Include:
Tech
Cybersecurity
Business Strategy
Channel Insights
Stay Connected
Acer America
Acer America Corp. is a computer manufacturer of business and consumer PCs, notebooks, ultrabooks, projectors, servers, and storage products.

Location

333 West San Carlos Street
San Jose, California 95110
United States

WWW: acer.com

ChannelPro Network Awards

hello 2
hello 3

Press Releases

September 20, 2024 |

Key Channel Headlines: NinjaOne Free Warranty, Surprising New ArcticWolf Cybersecurity Research, and More IT News

Another action-packed week in the MSP channel has unfolded, and we’re here to keep you in the loop with the latest must-know news.

Another action-packed week in the MSP channel is almost done, and we’re here to keep you in the loop with the latest must-know IT news. From industry updates to game-changing tech, we’ve got the insights that can help sharpen your strategy and give your MSP a competitive edge. Staying ahead of the curve means smarter decisions, enhanced client service, and more confident leadership. Let’s dive into the trends shaping the future and help you gear up for what’s next!


NinjaOne Announces Free Warranty Tracking for Customers

Documentation product also is free for up to three users; NinjaOne offers migration services and proves the ability to scale to hundreds of thousands of endpoints for large MSPs.

Key facts from the announcement:

  • New White-glove Professional Services for MSPs: The services will allow MSPs to easily migrate new customers and move tech stacks without impacting their business.
  • Free Warranty Tracking for all MSP Customers:  31% of early customers cited the ability to consolidate tools/save money while 17% cited better tracking/managing of device lifecycles due to this feature as top business benefits of the solution automatically managing and tracking device warranty.
  • Free Documentation for 3 MSP Users: NinjaOne Documentation provides a centralized platform that consolidates IT knowledge to help new technicians onboard faster.

Arctic Wolf Security Operations Report Reveals Threat Landscape Intensifies, Almost Half of Security Incidents Occur After Hours

Technology companies drastically trail other industries in overall security posture.

Key findings from the press release:

  • 24×7 Coverage is Key: Nearly half of security events (45%) now occur outside of traditional working hours. This highlights how the mass adoption of cloud-based applications requires organizations to enable 24x7x365 security monitoring.
  • Security Tools Sprawl Overwhelms Teams: Identity and access management (IAM) tools have become the leading source of alerts for security operations teams, with identity telemetry accounting for seven of the top 10 indicators of compromise during security events.
  • Many Industries Are Under Constant Attack: Technology companies have the worst average security posture of all industries examined. Meanwhile, highly regulated industries like banking, legal, and healthcare have the best overall security postures.
  • Leading Business Applications Are the Most Targeted: Some of the most commonly used critical business software from Microsoft accounted for three of the top four applications most leveraged by attackers.

Microsoft Shares New IDC Study on Partner Profitability with Microsoft AI

The study surveyed over 600 partners around the world and focuses on the economic value partners realize through their collaboration with Microsoft and its technology — particularly with AI.

Key findings from the blog post:

  • Partner Multiplier: For every $1 of Microsoft revenue, partners who provide services generate $8.45, while partners who develop software generate $10.93.
  • AI Growth: AI is a huge growth opportunity, with GenAI forecasted to grow 86% (2022–2027), 13 times the overall IT market growth.
  • Services Partners’ Value: Partners engaged with Microsoft generate a high average ratio of revenue from their own services, and AI elevates this. The survey showed that 62% of total partner revenue comes from services.

Pax8 Expands Cybersecurity Portfolio Across EMEA and North America with the Introduction of Cynomi’s Virtual CISO Solution

This new strategic partnership provides MSPs access to cutting-edge cybersecurity tools, enhancing their ability to protect clients in an increasingly complex digital landscape.

Key details from the press release:

  • Cynomi’s platform allows MSPs to offer their clients strategic cybersecurity services that were traditionally accessible only to large enterprises.
  • Cynomi leverages AI to automate cybersecurity management tasks as well as crunch data and knowhow into simplified processes. All this allows MSPs to serve their clients in a structured and effective manner.
  • By automating risk assessments, compliance management, and tailored cybersecurity strategies, Cynomi equips MSPs to serve the growing cybersecurity demands of SMBs, particularly in the cloud market.
  • This partnership further solidifies Pax8’s commitment to empowering MSPs with the tools they need to succeed in the modern cloud landscape.

TD SYNNEX Expands Security Portfolio in the Americas through Broadcom’s Cybersecurity and Software Solutions

Expanded, exclusive agreement streamlines purchasing and provides increased support for Symantec, CA Technologies, and Carbon Black resellers and customers.

Key quote from the press release:

“Under the agreement, TD SYNNEX will own the complete go-to-market strategy and customer relationships for Broadcom’s Symantec and Carbon Black portfolios in Latin America and the Caribbean (LAC) and North America, (excluding U.S. state and local government and education accounts), streamlining the purchasing process, and enhancing region-based support for both product portfolios.”


N-able Cove Data Shows Microsoft 365 Domains Have Seen a 56% Increase in Disaster Recovery Events this Year

Data revealed a related increase in backups among its partners, helping them become more ransomware resilient to address the growing number of threats and attacks.

Key results from the press release:

  • A 56% increase in disaster recovery events were related to Microsoft 365 domains.
  • 1,000 more MSPs offered backup services for Microsoft 365 with Cove this year when compared to last year.
  • MSPs are protecting over 2.2 million Microsoft 365 end users with Cove, a 46% increase compared to last year.
  • These MSPs are backing up 42 petabytes of Microsoft 365 data, up from 26 petabytes last year. This is equivalent to watching a film in 4K for over 700 years.

Hyperion Launches VAST IoT Services at MSP Summit to Help Partners Monetize New Business Opportunities

End-to-end services enable MSPs to satisfy the demand for automation and asset tracking in logistics, retail, energy, and industrial settings.

Key offerings from the press release:

  • VAST tracking solutions provide functional asset tracking services that are perfect for transportation and logistics needs.
  • VASTConnect provides robust connectivity services that incorporate IoT capabilities, ideal for remote environments in verticals like agriculture, energy production, and other industrial sites, utilizing a U.S. domestic carrier for primary connectivity.
  • VASTConnect+ utilizes a multi-IMSI IoT SIM to deliver resilient communication with more than 2,000 carriers worldwide, optimizing network performance to support bandwidth-heavy applications.

ExtraHop Automates Detection and Response Workflows for Customers with CrowdStrike Falcon Next-Gen SIEM

Network telemetry from ExtraHop RevealX helps SOC analysts reveal and stop threats faster.

Key features from the press release:

  • Rapid Detection and Investigation: Anomalous network detections are investigated through automated workflows instantaneously.
  • Reduced Manual Intervention: Automated responses for low-priority detections empower analysts to allocate more time to mission-critical tasks.
  • Scalability: Customized workflows designed to scale with an organization ensure security processes remain effective with growth.

Quorum Cyber Accelerates Growth with Strategic Acquisition of Difenda

The deal cements Quorum Cyber’s position as a global leader of Microsoft Security services.

Key quote from the press release:

“As we continue to expand our reach and enhance our offerings, we sought a strategic partner who shared our vision and values — one who could help us scale our capabilities and continue to deliver exceptional results. In Quorum Cyber, we found that perfect partner. This acquisition marks the beginning of an exciting new chapter for Difenda.”— Manoj Arora, founder and CEO, Difenda


CyCognito Report Exposes Rising Software Supply Chain Threats​

Findings reveal escalating risks in the software supply chain, highlighting vulnerabilities in web servers, cryptographic protocols, and web interfaces that handle PII.

Key stats from the press release:

  • Web server environments — including platforms like Apache, NGINX, Microsoft IIS, and Google Web Server — were the host of one in three (34%) of all severe issues across surveyed assets. They accounted for more severe issues than 54 other environments combined (out of 60 total environments surveyed).
  • Roughly 15% of all severe issues on the attack surface affect platforms using TLS or HTTPS protocols. TLS issues are significant for all network-delivered data, but web apps especially so. Web apps lacking encryption currently ranked No. 2 of the OWASP Top 10.
  • Only half of surveyed web interfaces that handle personally identifiable information (PII) were protected by a WAF.
  • Despite HTTPS celebrating its 30th birthday this year, almost one in three (31%) of surveyed web interfaces failed to implement it. More than 60% of these interfaces that expose PII also lack a WAF.

Veeam Acquires Alcion, Appoints Niraj Tolia as Chief Technology Officer

By acquiring Alcion, an AI-driven backup solution for Microsoft 365 that helps ensure cyber resilience, Veeam further enhances its solution set.

Key quote from the blog post:

“We are excited to bring Alcion’s AI-powered capabilities, including advanced security, to Veeam to build a more robust Veeam Data Cloud.” — Niraj Tolia, CEO and co-founder, Alcion


Zimperium Identifies Coordinated Mobile Malware Campaign Targeting Banking Apps Worldwide

Zimperium, the global leader in mobile security, has uncovered new, critical insights into the Gigabud malware campaign, linking it to the notorious Spynote Android RAT.

Key points from the press release:

  • Connected Threats: zLabs research shows a strong overlap between Gigabud and Spynote malware families. Domains spreading Gigabud also distributed Spynote, suggesting a coordinated effort by a single threat actor. While Spynote allows attackers to remotely control devices, steal data, record media, and track locations, Gigabud focuses on banking app credential theft. This connection signals a broader and more coordinated threat.
  • Global Targets: The campaign impacts financial institutions worldwide, with phishing websites impersonating major airlines, e-commerce platforms, and government services. Zimperium identified 11 command-and-control servers and 79 phishing sites mimicking trusted brands, like Ethiopian Airlines and Vietnamese loan sites. These sites trick users into downloading malicious mobile apps or granting extensive permissions, giving attackers full mobile device access.
  • New Focus: New findings suggest a shift in the threat actor’s focus from government impersonations to directly targeting financial institutions. zLabs researchers found that over 50 financial mobile apps, including more than 40 banks and 10 cryptocurrency platforms, were specifically targeted in this campaign.
  • Advanced Obfuscation: The malware is protected by Virbox, a packer that complicates detection and analysis. This advanced obfuscation technique allows the malware to evade traditional defenses, increasing the threat’s effectiveness.

Alliance of Channel Women Launches Philanthropy Committee at ACWConnect Live! Atlanta

Channel women’s group broadens support for women through community nonprofit organizations.

Key quote from the press release:

“The goal of the Philanthropy Committee is to provide long-term and strategic relief to select nonprofit organizations. By using the power of networking through ACW, we can purposefully uplift others.” — Hope DeLaRosa, partner manager southeast, Genesys


MicroTouch Announces Expanded Mach Portfolio at VARTECH

The Mach line now includes a 27-inch Android all-in-one and a new Android media player designed to enhance digital experiences.

Key features from the press release:‍

  • Embedded AI enables customer behavior analysis for personalized service and more effective upselling.
  • Best-in-class performance with MediaTek NeuroPilot technology and Wi-Fi 6E certification for advanced AI capabilities, enhanced device performance, and seamless operation in evolving network environments
  • Design allows for integration with systems running on Windows or Android OS and an array of peripherals.
  • MicroTouch ISV and MDM (mobile device management) partner solutions enable turnkey solutions and simplify integration.
  • Optically bonded, etched antiglare touchscreens feature projected capacitive 10-point touch sensors, increasing viewing clarity and accuracy.
  • Mach products are ideal for noise-sensitive environments, and their design minimizes maintenance needs.
  • Mach products are energy efficient, reducing operational costs and supporting environmental sustainability.

Veritas Makes Cyber Recovery Simpler, Smarter and Faster

Veritas Technologies announces new AI-driven capabilities to help data protection specialists and IT generalists eliminate the guesswork and trial and error from the cyber recovery process.

The new capabilities include:

  • Automated asset audits and policy creation scans and identifies unprotected assets, then recommends and applies tailored protection.
  • Accelerated threat detection and response reduces time to scan and assess malware spread across an entire estate by up to 93% using hash-based tracking of malware in backup data and blast radius analysis.
  • Automated recovery blueprints enable IT teams to easily create, automate, test, and edit workflow plans at a granular level across multiple domains.
  • Automated recovery point recommendations reduce recovery time and potential data loss by eliminating the need to manually identify the “last known good copy,” relying instead on risk engine analysis.

Forescout for OT Security: 1st Solution to Cover Managed and Unmanaged Devices Across All Purdue Levels Securing Cloud, Air-Gapped, and Hybrid Environments

New solution allows organizations to secure complex, heterogeneous OT, IoT/IoMT, and IT environments whether they are fully in cloud, completely air-gapped, or hybrid.

Key features from the press release:

  • Comprehensive operational and cybersecurity threat detection rules specifically designed for OT, IoT, and IT hybrid environments
  • Expanded capabilities, OT discovery, and extraction, including from network and wireless infrastructure
  • AI-enhanced asset intelligence to track the effectiveness of response actions across the security ecosystem to reduce risk
  • AI reporting with contextual insights about connected devices, potential causes of incidents, and recommended remediation steps
  • Role-specific dashboards provide custom views for operations, security, SOC analysts, and executives.
  • Actionable vulnerability prioritization using FS Vedere Labs Known Exploited Vulnerabilities (VL-KEV), an innovative approach to OT/IoT specific exploitation indicators using Vedere Labs’ proprietary threat research (the industry’s largest curated database of actionable insights)
  • Asset classification covering 18.7 million unique device profiles from the Forescout Research Vedere Labs database

Tigera Enhances Calico Cloud and Calico Enterprise to Drive Efficiency in Vulnerability Management for Containers

New capabilities streamline remediating vulnerabilities in container images.

Key quote from the press release:

“Calico Cloud improves security posture with new vulnerability management capabilities at scale, and strengthens runtime security with real-time threat filtering, detection customization, and ITOps integrations. We’re pleased to bring these new, critical capabilities to our customers.” — Amit Gupta, chief product officer, Tigera


Introducing Xurrent, SaaS Vendor 4me Rebrands Modern Service Management

Leading SaaS-based service management software platform for the modern enterprise, formerly known as 4me, rebrands to support the company’s strategy and scaling.

Key quote from the press release:

“We provide a modern platform on which our customer’s digital transformation efforts can be sustained for the long haul. The rebrand underscores our commitment to help businesses deliver more consistent, automated and fantastic customer experiences.” — Kevin McGibben, CEO, Xurrent


Opnova Emerges from Stealth with $3.75M in Funding to Set a New Standard in IT, Security, and Compliance Operations

As customers of Opnova, midsized MSPs can expect to see downstream efficiency and productivity impact for SMBs. Their tickets will get resolved faster and right on the first try.

Key quote from the press release:

“Our AI-native platform is designed to integrate seamlessly with existing workflows, bridging the automation gap and allowing IT teams to improve operational processes in real-time while ensuring model safety, data security and governance. This results in a more efficient, productive, and competitive organization.” — Sinan Eren, CEO and co-founder, Opnova


Images: iStock

Related Press Releases

Growing the MSP

Editor’s Choice


Explore ChannelPro

Events

Reach Our Audience