Palo Alto Networks becomes strategic cybersecurity partner across Deloitte’s EMEA network

Palo Alto Networks becomes strategic cybersecurity partner across Deloitte’s EMEA network

Tech Intelligence Bulletin (HG Insights) – Deloitte’s EMEA Cybersphere Center has partnered with global cybersecurity leader Palo Alto Networks, with the aim of expanding its managed security services portfolio for customers both in Spain and across its entire global network. This partnership will see Deloitte’s EMEA Cybersphere Center integrate Cortex XDR, Cortex XSOAR (formerly Demisto),

Acronis launches “game-changing” solution to combat modern cyber threats

Acronis launches “game-changing” solution to combat modern cyber threats

Tech Intelligence Bulletin (HG Insights) – Acronis has launched Acronis Cyber Protect Cloud, the first and unique cyber protection solution that integrates backup, disaster recovery, next-generation anti-malware, anti-virus, cybersecurity and management tools all in one single console. The solution, described as “Game-Changing” on the Acronis website, is the result of an effort from Acronis’ R&D

Infosys launches Cyber Next platform-based offerings powered by Microsoft Azure Sentinel

Infosys launches Cyber Next platform-based offerings powered by Microsoft Azure Sentinel

Tech Intelligence Bulletin (HG Insights) – Infosys has announced the launch of its Cyber Next platform-based offerings, powered by Microsoft Azure Sentinel. These offerings will help enterprises enhance security monitoring, management, threat detection, and response services. The Microsoft Azure Sentinel is a cloud-native Security Information and Event Management (SIEM), Security Orchestration, Automation and Response (SOAR)

New Cohesity application combats cyber threat exposure

New Cohesity application combats cyber threat exposure

Tech Intelligence Bulletin (HG Insights) – Cohesity has expanded its security offerings with the release of Cohesity CyberScan, a new application that is the first and only solution that leverages backup data to assess the vulnerabilities, or risk posture, of an enterprise’s IT environment. This is significant because vulnerabilities often lead to cyberattacks — such