HomeCII/OTPondurance Platform 2.0 detects potential data breach vulnerabilities

Pondurance Platform 2.0 detects potential data breach vulnerabilities

Published on

spot_img

Pondurance recently unveiled the latest version of its cybersecurity platform, Pondurance Platform 2.0. This new version is geared towards providing organizations with a risk-based Managed Detection and Response (MDR) service tailored to eliminate breach risks.

The enhanced platform equips customers with cutting-edge monitoring, detection, and response capabilities, offering a unified portal that allows organizations to detect, respond to, and remediate cyber threats in coordination with Pondurance’s security operations center (SOC) experts.

Enzo Arefi, CTO at Pondurance, emphasized the platform’s evolution to incorporate cloud-native, AI-enabled technologies that utilize risk-based algorithms and methodologies for cybersecurity threat detection, response, and automated disruption. Arefi stated, “We now have the most technologically advanced platform that is exceptionally adaptable to stay ahead of the rapidly changing threat environment.”

The Pondurance Platform 2.0 features a range of tools designed to effectively combat cyber threats, including managed extended detection and response, exposure and vulnerability service, managed SIEM, and automated threat disruption. These tools aim to analyze telemetry data, address configuration issues, prioritize threat alerts, and facilitate rapid response and threat remediation.

Doug Howard, CEO of Pondurance, highlighted the platform’s focus on midmarket organizations facing challenges in identifying and mitigating data breach risks. Howard emphasized that the cloud-native, SaaS cybersecurity offering sets a new standard for ease of use and comprehensive protection against evolving risks.

Data breaches have been on the rise, with a reported 78% increase in 2024 and the average cost of a breach reaching $4.88 million. These breaches often involve the compromise of customer personally identifiable information (PII), making it imperative for organizations to strengthen their cybersecurity defenses.

Midmarket organizations, in particular, struggle with similar breach risks as larger enterprises but lack the budget and resources to address them effectively. This underscores the importance of partnering with MDR service providers like Pondurance that offer advanced technology and expertise to detect and remediate cybersecurity threats efficiently.

The Pondurance Platform 2.0 boasts consumer-class UX, risk-based cloud technology, a complete set of integrated tools, expert SOC services, and automated adversary disruption capabilities. These features aim to streamline cybersecurity operations, enhance threat detection and containment, and provide comprehensive protection against evolving cyber threats.

Furthermore, the Pondurance MDR service, powered by the new platform, includes the Pondurance Assurance Program, offering DFIR services up to $2 million for qualified incidents. This program, free for MDR service customers, reinforces Pondurance’s commitment to providing comprehensive incident response support in case of security incidents.

The Pondurance Platform 2.0 is currently available for organizations through Pondurance and authorized partners. By leveraging this advanced cybersecurity platform, organizations can proactively address breach risks, enhance their security posture, and safeguard critical data from cyber threats.

Source link

Latest articles

Security Automation: An Overview

Security automation has become a critical element in IT security policy, offering numerous benefits...

MDIRSS retrieves stolen funds exceeding $1 million in cybercrime incident

Bar Harbor, Maine - In a recent update from Mount Desert Islander, it has...

Bastille, a Wireless Airspace Defense Firm, Unveils Key Threats for 2025

Wireless airspace defense firm Bastille recently released a report detailing the top threats facing...

Is Security Human Factors Research Biased Towards Western Ideals and Practices? – Source: www.schneier.com

A recent study titled "How WEIRD is Usable Privacy and Security Research?" conducted by...

More like this

Security Automation: An Overview

Security automation has become a critical element in IT security policy, offering numerous benefits...

MDIRSS retrieves stolen funds exceeding $1 million in cybercrime incident

Bar Harbor, Maine - In a recent update from Mount Desert Islander, it has...

Bastille, a Wireless Airspace Defense Firm, Unveils Key Threats for 2025

Wireless airspace defense firm Bastille recently released a report detailing the top threats facing...