SolarWinds MSP and SentinelOne have entered a cybersecurity partnership to address endpoint protection and response for MSPs, according to SolarWinds CEO Kevin Thompson.SolarWinds CEO Kevin ThompsonBased on the partnership, SolarWinds is planning to "launch an advanced endpoint protection offering before the end of the second quarter, which will allow our MSPs move beyond just providing antivirus to their customers to provide protection against a broad range of attacks, including ransomware and zero-day attacks that all companies are facing in today's threat-laden IT infrastructure world," Thompson told Wall Street analysts during the IT management software company's earnings call on Wednesday, April 24, 2019.Related - ITSM & PSA Software: During the call, Thompson also described how a new product called SolarWinds Service Desk will compete in the IT service management (ITSM) software market against ServiceNow, and may ultimately compete against MSP-focused PSA (professional services automation) software from ConnectWise, Datto (Autotask PSA), Kaseya BMS and more. SolarWinds Service Desk will be based on the company's pending Samanage acquisition.
Perhaps not by coincidence, private equity firm Thoma Bravo is a SolarWinds MSP investor while also owning Continuum.
SOCs, Endpoint Protection and SMB Customers
Just about every major MSP software company is pushing hard into the cybersecurity market through organic R&D, partnerships and acquisitions. But so far, no single de facto standard has emerged for MSSPs and MSPs to build or operate SOCs. Also, the endpoint protection market remains highly fragmented with a range of fast-growing upstarts and entrenched rivals competing for market share.
Joe Panettieri is co-founder & editorial director of MSSP Alert and ChannelE2E, the two leading news & analysis sites for managed service providers in the cybersecurity market.
Hackread reports that Chinese Internet-of-Things grow light and agricultural software firm Mars Hydro had 1.17 TB of data containing 2.7 billion records inadvertently leaked by a misconfigured database.
Nearly 4,500 internet-exposed SonicWall firewalls were discovered by Bishop Fox researchers to be at risk of having their VPN sessions taken over in attacks exploiting a recently patched high-severity authentication bypass flaw within the SonicOS SSLVPN application, tracked as CVE-2024-53704, according to BleepingComputer.