Azure Sentinel News
  • Home
    • Home – Layout 1
    • Home – Layout 2
    • Home – Layout 3
  • Security and Compliance
  • SOC
  • Threat Intelligence
  • Security Ochestration & Automated Response
  • SOAR
  • Security Operations
  • Artificial Intelligence
No Result
View All Result
  • Home
    • Home – Layout 1
    • Home – Layout 2
    • Home – Layout 3
  • Security and Compliance
  • SOC
  • Threat Intelligence
  • Security Ochestration & Automated Response
  • SOAR
  • Security Operations
  • Artificial Intelligence
No Result
View All Result
Azure Sentinel News
No Result
View All Result
Home SIEM

Open Systems Augments its Cybersecurity Capabilities With Acquisition of Leading Microsoft Azure Sentinel Expert

Azure Sentinel News Editor by Azure Sentinel News Editor
November 19, 2020
in SIEM
0
CriticalStart Boosts MDR With Azure Sentinel Support
4.2kViews
1500 Shares Share on Facebook Share on Twitter

Acquiring Born in the Cloud, a Microsoft Gold Partner, Expands Open Systems’ Extended Detection and Response (XDR) Capabilities and Deepens its Expertise in Azure Sentinel

REDWOOD CITY, Calif.–(BUSINESS WIRE)–Open Systems, a secure access service edge (SASE) pioneer supporting enterprises in their digital transformation journey, today announced its acquisition of Born in the Cloud, a specialist in cybersecurity threat detection, prevention and response. Its “SWAT team” of architects, engineers and developers enables enterprise customers to securely achieve their cloud automation, strategy and migration goals with the Microsoft Azure cloud platform. This addition bolsters Open Systems’ ability to serve the large and expanding market for Azure Sentinel services with enterprises worldwide.

“Born in the Cloud’s unrivaled expertise in securing Microsoft environments, from end points to cloud, and reputation for solving customers’ most demanding Azure Sentinel requirements, make it an ideal extension of Open Systems, a fellow Microsoft Gold Partner,” said Jeff Brown, CEO of Open Systems. “The timing of this deal is perfect as COVID-19 has forced enterprises to accelerate their digital transformation and driven the need for cybersecurity solutions like our Managed Detection and Response (MDR) services, which complement our Managed SD-WAN services to deliver a complete SASE offering.”

The acquisition of Born in the Cloud builds on the recent introduction of Open Systems’ new cloud-native MDR service, which incorporates the Microsoft Azure Sentinel security information and event management (SIEM) solution. This MDR service complements the networking capabilities of Open Systems’ SASE solution and its SASE-delivered SD-WAN, providing exceptional security that supports enterprises’ digital transformations and their increasing use of mobile devices, edge computing and the cloud. Enterprises that use Azure and Sentinel will find implementing the service to be a straightforward process.

“Open Systems’ acquisition of Born in the Cloud, with its complementary security capabilities, is a smart way to enhance its SASE platform,” said Lee Doyle, Principal Analyst, Doyle Research. “This is a good time for this move, as many enterprises are looking to leverage cloud-based SIEMs to power their digital transformation.”

Born in the Cloud works with enterprises around the world and specializes in onboarding and management services that enable customers to maximize their Azure and Sentinel implementations. Its engineers are experts in cybersecurity, Microsoft Security Stack, cloud automation and AI, data science and DevOps. The company was founded in 2010 by Paul Keely, a noted cloud and security expert who has been recognized as a Microsoft Most Valuable Professional (MVP) 10 times and is the author of Microsoft Cloud Security at the C-Level, a best-selling book on Azure security.

“Joining Open Systems gives us the scale to serve more large clients, while still retaining the nimbleness to quickly address customer needs,” said Keely, who has joined Open Systems as General Manager to oversee the company’s Born in the Cloud business unit. “Together, we offer Azure customers an unbeatable combination of proven networking and security solutions supported by world-class engineers who thrive on challenges.”

About Open Systems

Open Systems is a secure access service edge (SASE) pioneer supporting enterprises in their digital transformation journey. The company’s cloud-delivered Secure SD-WAN and Managed Detection and Response (MDR) services unify security and comprehensive networking capabilities, enabling organizations to connect their clouds, branches, applications and users anywhere in the world, in a secure and agile way. Open Systems’ service delivery platform combines AIOps and automation with 24×7 experts to deliver immediate peace of mind and future-proof business critical infrastructure.

More information is available at open-systems.com

Reference: https://www.businesswire.com/news/home/20200520005016/en/Open-Systems-Augments-Cybersecurity-Capabilities-Acquisition-Leading

Azure Sentinel News Editor

Azure Sentinel News Editor

Related Posts

What’s new: Microsoft Teams connector in Public Preview
SIEM

Changes in How Running Hunting Queries Works in Azure Sentinel

February 11, 2021
Microsoft suspends 18 Azure accounts tied to China-based hackers
SIEM

Azure Sentinel can now Analyze All Available Azure Active Directory Log Files

February 8, 2021
With new release, CrowdStrike targets Google Cloud, Azure and container adopters
SIEM

How to Setup a Managed Identity for the Azure Sentinel Logic App Connector

January 21, 2021
Next Post
Microsoft brings endpoint & Azure security under Microsoft Defender

Microsoft brings endpoint & Azure security under Microsoft Defender

RiskIQ Joins Microsoft Intelligent Security Association

RiskIQ Joins Microsoft Intelligent Security Association

Microsoft introduces integrated Darktrace-a-like, Azure Sentinel

Microsoft introduces integrated Darktrace-a-like, Azure Sentinel

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Follow Us

  • 21.8M Fans
  • 81 Followers

Recommended

Microsoft is quietly becoming a cybersecurity powerhouse

Official Azure Sentinel PowerShell Module Released

2 months ago
Microsoft announces security, identity, management, and compliance updates across Azure and Office

How to be Notified When Azure Sentinel Data Stops Flowing

2 months ago
Microsoft Azure AD Gains Machine Learning Hooks To Detect Sneaky Password Spray Attacks

Microsoft Azure AD Gains Machine Learning Hooks To Detect Sneaky Password Spray Attacks

4 months ago
Microsoft’s newest sustainable datacenter region coming to Arizona in 2021

How to Evolve the SOC with Azure Sentinel: Hunting Queries

2 months ago

Instagram

    Please install/update and activate JNews Instagram plugin.

Categories

  • AI & ML
  • Artificial Intelligence
  • Incident Response
  • IR
  • KQL
  • Security and Compliance
  • Security Ochestration & Automated Response
  • Security Operations
  • SIEM
  • SOAR
  • SOC
  • Threat Intelligence
  • Uncategorized

Topics

anomaly automation Azure Azure DevOps Azure Security Center Azure Sentinel Azure Sentinel API Azure Sentinel Connector BlueVoyant Call cybersecurity Detection file GitHub Hunting Huntingy IAC incident response Incident Triage infrastructure as code Investigation jupyter LAQueryLogs MDR Microsoft microsoft 365 mssp Multitenancy Notebooks Pester Playbooks PowerShell python Records Security Sentinel Sharing SIEM signin Supply Chain teams Threat hunting Watchlists Workbooks XDR
No Result
View All Result

Highlights

New Items of Note on the Azure Sentinel GitHub Repo

Tuning the MCAS Analytics Rule for Azure Sentinel: System Alerts and Feature Deprecation

New Search Capability for Azure Sentinel Incidents

Follow-up: Microsoft Tech Talks Practical Sentinel : A Day in the Life of a Sentinel Analyst

Changes in How Running Hunting Queries Works in Azure Sentinel

Azure Sentinel can now Analyze All Available Azure Active Directory Log Files

Trending

What’s new: Microsoft Teams connector in Public Preview
IR

How to Generate Azure Sentinel Incidents for Testing

by Azure Sentinel News Editor
February 26, 2021
0

Do you want to generate an Incident in Azure Sentinel for testing/demoing? Here’s a couple easy ways...

What’s new: Microsoft Teams connector in Public Preview

Azure Sentinel Notebooks Loses It’s Preview Tag

February 25, 2021
Microsoft’s newest sustainable datacenter region coming to Arizona in 2021

The Holy Grail of Azure Sentinel Data Connections: The Azure Service Diagnostic Setting

February 22, 2021
Microsoft’s newest sustainable datacenter region coming to Arizona in 2021

New Items of Note on the Azure Sentinel GitHub Repo

February 18, 2021
Microsoft’s newest sustainable datacenter region coming to Arizona in 2021

Tuning the MCAS Analytics Rule for Azure Sentinel: System Alerts and Feature Deprecation

February 17, 2021

We bring you the best, latest and perfect Azure Sentinel News, Magazine, Personal Blogs, etc. Visit our landing page to see all features & demos.
LEARN MORE »

Recent News

  • How to Generate Azure Sentinel Incidents for Testing February 26, 2021
  • Azure Sentinel Notebooks Loses It’s Preview Tag February 25, 2021
  • The Holy Grail of Azure Sentinel Data Connections: The Azure Service Diagnostic Setting February 22, 2021

Categories

  • AI & ML
  • Artificial Intelligence
  • Incident Response
  • IR
  • KQL
  • Security and Compliance
  • Security Ochestration & Automated Response
  • Security Operations
  • SIEM
  • SOAR
  • SOC
  • Threat Intelligence
  • Uncategorized

[mc4wp_form]

Copyright © 2020 - Azure Sentinel News

No Result
View All Result
  • Home
  • Security and Compliance
  • SOC
  • Threat Intelligence
  • Security Ochestration & Automated Response
  • SOAR
  • Security Operations
  • Artificial Intelligence

Copyright © 2020 Azure Sentinel News