Ad Image

Endpoint Security and Network Monitoring News for the Week of July 21; Postman, Actility, Sonar, and More

Endpoint Security and Network Monitoring News for the Week of July 21

Endpoint Security and Network Monitoring News for the Week of July 21

The editors at Solutions Review have curated this list of the most noteworthy endpoint security and network monitoring news for the week of July 21. This curated list features endpoint security and network monitoring vendors such as Postman, Actility, Sonar, and more.

Keeping tabs on all the most relevant endpoint security and network monitoring news can be a time-consuming task. As a result, our editorial team aims to provide a summary of the top headlines from the last month in this space. Solutions Review editors will curate vendor product news, mergers and acquisitions, venture capital funding, talent acquisition, and other noteworthy endpoint security and network monitoring news items.

Download Link to Endpoint Security Buyer's Guide

Endpoint Security and Network Monitoring News for the Week of July 21


Postman Acquires Akita Software

Postman, an API Platform, this week announced it has acquired Akita Software, a monitoring and observability solutions provider. This is Postman’s first strategic acquisition since hitting a major milestone of 20M users. Postman will integrate Akita’s API discovery and monitoring capabilities into its platform to deliver tooling to help organizations “thrive in an API-first world.” Akita’s addition will make it easier than ever for users to manage their production APIs, even in the face of API sprawl. Managing too many APIs or microservices is a top obstacle to producing APIs, according to nearly one in four respondents in Postman’s 2023 State of the API Report, which surveyed over 40,000 professionals. At large enterprises, API sprawl is even worse: almost one in three respondents say it’s an obstacle. Akita’s capabilities for API discovery and monitoring make it possible to automatically manage APIs by simply allowing Akita’s agent to watch API traffic.

Read on for more.

Lookout Report: “Android Surveillanceware Attributed to China’s APT41”

Lookout, Inc., the endpoint-to-cloud security company, this week announced the discovery of two new advanced Android surveillanceware instances, WyrmSpy and DragonEgg, attributed to the high-profile Chinese threat group APT41. Despite being indicted on multiple charges by the U.S. government for its attacks on more than 100 private and public enterprises in the U.S. and around the world, APT41’s tactics have evolved to include mobile devices. Customers of Lookout Mobile Endpoint Security are protected from these threats.

Read on for more.

Actility Acquires Acklio

Actility, an IoT network infrastructure solutions provider, this week announced the acquisition of Acklio, a provider of SCHC (Static Context Header Compression) technology for LPWAN (Low Power Wide Area Network) networks. This acquisition will further strengthen Actility’s position as a leader of end-to-end IoT solutions and will enable the company to offer a broader range of IP-based IoT applications over LPWAN networks.

Read on for more.

Endor Labs Releases “State of Dependency Management 2023” Report

Endor Labs, creator of the Code Governance Platform, today released “State of Dependency Management 2023,” a new research report exploring emerging trends that software organizations need to consider as part of their security strategy, and risks associated with the use of existing open source software (OSS) in application development. In particular, as modern software development increasingly adopts distributed architectures and microservices alongside third party and open source components, the report tracks the astonishing popularity of ChatGPT’s API, how current large language model (LLM)-based AI platforms are unable to accurately classify malware risk in most cases, and how almost half of all applications make no calls at all to security-sensitive APIs in their code base. The report emphasizes how these issues need to be prioritized in every organization’s security strategy.

Read on for more.

New Research Released from Sonar on Cost of Technical Debt

This week, Sonar released a research report that examines the millions of dollars that businesses lose when they fail to implement an optimal approach for software development. The research, based on an examination of over 200 projects within a 12-month span, calculates that the attributed technical debt cost is $306,000 per year for a project of one million Lines of Code (LoC). This is equivalent to 5,500 developer hours spent on remediation, development time that could be put towards more innovative and valuable projects.

Read on for more.

Coursera Announces First Entry-Level Professional Certification

Earlier this week, Coursera announced that Microsoft launched its first entry-level Professional Certificate on Coursera, the Microsoft Cybersecurity Analyst Professional Certificate. This program is designed to help learners develop the in-demand skills needed for a successful career in cybersecurity. This program doesn’t require previous experience or education, and requires only six months for beginner-level learners to get hands-on practice in Microsoft Azure, network security, cloud computing security, computer security incident management, threat mitigation, and more.

Read on for more.


Expert Insights Section

expert insight badgeWatch this space each week as Solutions Review editors will use it to share new Contributed Content Series articles, Contributed Shorts videos, Expert Roundtable and event replays, and other curated content to help you gain a forward-thinking analysis and remain on-trend. All to meet the demand for what its editors do best: bring industry experts together to publish the web’s leading insights for enterprise technology practitioners.

NDR: The Vital Ingredient For A Successful XDR Strategy

Mark Doering of NETSCOUT dons his chef’s hat and looks at why NDR is a vital ingredient when cooking up an XDR strategy.

In the world of enterprise security, numerous technology options are available, causing companies to make difficult decisions when it comes to designing their security strategies. Despite the options, security teams are constantly searching for the ‘secret sauce’ or the best and most effective way to integrate security tools that will achieve a strong ROI. One of those ingredients is a successful Extended Detection and Response (XDR) strategy, which offers visibility across multiple data in one platform. This strategy, however, can only exist with the inclusion of Network Detection and Response (NDR), which focuses on analyzing packet data in network traffic rather than logs, endpoints, or other data streams. In this article, we will explore the intricacies of designing a comprehensive XDR strategy, why packet-based NDR solutions must be a vital part of that strategy, and why combining both security solutions is the ideal posture for a more robust, real-time view of today’s rapidly-evolving threat landscape and dynamic attack surface.

Read on for more.

Download Link to Endpoint Security Buyer's Guide

Mike Costello
Follow Mike

Share This

Related Posts

IAM Solution Suggestion Engine