'Data is the answer to a more effective digital transformation,' says SonicWall's Diane Walker

In this interview with Diane Walker, Senior Director of Demand Generation at SonicWall, we had the opportunity to peek into SonicWall's latest high-performance firewall models that are aimed to combat the unprecedented surge of malware and ransomware resulting from a rise in remote and hybrid workforces across enterprises. She shared meaningful insights into SonicWall's vision of cybersecurity, and how modern-day marketers need to reflect on the different levels of the digital buyer journey. Read on to discover effective approaches towards marketing to drive business growth.

Marketing’s job is to drive buying processes at scale.

MEDIA 7: In your professional marketing career, how have you mastered the ability to combine the Arts and the Sciences to create meaningful customer experiences?
DIANE WALKER:
The Creative:
Identifying a brand – most people can easily recognize familiar logos, signature colors, and entertaining campaigns, and that’s certainly part of it. But the real magic begins when you couple those thought-provoking and entertaining images with a clear, concise copy. Communicating with customers, prospects, and partners is a fine art. We focus on crafting messages using a casual narrative in a conversational tone. After all, B2B buyers are consumers too. The creative is the visual clue, designed to align with the story. We strive to engage the reader with a short story, providing insight into a business challenge they’re experiencing and how to solve for it. It’s no easy task to surprise and delight the audience while retaining the technology’s sophistication with informative and educational content. The key is to engage the reader by capturing their attention and creating intrigue to further illustrate customer benefits with desired business outcomes.

The Science:
We measure everything from overall marketing and sales performances to the tiniest detail. We monitor conversions from leads to revenue. Keeping a pulse on pipeline velocity has been a game-changer. Activities such as regular A/B testing, creating asset heat maps, and evaluating engagement trends are just a few ways we monitor the health of our programs. We are constantly evolving – process improvement, program experimentation and integration across all marketing channels are critical. We evaluate and adjust strategies and tactics as needed by restructuring low performers and replicating the components of our highest-performing content and programs. We leverage marketing automation, intent data, artificial intelligence, and machine learning to define audience profiles. The approach includes Account-Based Marketing, industry verticals, role-based targeting, re-engagement, and more. We are close partners with Marketing Operations. Our focus is to reach the right person at the right time with the right message. Creating an orchestrated, digital experience requires data-driven decisions, experimentation, and innovation.


 

M7: How does SonicWall mitigate the risks for enterprises with remote and mobile workforces?
DW:
To be effective, cybersecurity must provide mobile employees with easy and secure 24/7 access to key business resources in an agile, easy-to-use, cost-effective, and scalable way. This requires a zero-trust posture regarding any mobile device attempting to connect with corporate resources, whether those resources be on-prem or in the cloud. Secure mobile access is a core component of a zero-trust approach to anywhere, anytime access. IT must also secure access from these mobile endpoints with limited budgets and skilled staff resources. This means streamlining deployment, availability, and support to the lower total cost of ownership.

SonicWall Secure Mobile Access provides distributed enterprises with comprehensive end-to-end secure remote access to corporate resources hosted across on-prem, cloud, and hybrid datacenters. It applies identity-based, policy-enforced access controls, context-aware device authentication, and application-level VPN to grant access to data, resources, and applications after establishing user and device identity and trust. SonicWall Central Management Server enables organizations, distributed enterprises, and service providers to centrally manage and rapidly deploy secure access solutions, either deployed on a private cloud as a virtual appliance or on a public cloud (AWS or Microsoft Azure) using Bring Your Own License (BYOL).

Read More: People now just want news that's true, says Ivar Krustok, Head of Data Science and IT at Ekspress Meedia


Communicating with customers, prospects, and partners is a fine art.



M7: SonicWall recently turned 30 as a global cybersecurity leader. As a team, how did you commemorate this milestone and what do you hope to achieve as you step into a new year?
DW:
Throughout August 2021, SonicWall celebrated its heritage –  the customers, employees, product innovation, and channel DNA that have helped shape SonicWall over the past three decades and will continue to inspire us in the years ahead. As a company, SonicWall celebrated its leadership and heritage across 30 years in the cybersecurity industry. We celebrated our customers for their loyalty and being part of decades worth of innovation and security. SonicWall recognized employees, the hard-working people who made the company what it is today — many of whom are still employed with us today. We highlighted our product innovation across three decades of growth.

SonicWall applauded its global partners who serve as the heartbeat of the organization, which has always been 100% driven by the channel. We armed our employees, customer communities, and partners with 30-year badges, banners, email signature blocks, and virtual meeting backdrops. There were contests with prizes for best photos and shared lots of memorable stories through blogs and social media posts. While the last five years were important chapters in this journey, we have more goals to achieve, milestones to mark, and history to be made. SonicWall is always forward-looking. And that’s how the company — and its people — has been a mainstay in the industry for more than 30 years.


M7: This year, SonicWall released three new high-performance firewall models. How can enterprises and large organizations around the world benefit from these new products?
DW:
If we’ve learned anything during the unprecedented surge of malware and ransomware this year with 70% of full-time workers working from home in hybrid multi-cloud environments – we’re more vulnerable than ever. For organizations, it’s all about choice. SonicWall’s growing virtual, cloud, and hybrid offerings leverage the best of the company’s Boundless Cybersecurity approach to provide deployment choices to the customer while solving real-world use cases faced by SMBs, enterprises, governments, and MSSPs. This year, we launched the power and flexibility of the 7th generation firewall advancements that bring enterprises to a level where they can stop attacks from many vectors.

Our vision for cybersecurity is to protect organizations from the broadest spectrum of intrusions, pre-emptively reduce cyber risk, and achieve greater protection across devices, new perimeters, and network segments more efficiently while lowering the total cost of ownership. Our next-generation firewalls protect organizations from the broadest spectrum of intrusions, pre-emptively reduce cyber risks, and achieve greater protection across devices, new perimeters, and network segments more efficiently while lowering the total cost of ownership.

Read More: Listen to your customers, advises Christopher Penn, Co-Founder and Chief Data Scientist at TrustInsights.ai


Creating an orchestrated, digital experience requires data-driven decisions, experimentation, and innovation.



M7: What does modern-day marketing mean to you and how do you leverage these developments to facilitate increased demand and business growth?
DW:
Marketing’s job is to drive buying processes at scale. Communicating with both customers and prospective customers where they are engaged is key. If our audience understands the message, then that message will create a brand affiliation to help them move forward in the buying process. The buyer’s journey is not linear. Decisions are made by diverse buying groups with different needs and engagement patterns. We need to reflect on the multi-stage, multi-touch digital buyer journey.

Marketing platforms, tools, and processes have come a long way over the past decade. It’s exciting to see the advancements in data intelligence. Data is the answer to a more effective digital transformation. It shows us where to find opportunities and gives us insight into how we can win more business. Connecting with Sales makes a measurable impact. We are enabling front-line qualification sales teams with lead information that includes the context of what product or solution the account has shown interest in, suggested contacts to follow up with, and content to start those outreach conversations.


M7: According to you, what are some of the best practices for effective marketing strategies that drive business growth?
DW:
There are so many components to an effective marketing strategy. “Know thy customer” is the golden rule. Profiling the ideal customer helps us formulate strategies to pursue net new customers. Who are they? What do they care about? When are they typically ready to buy? Where are we successful in helping them solve their business challenges? How do we create real business value? Why choose SonicWall? Understanding the customer experience is paramount to customer satisfaction as well as net-new customer acquisition. Based on your Ideal Customer Profile (ICP), you can build the propensity to buy models which will lead to net-new opportunities.

Today’s marketers must be revenue marketers. Guideposts include: Understanding the business, monitoring and interpreting performance metrics, and creating targeted pipeline acceleration programs to increase revenue velocity to closed-won revenue.
This year, the demand generation team has been focused on innovation and integration. Innovation for us means embracing new ideas and trying new approaches and tactics – everything from creative services and messaging to marketing operations and sales. We have had tremendous success leveraging automated nurture programs within our Marketing Automation Platform (MAP). Integration planning across the marketing and sales ecosystem is being achieved through collaboration between the marketing and field organizations. To date, our efforts have paid dividends. One company, one voice.

ABOUT SONICWALL

SonicWall delivers Boundless Cybersecurity for the hyper-distributed era and a work reality where everyone is remote, mobile and unsecure. By knowing the unknown, providing real-time visibility and enabling breakthrough economics, SonicWall closes the cybersecurity business gap for enterprises, governments and SMBs worldwide. For more information, visit www.sonicwall.com.

More THOUGHT LEADERS

Q&A with Alastair Speare-Cole, President of Insurance at QOMPLX

Media 7 | August 20, 2021

Alastair Speare-Cole, President and General Manager of the Insurance Division at QOMPLX, leads the overall strategy for the business unit, the development of QOMPLX’s underwriting-as-a-service platform, the management of the company’s Managing General Agent (MGA), as well as setting the direction for the company’s next-generation insurance decision platform that leverages a wide variety of data and advanced analytics to provide advanced risk and portfolio management solutions. Prior to joining QOMPLX, he served as Chief Underwriting Officer at Qatar, and he served as the CEO of JLT Towers from 2012 to 2015. He was also COO at Aon Re for ten years and has also held board appointments at reinsurance and banking subsidiaries in the United Kingdom....

Read More

Q&A with Matt Amundson, VP of Marketing at Everstring

MEDIA 7 | November 14, 2019

Matt Amundson, VP of Marketing at EverString has over 10 years of sales and marketing experience. Matt has held roles in Demand Generation and Sales Development at TIBCO, Marketo, FGXI and Red Bull. His primary focus has been on creating processes that generate a consistent, pipeline. MEDIA 7: Could you tell us about your mantra “Go for the run”? MATT AMUNDSON: On December 29th of 2017, I decided to change my lifestyle habits and decided that I’m going to run a minimum of one mile every single day. So, every day since that day I’ve got up and ran. It’s been a seminal moment where my approach on life and work has changed dramatically. And as a result of that, it’s become a personal mantra, which is to not be afraid of where you might be today. If you’ve got some lofty goals or if you want to try something new, just get out there and give it a try and see what the results of it could be. On a personal level, whether you’re physically tired or don’t feel like doing it, just give it a shot and go for it. On a professional level, if it’s something that can benefit you or your brand give it a try, go for it and see what happens. M7: What is your favorite part about working at EverString? MA: I really love the people that I work with and I’ve been at the organization for about four and a half years. Some of the folks that I’ve worked with since the beginning are still here and it’s just been an awesome journey to be on with some incredible colleagues and that’s just on a personal level. On a professional level, I think we’re all solving a major problem that a lot of organizations are suffering from – which is related to data. As a marketer who has existed in the mar tech space for the broader part of my career, we often think of our process improvements and workflow improvements to gain more efficiency. Whether that’s marketing automation system or a cool new technology like conversational AI most people fall into two camps when it comes to data, either they’re just not conscious of data or they are. The data that they purchase or the data they acquire ultimately powers everything they do from a marketing perspective or they’re used to the status quo of current data providers that provide low quality of data and are sort of mired in the “well I guess that’s the way it is and that’s just the quality level that I have to deal with”. The fact that we’re changing that for some of the world’s biggest brands like Capital One, FedEx, Staples, Autodesk, Oracle as well as the smaller brands is really exciting to me. ...

Read More

Q&A with Div Manickam, Director of WW Services Marketing and Portfolio Management (Data Center Group) at Lenovo

Media 7 | March 24, 2021

Div Manickam, Director of WW Services Marketing and Portfolio Management (Data Center Group) at Lenovo, has led B2B SaaS initiatives in startups and Fortune 500 technology companies for 10+ years. With disciplined product marketing across the buyer journey and cross-functional relationships, she empowers mindful teams and fosters a vulnerable culture where everyone's voice is heard.  She enjoys sharing her experiences on authentic leadership and evolution of product marketing in Forbes Communications Council and Product Marketing Alliance. Just as committed and passionate, she enjoys traveling, is a foodie at heart, and a proud Google Local Guide exploring the world. And one day, she aspires to share her passion and story on TEDx....

Read More

Q&A with Alastair Speare-Cole, President of Insurance at QOMPLX

Media 7 | August 20, 2021

Alastair Speare-Cole, President and General Manager of the Insurance Division at QOMPLX, leads the overall strategy for the business unit, the development of QOMPLX’s underwriting-as-a-service platform, the management of the company’s Managing General Agent (MGA), as well as setting the direction for the company’s next-generation insurance decision platform that leverages a wide variety of data and advanced analytics to provide advanced risk and portfolio management solutions. Prior to joining QOMPLX, he served as Chief Underwriting Officer at Qatar, and he served as the CEO of JLT Towers from 2012 to 2015. He was also COO at Aon Re for ten years and has also held board appointments at reinsurance and banking subsidiaries in the United Kingdom....

Read More

Q&A with Matt Amundson, VP of Marketing at Everstring

MEDIA 7 | November 14, 2019

Matt Amundson, VP of Marketing at EverString has over 10 years of sales and marketing experience. Matt has held roles in Demand Generation and Sales Development at TIBCO, Marketo, FGXI and Red Bull. His primary focus has been on creating processes that generate a consistent, pipeline. MEDIA 7: Could you tell us about your mantra “Go for the run”? MATT AMUNDSON: On December 29th of 2017, I decided to change my lifestyle habits and decided that I’m going to run a minimum of one mile every single day. So, every day since that day I’ve got up and ran. It’s been a seminal moment where my approach on life and work has changed dramatically. And as a result of that, it’s become a personal mantra, which is to not be afraid of where you might be today. If you’ve got some lofty goals or if you want to try something new, just get out there and give it a try and see what the results of it could be. On a personal level, whether you’re physically tired or don’t feel like doing it, just give it a shot and go for it. On a professional level, if it’s something that can benefit you or your brand give it a try, go for it and see what happens. M7: What is your favorite part about working at EverString? MA: I really love the people that I work with and I’ve been at the organization for about four and a half years. Some of the folks that I’ve worked with since the beginning are still here and it’s just been an awesome journey to be on with some incredible colleagues and that’s just on a personal level. On a professional level, I think we’re all solving a major problem that a lot of organizations are suffering from – which is related to data. As a marketer who has existed in the mar tech space for the broader part of my career, we often think of our process improvements and workflow improvements to gain more efficiency. Whether that’s marketing automation system or a cool new technology like conversational AI most people fall into two camps when it comes to data, either they’re just not conscious of data or they are. The data that they purchase or the data they acquire ultimately powers everything they do from a marketing perspective or they’re used to the status quo of current data providers that provide low quality of data and are sort of mired in the “well I guess that’s the way it is and that’s just the quality level that I have to deal with”. The fact that we’re changing that for some of the world’s biggest brands like Capital One, FedEx, Staples, Autodesk, Oracle as well as the smaller brands is really exciting to me. ...

Read More

Q&A with Div Manickam, Director of WW Services Marketing and Portfolio Management (Data Center Group) at Lenovo

Media 7 | March 24, 2021

Div Manickam, Director of WW Services Marketing and Portfolio Management (Data Center Group) at Lenovo, has led B2B SaaS initiatives in startups and Fortune 500 technology companies for 10+ years. With disciplined product marketing across the buyer journey and cross-functional relationships, she empowers mindful teams and fosters a vulnerable culture where everyone's voice is heard.  She enjoys sharing her experiences on authentic leadership and evolution of product marketing in Forbes Communications Council and Product Marketing Alliance. Just as committed and passionate, she enjoys traveling, is a foodie at heart, and a proud Google Local Guide exploring the world. And one day, she aspires to share her passion and story on TEDx....

Read More

Related News

Data Security

GuidePoint Security Announces Portfolio of Data Security Governance Services

GuidePoint Security | January 30, 2024

GuidePoint Security, a cybersecurity solutions leader enabling organizations to make smarter decisions and minimize risk, today announced the availability of its Data Security Governance services, which are designed to help customers address the challenges of unstructured data and data sprawl through a proven process and program to meet their unique needs. GuidePoint’s Data Security Governance services consist of policies, standards, and processes leveraging the newest technologies to meet organizations’ data governance goals in both on-prem and cloud environments. Once the right strategy is determined with the customer, GuidePoint Security consultants will review program requirements, assess current policies and controls, perform gap analysis, design and develop/enhance the program, recommend and implement supporting technologies, and create operational processes and metrics. “Whether an organization is just beginning to build their data security governance program or needs help assessing and improving an existing program, our team and service capabilities are built to meet them at their current maturity level,” said Scott Griswold, Practice Director - Security Governance Services, GuidePoint Security. “We work side by side with the customer to conduct the necessary data discovery in their environment and provide tailored recommendations for solutions and processes to ultimately build/improve upon the data security governance program.” GuidePoint’s Data Security Governance Services include: Sensitive Data Cataloging: For organizations just getting started in the process of protecting their sensitive data, GuidePoint offers Data Identification workshops to identify sensitive data types in the environment, including trade secrets, intellectual property, and sensitive business communications. Data Security Governance Program Assessment: For organizations with existing Data Security Governance or Data Protection programs, GuidePoint Security experts will assess the program to identify policy non-compliance, gaps in data protection requirements—whether legal, regulatory, contractual, or business—and program maturity levels. Data Security Governance Program Strategy Development: The GuidePoint team will work with an organization's key stakeholders to design a program strategy aligned with relevant requirements. The outputs of this effort include delivering ongoing sensitive data discovery, automated classification and labeling, the application of required sensitive data protections, restrictions on where sensitive data can be stored and sent, and data retention policy enforcement. Merger and Acquisition Data Identification: This offering provides the ability to identify sensitive data within an M&A target or recent acquisition (including locations, amounts, and access rights) and then perform penetration testing on the storage repositories where that sensitive data exists to determine the risk of data compromise. About GuidePoint Security GuidePoint Security provides trusted cybersecurity expertise, solutions and services that help organizations make better decisions that minimize risk. Our experts act as your trusted advisor to understand your business and challenges, helping you through an evaluation of your cybersecurity posture and ecosystem to expose risks, optimize resources and implement best-fit solutions. GuidePoint’s unmatched expertise has enabled a third of Fortune 500 companies and more than half of the U.S. government cabinet-level agencies to improve their security posture and reduce risk. Learn more at www.guidepointsecurity.com.

Read More

Data Security

Boomi Strengthens Commitment to Data Security and Compliance by Achieving StateRAMP Authorization

Boomi | January 12, 2024

Boomi™, the intelligent connectivity and automation leader, today announced that the Boomi platform has achieved StateRAMP Authorization. This achievement reflects Boomi’s unwavering commitment to data security and compliance, and to delivering a secure and reliable solution that government agencies can rely on to safeguard their data and operations. “At Boomi, we are committed to democratizing modernization. Securing StateRAMP authorization for our platform was paramount, enabling public sector organizations to seamlessly and securely integrate and leverage cloud applications,” said Sean Wechter, Chief Information Officer at Boomi. “Through a strategic alliance with StateRAMP, Boomi actively collaborates with its leadership board, facilitating streamlined documentation and audit processes to expedite digital transformation within the public sector." According to the U.S. Government Accountability Office, government agencies plan to spend billions of dollars each year to support their IT and cybersecurity efforts, including transitioning IT resources to secure, cost-effective commercial cloud services.1 However, agencies are challenged to select secure cloud-based solutions, making it difficult for these organizations to modernize and improve constituent experiences. StateRAMP, a nationally recognized risk authorization management program that provides a standardized approach to assessing cloud products, improves security and simplifies procurement by building a pool of pre-authorized Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS) solutions for public sector entities. As organizations more frequently implement cloud-based solutions, they also require validated access to integration platform as a service (iPaaS) to streamline application and resource integration. iPaaS integrates cloud-to-cloud, cloud-to-on premises, and on-premises-to-on-premises platforms, helping public sector organizations break down data silos to enhance information flow, improve citizen services, and increase operational effectiveness. About Boomi Boomi aims to make the world a better place by connecting everyone to everything, anywhere. The pioneer of cloud-based integration platform as a service (iPaaS), and now a category-leading, global software as a service (SaaS) company, Boomi touts the largest customer base among integration platform vendors and a worldwide network of approximately 800 partners – including Accenture, Capgemini, SAP, and Snowflake. Global organizations turn to Boomi’s award-winning platform to discover, manage, and orchestrate data, while connecting applications, processes, and people for better, faster outcomes. For more information, visit boomi.com.

Read More

Platform Security

Stellar Cyber and Proofpoint Strategic Alliance to Deliver Comprehensive Email Security Solution For SecOps Teams

Stellar Cyber | January 23, 2024

Stellar Cyber, the innovator of Open XDR, announced a new partnership with Proofpoint, a leading cybersecurity and compliance company. Through this alliance, Proofpoint and Stellar Cyber customers benefit from an out-of-the-box integration enabling swift email investigations and real-time response actions to email-driven attacks. Proofpoint Targeted Attack Protection monitors emails to identify suspicious emails and potentially malicious attachments and URLs. Once identified, the findings are shared with Stellar Cyber automatically. Stellar Cyber’s Open XDR platform ingests, normalizes, and analyzes Proofpoint findings and other collected data to deliver a comprehensive threat picture. As security analysts conduct investigations, they can instruct integrated third-party products – including Proofpoint – on corrective actions. “Protecting organizations against email-borne attacks is a top priority, and security teams need a way to automatically correlate threat telemetry across the entire attack surface in order to quickly remediate threats,” said Andrew Homer, VP of Strategic Alliances, Stellar Cyber. “This new partnership with Proofpoint is the latest example of Stellar Cyber delivering on its Open XDR strategy to provide customers turn-key integrations that improve productivity and threat detection.” “Email attacks remain the number one entry point into an organization, and the level of sophistication of these attacks continues to grow exponentially,” said D.J. Long, Vice President, Strategic Alliances & Business Development, Proofpoint. “We’re thrilled to work with Stellar Cyber on this strategic alliance to help customers protect against advanced email-based threats and unify their cybersecurity defense.” Through this alliance, Stellar Cyber and Proofpoint give security teams an advantage over attackers, resulting in the following: Real-time threat signals exchanged for proactive detection Correlation of Proofpoint alerts across the entire attack surface Automated response actions for immediate threat containment About Stellar Cyber Stellar Cyber’s Open XDR Platform delivers comprehensive, unified security without complexity, empowering lean security teams of any skill level to secure their environments successfully. With Stellar Cyber, organizations reduce risk with early and precise identification and remediation of threats while slashing costs, retaining investments in existing tools, and improving analyst productivity, delivering an 8X improvement in MTTD and a 20X improvement in MTTR. The company is based in Silicon Valley.

Read More

Data Security

GuidePoint Security Announces Portfolio of Data Security Governance Services

GuidePoint Security | January 30, 2024

GuidePoint Security, a cybersecurity solutions leader enabling organizations to make smarter decisions and minimize risk, today announced the availability of its Data Security Governance services, which are designed to help customers address the challenges of unstructured data and data sprawl through a proven process and program to meet their unique needs. GuidePoint’s Data Security Governance services consist of policies, standards, and processes leveraging the newest technologies to meet organizations’ data governance goals in both on-prem and cloud environments. Once the right strategy is determined with the customer, GuidePoint Security consultants will review program requirements, assess current policies and controls, perform gap analysis, design and develop/enhance the program, recommend and implement supporting technologies, and create operational processes and metrics. “Whether an organization is just beginning to build their data security governance program or needs help assessing and improving an existing program, our team and service capabilities are built to meet them at their current maturity level,” said Scott Griswold, Practice Director - Security Governance Services, GuidePoint Security. “We work side by side with the customer to conduct the necessary data discovery in their environment and provide tailored recommendations for solutions and processes to ultimately build/improve upon the data security governance program.” GuidePoint’s Data Security Governance Services include: Sensitive Data Cataloging: For organizations just getting started in the process of protecting their sensitive data, GuidePoint offers Data Identification workshops to identify sensitive data types in the environment, including trade secrets, intellectual property, and sensitive business communications. Data Security Governance Program Assessment: For organizations with existing Data Security Governance or Data Protection programs, GuidePoint Security experts will assess the program to identify policy non-compliance, gaps in data protection requirements—whether legal, regulatory, contractual, or business—and program maturity levels. Data Security Governance Program Strategy Development: The GuidePoint team will work with an organization's key stakeholders to design a program strategy aligned with relevant requirements. The outputs of this effort include delivering ongoing sensitive data discovery, automated classification and labeling, the application of required sensitive data protections, restrictions on where sensitive data can be stored and sent, and data retention policy enforcement. Merger and Acquisition Data Identification: This offering provides the ability to identify sensitive data within an M&A target or recent acquisition (including locations, amounts, and access rights) and then perform penetration testing on the storage repositories where that sensitive data exists to determine the risk of data compromise. About GuidePoint Security GuidePoint Security provides trusted cybersecurity expertise, solutions and services that help organizations make better decisions that minimize risk. Our experts act as your trusted advisor to understand your business and challenges, helping you through an evaluation of your cybersecurity posture and ecosystem to expose risks, optimize resources and implement best-fit solutions. GuidePoint’s unmatched expertise has enabled a third of Fortune 500 companies and more than half of the U.S. government cabinet-level agencies to improve their security posture and reduce risk. Learn more at www.guidepointsecurity.com.

Read More

Data Security

Boomi Strengthens Commitment to Data Security and Compliance by Achieving StateRAMP Authorization

Boomi | January 12, 2024

Boomi™, the intelligent connectivity and automation leader, today announced that the Boomi platform has achieved StateRAMP Authorization. This achievement reflects Boomi’s unwavering commitment to data security and compliance, and to delivering a secure and reliable solution that government agencies can rely on to safeguard their data and operations. “At Boomi, we are committed to democratizing modernization. Securing StateRAMP authorization for our platform was paramount, enabling public sector organizations to seamlessly and securely integrate and leverage cloud applications,” said Sean Wechter, Chief Information Officer at Boomi. “Through a strategic alliance with StateRAMP, Boomi actively collaborates with its leadership board, facilitating streamlined documentation and audit processes to expedite digital transformation within the public sector." According to the U.S. Government Accountability Office, government agencies plan to spend billions of dollars each year to support their IT and cybersecurity efforts, including transitioning IT resources to secure, cost-effective commercial cloud services.1 However, agencies are challenged to select secure cloud-based solutions, making it difficult for these organizations to modernize and improve constituent experiences. StateRAMP, a nationally recognized risk authorization management program that provides a standardized approach to assessing cloud products, improves security and simplifies procurement by building a pool of pre-authorized Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS) solutions for public sector entities. As organizations more frequently implement cloud-based solutions, they also require validated access to integration platform as a service (iPaaS) to streamline application and resource integration. iPaaS integrates cloud-to-cloud, cloud-to-on premises, and on-premises-to-on-premises platforms, helping public sector organizations break down data silos to enhance information flow, improve citizen services, and increase operational effectiveness. About Boomi Boomi aims to make the world a better place by connecting everyone to everything, anywhere. The pioneer of cloud-based integration platform as a service (iPaaS), and now a category-leading, global software as a service (SaaS) company, Boomi touts the largest customer base among integration platform vendors and a worldwide network of approximately 800 partners – including Accenture, Capgemini, SAP, and Snowflake. Global organizations turn to Boomi’s award-winning platform to discover, manage, and orchestrate data, while connecting applications, processes, and people for better, faster outcomes. For more information, visit boomi.com.

Read More

Platform Security

Stellar Cyber and Proofpoint Strategic Alliance to Deliver Comprehensive Email Security Solution For SecOps Teams

Stellar Cyber | January 23, 2024

Stellar Cyber, the innovator of Open XDR, announced a new partnership with Proofpoint, a leading cybersecurity and compliance company. Through this alliance, Proofpoint and Stellar Cyber customers benefit from an out-of-the-box integration enabling swift email investigations and real-time response actions to email-driven attacks. Proofpoint Targeted Attack Protection monitors emails to identify suspicious emails and potentially malicious attachments and URLs. Once identified, the findings are shared with Stellar Cyber automatically. Stellar Cyber’s Open XDR platform ingests, normalizes, and analyzes Proofpoint findings and other collected data to deliver a comprehensive threat picture. As security analysts conduct investigations, they can instruct integrated third-party products – including Proofpoint – on corrective actions. “Protecting organizations against email-borne attacks is a top priority, and security teams need a way to automatically correlate threat telemetry across the entire attack surface in order to quickly remediate threats,” said Andrew Homer, VP of Strategic Alliances, Stellar Cyber. “This new partnership with Proofpoint is the latest example of Stellar Cyber delivering on its Open XDR strategy to provide customers turn-key integrations that improve productivity and threat detection.” “Email attacks remain the number one entry point into an organization, and the level of sophistication of these attacks continues to grow exponentially,” said D.J. Long, Vice President, Strategic Alliances & Business Development, Proofpoint. “We’re thrilled to work with Stellar Cyber on this strategic alliance to help customers protect against advanced email-based threats and unify their cybersecurity defense.” Through this alliance, Stellar Cyber and Proofpoint give security teams an advantage over attackers, resulting in the following: Real-time threat signals exchanged for proactive detection Correlation of Proofpoint alerts across the entire attack surface Automated response actions for immediate threat containment About Stellar Cyber Stellar Cyber’s Open XDR Platform delivers comprehensive, unified security without complexity, empowering lean security teams of any skill level to secure their environments successfully. With Stellar Cyber, organizations reduce risk with early and precise identification and remediation of threats while slashing costs, retaining investments in existing tools, and improving analyst productivity, delivering an 8X improvement in MTTD and a 20X improvement in MTTR. The company is based in Silicon Valley.

Read More

Spotlight

SonicWall

SonicWall has been fighting the cyber-criminal industry for over 30 years defending small, medium-size businesses and enterprises worldwide. Backed by research from the Global Response Intelligent Defense (GRID) Threat Network, our award-winning real-time breach detection and prevention solutions, c...

Events

Resources