Story image

SolarWinds acquires Trusted Metrics, adds threat monitoring offering for MSSPs

11 Jul 18

IT management software provider SolarWinds has acquired Trusted Metrics, a provider of real-time threat monitoring and management software.

SolarWinds says the acquisition extends its IT management portfolio  - to include security monitoring - and serves as an important advance in the company’s mission make technology professional’s jobs easier.

SolarWinds CEO Kevin Thompson says, “For nearly 20 years, SolarWinds has focused on helping to address our customers’ everyday IT management challenges—working to make sure that our products are designed to be powerful, yet easy to use, and work the way that technology professionals need them to work.

“Because we serve such a wide range of technology professionals, we understand the unique challenge that security presents—whether an organisation is managing its IT infrastructure directly or working with a managed service provider (MSP).”

The acquisition will allow SolarWinds to offer a new security software product, dubbed SolarWinds Threat Monitor.

Threat Monitor is an automated tool that is designed to reduce the complexity of threat detection for IT operations teams as well as for MSPs and MSSPs (managed security service providers).

According to SolarWinds, the solution can detect suspicious activity and malware by aggregating asset data, security events, host intrusion detection, network intrusion detection, and correlating that data with continuously updated threat intelligence.

The company says this functionality will allow security professionals to identify danger signals amidst the innocent noise of a normal network.

SolarWinds believes that this will ultimately help customers respond quickly and make faster, better decisions while using fewer resources.

“When we look at the rapidly changing IT security landscape, the proliferation of mass-marketed malware and the non-discriminatory approach of cybercriminals, we believe that real-time threat monitoring and management shouldn’t be a luxury, but an affordable option for everyone,” Thompson adds.

Trusted Metrics CEO Michael Menefee comments, “Trusted Metrics is pleased to join the SolarWinds family, a move that is in line with what we hoped to accomplish as a security innovator.

“We built a solution that’s designed to help companies of all sizes to improve their ability to uncover incoming attacks and quickly detect breaches by correlating customers’ network data with continuously refreshed threat intelligence—helping them make better and faster incident-response decisions.

“SolarWinds’ reach and tech industry know-how make them a perfect fit for getting this solution into the hands of more and more technology professionals.”

Using blockchain to ensure regulatory compliance
“Data privacy regulations such as the GDPR require you to put better safeguards in place to protect customer data, and to prove you’ve done it."
A10 aims to secure Kubernetes container environments
The solution aims to provide teams deploying microservices applications with an automated way to integrate enterprise-grade security with comprehensive application visibility and analytics.
DigiCert conquers Google's distrust of Symantec certs
“This could have been an extremely disruptive event to online commerce," comments DigiCert CEO John Merrill. 
One Identity a Visionary in Magic Quad for PAM
One Identity was recognised in the Gartner Magic Quadrant for Privileged Access Management for completeness of vision and ability to execute.
Gartner names newcomer Exabeam a leader in SIEM
The vendor landscape for SIEM is evolving, with recent entrants bringing technologies optimised for analytics use cases.
52mil users affected by Google+’s second data breach
Google+ APIs will be shut down within the next 90 days, and the consumer platform will be disabled in April 2019 instead of August 2019 as originally planned.
Symantec releases neural network-integrated USB scanning station
Symantec Industrial Control System Protection Neural helps defend against USB-borne cyber attacks on operational technology.
Ramping up security with next-gen firewalls
The classic firewall lacked the ability to distinguish between different kinds of web traffic.