HomeCII/OTPondurance Platform 2.0 detects potential data breach vulnerabilities

Pondurance Platform 2.0 detects potential data breach vulnerabilities

Published on

spot_img

Pondurance recently unveiled the latest version of its cybersecurity platform, Pondurance Platform 2.0. This new version is geared towards providing organizations with a risk-based Managed Detection and Response (MDR) service tailored to eliminate breach risks.

The enhanced platform equips customers with cutting-edge monitoring, detection, and response capabilities, offering a unified portal that allows organizations to detect, respond to, and remediate cyber threats in coordination with Pondurance’s security operations center (SOC) experts.

Enzo Arefi, CTO at Pondurance, emphasized the platform’s evolution to incorporate cloud-native, AI-enabled technologies that utilize risk-based algorithms and methodologies for cybersecurity threat detection, response, and automated disruption. Arefi stated, “We now have the most technologically advanced platform that is exceptionally adaptable to stay ahead of the rapidly changing threat environment.”

The Pondurance Platform 2.0 features a range of tools designed to effectively combat cyber threats, including managed extended detection and response, exposure and vulnerability service, managed SIEM, and automated threat disruption. These tools aim to analyze telemetry data, address configuration issues, prioritize threat alerts, and facilitate rapid response and threat remediation.

Doug Howard, CEO of Pondurance, highlighted the platform’s focus on midmarket organizations facing challenges in identifying and mitigating data breach risks. Howard emphasized that the cloud-native, SaaS cybersecurity offering sets a new standard for ease of use and comprehensive protection against evolving risks.

Data breaches have been on the rise, with a reported 78% increase in 2024 and the average cost of a breach reaching $4.88 million. These breaches often involve the compromise of customer personally identifiable information (PII), making it imperative for organizations to strengthen their cybersecurity defenses.

Midmarket organizations, in particular, struggle with similar breach risks as larger enterprises but lack the budget and resources to address them effectively. This underscores the importance of partnering with MDR service providers like Pondurance that offer advanced technology and expertise to detect and remediate cybersecurity threats efficiently.

The Pondurance Platform 2.0 boasts consumer-class UX, risk-based cloud technology, a complete set of integrated tools, expert SOC services, and automated adversary disruption capabilities. These features aim to streamline cybersecurity operations, enhance threat detection and containment, and provide comprehensive protection against evolving cyber threats.

Furthermore, the Pondurance MDR service, powered by the new platform, includes the Pondurance Assurance Program, offering DFIR services up to $2 million for qualified incidents. This program, free for MDR service customers, reinforces Pondurance’s commitment to providing comprehensive incident response support in case of security incidents.

The Pondurance Platform 2.0 is currently available for organizations through Pondurance and authorized partners. By leveraging this advanced cybersecurity platform, organizations can proactively address breach risks, enhance their security posture, and safeguard critical data from cyber threats.

Source link

Latest articles

The Battle Behind the Screens

 As the world watches the escalating military conflict between Israel and Iran, another...

Can we ever fully secure autonomous industrial systems?

 In the rapidly evolving world of industrial IoT (IIoT), the integration of AI-driven...

The Hidden AI Threat to Your Software Supply Chain

AI-powered coding assistants like GitHub’s Copilot, Cursor AI and ChatGPT have swiftly transitioned...

Why Business Impact Should Lead the Security Conversation

 Security teams face growing demands with more tools, more data, and higher expectations...

More like this

The Battle Behind the Screens

 As the world watches the escalating military conflict between Israel and Iran, another...

Can we ever fully secure autonomous industrial systems?

 In the rapidly evolving world of industrial IoT (IIoT), the integration of AI-driven...

The Hidden AI Threat to Your Software Supply Chain

AI-powered coding assistants like GitHub’s Copilot, Cursor AI and ChatGPT have swiftly transitioned...