’s operating companies, with the service being gradually launched across the entire footprint in the coming weeks.

Read on for more.

SecurityBridge Launches SecurityBridge Platform for SAP BTP

SecurityBridge, a leading global provider of SAP security solutions, this week announced the launch of SecurityBridge Platform for SAP BTP. “The SecurityBridge Platform for SAP BTP sets a new standard for comprehensive security in the SAP cloud environment,” said Holger Hügel, Product Management Director, SecurityBridge. “Our platform addresses the critical needs of SAP customers, whether exploring SAP BTP as part of their cloud transformation strategy or enhancing collaboration with external business partners and supply chains. This new platform will provide the transparency and control needed to secure external access effectively.”

Read on for more.

Backslash Announces Major Updates to Platform

Backslash, an AppSec solutions provider, this week unveiled expansive new platform capabilities. With a broad roster of new on-premises integrations, security team workflow integrations and automation features, CI/CD integrations, and bolstered language support, Backslash now serves the full software development lifecycle and further supports the application security needs of large enterprises. “There are two core elements that make AppSec teams successful – one is cutting through the noise to prioritize truly reachable and exploitable vulnerabilities; the other is building confidence with our developers to trust that the risks we flag are real, and worth their effort to investigate and fix,” said Shane Garoutte, Head of Security & Compliance at Capital Rx. “Backslash’s focus on reachability analysis enables us to achieve both, and with the platform’s expanded capabilities, we can also work seamlessly with DevOps to integrate security throughout the software development lifecycle.”

Read on for more.

Have I Been Pwned Update to Include 361M Stolen Email Addresses

Data breach notification service Have I Been Pwned has been updated to include 361 million email addresses from credentials exfiltrated in credential-stuffing attacks and password-stealing malware intrusions that have been leaked on Telegram channels used by cybercriminals, BleepingComputer reports. More than 150 million of the newly added email addresses have not been previously processed by the HIBP, according to the site’s founder Troy Hunt, who noted that the exposed email addresses were part of the 1,700 files obtained from the Telegram channels. “Alongside those addresses were passwords and, in many cases, the website the data pertains to,” said Hunt, who was able to verify the legitimacy of some of the leaked email addresses by using websites’ password reset forms.

Read on for more.


Expert Insights Section

Insight Jam logoWatch this space each week as our editors will share upcoming events, new thought leadership, and the best resources from Insight Jam, Solutions Review’s enterprise tech community for business software pros. The goal? To help you gain a forward-thinking analysis and remain on-trend through expert advice, best practices, trends and predictions, and vendor-neutral software evaluation tools.

Now On Demand: Passkeys: The Great ‘Password Killer’?

Access management and authentication solutions providers have been chasing the “password killer” dream since MFA, and right now, passkeys are at the front and have experts on both sides of the discussion answering the question, “Is this the password killer or just another tool in a growing list of tools?”

Watch here.

This post was originally published on the 3rd party site mentioned in the title of this this site

Similar Posts