{"id":2508,"date":"2019-10-28T00:00:00","date_gmt":"2019-10-28T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2019\/10\/28\/oem-security-newsalert-27-oct-2019\/"},"modified":"2022-01-13T23:29:42","modified_gmt":"2022-01-13T23:29:42","slug":"oem-security-newsalert-27-oct-2019","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2019\/10\/28\/oem-security-newsalert-27-oct-2019\/","title":{"rendered":"OEM Security Newsalert &#8211; 27-Oct-2019"},"content":{"rendered":"<ul>\n<li style=\"-ms-text-size-adjust: 100%;-webkit-text-size-adjust: 100%;\"><font color=\"darkblue\">Check Point Revamps Small and Medium Businesses Security to Protect from the Most Advanced Cyber Attacks&nbsp;<\/font><\/li>\n<li style=\"-ms-text-size-adjust: 100%;-webkit-text-size-adjust: 100%;\"><font color=\"darkblue\">How BlackBerry Used Improv Comedy To Make Cybersecurity A More \u2018Human\u2019 Topic&nbsp;<\/font><\/li>\n<li style=\"-ms-text-size-adjust: 100%;-webkit-text-size-adjust: 100%;\"><font color=\"darkblue\">Zscaler: Time To Buy&nbsp;<\/font><\/li>\n<li style=\"-ms-text-size-adjust: 100%;-webkit-text-size-adjust: 100%;\"><font color=\"darkblue\">Apollo Global in rumoured $5bn takeover bid for Tech Data&nbsp;<\/font><\/li>\n<li style=\"-ms-text-size-adjust: 100%;-webkit-text-size-adjust: 100%;\"><font color=\"darkblue\">The software-defined rebirth of the load balancer&nbsp;<\/font><\/li>\n<li style=\"-ms-text-size-adjust: 100%;-webkit-text-size-adjust: 100%;\"><font color=\"darkblue\">Nutanix and the &#8216;messy middle&#8217; of the subscription software model&nbsp;<\/font><\/li>\n<li style=\"-ms-text-size-adjust: 100%;-webkit-text-size-adjust: 100%;\"><font color=\"darkblue\">French VAR looks to triple revenues to \u20ac1bn through M&amp;A&nbsp;<\/font><\/li>\n<li style=\"-ms-text-size-adjust: 100%;-webkit-text-size-adjust: 100%;\"><font color=\"darkblue\">Global Software-Defined Perimeter (SDP) Market key Insights Based on Product Type, End-use and Regional Demand Till 2025&nbsp;<\/font><\/li>\n<li style=\"-ms-text-size-adjust: 100%;-webkit-text-size-adjust: 100%;\"><font color=\"darkblue\">Avast says hackers breached internal network through compromised VPN profile&nbsp;<\/font><\/li>\n<li style=\"-ms-text-size-adjust: 100%;-webkit-text-size-adjust: 100%;\"><font color=\"darkblue\">Proofpoint Announces Third Quarter 2019 Financial Results&nbsp;<\/font><\/li>\n<li style=\"-ms-text-size-adjust: 100%;-webkit-text-size-adjust: 100%;\"><font color=\"darkblue\">Trustwave Unveils Government, Enterprise Security Testing Services&nbsp;<\/font><\/li>\n<li style=\"-ms-text-size-adjust: 100%;-webkit-text-size-adjust: 100%;\"><font color=\"darkblue\">Atos Acquires Identity Management&nbsp;<\/font><\/li>\n<li style=\"-ms-text-size-adjust: 100%;-webkit-text-size-adjust: 100%;\"><font color=\"darkblue\">Accenture Acquires Happen for Digital Transformation Services&nbsp;<\/font><\/li>\n<li style=\"-ms-text-size-adjust: 100%;-webkit-text-size-adjust: 100%;\"><font color=\"darkblue\">Trend Micro has acquired Cloud Conformity, a software platform that helps partners and customers to spot and mitigate cloud security misconfigurations across Amazon Web Services (AWS), Microsoft Azure and Google Cloud Platform (GCP).&nbsp;<\/font><\/li>\n<li style=\"-ms-text-size-adjust: 100%;-webkit-text-size-adjust: 100%;\"><font color=\"darkblue\">Radiflow and Asset Guardian Introduce Joint Solution to Enrich Industrial Asset Monitoring and Risk Assessment English T&nbsp;<\/font><\/li>\n<li style=\"-ms-text-size-adjust: 100%;-webkit-text-size-adjust: 100%;\"><font color=\"darkblue\">Upstream Security raises $30 million to protect connected cars from cyberattacks&nbsp;<\/font><\/li>\n<li style=\"-ms-text-size-adjust: 100%;-webkit-text-size-adjust: 100%;\"><font color=\"darkblue\">Upstream Security raises $30 million to protect connected cars from cyberattacks&nbsp;<\/font><\/li>\n<li style=\"-ms-text-size-adjust: 100%;-webkit-text-size-adjust: 100%;\"><font color=\"darkblue\">Ubiq Hires Steve Pataky, Pursues Data Security MSSP&nbsp;<\/font><\/li>\n<li style=\"-ms-text-size-adjust: 100%;-webkit-text-size-adjust: 100%;\"><font color=\"darkblue\">Rackspace Selects Armor to Deliver Best-in-Class Security for Hybrid Cloud Environments&nbsp;<\/font><\/li>\n<li style=\"-ms-text-size-adjust: 100%;-webkit-text-size-adjust: 100%;\"><font color=\"darkblue\">Forescout Joins Global Cyber Security Alliance for Operational Technology&nbsp;<\/font><\/li>\n<li style=\"-ms-text-size-adjust: 100%;-webkit-text-size-adjust: 100%;\"><font color=\"darkblue\">Foundries.io raises $3.5 million to fix IoT and Edge security&nbsp;<\/font><\/li>\n<li style=\"-ms-text-size-adjust: 100%;-webkit-text-size-adjust: 100%;\"><font color=\"darkblue\">Ian McLeod Joins Veracode as Chief Product Officer&nbsp;<\/font><\/li>\n<li style=\"-ms-text-size-adjust: 100%;-webkit-text-size-adjust: 100%;\"><font color=\"darkblue\">Cynet\u2019s free vulnerability assessment offering helps organizations significantly increase their security&nbsp;<\/font><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p style=\"margin: 1em 0;-ms-text-size-adjust: 100%;-webkit-text-size-adjust: 100%;color: #202020;font-family: Helvetica;font-size: 15px;line-height: 150%;text-align: left;\"><img loading=\"lazy\" decoding=\"async\" height=\"16\" src=\"https:\/\/software.einnews.com\/favicon.ico\" width=\"16\" style=\"border: 0;outline: none;text-decoration: none;-ms-interpolation-mode: bicubic;height: auto !important;\">&nbsp;<strong>Check Point Revamps Small and Medium Businesses Security to Protect from the Most Advanced Cyber Attacks<\/strong><br \/>\n<em>Nasaq Globe Newswire<\/em>&nbsp;<br \/>\n<em>EIN News<\/em>&nbsp;<br \/>\n\/EIN News\/ &#8212; SAN CARLOS, Calif., Oct. 17, 2019 (GLOBE NEWSWIRE) &#8212; Check Point\u00ae Software Technologies Ltd. (NASDAQ: CHKP), a leading provider of cyber security solutions globally, announced the release of the new 1500 series security gateways for SMBs.<br \/>\nThe two new SMB appliances set new standards of protection against the most advanced fifth-generation cyberattacks, and offer unrivalled ease of deployment and management.<br \/>\nThe 1550 and 1590 gateways are powered by Check Point\u2019s R80 release.<br \/>\nR80 is the industry\u2019s most advanced security management software, and includes multi-layered next-generation protection from both known threats and zero-day attacks using the award-winning SandBlast\u2122 Zero-Day Protection, plus antivirus, anti-bot, IPS, app control, URL filtering and identity awareness.&nbsp;<br \/>\nffective May 30th, 2020, Check Point will cease to sale the following security gateway models:&nbsp; 730, 750, 770, 790, 1430, 1450, 1470 and 1490 wired and wireless (excluding VDSL).<br \/>\n<font color=\"blue\"><strong>Link:<\/strong><\/font>&nbsp;<a href=\"https:\/\/software.einnews.com\/pr_news\/499529696\/check-point-revamps-small-and-medium-businesses-security-to-protect-from-the-most-advanced-cyber-attacks?n=2&amp;code=oFvCCJC2r-jYysMo&amp;utm_source=NewsletterN\" style=\"-ms-text-size-adjust: 100%;-webkit-text-size-adjust: 100%;color: #202020;font-weight: normal;text-decoration: underline;\">https:\/\/software.einnews.com\/pr_news\/499529696\/check-point-revamps-small-and-medium-businesses-security-to-protect-from-the-most-advanced-cyber-attacks?n=2&amp;code=oFvCCJC2r-jYysMo&amp;utm_source=NewsletterN<\/a><\/p>\n<p style=\"margin: 1em 0;-ms-text-size-adjust: 100%;-webkit-text-size-adjust: 100%;color: #202020;font-family: Helvetica;font-size: 15px;line-height: 150%;text-align: left;\"><img loading=\"lazy\" decoding=\"async\" height=\"16\" src=\"https:\/\/thumbor.forbes.com\/thumbor\/600x315\/https%3A%2F%2Fspecials-images.forbesimg.com%2Fimageserve%2F5da9e9c16763cb0006091403%2F960x0.jpg%3FcropX1%3D76%26cropX2%3D987%26cropY1%3D0%26cropY2%3D512\" width=\"16\" style=\"border: 0;outline: none;text-decoration: none;-ms-interpolation-mode: bicubic;height: auto !important;\">&nbsp;<strong>How BlackBerry Used Improv Comedy To Make Cybersecurity A More \u2018Human\u2019 Topic<\/strong><br \/>\n<em>Marty Swant<\/em>&nbsp;<br \/>\n<em>Forbes<\/em>&nbsp;<br \/>\nBlackBerry wants to make data breaches a laughing matter.<br \/>\nTo illustrate how even the smartest and most capable employees can make accidental mistakes that put sensitive information at risk, the Canadian company is taking a more \u201chuman\u201d approach to the serious subject of cybersecurity.<br \/>\nIt\u2019s not that Mark Wilson\u2013who\u2019s been CMO of the brand since 2017\u2013doesn\u2019t take threats lightly.<br \/>\nRather, he said an overwhelming majority of customers surveyed viewed their own staff as more of an accidental threat than an outside hacker.<br \/>\nAccording to research conducted by BlackBerry, 94% of chief security officers and other executives don\u2019t trust their own employees with critical information.<br \/>\nIn fact, 72% suspected their employees were working around existing security measures. (For example, BlackBerry found that a nurse at a hospital sent X-ray images to a doctor via Snapchat because she was locked out of the company\u2019s software.)<br \/>\nTo promote its own security software, BlackBerry\u2014which has pivoted from its earlier smartphone-making days to enterprise tech made for the era of self-driving cars and the Internet of Things\u2014decided to humanize accidental errors.<br \/>\nBut instead of just passing a brief over to an creative agency to come up with a TV spot and some billboards or print ads, Blackerry worked with Oakland-based Funworks to hire improv comedians to create a campaign alongside BlackBerry teams ranging from marketing and tech to sales.<br \/>\nThe goal: to translate the technical side of security to something more relatable.<br \/>\n\u201cThe key to this is how do you evoke emotion into something that can be at times a very dry topic,\u201d Wilson says. \u201cThat\u2019s kind of the fun of what we do.<br \/>\nHow do you break through a sea of sameness with something that\u2019s an evolutionary or provocative point of view and that\u2019s a very human point of view?\u201d<br \/>\n<font color=\"blue\"><strong>Link:<\/strong><\/font>&nbsp;<a href=\"https:\/\/www.forbes.com\/sites\/martyswant\/2019\/10\/18\/how-blackberry-used-improv-comedy-to-make-cybersecurity-a-more-human-topic\/#4ec87b51cf5a\" style=\"-ms-text-size-adjust: 100%;-webkit-text-size-adjust: 100%;color: #202020;font-weight: normal;text-decoration: underline;\">https:\/\/www.forbes.com\/sites\/martyswant\/2019\/10\/18\/how-blackberry-used-improv-comedy-to-make-cybersecurity-a-more-human-topic\/#4ec87b51cf5a<\/a><\/p>\n<p style=\"margin: 1em 0;-ms-text-size-adjust: 100%;-webkit-text-size-adjust: 100%;color: #202020;font-family: Helvetica;font-size: 15px;line-height: 150%;text-align: left;\"><img loading=\"lazy\" decoding=\"async\" height=\"16\" src=\"https:\/\/software.einnews.com\/pr_news\/499302287\/aviatrix-names-cloud-industry-veteran-as-senior-vice-president-of-worldwide-sales\" width=\"16\" style=\"border: 0;outline: none;text-decoration: none;-ms-interpolation-mode: bicubic;height: auto !important;\">&nbsp;<strong>Zscaler: Time To Buy<\/strong><br \/>\n<em>Stefan Ong<\/em>&nbsp;<br \/>\n<em>Seeking Alpha<\/em>&nbsp;<br \/>\nSummary<br \/>\nZscaler has fallen roughly 46% since its 52-week high.<br \/>\nThe stock has grown strongly with revenue growth rates above 50% for the past three years.<br \/>\nMoreover, Zscaler is undervalued by 9.5% based on my estimates.<br \/>\n<font color=\"blue\"><strong>Link:<\/strong><\/font>&nbsp;<a href=\"https:\/\/seekingalpha.com\/article\/4296361-zscaler-time-buy\" style=\"-ms-text-size-adjust: 100%;-webkit-text-size-adjust: 100%;color: #202020;font-weight: normal;text-decoration: underline;\">https:\/\/seekingalpha.com\/article\/4296361-zscaler-time-buy<\/a><\/p>\n<p style=\"margin: 1em 0;-ms-text-size-adjust: 100%;-webkit-text-size-adjust: 100%;color: #202020;font-family: Helvetica;font-size: 15px;line-height: 150%;text-align: left;\"><img loading=\"lazy\" decoding=\"async\" height=\"16\" src=\"http:\/\/www.channelpartnerinsight.com\/w-images\/3096ea17-863e-4316-a5b9-bfe9850eb420\/2\/TechData-370x229.png\" width=\"16\" style=\"border: 0;outline: none;text-decoration: none;-ms-interpolation-mode: bicubic;height: auto !important;\">&nbsp;<strong>Apollo Global in rumoured $5bn takeover bid for Tech Data<\/strong><br \/>\n<em>Doug Woodburn<\/em>&nbsp;<br \/>\n<em>Channel Partner Insight<\/em>&nbsp;<br \/>\nTech Data&#8217;s shares have spiked following a report that it is the subject of a near $5bn (\u20ac4.53bn) takeover approach.<br \/>\nAccording to a report today by Reuters, private equity firm Apollo Global Management is offering to pay about $130 a share for the global distribution giant.<br \/>\nIt cited &#8220;people familiar with the matter&#8221;.<\/p>\n<p>Tech Data&#8217;s shares have hiked 14 per cent in after-hours trading this evening.<br \/>\nApollo was linked with a $7.5bn bid for Tech Data&#8217;s arch-rival Ingram late last year.<br \/>\n<font color=\"blue\"><strong>Link:<\/strong><\/font>&nbsp;<a href=\"https:\/\/www.channelpartnerinsight.com\/channel-partner-insight\/news\/3082668\/apollo-global-in-rumoured-usd5bn-takeover-bid-for-tech-data?utm_medium=email&amp;utm_content=&amp;utm_campaign=Channel%20Partner%20In\" style=\"-ms-text-size-adjust: 100%;-webkit-text-size-adjust: 100%;color: #202020;font-weight: normal;text-decoration: underline;\">https:\/\/www.channelpartnerinsight.com\/channel-partner-insight\/news\/3082668\/apollo-global-in-rumoured-usd5bn-takeover-bid-for-tech-data?utm_medium=email&amp;utm_content=&amp;utm_campaign=Channel%20Partner%20In<\/a><\/p>\n<p style=\"margin: 1em 0;-ms-text-size-adjust: 100%;-webkit-text-size-adjust: 100%;color: #202020;font-family: Helvetica;font-size: 15px;line-height: 150%;text-align: left;\"><img loading=\"lazy\" decoding=\"async\" height=\"16\" src=\"http:\/\/www.channelpartnerinsight.com\/w-images\/39d5a844-bf05-45cc-83aa-354837bba5e7\/1\/networkingcomputerdatacable-370x229.jpg\" width=\"16\" style=\"border: 0;outline: none;text-decoration: none;-ms-interpolation-mode: bicubic;height: auto !important;\">&nbsp;<strong>The software-defined rebirth of the load balancer<\/strong><br \/>\n<em>Frank J. Ohlhorst<\/em>&nbsp;<br \/>\n<em>Channel Partner Insight<\/em>&nbsp;<br \/>\nSoftware-defined technologies have quickly transformed traditional WAN optimization solutions and load balancers into solutions now referred to as application delivery controllers (ADCs).&nbsp;&nbsp;<br \/>\nZK Research revealed that software defined technologies, along with cloud native applications, are being deployed more frequently, with 50 percent of UK businesses and 29 percent of US businesses expecting to move over half of their applications into the cloud within the next 12 months.<br \/>\nIt&#8217;s a transformation that ZK expects to have a profound impact on the ADC Market.&nbsp;&nbsp;<br \/>\nAccording to ZK Research, F5 and Citrix are the most commonly used ADCs by today&#8217;s businesses, yet ZK opines that cloud native ADCs are beginning to show strength as applications transform into cloud-based entities.&nbsp;&nbsp;<br \/>\nForrester&#8217;s Application Experience (AX) for Asia Pacific Enterprises in Multi-cloud Environments report reveals that 84 percent of CIOs in APAC believe that a multi-cloud deployment will constitute up to half of their web and application hosting environment in the next three years.<br \/>\n<font color=\"blue\"><strong>Link:<\/strong><\/font>&nbsp;<a href=\"https:\/\/www.channelpartnerinsight.com\/channel-partner-insight\/analysis\/3082956\/the-death-of-the-load-balancer-is-the-adc-market-primed-for-a-revolution?utm_medium=email&amp;utm_content=&amp;utm_campaign=Chann\" style=\"-ms-text-size-adjust: 100%;-webkit-text-size-adjust: 100%;color: #202020;font-weight: normal;text-decoration: underline;\">https:\/\/www.channelpartnerinsight.com\/channel-partner-insight\/analysis\/3082956\/the-death-of-the-load-balancer-is-the-adc-market-primed-for-a-revolution?utm_medium=email&amp;utm_content=&amp;utm_campaign=Chann<\/a><\/p>\n<p style=\"margin: 1em 0;-ms-text-size-adjust: 100%;-webkit-text-size-adjust: 100%;color: #202020;font-family: Helvetica;font-size: 15px;line-height: 150%;text-align: left;\"><img loading=\"lazy\" decoding=\"async\" height=\"16\" src=\"http:\/\/www.computing.co.uk\/w-images\/1e666726-9996-41ad-8712-f48f0af50f87\/2\/NutanixX-370x229.png\" width=\"16\" style=\"border: 0;outline: none;text-decoration: none;-ms-interpolation-mode: bicubic;height: auto !important;\">&nbsp;<strong>Nutanix and the &#8216;messy middle&#8217; of the subscription software model<\/strong><br \/>\n<em>Ohn Leonard<\/em>&nbsp;<br \/>\n<em>Computing<\/em>&nbsp;<br \/>\nMoving to a new licensing model always carries a degree of risk.<br \/>\nFor hyperconvergence vendor Nutanix, the change to a subscription software vendor was more radical than for the many software vendors that have taken that route, in that Nutanix went public three years ago as a hardware vendor.<br \/>\nIt is, perhaps, the only enterprise vendor to go directly from hardware to subscription software, according to VP investor relations Tonya Chin.<br \/>\nThe company moved to the software subscription model two years ago and finally stopped selling hardware appliances altogether in 2018.<br \/>\nSpeaking at a media briefing during the .NEXT event in Copenhagen this month, Chin put the dip down to a number of factors.<br \/>\nFirst, revenues for a three-year subscription contract will be realised three years later with than an equivalent up-front deal, so in the short-term income will inevitably decline.<br \/>\nChin forecasts that company will get through its \u2018messy middle&#8217;, becoming a fully-fledged subscription software company within the next two years.<br \/>\n<font color=\"blue\"><strong>Link:<\/strong><\/font>&nbsp;<a href=\"https:\/\/www.computing.co.uk\/ctg\/news\/3083008\/nutanix-and-the-messy-middle-of-the-subscription-software-model?utm_source=Adestra&amp;utm_medium=email&amp;utm_content=&amp;utm_campaign=CTG.Daily_RL.EU.A.U&amp;im_edp=14\" style=\"-ms-text-size-adjust: 100%;-webkit-text-size-adjust: 100%;color: #202020;font-weight: normal;text-decoration: underline;\">https:\/\/www.computing.co.uk\/ctg\/news\/3083008\/nutanix-and-the-messy-middle-of-the-subscription-software-model?utm_source=Adestra&amp;utm_medium=email&amp;utm_content=&amp;utm_campaign=CTG.Daily_RL.EU.A.U&amp;im_edp=14<\/a><\/p>\n<p style=\"margin: 1em 0;-ms-text-size-adjust: 100%;-webkit-text-size-adjust: 100%;color: #202020;font-family: Helvetica;font-size: 15px;line-height: 150%;text-align: left;\"><img loading=\"lazy\" decoding=\"async\" height=\"16\" src=\"http:\/\/www.channelpartnerinsight.com\/w-images\/25204121-aac7-4c3d-b414-2446e0aa1806\/1\/mergersandacquisitionsimage-370x229.jpeg\" width=\"16\" style=\"border: 0;outline: none;text-decoration: none;-ms-interpolation-mode: bicubic;height: auto !important;\">&nbsp;<strong>French VAR looks to triple revenues to \u20ac1bn through M&amp;A<\/strong><br \/>\n<em>Josh Budd<\/em>&nbsp;<br \/>\n<em>Channel Partner Insight<\/em>&nbsp;<br \/>\nFrench VAR C&#8217;PRO is aiming to hit \u20ac1bn revenues by 2025 as part of an M&amp;A strategy which will see it acquire 10 competitors every year.<br \/>\nPrint provider C&#8217;PRO merged with IT services firm Quadria at the start of 2018 to create a \u20ac300m-revenue entity with 1,000 employees.<br \/>\nThrough acquiring Quadria, C&#8217;PRO, which claims to be Canon&#8217;s and Toshiba&#8217;s number one print partner in Europe, has now moved beyond its print provider roots into new areas of IT, including reselling PCs and infrastructure, systems integration, managed services, cloud, security and telco services.<br \/>\n<font color=\"blue\"><strong>Link:<\/strong><\/font>&nbsp;<a href=\"https:\/\/www.channelpartnerinsight.com\/channel-partner-insight\/news\/3082869\/french-var-looks-to-triple-revenues-to-eur1bn-through-m-a?utm_medium=email&amp;utm_content=&amp;utm_campaign=Channel%20Partner%20Insi\" style=\"-ms-text-size-adjust: 100%;-webkit-text-size-adjust: 100%;color: #202020;font-weight: normal;text-decoration: underline;\">https:\/\/www.channelpartnerinsight.com\/channel-partner-insight\/news\/3082869\/french-var-looks-to-triple-revenues-to-eur1bn-through-m-a?utm_medium=email&amp;utm_content=&amp;utm_campaign=Channel%20Partner%20Insi<\/a><\/p>\n<p style=\"margin: 1em 0;-ms-text-size-adjust: 100%;-webkit-text-size-adjust: 100%;color: #202020;font-family: Helvetica;font-size: 15px;line-height: 150%;text-align: left;\"><img loading=\"lazy\" decoding=\"async\" height=\"16\" src=\"https:\/\/mw4.wsj.net\/mw5\/content\/images\/favicons\/apple-touch-icon-180x180.png\" width=\"16\" style=\"border: 0;outline: none;text-decoration: none;-ms-interpolation-mode: bicubic;height: auto !important;\">&nbsp;<strong>Global Software-Defined Perimeter (SDP) Market key Insights Based on Product Type, End-use and Regional Demand Till 2025<\/strong><br \/>\n<em>Market Watch<\/em>&nbsp;<br \/>\nOct 21, 2019 (AmericaNewsHour) &#8212; The Global Software-Defined Perimeter (SDP) Market was valued at USD 998.26 million in 2016 and is projected to reach USD 15,077.28 million by 2025, growing at a CAGR of 35.21% from 2017 to 2025.<br \/>\nCompetitive Landscape:The major players in the market are as follows:&nbsp;<br \/>\n1. Cisco Systems, Inc.&nbsp;<br \/>\n2. Catbird Networks, Inc.&nbsp;<br \/>\n3. Intel Corporation&nbsp;<br \/>\n4. Symantec Corporation&nbsp;<br \/>\n5. Check Point Software Technologies Ltd.&nbsp;<br \/>\n6. Certes Networks, Inc.&nbsp;<br \/>\n7. EMC RSA&nbsp;<br \/>\n8. Palo Alto Networks, Inc.&nbsp;<br \/>\n9. Fortinet, Inc.&nbsp;<br \/>\n10. Juniper Networks, Inc.<br \/>\nThese major players have adopted various organic as well as inorganic growth strategies such as mergers &amp; acquisitions, new product launches, expansions, agreements, joint ventures, partnerships, and others to strengthen their position in this market.<br \/>\n<font color=\"blue\"><strong>Link:<\/strong><\/font>&nbsp;<a href=\"https:\/\/www.marketwatch.com\/press-release\/global-software-defined-perimeter-sdp-market-key-insights-based-on-product-type-end-use-and-regional-demand-till-2025-2019-10-21\" style=\"-ms-text-size-adjust: 100%;-webkit-text-size-adjust: 100%;color: #202020;font-weight: normal;text-decoration: underline;\">https:\/\/www.marketwatch.com\/press-release\/global-software-defined-perimeter-sdp-market-key-insights-based-on-product-type-end-use-and-regional-demand-till-2025-2019-10-21<\/a><\/p>\n<p style=\"margin: 1em 0;-ms-text-size-adjust: 100%;-webkit-text-size-adjust: 100%;color: #202020;font-family: Helvetica;font-size: 15px;line-height: 150%;text-align: left;\"><img loading=\"lazy\" decoding=\"async\" height=\"16\" src=\"https:\/\/zdnet3.cbsistatic.com\/hub\/i\/r\/2019\/10\/21\/bd7b8f71-50b2-4bad-aaa7-0fd1c52f3c80\/thumbnail\/770x578\/3628a68700490410cb6a35402e5f126c\/avast.png\" width=\"16\" style=\"border: 0;outline: none;text-decoration: none;-ms-interpolation-mode: bicubic;height: auto !important;\">&nbsp;<strong>Avast says hackers breached internal network through compromised VPN profile<\/strong><br \/>\n<em>Catalin Cimpanu<\/em>&nbsp;<br \/>\n<em>ZD Net<\/em>&nbsp;<br \/>\nCzech cyber-security software maker Avast disclosed today a security breach that impacted its internal network.<br \/>\nIn a statement published today, the company said it believed the attack&#8217;s purpose was to insert malware into the CCleaner software, similar to the infamous CCleaner 2017 incident.<br \/>\nAvast said the breach occurred because the attacker compromised an employee&#8217;s VPN credentials, gaining access to an account that was not protected using a multi-factor authentication solution.<br \/>\nBaloo said Avast intentionally left the compromised VPN profile active, with the purpose of tracking the attacker and observing their actions.<br \/>\nThis lasted until October 15, when the company finished auditing previous CCleaner releases, and pushed out a new clean update.<br \/>\n<font color=\"blue\"><strong>Link:<\/strong><\/font>&nbsp;<a href=\"https:\/\/www.zdnet.com\/article\/avast-says-hackers-breached-internal-network-through-compromised-vpn-profile\/\" style=\"-ms-text-size-adjust: 100%;-webkit-text-size-adjust: 100%;color: #202020;font-weight: normal;text-decoration: underline;\">https:\/\/www.zdnet.com\/article\/avast-says-hackers-breached-internal-network-through-compromised-vpn-profile\/<\/a><\/p>\n<p style=\"margin: 1em 0;-ms-text-size-adjust: 100%;-webkit-text-size-adjust: 100%;color: #202020;font-family: Helvetica;font-size: 15px;line-height: 150%;text-align: left;\"><img loading=\"lazy\" decoding=\"async\" height=\"16\" src=\"https:\/\/ml.globenewswire.com\/media\/5c97f3d3-aee5-4cc1-87c0-1cef1b628f18\/small\/proofpoint-logo-k-jpg.jpg\" width=\"16\" style=\"border: 0;outline: none;text-decoration: none;-ms-interpolation-mode: bicubic;height: auto !important;\">&nbsp;<strong>Proofpoint Announces Third Quarter 2019 Financial Results<\/strong><br \/>\n<em>Nasdaq Globe Newswire<\/em>&nbsp;<br \/>\n<em>EIN News<\/em>&nbsp;<br \/>\nTotal revenue of $227.4 million, up 23% year-over-year<br \/>\nBillings of $277.8 million, up 26% year-over-year<br \/>\nGAAP EPS of $(0.79) per share, Non-GAAP EPS of $0.49 per share<br \/>\nOperating cash flow of $68.6 million and free cash flow of $58.6 million<br \/>\nIncreasing FY19 revenue and profitability guidance<br \/>\n<font color=\"blue\"><strong>Link:<\/strong><\/font>&nbsp;<a href=\"https:\/\/software.einnews.com\/pr_news\/500248740\/proofpoint-announces-third-quarter-2019-financial-results?n=2&amp;code=oFvCCJC2r-jYysMo&amp;utm_source=NewsletterNews&amp;utm_medium=email&amp;utm_campaign=Targeted+Thre\" style=\"-ms-text-size-adjust: 100%;-webkit-text-size-adjust: 100%;color: #202020;font-weight: normal;text-decoration: underline;\">https:\/\/software.einnews.com\/pr_news\/500248740\/proofpoint-announces-third-quarter-2019-financial-results?n=2&amp;code=oFvCCJC2r-jYysMo&amp;utm_source=NewsletterNews&amp;utm_medium=email&amp;utm_campaign=Targeted+Thre<\/a><\/p>\n<p style=\"margin: 1em 0;-ms-text-size-adjust: 100%;-webkit-text-size-adjust: 100%;color: #202020;font-family: Helvetica;font-size: 15px;line-height: 150%;text-align: left;\"><img loading=\"lazy\" decoding=\"async\" height=\"16\" src=\"https:\/\/www.msspalert.com\/wp-content\/uploads\/2019\/08\/trustwave-2019.jpg\" width=\"16\" style=\"border: 0;outline: none;text-decoration: none;-ms-interpolation-mode: bicubic;height: auto !important;\">&nbsp;<strong>Trustwave Unveils Government, Enterprise Security Testing Services<\/strong><br \/>\n<em>Dan Kobialka<\/em>&nbsp;<br \/>\n<em>MSSP Alert<\/em>&nbsp;<br \/>\nTrustwave, a Top 200 MSSP for 2019, has launched Trustwave Security Testing Services to help government agencies and enterprises leverage security scanning and testing capabilities across their IT environments.<br \/>\nTrustwave Security Testing Services provide access to a catalog of scanning and testing services and security personnel that can be scaled as required, according to the company.<br \/>\nThey are built on the Trustwave Fusion cloud-based cybersecurity platform and offer a variety of security scanning and testing capabilities, including:<br \/>\n\u2022 Network and application scanning scheduling and execution.<br \/>\n\u2022 Security tests led by Trustwave SpiderLabs.<br \/>\n\u2022 Risk analysis.<br \/>\n<font color=\"blue\"><strong>Link:<\/strong><\/font>&nbsp;<a href=\"https:\/\/www.msspalert.com\/cybersecurity-companies\/mssps\/trustwave-testing-services\/?utm_medium=email&amp;utm_source=sendpress&amp;utm_campaign\" style=\"-ms-text-size-adjust: 100%;-webkit-text-size-adjust: 100%;color: #202020;font-weight: normal;text-decoration: underline;\">https:\/\/www.msspalert.com\/cybersecurity-companies\/mssps\/trustwave-testing-services\/?utm_medium=email&amp;utm_source=sendpress&amp;utm_campaign<\/a><\/p>\n<p style=\"margin: 1em 0;-ms-text-size-adjust: 100%;-webkit-text-size-adjust: 100%;color: #202020;font-family: Helvetica;font-size: 15px;line-height: 150%;text-align: left;\"><img loading=\"lazy\" decoding=\"async\" height=\"16\" src=\"https:\/\/www.msspalert.com\/wp-content\/uploads\/2018\/05\/atos-building.jpg\" width=\"16\" style=\"border: 0;outline: none;text-decoration: none;-ms-interpolation-mode: bicubic;height: auto !important;\">&nbsp;<strong>Atos Acquires Identity Management<\/strong><br \/>\n<em>Dan Kobialka<\/em>&nbsp;<br \/>\n<em>MSSP Alert<\/em>&nbsp;<br \/>\nAtos, a Top 200 MSSP for 2019, has finalized its acquisition of European digital identity infrastructure management provider IDnomic.<br \/>\nThe news comes after Atos in July announced that it had entered into exclusive negotiations to acquire IDnomic.<br \/>\nMore than 100 IDnomic digital identity specialists are joining Atos\u2019s cybersecurity team as part of the acquisition, the companies said.<br \/>\nIn addition, the IDnomic acquisition could help Atos extend its reach in the global identity and access management (IAM) and public key infrastructure (PKI) solutions markets.<br \/>\nGlobal IAM solutions market revenues are expected to increase at a compound annual growth rate (CAGR) of 13.1 percent between 2018 and 2025 and could be worth $24.1 billion by 2025, industry analyst Grand View Research stated.<br \/>\nFurthermore, the global PKI solutions market is projected to expand at a CAGR of 15.1 percent between 2019 and 2024 and could be worth $3.6 billion by 2024, industry analyst MarketsandMarkets indicated.<br \/>\n<font color=\"blue\"><strong>Link:<\/strong><\/font>&nbsp;<a href=\"https:\/\/www.msspalert.com\/cybersecurity-companies\/mssps\/atos-buys-idnomic\/?utm_medium=email&amp;utm_source=sendpress&amp;utm_campaign\" style=\"-ms-text-size-adjust: 100%;-webkit-text-size-adjust: 100%;color: #202020;font-weight: normal;text-decoration: underline;\">https:\/\/www.msspalert.com\/cybersecurity-companies\/mssps\/atos-buys-idnomic\/?utm_medium=email&amp;utm_source=sendpress&amp;utm_campaign<\/a><\/p>\n<p style=\"margin: 1em 0;-ms-text-size-adjust: 100%;-webkit-text-size-adjust: 100%;color: #202020;font-family: Helvetica;font-size: 15px;line-height: 150%;text-align: left;\"><img loading=\"lazy\" decoding=\"async\" height=\"16\" src=\"https:\/\/www.channele2e.com\/wp-content\/uploads\/2019\/10\/accenture-1.jpg\" width=\"16\" style=\"border: 0;outline: none;text-decoration: none;-ms-interpolation-mode: bicubic;height: auto !important;\">&nbsp;<strong>Accenture Acquires Happen for Digital Transformation Services<\/strong><br \/>\n<em>Ty Trumbull<\/em>&nbsp;<br \/>\n<em>CHANNEL e2e<\/em>&nbsp;<br \/>\nAccenture is pushing forward with its rampant acquisition plan.<br \/>\nThis time, the global systems integrator purchased London, England-based innovation firm Happen for an undisclosed sum.<br \/>\nThe deal bolsters Accenture\u2019s front-end innovation and analytics capabilities to help customers generate new ideas, products, and services, the company asserts.<br \/>\nHappen, founded in 2007, works with companies primarily in the consumer goods, food &amp; beverage, retail, and life sciences industries.<br \/>\nThe firm\u2019s key skills include consumer insights and product and service innovation.<br \/>\n<font color=\"blue\"><strong>Link:<\/strong><\/font>&nbsp;<a href=\"https:\/\/www.channele2e.com\/investors\/mergers-acquisitions\/accenture-buys-happen\/?utm_medium=email&amp;utm_source=sendpress&amp;utm_campaign\" style=\"-ms-text-size-adjust: 100%;-webkit-text-size-adjust: 100%;color: #202020;font-weight: normal;text-decoration: underline;\">https:\/\/www.channele2e.com\/investors\/mergers-acquisitions\/accenture-buys-happen\/?utm_medium=email&amp;utm_source=sendpress&amp;utm_campaign<\/a><\/p>\n<p style=\"margin: 1em 0;-ms-text-size-adjust: 100%;-webkit-text-size-adjust: 100%;color: #202020;font-family: Helvetica;font-size: 15px;line-height: 150%;text-align: left;\"><img loading=\"lazy\" decoding=\"async\" height=\"16\" src=\"https:\/\/www.msspalert.com\/wp-content\/uploads\/2019\/10\/trend-micro-2.jpg\" width=\"16\" style=\"border: 0;outline: none;text-decoration: none;-ms-interpolation-mode: bicubic;height: auto !important;\">&nbsp;<strong>Trend Micro has acquired Cloud Conformity, a software platform that helps partners and customers to spot and mitigate cloud security misconfigurations across Amazon Web Services (AWS), Microsoft Azure and Google Cloud Platform (GCP).<\/strong><br \/>\n<em>Joe Panettieri<\/em>&nbsp;<br \/>\n<em>MSSP Alert<\/em>&nbsp;<br \/>\nOpenText late on October 18 released a statement saying that it was not considering a potential acquisition of Micro Focus.<br \/>\nThe statement surfaced after Bloomberg speculated a deal may be brewing.<br \/>\nMicro Focus shares rose nearly 7 percent today amid the takeover rumors on October 18.<br \/>\nThe snuffed-out takeover rumors follow chatter in September 2019 that suggested private equity firms may want to acquire Micro Focus\u2019s Arcsight and Fortify security software units, according to DealReporter sources.<br \/>\nAt the time, interested parties apparently included Carlyle, Veritas and KKR.<br \/>\nAll of Cloud Conformity\u2019s employees&nbsp; \u2014 including 50 developers and engineers \u2014 will join Trend Micro.<br \/>\nCloud Conformity, founded in 2016, has 100-plus customers and offices in Sydney, Australia; Dallas, Texas; London, United Kingdom; Montreal, Canada and Singapore.<br \/>\nFinancial terms of the deal and specific revenue figures for Cloud Conformity were not disclosed.<br \/>\n<font color=\"blue\"><strong>Link:<\/strong><\/font>&nbsp;<a href=\"https:\/\/www.msspalert.com\/investments\/trend-micro-acquires-cloud-conformity\/?utm_medium=email&amp;utm_source=sendpress&amp;utm_campaign\" style=\"-ms-text-size-adjust: 100%;-webkit-text-size-adjust: 100%;color: #202020;font-weight: normal;text-decoration: underline;\">https:\/\/www.msspalert.com\/investments\/trend-micro-acquires-cloud-conformity\/?utm_medium=email&amp;utm_source=sendpress&amp;utm_campaign<\/a><\/p>\n<p style=\"margin: 1em 0;-ms-text-size-adjust: 100%;-webkit-text-size-adjust: 100%;color: #202020;font-family: Helvetica;font-size: 15px;line-height: 150%;text-align: left;\"><img loading=\"lazy\" decoding=\"async\" height=\"16\" src=\"https:\/\/www.prnewswire.com\/content\/dam\/prnewswire\/icons\/favicon.png\" width=\"16\" style=\"border: 0;outline: none;text-decoration: none;-ms-interpolation-mode: bicubic;height: auto !important;\">&nbsp;<strong>Radiflow and Asset Guardian Introduce Joint Solution to Enrich Industrial Asset Monitoring and Risk Assessment English T<\/strong><br \/>\n<em>Cision PR Newswire<\/em>&nbsp;<br \/>\nMAHWAH, New Jersey and LIVINGSTON, Scotland, Oct. 21, 2019 \/PRNewswire\/ &#8212; Radiflow, a leading provider of cybersecurity solutions for industrial automation networks, and Asset Guardian, a dedicated provider of leading edge protection for process control and industrial software, today jointly announced that the two companies have launched a joint solution to expand industrial asset monitoring, change management and risk assessment capabilities for industrial enterprises.<br \/>\nIn this new integrated solution, iSID&#8217;s asset inventory now incorporates the asset information stored in the Asset Guardian database, including the detailed asset information that is not available from traffic monitoring.<br \/>\nWith this new detailed asset information from Asset Guardian, such as logic version, ownership, geo-location and more, the result is a far more granular risk score calculated by iSID for each asset.<br \/>\nChanges to assets, such as new firmware or PLC logic, are detected on the network in real-time by iSID and sent to Asset Guardian for verification, authorization and validation against the &#8216;golden image&#8217; of the binary stored in the Asset Guardian database.<br \/>\n<font color=\"blue\"><strong>Link:<\/strong><\/font>&nbsp;<a href=\"https:\/\/www.prnewswire.com\/news-releases\/radiflow-and-asset-guardian-introduce-joint-solution-to-enrich-industrial-asset-monitoring-and-risk-assessment-300941791.html\" style=\"-ms-text-size-adjust: 100%;-webkit-text-size-adjust: 100%;color: #202020;font-weight: normal;text-decoration: underline;\">https:\/\/www.prnewswire.com\/news-releases\/radiflow-and-asset-guardian-introduce-joint-solution-to-enrich-industrial-asset-monitoring-and-risk-assessment-300941791.html<\/a><\/p>\n<p style=\"margin: 1em 0;-ms-text-size-adjust: 100%;-webkit-text-size-adjust: 100%;color: #202020;font-family: Helvetica;font-size: 15px;line-height: 150%;text-align: left;\"><img loading=\"lazy\" decoding=\"async\" height=\"16\" src=\"https:\/\/venturebeat.com\/wp-content\/themes\/vb-news\/img\/favicon.ico\" width=\"16\" style=\"border: 0;outline: none;text-decoration: none;-ms-interpolation-mode: bicubic;height: auto !important;\">&nbsp;<strong>Upstream Security raises $30 million to protect connected cars from cyberattacks<\/strong><br \/>\n<em>Paul Sawers<\/em>&nbsp;<br \/>\n<em>Venture Beat<\/em>&nbsp;<br \/>\nUpstream Security, a cloud-based cybersecurity platform for connected cars, has raised $30 million in a series B round of funding led by Alliance Ventures, an automotive alliance constituting Renault, Mitsubishi, and Nissan.<br \/>\nVolvo Group, Hyundai, CRV, Glilot Capital, Maniv Mobility, and Nationwide also participated in the round.<br \/>\nThe connected car market was pegged at $63 billion in 2017, a figure that could rise to more than $200 billion by 2025.&nbsp;&nbsp;<br \/>\nounded in 2017, Upstream Security is adopting a \u201cmulti-layer\u201d approach to protecting connected cars and the underlying network infrastructure.<br \/>\nIts C4 platform integrates with automotive data streams of vehicles and promises to detect incidents as they happen in real time, allocating a rating based on perceived impact and severity.<br \/>\n<font color=\"blue\"><strong>Link:<\/strong><\/font>&nbsp;<a href=\"https:\/\/venturebeat.com\/2019\/10\/21\/upstream-security-raises-30-million-to-protect-connected-cars-from-cyber-attacks\/\" style=\"-ms-text-size-adjust: 100%;-webkit-text-size-adjust: 100%;color: #202020;font-weight: normal;text-decoration: underline;\">https:\/\/venturebeat.com\/2019\/10\/21\/upstream-security-raises-30-million-to-protect-connected-cars-from-cyber-attacks\/<\/a><\/p>\n<p style=\"margin: 1em 0;-ms-text-size-adjust: 100%;-webkit-text-size-adjust: 100%;color: #202020;font-family: Helvetica;font-size: 15px;line-height: 150%;text-align: left;\"><img loading=\"lazy\" decoding=\"async\" height=\"16\" src=\"https:\/\/venturebeat.com\/wp-content\/themes\/vb-news\/img\/favicon.ico\" width=\"16\" style=\"border: 0;outline: none;text-decoration: none;-ms-interpolation-mode: bicubic;height: auto !important;\">&nbsp;<strong>Upstream Security raises $30 million to protect connected cars from cyberattacks<\/strong><br \/>\n<em>Paul Sawers<\/em>&nbsp;<br \/>\n<em>Venture Beat<\/em>&nbsp;<br \/>\nUpstream Security, a cloud-based cybersecurity platform for connected cars, has raised $30 million in a series B round of funding led by Alliance Ventures, an automotive alliance constituting Renault, Mitsubishi, and Nissan.<br \/>\nVolvo Group, Hyundai, CRV, Glilot Capital, Maniv Mobility, and Nationwide also participated in the round.<br \/>\nThe connected car market was pegged at $63 billion in 2017, a figure that could rise to more than $200 billion by 2025.&nbsp;&nbsp;<br \/>\nounded in 2017, Upstream Security is adopting a \u201cmulti-layer\u201d approach to protecting connected cars and the underlying network infrastructure.<br \/>\nIts C4 platform integrates with automotive data streams of vehicles and promises to detect incidents as they<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[29,3],"tags":[],"class_list":["post-2508","post","type-post","status-publish","format-standard","hentry","category-news","category-product"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2508","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=2508"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2508\/revisions"}],"predecessor-version":[{"id":4995,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2508\/revisions\/4995"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=2508"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=2508"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=2508"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}