Hybrid IT Requires the Convergence of Security and Networking
The new security-driven networking model protects businesses anywhere on any edge—on premises, in the cloud, or both—and opens up new opportunities for MSPs.
Fortinet Rolls Out AI-Powered XDR Solution
The new system is designed to accelerate threat investigation, remediate issues automatically, and ease burdens on human security analysts.
Huntress Launches Managed Antivirus for Microsoft Defender
The service provides a centralized multi-tenant administration console for all of the Microsoft Defender deployments an MSP manages while augmenting the product’s native capabilities with expertise and assistance from the Huntress ThreatOps team.
SOCSoter Adds New CISA Indicators of Compromise to Managed Cloud SIEM Platform
Hagerstown, MD – Monday, January 25, 2021 – In response to Indicators of Compromise (IoC) identified in the recent SolarWinds/Microsoft 365 breach, SOCSoter has implemented these IoCs into its Managed Cloud SIEM cloud monitoring tool. While the indicators found in the Cybersecurity and Infrastructure Security Agency (CISA) tool are helpful as a handy status check, it only provides a historical view of the environment from a forensic perspective.
ChannelPro 5 Minute Roundup for the Week of January 18th, 2021
This week, Erick and Rich take a look at ChannelPro’s annual industry preview article for 2021, explore the importance of reviewing your performance in 2020, and discuss the wisdom of sampling a new variety of gin made with Elephant dung.
5 Cybersecurity Conversation Starters
By focusing on challenges along with strategies, ROI, and opportunities, MSPs can turn security into a business discussion and cement their trusted adviser status.
Mission Impossible: Forecasting Tech in 2021
After a year of unprecedented turmoil, predicting what lies ahead isn’t easy. Seven brave experts agreed to help us try anyway.
Cybersecurity Trends and Tips
This Expert Guide offers some best practices for defending against attacks on managed service providers’ systems, shoring up risk management strategies to avoid lawsuits, protecting edge computing devices, and keeping remote workers safe.
Work from Home: The Art and Science of Post-Perimeter Security
New procedures and policies are required that emphasize identity and access control, while issues around privacy and financial responsibility remain to be addressed.
Huntress Acquires Network-Aware EDR Specialist Level Effect
The deal will add deep network traffic visibility and analysis to the vendor’s existing detection and response capabilities, according to CEO Kyle Hanslovan (pictured).










