Category Archives for "Managed Services News"

Jul 30

Mimecast Beefs Up Email Security with MessageControl Acquisition

By | Managed Services News

MessageControl’s services help stop social engineering and human identity attacks.

Mimecast is buying MessageControl, an email and messaging security provider, to strengthen its email security strategy.

MessageControl helps stop social engineering and human identity attacks with machine learning (ML) technology. Mimecast didn’t say how much it paid for MessageControl.

Together, the two companies will offer customers stronger protection against advanced phishing and impersonation attacks while using productivity apps like Microsoft 365. Additionally, they will protect against the inadvertent loss of sensitive and confidential data. MessageControl also will further enhance Mimecast’s threat intelligence.

Peter Bauer is Mimecast‘s co-founder and CEO.

Mimecast's Peter Bauer

Mimecast’s Peter Bauer

“The addition of MessageControl strengthens Mimecast’s email security 3.0 strategy to help partners address customers’ threats at the email perimeter, inside the organization and beyond so that they are covering all their bases,” Bauer said.

More Email Security Benefits

Mimecast email security will get more benefits from the MessageControl acquisition. They include:

  • Using machine learning to build a library of known and unknown patterns for an individual user. And making real-time decisions on 1 billion-plus unique user behavior data points.
  • Giving users more intelligent warnings about potential untrusted senders or content into emails.
  • Notifying employees before they accidentally send information to the wrong recipients using historical sending patterns to predict anomalies.

“The acquisition of MessageControl gives Mimecast the ability to see further into the life cycle of an email attack by utilizing ML capabilities to identify anomalous behaviors, receive real-time, contextual warnings in an email, and prevent misaddressed email data leaks,” Bauer said. “The technology is designed to get smarter over time.”

Recent research from Mimecast found impersonation fraud, phishing and internal threats or data leaks are all on the rise. IT and security leaders have seen the volume of each increase over the last year.

“Bringing MessageControl under the Mimecast roof will expand [MessageControl] partners’ reach by allowing them to offer stronger protection against advanced phishing and impersonation attacks within a suite of cyber resilience solutions — from email and web security, through brand protection, security awareness training and data protection,” Bauer said.

“Mimecast’s portfolio of solutions offers MessageControl the opportunity to expand its reach to protect even more organizations against the advanced threats plaguing the market today,” said Paul Everton, MessageControl’s founder and CTO. “We’re excited to join the Mimecast team as we continue on our mission to stop social engineering and human identity attacks.”

In January, Mimecast bought Segasec, a provider of digital threat protection, to provide brand exploitation protection using ML to identify potential hackers at the earliest stages of an attack.

Jul 30

CompTIA Partner Summit Online 2020: IT Leaders Prepare for Challenges

By | Managed Services News

Prepare for a crisis and you’ll be prepared for anything.

CompTIA Partner Summit Online, held this week, focused on the critical skills and competencies that IT and security professionals need. In a world reshaped by COVID-19, the conference theme –The Next Wave: Reskilling for The Future – is more relevant than ever.

In a session – Preparing for the Next Challenge: Preparedness from Today’s IT Leaders – a panel of three senior IT executives talked about lessons learned from the COVID-19 pandemic. Session moderator James Stanger, CompTIA’s chief technology evangelist, refers to the evolution of IT as pre-COVID, during COVID and post COVID.

The session from the virtual event featured a trio of panelists. They were Michael Geraghty, chief information officer for the state of New Jersey; Clem Craven, senior cybersecurity training lead at BT (British Telecom); and Illysa Ortsmann, senior vice president, global head of technology and infrastructure, at Christie’s Auction House. The three talked about the IT preparedness of their organizations before the pandemic hit, and where they go from here.

The CompTIA Partner Summit panelists quickly revealed that their organizations were in different levels of preparedness for the pandemic. As a result, their road map has changed. The input from these high-level IT professionals is vital for partners when they think about helping their customers.

BT Shines

In a perfect world, many companies would like to be in BT’s shoes.

When Craven joined the company in 2012, he was issued a laptop. In fact, everyone has laptops, he said. Not so with desktops.

CompTIA's Clem Craven

CompTIA’s Clem Craven

“We’re agile. We can work from any BT building or work from home. When the pandemic restrictions happened, it was normal for us. We didn’t notice a major issue,” he said.

There was some backend work required; for example, checks on network capacity, but employees routinely work from home or in the various offices. Connections are over a VPN or the internet.

“All of our systems are configured for collaboration,” he said.

Craven’s team is all over the U.K., but chat and collaborate using Microsoft Teams, Skype, WebEx or SharePoint, regardless of where they are in the world.

“You would expect that from us being a network company. It would be embarrassing if that didn’t happen. We were able to pick up and carry on as normal. We have that resilience built in,” he said.

Geraghty talked about what’s it like on the other end of the spectrum. IT was somewhat prepared. He required his employees have a laptop and take it home at night. In the cybersecurity space, no one can predict when bad things will happen.

Michael Geraghty“So, we’re 24/7 in the event of incident. We have the capability to work from anywhere,” he said.

Others Face Challenges

It was the rest of the state government in New Jersey that struggled. There was a …

Jul 30

Top Gun 51 Profile: McAfee Global Channel Leader Kathleen Curry

By | Managed Services News

Partners will invest in your business if you give them a fair and profitable path to do so.

Kathleen Curry is steadfastly focused on making sure McAfee channel partners know how their hard work leads to successful business results.

Curry joined McAfee as its senior vice president of global enterprise channels, OEM and strategic alliances in April.  The former Apple sales executive has advocated for the channel in all of her positions.

McAfee's Kathleen Curry

McAfee’s Kathleen Curry

Since joining McAfee, she’s been questioning at every turn how to improve McAfee channel partners’ profit, engagement and support in the field. She is a channel-first leader who ensures her partners are top of mind across the organization and in the C-suite. So say those who nominated her — the distributors, master agents and industry analysts we polled to compile the prestigious Channel Partners/Channel Futures Top Gun 51.

Introduced last year, the Top Gun 51 recognizes premier leaders in the indirect IT and telecom channel. Our nomination panel considered three criteria in recommending this year’s group: advocacy for the channel; commitment to partners’ business success; and dedication to earning the channel’s trust.

In a Q&A with Channel Futures, Curry talks about what drew her to the channel and what McAfee channel partners can expect in the months ahead.

Channel Futures: How did you first become involved in the channel? Was it part of your overall career plan?

Kathleen Curry: I was attracted to sales very early in my career, starting at Oracle. While I enjoyed direct sales, I found that I really excelled at building partner relationships, connecting people and aligning business strategies. I found great fulfillment in finding win-win opportunities between us, the partner and our customers — so much so that I dedicated my career to it.

McAfee’s Kathleen Curry is part of Channel Partners/Channel Futures’ 2020 Top Gun 51. This program recognizes today’s channel executives who build and execute channel programs that drive partner, customer and supplier success. See the full list.

CF: Have you been responsible for building channel programs from the ground up? If so, how did your experience come into play in these processes?

KC: I have been a part of reimagining and restructuring partner programs a few times in my career. When I was leading Americas channels at Symbol Technologies, we were acquired by Motorola. We both had robust channel programs, but very different go-to-market approaches. I was part of the integration team to build a new, joint program that protected and rewarded unique technical skills, as well as market presence and investment. We effectively addressed bringing together Symbol’s open channel approach with Motorola’s closed channel approach. It not only helped maintain current business trajectory, it bolstered it. Similarly at NCR, we acquired a company with a closed channel and deep market presence in a new vertical. With a very similar approach to my previous experience, we launched a new program that effectively addressed and embraced all partner communities.

I’ve been a part of rolling out many big and small program changes in my career. The hard part is making sure you’ve thought through all the potential areas of impact to the partner community, across all types of partners and in every region. You cannot think hard enough about this. When you think you’re done, go back and review again. Review it with partners themselves and be open to making changes. While programs are meant to increase business trajectory, they don’t always have the same positive impact for every partner. It is important that the partner community believes you’ve fairly considered all aspects of program decision impacts. While not intended, a partner will …

Jul 30

Phishing Report: Hook Line & Sinker

By | Managed Services News

When we talk about phishing, it might conjure up memories of scam emails from foreign princes, chock-full of terrible typos, grammar mistakes, and other easy-to-spot signs that the message might not be legitimate. If you’re thinking in those terms, it might shock you to find out how many people actually fall for such attacks.

In partnership with Wakefield Research, Carbonite surveyed 4,000 office workers across the U.S., U.K., Australia, and Japan on their phishing knowledge and clicking habits. It then consulted with Dr. Cleotilde Gonzalez, research professor in the Department of Social and Decision Sciences at Carnegie Mellon University, to gain a deeper insight into the question: what is it that makes people click?

This report digs deeper into the survey results and present Carbonite’s own understanding of these statistics, as well as analysis from Dr. Gonzalez, insights from cybersecurity experts, real-world phishing stories from customers and partners, and tips on how to stay safe from phishing threats.

Brought to you by:
Carbonite program logo

Jul 30

Phishing Report: Hook Line & Sinker

By | Managed Services News

When we talk about phishing, it might conjure up memories of scam emails from foreign princes, chock-full of terrible typos, grammar mistakes, and other easy-to-spot signs that the message might not be legitimate. If you’re thinking in those terms, it might shock you to find out how many people actually fall for such attacks.

In partnership with Wakefield Research, Carbonite surveyed 4,000 office workers across the U.S., U.K., Australia, and Japan on their phishing knowledge and clicking habits. It then consulted with Dr. Cleotilde Gonzalez, research professor in the Department of Social and Decision Sciences at Carnegie Mellon University, to gain a deeper insight into the question: what is it that makes people click?

This report digs deeper into the survey results and present Carbonite’s own understanding of these statistics, as well as analysis from Dr. Gonzalez, insights from cybersecurity experts, real-world phishing stories from customers and partners, and tips on how to stay safe from phishing threats.

Brought to you by:
Carbonite program logo

Jul 30

Phishing Report: Hook Line & Sinker

By | Managed Services News

When we talk about phishing, it might conjure up memories of scam emails from foreign princes, chock-full of terrible typos, grammar mistakes, and other easy-to-spot signs that the message might not be legitimate. If you’re thinking in those terms, it might shock you to find out how many people actually fall for such attacks.

In partnership with Wakefield Research, Carbonite surveyed 4,000 office workers across the U.S., U.K., Australia, and Japan on their phishing knowledge and clicking habits. It then consulted with Dr. Cleotilde Gonzalez, research professor in the Department of Social and Decision Sciences at Carnegie Mellon University, to gain a deeper insight into the question: what is it that makes people click?

This report digs deeper into the survey results and present Carbonite’s own understanding of these statistics, as well as analysis from Dr. Gonzalez, insights from cybersecurity experts, real-world phishing stories from customers and partners, and tips on how to stay safe from phishing threats.

Brought to you by:
Carbonite program logo

Jul 30

Phishing Report: Hook Line & Sinker

By | Managed Services News

When we talk about phishing, it might conjure up memories of scam emails from foreign princes, chock-full of terrible typos, grammar mistakes, and other easy-to-spot signs that the message might not be legitimate. If you’re thinking in those terms, it might shock you to find out how many people actually fall for such attacks.

In partnership with Wakefield Research, Carbonite surveyed 4,000 office workers across the U.S., U.K., Australia, and Japan on their phishing knowledge and clicking habits. It then consulted with Dr. Cleotilde Gonzalez, research professor in the Department of Social and Decision Sciences at Carnegie Mellon University, to gain a deeper insight into the question: what is it that makes people click?

This report digs deeper into the survey results and present Carbonite’s own understanding of these statistics, as well as analysis from Dr. Gonzalez, insights from cybersecurity experts, real-world phishing stories from customers and partners, and tips on how to stay safe from phishing threats.

Brought to you by:
Carbonite program logo

Jul 30

Phishing Report: Hook Line & Sinker

By | Managed Services News

When we talk about phishing, it might conjure up memories of scam emails from foreign princes, chock-full of terrible typos, grammar mistakes, and other easy-to-spot signs that the message might not be legitimate. If you’re thinking in those terms, it might shock you to find out how many people actually fall for such attacks.

In partnership with Wakefield Research, Carbonite surveyed 4,000 office workers across the U.S., U.K., Australia, and Japan on their phishing knowledge and clicking habits. It then consulted with Dr. Cleotilde Gonzalez, research professor in the Department of Social and Decision Sciences at Carnegie Mellon University, to gain a deeper insight into the question: what is it that makes people click?

This report digs deeper into the survey results and present Carbonite’s own understanding of these statistics, as well as analysis from Dr. Gonzalez, insights from cybersecurity experts, real-world phishing stories from customers and partners, and tips on how to stay safe from phishing threats.

Brought to you by:
Carbonite program logo

Jul 30

Phishing Report: Hook Line & Sinker

By | Managed Services News

When we talk about phishing, it might conjure up memories of scam emails from foreign princes, chock-full of terrible typos, grammar mistakes, and other easy-to-spot signs that the message might not be legitimate. If you’re thinking in those terms, it might shock you to find out how many people actually fall for such attacks.

In partnership with Wakefield Research, Carbonite surveyed 4,000 office workers across the U.S., U.K., Australia, and Japan on their phishing knowledge and clicking habits. It then consulted with Dr. Cleotilde Gonzalez, research professor in the Department of Social and Decision Sciences at Carnegie Mellon University, to gain a deeper insight into the question: what is it that makes people click?

This report digs deeper into the survey results and present Carbonite’s own understanding of these statistics, as well as analysis from Dr. Gonzalez, insights from cybersecurity experts, real-world phishing stories from customers and partners, and tips on how to stay safe from phishing threats.

Brought to you by:
Carbonite program logo

Jul 30

Buyer’s Guide: Migration Made Simple

By | Managed Services News

When it comes to the common causes of downtime, disasters tend to get most of the attention. But disasters represent a small fraction of the events that cause downtime. Planned downtime creates a real drain on resources, and many tools and technologies designed purely for disaster recovery don’t help much in minimizing outages.

In fact, the complexity and disruption associated with migrating data lead some businesses to delay or forego IT upgrades. But delaying workload migrations also limits innovation and stagnates IT systems in a way that can leave businesses at a disadvantage. In order for businesses to take full advantage of the cost savings and efficiencies of virtual and cloud technologies, they need a proven process for moving workloads that minimizes the potential for data loss and downtime.

This guide outlines the key capabilities to look for when considering a data migration solution, and addresses the chief benefits of structured, repeatable migrations.

>