Connect with us

Channel Talk

Traditional Perimeter Security Simply Isn’t Enough

Published

on

Maher Jadallah, the Senior Director for the Middle East and North Africa at Tenable, says that companies need to invest in adaptive user and data risk profiles to disrupt attack paths

What are the cybersecurity challenges organisations face in 2021 and beyond?
The increasing threat and severity of cyberattacks have been well documented with governments, businesses, and even civilians all questioning how safe their personal information is. More recently this concern has intensified as we’ve seen threat actors target the very infrastructure that underpins our lives – from water purification plants, oil refineries, medical facilities, and transportation systems, nothing is off-limits. With defenses falling we need a new approach to cybersecurity practices.

When we think of traditional network security, the premise is to fortify the perimeter. The aim is to prevent threats outside of the network from getting in. The downside is that, once users – or bad actors – clear the perimeter, they are free to move about the network, taking whatever they find with them as they leave.

Traditional perimeter security simply isn’t enough to protect multiple environments against today’s cybercriminals. Instead, security needs to adopt a model in which nothing – no device, person, or action – is inherently trusted. In tandem, they need to invest in adaptive user and data risk profiles to disrupt attack paths by accounting for misconfigurations in Active Directory and the cloud and step up security based on changing conditions, behaviors, or locations.

Finally, they must take a hard look at the limits of traditional, perimeter-based security architectures, to consider more sophisticated options that continuously monitor and verify every attempt to request access to corporate data at all levels, whether that’s a device, app, user, or network attempting to make that connection.

How does Tenable help customers address their cyber risks?
Tenable is focused on enabling our customers to see every asset and vulnerability across their entire modern attack surface, predict the vulnerabilities that will be leveraged in an attack on the assets that matter to the business, and guide our customers on where they need to act to address risk.

Our solutions include:

  • Tenable.io: Cloud-based vulnerability management platform provides a risk-based view of the entire attack surface – from IT to cloud to OT and containers – to quickly identify, investigate and prioritize vulnerabilities.
  • Tenable.sc: On-premises Vulnerability Management with comprehensive compliance reporting, highly customized dashboards, and real-time asset and vulnerability discovery.
  • Tenable.ad: Continuously and non-disruptively discovers new Active Directory attack pathways and detects ongoing attacks in real-time, recommending remediations without the need to deploy agents or leverage privileged accounts.
  • Tenable.ot: Asset inventory, threat management, vulnerability management, and configuration control of OT assets that integrates with Tenable.sc and Tenable.io for full visibility across converged IT/OT environments.

What can a partner expect from Tenable’s channel strategy?
Tenable’s channel strategy is tailored for each country to address the market dynamics and provide the needed support for local partners. As a vendor, we look for and actively nurture relationships with partners that do more than just sell our products.

We want to see commitment as we know that is what our customers demand, and we’re prepared to offer the same. Our partners need to be as invested in the technology as we are, and from this basis, we will actively work to help and support them build services and value around our solutions.

This could include complementary technologies that ultimately address the challenge the customer is facing. Tenable is committed to the Middle East region and the strategy we have built has managed to successfully win major customers across all sectors.

Channel Talk

Dynatrace Names DXC Global Partner of the Year

Published

on

DXC Technology has announced it has received the Global Partner of the Year award at the Dynatrace Amplify Partner Sales Kickoff. This award recognizes DXC’s 15-year collaboration with Dynatrace, highlighting DXC’s technical expertise, strategic investment, and results for enterprise customers worldwide.

The Global Partner of the Year Award acknowledges organizations that show innovation and promote the adoption of Dynatrace solutions. DXC earned this recognition for its ability to use Dynatrace solutions to drive growth and success, consistently meeting and exceeding client expectations. DXC was also recognized for establishing a dedicated Dynatrace strategic business unit, which includes over 280 certified engineers and more than 1,500 trained professionals globally.

Howard Boville, President, DXC Consulting & Engineering Services Powered by AI, said, “This recognition underscores the power of our partnership and the trust our customers place in our joint solutions. In just the past 15 months, we’ve helped more than 200 organizations, including some of the most complex enterprises in the world—adopt Dynatrace. With the industry’s largest team of Dynatrace-certified engineers, a dedicated business unit, and automation that facilitates onboarding in minutes, we’re enabling clients to accelerate transformation, resolve issues faster, and realize the full value of AI-powered observability.”

DXC contributes significant scale and expertise to the Dynatrace ecosystem, with one of the largest investments in Dynatrace talent within the IT industry. DXC’s dedicated Global Dynatrace Strategic Business Group demonstrates its commitment to providing next-generation observability solutions. DXC is also the only IT services provider with a Center of Excellence focused on Logs Management on Grail, highlighting its leadership in applying AI to enterprise-scale applications.

Jay Snyder, SVP, Global Partners and Alliances, Dynatrace, said, “It’s my honor to congratulate DXC Technology on being named our 2025 Global Partner of the Year. This well-deserved award reflects DXC’s remarkable commitment to innovating and driving market growth, and we couldn’t be prouder to recognize their achievements. Our combined potential to deliver true business outcomes is only increasing, and we look forward to building on this success and delivering even greater impact in the year to come.”

Continue Reading

Channel Talk

CyberKnight and ON2IT Bring Zero Trust as a Service to META

Published

on

CyberKnight and ON2IT have announced a strategic partnership. The collaboration is aimed at helping enterprise and government organizations across the Middle East, Turkey and Africa (META) move away from perimeter-based defenses. Their unified Zero Trust framework lowers cyber-risk, bolsters compliance and reduces operational cost.

According to Gartner, the Zero Trust approach delivers the resilience to mitigate cyber risk, enables modern business capabilities and a hybrid workforce, and provides the flexibility to enable appropriate access methods, while removing implicit access based on location. By 2026, 10 percent of large enterprises will have a mature and measurable Zero Trust program in place, up from less than 1 percent today.

Meanwhile Forrester’s Principal Analyst, Chase Cunningham, said, “Zero Trust is no longer optional.” These analyst findings underline an urgent reality: in a fast-changing world defined by AI-driven threats and escalating geopolitical tensions, Zero Trust has become a business necessity, not a ‘nice-to-have’.

“Current security stacks weren’t built for today’s cyber war,” said Wael Jaber, Chief Strategy Officer at CyberKnight. “By adding ON2IT’s Zero Trust as a Service to our portfolio, we give META customers direct access to globally proven Zero Trust Readiness, Fast Track and Coaching services, empowering them to adopt Zero Trust with confidence, clarity and ease.”

ON2IT’s Managed Detection & Response (MDR) service runs on its AUXO security platform, which ingests log data from any IT, OT or cloud source -without the complexity of a traditional SIEM. Each event is analyzed both in real time and retrospectively against the AUXO Threat Intel Feed™. It’s then routed through EventFlow and, when necessary, escalated to ON2IT’s 24/7 SOC. The result is a prevention-first approach that blocks attacks before they escalate while cutting data-storage overhead and tool sprawl.

“CyberKnight and ON2IT are proud to join forces to offer globally leading Zero Trust consulting services across the Middle East and Africa,” said Marcel van Eemeren, CEO & Co-founder of ON2IT. “With a decade of Zero Trust leadership and a SOC-driven, prevention-first approach, ON2IT delivers modular, scalable services tailored to each organization’s unique needs. Through this partnership, META organizations gain the same Zero Trust strategies trusted by global leaders and mandated by governments, no SIEM required, no trade-offs made.”

Continue Reading

Channel Talk

Qualys Partners with Teksalah, the First Middle Eastern MSP in its mROC Alliance

Published

on

Qualys has announced the expansion of its invite-only managed Risk Operations Center (mROC) Partner Alliance with seven new global partners, including Teksalah from the Middle East. This marks a significant step forward in Qualys’ mission to build a robust Risk Operations Center (ROC) ecosystem—making business-aligned cyber risk management more accessible, actionable, and measurable for organizations worldwide.

Built on the Qualys Enterprise TruRisk™ Management Platform, the ROC framework consolidates risk signals across an organization’s digital footprint into a single pane of glass. It enables Continuous Threat Exposure Management (CTEM), cyber risk quantification, and risk remediation, empowering CISOs to translate cyber risk into business terms, ensure audit readiness, and build long-term resilience.

The mROC Partner Alliance equips partners to drive growth by delivering enhanced Qualys-powered ROC services that transform how enterprises measure, manage, and reduce cyber risk. The expanded roster of partners brings world-class expertise to help organizations overcome common cybersecurity challenges such as fragmented tools, disjointed risk response, and limited visibility—enabling a proactive approach to managing cyber risk at scale.

“When we introduced the concept of the Risk Operations Center, we knew it had the potential to redefine how organizations manage cyber risk,” said Sumedh Thakar, president and CEO of Qualys. “Today, with the launch of our inaugural global mROC partners, we’re delivering on that vision. This is a major milestone in building a thriving ROC ecosystem—one that helps businesses around the world take control of cyber risk with clarity, speed, and measurable impact.”

mROC Partners, through a comprehensive suite of risk service offerings, play a critical role in Qualys’ mission to make cyber risk management easier to adopt, more practical to implement, and more impactful for organizations globally. This innovative group of mROC partners has been thoroughly trained and enabled to operate a ROC powered by Qualys Enterprise TruRisk Management (ETM), delivering comprehensive managed risk services. By aggregating and analyzing risk signals from both Qualys and third-party tools, they offer their clients a holistic, business-aligned view of their risk exposure.

“The Teksalah and Qualys partnership is built on a shared vision — to embed a holistic risk-based, proactive approach at the core of enterprise cybersecurity. Through our powerful platforms, intelligent tools, and proven services—covering real-time risk monitoring to effective remediation—we are enabling organizations to manage risk with precision and drive secure innovation. Together, we are transforming our client’s cybersecurity from a control function into a catalyst for business growth and resilience,” commented Murali Konasani, CEO, Teksalah.

Continue Reading
Advertisement

Follow Us

Trending

Copyright © 2021 Security Review Magazine. Rysha Media LLC. All Rights Reserved.