Arctic Wolf | November 09, 2021
-Arctic Wolf®, a leader in security operations, today announced the global expansion of its industry-leading cloud-native platform, the Arctic Wolf Security Operations Cloud, to provide customers and partners with unified visibility, protection, and automation, through a growing number of technical integrations. With the establishment of a European Security Operations Center (SOC) in Frankfurt, Germany, Arctic Wolf customers in any location, will have full flexibility in how their native security solution data is stored and accessed to aid in their compliance with local and international data governance regulations.
Built on an open XDR architecture, the Arctic Wolf Security Operations Cloud has scaled to ingest, parse, enrich, and analyze over 1.6 trillion security events and 1.3 petabytes of data each week from over one million licensed users at 2,000 global customers. By leveraging machine learning and artificial intelligence the Arctic Wolf Security Operations Cloud now processes events at an equivalent or greater rate than that of other market-defining cloud platforms. This momentum is driven by a strong uptick in demand for the technology in the enterprise market, demonstrated by Arctic Wolf’s 510% year-over-year large enterprise ARR growth in the first quarter of the fiscal year.
Unlike the rest of the industry that is just now starting to parse solutions to integrate data from multiple attack surfaces, Arctic Wolf’s platform was built from day one on a cloud-native architecture that seamlessly ingests data from endpoint, network, identity, and cloud sources to deliver automated threat detection and response at scale. This unification of an organization’s security data ensures only verified security incidents are escalated to customers, effectively eliminating alert fatigue, and ensuring internal security resources have the time needed to focus on hardening their overall security posture.
Powering Security Operations at a Global Scale
To further support Arctic Wolf’s ongoing global expansion, the company has leveraged the scalability and extensibility of the AWS public cloud infrastructure, providing new customers the ability to have their native security solution data hosted within the Arctic Wolf Security Operations Cloud in their choice of the United States, Germany, or Canada.
With five SOCs spread across North America and Europe, as well as a growing team of remote security analysts, organizations within Arctic Wolf’s global customer base can have confidence that the Arctic Wolf Concierge Delivery Model aligns with the needs of their compliance requirements on their security journey to end cyber risk.
Delivering Critical Outcomes Across the Entire Security Operations Framework
The massive growth in the power and scale of the Arctic Wolf Security Operations Cloud has been pushed by explosive market demand for security operations, which has resulted in the company doubling its sales for eight consecutive years and achieving a $4.3B valuation as part of a $150M Series F funding round in July.
In addition to the business expansion driving the momentum of its cloud-native platform, Arctic Wolf has also made aggressive investments in ecosystem integrations, resulting in the Arctic Wolf Security Operations Cloud adding support for dozens of new security data sources over the last year. Arctic Wolf’s universal and unlimited approach to data ingestion allows customers to gain visibility and control over historically disparate security solutions, while removing the need for security leaders to choose which data sources are important or cost-effective to monitor.
“While every other aspect of the modern technology stack has a category-defining platform —think Salesforce, ServiceNow, and Workday— no one in cybersecurity has managed to unify the market and produce a true platform that serves all security operations use cases for midsize and enterprise customers,The Arctic Wolf Security Operations Cloud delivers exactly that – the unified security operations experience that owns the outcome for the customer, and our new global footprint makes it easier than ever for organizations to have full control over where their native security solution data is stored.”
Nick Schneider, president and chief executive officer of Arctic Wolf
“Accelerated digital transformation and the shift to cloud-based solutions require organizations to rethink data protection strategies and upscale their data security infrastructures to meet the ever-evolving privacy and data compliance landscape,” said Duncan Brown, vice president, European Enterprise Research, IDC. “This trend is global in nature and in Europe, in particular, we are seeing a rapid movement to adopt cloud environments. The vendors who will lead the market in that change will need to demonstrate a proven track record in delivering a mature, global cloud model that meets data sovereignty requirements without compromising speed and scalability.”
With the Security Operations Cloud, Arctic Wolf is the first to deliver a cloud-based platform that gives organizations the protection, resilience, and guidance they need to defend against cyber threats, including Managed Detection and Response (MDR), Managed Risk, Cloud Security Posture Management (CSPM), and Managed Security Awareness —each delivered by the unique concierge delivery model.
About Arctic Wolf:
Arctic Wolf® is a global leader in security operations, delivering the first cloud-native security operations platform to end cyber risk. Powered by threat telemetry spanning endpoint, network, and cloud sources, the Arctic Wolf® Security Operations Cloud ingests and analyzes more than 1.6 trillion security events a week across the globe, enabling critical outcomes for most security use cases and optimizing customers’ disparate security solutions. Now deployed to more than 2,000 customers worldwide, the Arctic Wolf® Platform delivers automated threat detection and response at scale, and empowers organizations of any size to stand up world-class security operations with the push of a button.
prnewswire | September 28, 2020
Ivanti, Inc. , which automates IT and Security Operations to discover, manage, secure and service from cloud to edge, and is backed by affiliates of Clearlake Capital Group, L.P. (together with its affiliates, "Clearlake") and TA Associates, today announced it has signed definitive agreements to acquire MobileIron Inc. ("MobileIron"), a leading provider of mobile-centric unified endpoint management solutions, and Pulse Secure LLC ("Pulse Secure"), a leading provider of secure access and mobile security solutions.
Group-IB | August 26, 2021
Group-IB, one of the leading providers of solutions dedicated to detecting and preventing cyberattacks, identifying online fraud, investigation of high-tech crimes and intellectual property protection, has been included in the Forrester overview of the global cybersecurity consulting providers "Now Tech: Global Cybersecurity Consulting Providers, Q3 2021". The report covers 36 major global cybersecurity consulting firms.
The demand for superior cybersecurity consulting services continues to increase every year. According to the Forrester's Analytics Business Technographics Security Survey, 31% of enterprise security decision-makers expect to increase spending on cybersecurity consultants and systems integrators by 5% or more in 2021. Digital transformation challenges brought by pandemic have spurred this demand further. To reinforce their cybersecurity risk programs, CISO are tapping into purpose-built strategic and tactical cybersecurity expertise.
The Forrester analysts included Group-IB service offering in the category of consultancies – the providers which "offer clients a broad range of audit, consulting, and advisory services, including cybersecurity consulting. They have a diverse set of assets and intellectual property to help clients solve security problems."
Cybersecurity services have always been the key drivers of Group-IB's technological leadership enriching the company's global threat intelligence and hunting ecosystem with first-hand understanding of adversary tactics. The company's contribution to high-profile cyber investigations in partnership with international law enforcement, and incident response engagements in more than 60 countries bring in-depth knowledge of criminal schemes. Group-IB's battle-tested experts carried out more than 1,200 successful investigations over 18 years around.
While many corporate cybersecurity teams struggle to manage multiple vendors, Group-IB offers its customers a single point of accountability and security consulting expertise trusted by the international automotive, fintech, retail companies. The company provides consulting services at every stage of the attack lifecycle: before (Security Assessment, Compromise Assessment, Incident Response Readiness Assessment), during (Incident Response and Incident Response Retainer), and after the attack (Digital Forensics and Cyber Investigation).
Group-IB is one of the leading providers of solutions dedicated to detecting and preventing cyberattacks, identifying online fraud, investigation of high-tech crimes and intellectual property protection, headquartered in Singapore. The company's threat intelligence and research centers are located in the Middle East (Dubai), the Asia-Pacific (Singapore), Europe (Amsterdam), and Russia (Moscow).
Group-IB's Threat Intelligence & Attribution system has been named one of the best in class by Gartner, Forrester, and IDC. Group-IB's Threat Hunting Framework (earlier known as TDS) intended for the proactive search and the protection against complex and previously unknown cyberthreats has been recognized as one of the leaders in Network Detection and Response by the leading European analyst agency KuppingerCole Analysts AG, while Group-IB itself has been recognized as a Product Leader and Innovation Leader. Gartner identified Group-IB as a Representative Vendor in Online Fraud Detection for its Fraud Hunting Platform. In addition, Group-IB was granted Frost & Sullivan's Innovation Excellence award for its Digital Risk Protection (DRP), an Al-driven platform for identifying and mitigating digital risks and counteracting brand impersonation attacks with the company's patented technologies at its core.