Include:
Tech
Cybersecurity
Business Strategy
Channel Insights
Stay Connected
Acer America
Acer America Corp. is a computer manufacturer of business and consumer PCs, notebooks, ultrabooks, projectors, servers, and storage products.

Location

333 West San Carlos Street
San Jose, California 95110
United States

WWW: acer.com

ChannelPro Network Awards

hello 2
hello 3

Press Releases

May 15, 2026 |

Key Channel Headlines: Acronis Introduces Cyber Frame, Arctic Wolf Launches AI-Powered Mobile Threat Defense, and More

Acronis Cyber Frame headlines this week’s MSP roundup as vendors push deeper into agentic AI, autonomous security operations, and more.

MSP Technology News Headlines for the Week of 5/11/2026

AI automation is rapidly moving from assistive to autonomous, and this week’s headlines show vendors racing to help MSPs manage that shift without adding complexity. Acronis’ new Cyber Frame platform leads the way, while a wave of agentic security, identity protection, and AI-driven operations tools underscores how quickly the channel is adapting to an AI-first era. If you’re ready for a rundown of this week’s MSP news and partner program updates, scroll on down!


Acronis Introduces Cyber Frame, Addressing Service Provider Demand for Profitable, Reliable, and Protected IaaS

New AI-powered infrastructure platform combines hyperconverged infrastructure, cyber protection, management, and automation for service providers.

Key quote from the press release:

“Service providers are rethinking their infrastructure strategies in response to major market shifts and need infrastructure that fits their business. Acronis Cyber Frame brings infrastructure, protection, and management together in a single, natively integrated platform, helping partners simplify complexity and achieve stronger margins from their infrastructure services.” — Gaidar Magdanurov, president, Acronis


Arctic Wolf Launches AI-Powered Mobile Threat Defense to Protect Organizations Against Growing Mobile-based Cyber Threats

New Aurora Mobile Threat Defense platform expands protection for iOS and Android devices with AI-powered detection, privacy-focused security, and enhanced threat intelligence capabilities.

Key quote from the press release:

“Mobile devices hold direct access to sensitive corporate data, yet they remain one of the least protected attack surfaces. Aurora Mobile Threat Defense brings mobile security into modern security operations, giving organizations confidence to secure their devices while keeping employee privacy top of mind.” — Dan Schiappa, president of technology and services, Arctic Wolf


Cloaked Study Reveals Americans Feel Increasingly Exposed Online but Powerless to Control Their Digital Identity

New research highlights growing public anxiety over personal data exposure, AI-driven privacy risks, and the difficulty of removing information from the internet.

Key findings from the report include:

  • Half of Americans (50%) believe their personal information is more publicly available than it should be.
  • Only 23% of Americans say they feel in control of what appears about them online.
  • More than half of Americans (53%) who tried to remove personal information from the internet failed or achieved only partial success.
  • Americans made more than 33 million searches related to digital identity, online privacy, and personal data removal over the past two years.

ThreatDown Launches Identity Threat Detection and Response to Stop Credential-Based Attacks

New ITDR capabilities help organizations detect, investigate, and respond to identity-based attacks targeting credentials and privileged accounts.

Key quote from the press release:

“Attackers have shifted from breaking in to logging in, which means the most dangerous activity now happens after authentication. Identity threat detection is the natural next layer of our platform, extending the same unified visibility and guided response our customers rely on for endpoints into the identity systems they use every day. By building ITDR directly into our platform, we’re giving lean IT teams and MSPs a practical way to close this gap without a new tool, a new console, or added overhead.” — Kendra Krause, general manager, ThreatDown


Versa Launches Cloud Security Posture Management for the VersaONE Universal SASE Platform

New AI-powered CSPM capabilities extend VersaONE with unified cloud risk visibility, compliance monitoring, and automated remediation across multi-cloud environments.

Key quote from the press release:

“Cloud risk and access risk are two sides of the same exposure, and security teams cannot afford to manage them in separate tools. Most enterprises today look at access and cloud posture through entirely different consoles, with no shared context. Versa CSPM brings them together on a single platform, extending the VersaONE Universal SASE Platform with continuous cloud risk assessment alongside our existing access protection, so security teams can quantify and reduce enterprise exposure faster, with less complexity.” — Anusha Vaidyanathan, senior director, product management, Versa\

More Versa Headlines:

➡️ Versa releases 2026 Annual State of SASE + AI Report


Keeper Security Delivers Structured Governance for Humans and AI Agents with New PAM Approval Workflows in KeeperPAM

New just-in-time approval workflows add structured governance, MFA enforcement, and real-time visibility for privileged access requests across human and AI identities.

Key quote from the press release:

“AI is no longer just a productivity tool; it is a permanent and foundational layer of the modern enterprise technology stack. With Keeper Workflow, we are enforcing the boundaries of AI and human access. This is zero trust in practice: structured, auditable and built to determine exactly when and if an identity is allowed to act inside the enterprise infrastructure.” — Darren Guccione, CEO and co-founder, Keeper Security


Threat Hunting World Championship Opens Registration with $100,000 Prize Pool

Global cybersecurity competition challenges threat hunters to capture more than 400 flags across qualifier rounds and championship events.

The Threat Hunting World Championship launched last week with a total prize pool of $100,000 and multiple trophies available for competitors who successfully capture flags throughout the event. Organizers say the competition includes more than 400 flags designed to test participants’ threat hunting, detection, and cybersecurity investigation skills.

Qualifier rounds are scheduled to begin next month, giving cybersecurity professionals, researchers, and enthusiasts the opportunity to compete for spots in later championship events. The competition is positioned as a hands-on challenge environment focused on real-world threat hunting scenarios and advanced defensive security techniques.


Jabra Introduces the PanaCast U30 Video Bar to Simplify BYOD Video Collaboration in Small Meeting Rooms

New Android-powered video bar combines AI-enabled audio and video features with flexible BYOD connectivity for small meeting room collaboration.

Key quote from the press release:

“Small meeting spaces are where many of the most important conversations happen. As teams look to support hybrid work, there’s a growing need to make more of these spaces meeting ready. With the Jabra PanaCast U30, we’re delivering intelligent video and professional audio in a compact, easy-to-deploy solution that makes it easier to equip more small rooms for video meetings.” — Holger Reisinger, senior vice president, Jabra video business unit


Blumira Launches Kindling Pilot, Cuts Alerts By 30-50x Through Agentic Auto-Triage

New agentic SIEM investigation engine uses AI-powered contextual analysis to reduce alert fatigue and surface only verified, actionable security cases.

Key quote from the press release:

“Kindling takes the guesswork out of security. With attackers moving faster than ever, a three-person IT team can’t afford to manually sort through alerts. Kindling replaces a finding to-do list with actionable cases and tells you what’s critical, so even lean security teams can have the contextual signal they need to triage, investigate, and remediate without manual overhead.” — Matt Warner, CEO, Blumira


Xurrent Extends Its AI Fabric with Autonomous Agents and an Open MCP Server

New autonomous AI agents and open MCP server expand Xurrent’s AI-powered IT operations platform with governed automation and support for external AI models.

Key quote from the press release:

“AI has been part of the Xurrent fabric for years. Today, the role changes. Our agents move from assisting the IT team to joining it. That’s what we built the platform to make possible.” — Brian Wenngatz, CEO, Xurrent


Reinvent Telecom Launches REVIVE to Unify Technology Management for Partners

New portal brings customer accounts, solution information, service monitoring and support workflows together in a digital command center.

Key quote from the press release:

“REVIVE is central to Reinvent’s strategy to become the platform that brings the technology ecosystem together for our partners. Our partners are expanding beyond traditional communications into a broader set of technology services, and they need one place to manage that complexity. REVIVE gives them a single platform experience that helps them operate more efficiently, deliver more value to their customers and scale more profitably.” — Justin Catlett, president and CEO, Reinvent Telecom


AI Phishing-as-a-Service Drives Increase in Email Attacks, Barracuda Reports

New Barracuda research finds AI-powered phishing kits and automation are accelerating the scale and sophistication of email-based attacks.

Key findings from the report include:

  • Phishing-as-a-service platforms powered by AI are making sophisticated email attacks more accessible to cybercriminals.
  • Attackers are increasingly using generative AI to create highly convincing phishing emails at scale.
  • Business email compromise and credential theft campaigns continue to rise as attackers automate social engineering tactics.
  • Organizations face growing difficulty distinguishing legitimate communications from AI-generated attacks.

Huntress and Acrisure Announce New Cyber Insurance Program with No Deductible for Eligible Applicants

New program combines managed cybersecurity services with cyber insurance coverage tailored for SMBs and MSPs.

Key quote from the press release:

“Our data indicates that better outcomes can be achieved by leveraging managed security platforms, and insurers look for demonstrated results in this space to confidently underwrite policies and streamline terms. Huntress provides that evidence every day.” — Adam Abresch, EVP of cyber solutions, Acrisure


Top Down Ventures Closes US$28M Founders Fund I, Exceeding Target

MSP-focused venture capital firm oversubscribes inaugural fund as institutional interest in MSP software and AI accelerates.

Key quote from the press release:

“We believe there has never been a more important time to invest at the early stage, especially in a category like MSP that remains underappreciated but critical to the global SMB market for managed IT, security and AI.” — Mark Scott, general partner, Top Down Ventures


SonicWall Expands Gen 8 Platform to the Cloud with New NSv XS Virtual Firewall to Help MSPs and MSSPs Deliver Managed Security Wherever Workloads Run

New virtual firewall extends SonicWall’s Gen 8 platform into cloud and hypervisor environments with scalable protection for distributed workloads.

Key quote from the press release:

“Cloud adoption didn’t wait for security to catch up and neither did the attackers. NSv XS extends our Gen 8 platform into the cloud and hypervisor environments for the first time, closing the inspection gap that perimeter-only security leaves behind. Paired with SonicOS 8.2.1 and purpose-built subscription tiers, it gives partners everything they need to build a managed virtual firewall practice without adding complexity or cost.” — Chandro Prasad, chief product officer, SonicWall


New Semperis Study Reveals AI’s Effects on the Identity Attack Surface

Global study finds organizations are rapidly expanding AI access to critical systems faster than they are implementing safeguards and recovery readiness.

Key findings from the report include:

  • 74% of organizations surveyed believe AI will increase attacks on identity infrastructure.
  • 93% already use or plan to use AI agents for sensitive security tasks such as password resets and VPN access.
  • 92% say AI is installed on at least some local machines with access to SSH and encryption keys.
  • Globally, only 32% of organizations are very confident they could regain control if AI exposes admin credentials.

Casepoint Announces Strategic Partnership with Proofpoint to Streamline Legal and Compliance Workflows

New integration connects Casepoint with Proofpoint Archive to reduce manual handoffs and improve defensibility during eDiscovery.

Key quote from the press release:

“Legal, compliance, and FOIA teams are under constant pressure to move faster and handle larger caseloads, while dealing with larger, more diffusive data sets that contain more types of native data. Our partnership with Proofpoint enables our customers to place preservations and streamline collection from the Proofpoint Archive environment, thus accelerating downstream document review, redaction, and production execution. This partnership improves efficiency and reduces the complexities typically associated with legal hold and collection activities — a significant win for our shared customers.” — Pete Feinberg, chief product officer, Casepoint


Scality Launches Autonomous Data Infrastructure: A New Operating Model for Enterprise AI, Cyber Resilience, and Sovereign Control

New Scality ADI platform combines autonomous operations, cyber resilience, and workload-aware storage management for AI-scale environments.

Key quote from the press release:

“The AI era hasn’t just changed how enterprises use data, it has exposed how badly the old storage model was broken. Scality ADI isn’t just a faster object store. It’s a new operating model that autonomously aligns the right performance, protection, and economics to every workload, at every stage of the data lifecycle.” — Jérôme Lecat, CEO, Scality


Palo Alto Networks Report Highlights Growing Identity Security Risks Across Enterprise Environments

New IDIRA research examines how identity sprawl, excessive privileges, and fragmented security controls are increasing organizational exposure to cyberattacks.

Key findings from the report include:

  • Identity-related attack paths continue to expand as organizations adopt more cloud services, SaaS applications, and machine identities.
  • Excessive privileges and overprovisioned accounts remain among the most common contributors to enterprise security risk.
  • Security teams face growing challenges correlating identity data across fragmented tools and environments.
  • Machine identities and service accounts are increasing rapidly, often without the same governance controls applied to human users.

As ChannelPro’s online director and tech editor for over a decade, Matt Whitlock has spent years blending sharp tech insight with digital know-how. He brings more than 25 years of experience working in the technology industry to his reviews, analysis, and general musings about all things gadget and gear.

Images: Acronis, Cloaked, SentinelOne, Jabra, Revive, Barracuda, Sempris, PaloAlto

Related News & Articles

Free MSP Resources

Editor’s Choice


Explore ChannelPro

Events

Reach Our Audience