Endpoint Security and Network Monitoring News for the Week of March 21st: Auvik, SlashNext, CyCognito, and More

Endpoint Security and Network Monitoring News for the Week of March 21st: Auvik, SlashNext, CyCognito, and More

The editors at Solutions Review have curated this list of the most noteworthy Endpoint Security and Network Monitoring news from the week of March 21st. This round-up covers announcements and updates from Auvik, SlashNext, CyCognito, and more.

Keeping?up with all the most relevant?Endpoint Security?and?Network Monitoring news can be time-consuming. As a result, our editorial team aims to summarize some of the top headlines in the space by curating a collection of the latest vendor product news, mergers and acquisitions, venture capital funding, talent acquisition, and other noteworthy news. With that in mind, here is some of the top endpoint security and network monitoring news from the week of March 21st.

For early access to all the expert insights published on Solutions Review, join Insight Jam, a community dedicated to enabling the human conversation on AI.

Endpoint Security and Network Monitoring News for the Week of March 21st


Acuvity Releases a GenAI Service Risk Evaluation Report Capability

Acuvity, a runtime generative AI security platform company, has announced the availability of its GenAI Service Risk Evaluation Report. With this new capability, organizations can improve how they assess risks, take immediate action to address issues without excessive overhead, and realize "a better way to secure the influx of new GenAI services." Acuvik's Risk Evaluation Report tool also covers information about GenAI service, including data shared with third parties, data usage, company training, legal compliance initiatives, and dependencies on other models.

Read on for more.


Auvik Debuts New Automation and Observability Capabilities

Auvik, a cloud-based IT management platform provider, has shared details on several new automation and observability features that it will use to provide "enterprise-grade" solutions to mid-market and managed service providers (MSPs). The additions include SaaS automation, license optimization, endpoint networking monitoring, and expanded server monitoring capabilities. Doug Murray, CEO of Auvik, says, "All of these capabilities were developed by closely working with our customers to understand the solutions and features they need to manage diverse IT environments better, gain greater visibility and efficiency, and uncover hidden opportunities for cost savings."

Read on for more.


Axonius Details a New Suite of Asset Intelligence Solutions

Axonius, a cyber asset management solution provider, recently launched the Axonius Asset Cloud, a new suite of products designed to transform asset intelligence into intelligent action. The new platform will expand the company's actionability capabilities to help organizations proactively identify and remediate threat exposures, inefficiencies, and misconfigurations across their technology environments. The products included in Axonius Asset Cloud include Axonius Identities and, coming in April, Axonius Exposures, which will complement the company's existing product suite.

Read on for more.


Blue Mantis Acquires Three Firms to Expand its Offerings

Blue Mantis—a digital strategy and services provider specializing in managed services, cybersecurity, and cloud solutions—has acquired three firms focused on IT, networking, telecommunications, and managed services. The companies acquired include TELigence Partners, Brevin Systems, and Calkins Networks. All three businesses are headquartered in Vermont and have customers and employees throughout the Northeast and greater United States. The acquisition will bring approximately 200 new customers to Blue Mantis' ecosystem.

Read on for more.


CyCognito Launches New Automation and Visibility Capabilities for its Platform

CyCognito, an external exposure management solution, has announced new capabilities to help clients improve security operations automation and risk visibility. The additions include AI-powered advanced search tools, intelligent action rules,cross-asset relationship analysis, comparative security benchmarking, enhanced cloud integration, comprehensive attack surface monitoring, integrated WordPress testing, and other capabilities to streamline security operations, make assets easier to attribute to owners, and compare attack surface risks to peer organizations.

Read on for more.


SlashNext Reveals a URL Analysis Tool

SlashNext, an AI cloud email and communications security provider, has launched a new advanced URL analysis feature. With this tool, teams can perform live, in-depth scanning of unknown URLs to combat complex threat landscapes where malicious pages only exist for hours. The feature is designed specifically for complex attacks executed by cyber-criminals who have learned to attack trusted cloud application infrastructure. SlashNext's URL analysis will also identify malicious behavior in real-time, even if the link changes or the site is only temporarily operational.

Read on for more.


Vanta Expands its Trust Management Platform with New Features

Vanta, a trust management platform, has shared details on several new features and capabilities to help security and GRC teams collaborate across their organization and extended network. The new features include enhanced audit capabilities, expanded security questionnaire automation, an integrated Vanta Exchange for vendor security reviews, team-based collaboration tools, and granular user access. These additions will help teams reduce manual processes, streamline compliance validation efforts, accelerate sales processes, ensure clear task ownership, and improve contextual communication across departments.

Read on for more.


VulnCheck Raises $12 Million in a Series A Funding Round

VulnCheck, an exploit intelligence company, has raised $12 million in a Series A funding round. The round was led by Ten Eleven Ventures, with participation from existing investors, including Sorenson Capital and In-Q-Tel. With this investment, the company's total funding has reached nearly $20 million. VulnCheck plans to use the funds to fuel its international expansion efforts, accelerate its ongoing growth, scale its go-to-market initiatives, and enhance its platform. Anthony Bettini, the founder and CEO at VulnCheck, says, "This funding represents a commitment to our customers to help them win the fight against adversaries that are weaponizing and exploiting an ever-growing volume of vulnerabilities faster than ever."

Read on for more.


Expert Insights Section


Watch this space each week as our editors will share upcoming events, new thought leadership, and the best resources from Insight Jam, Solutions Review's enterprise tech community for business software pros. The goal? To help you gain a forward-thinking analysis and remain on-trend through expert advice, best practices, trends and predictions, and vendor-neutral software evaluation tools.


Security and Governance of Edge AI Devices

Aparna Achanta, the Security and Compliance Lead at IBM Consulting, shares her insights into the role security and governance can (and should) play in Edge AI devices. In her article, Achanta discusses the growing need for Edge AI, how it might affect the future of IoT devices, what industries will most benefit from it, and the need for stronger regulations and governance.

Read on for more.


Rethinking Security in the Age of Agentic AI

James White, the President and Chief Technology Officer at CalypsoAI, recently commented on why companies need to rethink their security initiatives in the age of agentic AI. For example, his article says, "While agentic AI promises a major leap in efficiency—reducing the need for human involvement in certain tasks—it also presents significant new security risks. Crucially, those risks are either not very well understood or are being overlooked in the race for cost savings and productivity gains."

Read on for more.


For consideration in future news round-ups, send your announcements to [email protected].

要查看或添加评论,请登录

Cybersecurity Solutions Review的更多文章