Search
Homepage Rankings and Research Companies Channelcast Marketing Matters CRNtv Events WOTC Cisco Partner Summit Digital 2020 NetApp Digital Newsroom HPE Zone The Business Continuity Center Enterprise Tech Provider Masergy Zenith Partner Program Newsroom HP Reinvent Digital Newsroom Hitachi Vantara Digital Newsroom IBM Newsroom Juniper Newsroom Intel Partner Connect 2021 Avaya Newsroom Experiences That Matter The IoT Integrator Intel Tech Provider Zone NetApp Data Fabric WatchGuard Digital Newsroom

The 10 Biggest Cybersecurity News Stories Of 2019

The cybersecurity industry has in 2019 seen lots of outside money to address challenges around data and identity, with vendors tapping into the deep pockets of venture capital and IPOs, while many MSPs have found themselves under siege.

Back 1 ... 2   3   4   5   6   ... 11 Next
photo

8. Orchestration And Automation In The M&A Crosshairs

Security teams are struggling to make sense of all the data generated by the proliferating number of protection tools, and typically lack the financial resources to go hire additional analysts. For this reason, companies are looking to synthesize the collection and analysis of disparate data as well as automate the response to common issues with SOAR (Security Orchestration, Automation and Response) tools.

Palo Alto Networks kicked off the acquisition spree in March with its $560 million buy of Demisto to better leverage artificial intelligence and machine learning to automate large parts of customers' security operations. Then in May, FireEye bought Verodin for $250 million to help find security effectiveness gaps stemming from equipment misconfiguration, evolving attacker tactics, or changes in the IT environment.

Six months later, Sumo Logic acquired early stage autonomous SOC (Security Operations Center) provider Jask Labs to better protect modern applications, architectures and multi-cloud infrastructures. And in December, Fortinet bought CyberSponse for an initial cash consideration of $28 million to make security operations teams more efficient and bolster incident response.

 
 
Back 1 ... 2   3   4   5   6   ... 11 Next

sponsored resources