Picus Security, a breach and attack simulation seller, has introduced it’s joined the Microsoft Smart Security Association (MISA).
A consortium of independent software suppliers and managed security assistance providers, MISA offers integrated answers to assist defend towards constantly evolving threats.
By simulating true-globe threats, this sort of as ransomware and innovative persistent threats (APTs), the Full Security Manage Validation platform from Picus offers specific mitigation articles and actionable insights to shut visibility and protection gaps. Security posture administration is made a lot easier by mapping final results to globally-acessible MITRE ATT&CK framework.
With the integration of Picus’ security platform with Microsoft Defender for Endpoint and Microsoft Sentinel, shoppers can now fantastic-tune inform regulations and security automation to secure critical info and assets from cyber attacks.
“The Microsoft Clever Security Association has developed into a lively ecosystem comprised of the most trustworthy and trusted security program sellers throughout the world,” mentioned Maria Thomson, MISA guide.
“Our users, like Picus Security, share Microsoft’s dedication to collaboration within the cybersecurity community to make improvements to our customers’ potential to predict, detect, and answer to security threats faster.”
On top of that, Picus’ security system allows Microsoft buyers using Defender for Endpoint and Microsoft Sentinel to assess security notify era, ingestion of security party logs, telemetry, and much more.
Picus Security CTO Volkan Erturk mentioned: “With threats evolving far more speedily than at any time, it is essential that corporations consistently assess the functionality of their security controls to be certain that they stay effective.”
“By becoming a member of MISA and integrating our security validation resolution with Microsoft’s detection technology, we intention to make it simpler and considerably less source intense for security teams to be proactive and preserve network and endpoint controls optimally-tuned to defend towards the most up-to-date threats,” extra Erturk.
Some components of this write-up are sourced from: