DATA SECURITY, ENTERPRISE SECURITY, SOFTWARE SECURITY

Titan Security Group Announces Acquisition of Prudential Security, Inc.

Titan Security | September 06, 2022 | Read time : 02:50 min

Titan Security
Titan Security Group, LLC , a leading provider of security solutions headquartered in Chicago, IL, announced today that it has completed the acquisition of the security staffing operation of Prudential Security, Inc. ("Prudential"), a security solutions provider based in Taylor, Michigan. Titan is a portfolio company of Quad C Management, Inc.

"We are very excited to welcome the Prudential team to the Titan family. "Our organizations are very complementary, with shared values, culture, and focus on providing a high level of service to our clients and team members. Together, we are better positioned to be a leading regional provider of high-end security services."

Dave Pack, CEO of Titan

Titan's acquisition of Prudential adds over 700 team members to the Titan brand and expands their existing service area to 14 states including Illinois, Michigan, Wisconsin, Indiana, Alabama, Kansas, Mississippi, North Carolina, New York, Ohio, Pennsylvania, South Carolina, Tennessee, and Texas.

"This is an exciting collaboration," said Pack. "Our acquisition strategy is to identify like-minded companies, such as Prudential.  Applying our combined talent and resources will lead to new opportunities for our clients and team members."

Terms of the acquisition were not disclosed. Security ProAdvisors LLC represented Prudential Security Inc. in the transaction.

About Titan Security
Titan Security is one of the largest security services firms in the U.S. providing security staffing, consulting, and systems integration of enterprise security solutions including video surveillance, electronic access control, turnstiles, biometrics, visitor management, alarm monitoring and other solutions throughout the Chicago metropolitan area, Northern Indiana and Southern Wisconsin.

About Prudential
Prudential Security is a recognized leader in the security industry, providing a full range of security solutions to its clients in a wide range of industries. Prudential has built its business with a strong foundation of customer service and responsiveness. Prudential's longtime management team responds attentively to client concerns and issues, developing relationships with all clients, and forming a longstanding base of business, allowing Prudential to grow into one of the most sought-after security providers in the country.

About Quad-C
Founded in 1989 and headquartered in Charlottesville, Virginia, Quad-C is a middle market private equity firm focused on investing in well-established business and consumer services, food & beverage and consumer products, healthcare, industrials, specialty distribution and transportation/logistics companies. In its three-decade history, Quad-C has invested over $4.0 billion of capital in 80 platform companies. The Quad-C team is committed to partnering with entrepreneurs and management teams to accelerate growth and create long-term value.

Spotlight

Constructing a network security defense ad hoc, that is one product at a time as the need presents itself creates weak links in the overall strategy, weak links that can easily be broken. With multiple attack vectors and malware constantly increasing in volume and sophistication, what is needed is a comprehensive strategy that can eliminate the weak links and evolve as the threat landscape evolves. This solution guide explores the myths and issues surrounding Advanced Persistent Threats (APTs) and how the right solution can offer the necessary protection against APTs and other targeted attacks.

Spotlight

Constructing a network security defense ad hoc, that is one product at a time as the need presents itself creates weak links in the overall strategy, weak links that can easily be broken. With multiple attack vectors and malware constantly increasing in volume and sophistication, what is needed is a comprehensive strategy that can eliminate the weak links and evolve as the threat landscape evolves. This solution guide explores the myths and issues surrounding Advanced Persistent Threats (APTs) and how the right solution can offer the necessary protection against APTs and other targeted attacks.

Related News

DATA SECURITY, PLATFORM SECURITY, SOFTWARE SECURITY

BlueVoyant Recognized with Microsoft Verified Managed XDR Solution Status

BlueVoyant | October 21, 2022

BlueVoyant, an industry-leading cyber defense company that combines internal and external cybersecurity, today announced it has achieved Microsoft verified Managed Extended Detection and Response (MXDR) solution status. By achieving this status, BlueVoyant has proven its robust MXDR services, which include a Security Operations Center (SOC) with 24x7 year-round proactive hunting, monitoring, and response capabilities, are all built on tight integrations with the Microsoft Security platform. This solution combines expert-trained technology with human-led services and has been verified by Microsoft engineers. "BlueVoyant and Microsoft both recognize that the best cyber defense is advanced technology backed by human-led expertise. "We are honored to be teaming with Microsoft to deliver a Microsoft verified Managed XDR Solution. Earning verified MXDR solution status is among other recent accolades BlueVoyant received from Microsoft. Both companies recognize that cybersecurity is a team sport, and we look forward to continuing to work closely with Microsoft to deliver the very best in cybersecurity to our joint customers." Milan Patel, global head of managed security services (MSS) at BlueVoyant Said Rob Lefferts, corporate vice president, modern protection and SOC, for Microsoft: "With malicious attacks on the rise, we understand security is front and center for our customers. That is why I am excited to congratulate BlueVoyant on achieving Microsoft Verified: Managed Extended Detection and Response solution status. [Its] solution closely integrates with Microsoft 365 Defender and Microsoft Sentinel and has been verified by Microsoft Security engineering to ensure that it provides comprehensive service coverage across the Microsoft Security portfolio." BlueVoyant is a managed security service provider (MSSP) member of the Microsoft Intelligent Security Association (MISA). The company was a finalist in the Microsoft Security Excellence Awards, given by MISA, for Security MSSP of the Year. "The Microsoft Intelligent Security Association is comprised of some of the most reliable and trusted security companies across the globe," said Maria Thomson, Microsoft Intelligent Security Association lead. "Our members share Microsoft's commitment to collaboration within the cybersecurity community to improve our customers' ability to predict, detect, and respond to security threats faster. We're thrilled to recognize and welcome BlueVoyant's MXDR solution to the MISA portfolio." Earning verified MXDR solution status is among a long list of recognition BlueVoyant has received from Microsoft. Earlier this year, BlueVoyant was named the Microsoft Security U.S. Partner of the Year, a finalist in the Microsoft Canada Impact Awards in two categories — Healthcare Impact Award and Security Impact Award — and one of Microsoft's top 150 managed security partners. In 2021, BlueVoyant was named a Microsoft Security 20/20 Partner Awards Winner for Top MDR (Managed Detection and Response) Team. About BlueVoyant BlueVoyant combines internal and external cyber defense capabilities into an outcomes-based platform called BlueVoyant Elements™. Elements is cloud-native and continuously monitors your network, endpoints, attack surface, and supply chain plus the clear, deep, and dark web for vulnerabilities, risks, and threats; and takes action to protect your business, leveraging both machine learning-driven automation and human-led expertise. Elements can be deployed as independent solutions or together as a full-spectrum cyber defense platform. BlueVoyant's approach to cyber defense revolves around three key pillars — technology, telemetry, and talent — that deliver industry-leading cybersecurity to more than 700 clients across the globe.

Read More

DATA SECURITY, PLATFORM SECURITY, SOFTWARE SECURITY

BeyondTrust and NCS Partner to Strengthen Cybersecurity Posture for APAC Organisations

BeyondTrust | September 19, 2022

BeyondTrust, the leader in intelligent identity and access security, announced today a new strategic partnership with NCS Group, a leading technology services firm that provides services and solutions in consulting, digital, technology, cybersecurity and more. A strong player in identity security, NCS will be using the technology provided by BeyondTrust to offer companies best practice solutions in Privileged Access Management (PAM), a core component of enabling Zero Trust security. Organisations today are evolving as a result of digital transformation, an accelerating shift to cloud, and an expanded remote workforce. However, these changes are also creating an increase in vulnerable endpoints and remote access, as well as a large number of digital identities that pose a significant cybersecurity risk if left unmanaged and unsecured. According to Gartner, unauthorised privileged access is now the primary method that threat attackers use to infiltrate an organisation's systems and network. "From the rise of ransomware to an increased focus on digital transformation and Zero Trust strategies, it is a critical time for organisations to be equipped with solutions that can secure identities, safeguard access for remote employees, and strengthen endpoint security across hybrid environments. "Through this partnership, BeyondTrust and NCS will enable organisations in Asia Pacific with our Privileged Access Management (PAM) solutions to address these cybersecurity challenges." Ben Wong, Director of Channel and Alliance for Asia Pacific & Japan at BeyondTrust "When organisations think of access management, they may only think of traditional password management – and that should not be the case. There is an urgent need for organisations to implement more advanced endpoint security and access management solutions and many are still playing catch up in this area," said Mr. Wong. "This partnership with NCS enables us to provide tailored PAM solutions to customers across a wide range of industries from government to the commercial sectors. Combining the skills and experience of NCS with BeyondTrust's leading portfolio of PAM solutions will help their customers defend against the evolving threat landscape." BeyondTrust is a leader in the 2022 Gartner Magic Quadrant for PAM for the fourth year running, with a comprehensive PAM portfolio that enables identity and access security that is monitored, managed, secured, and just-in-time, and includes these solutions:: Privileged Password Management Secure Remote Access Endpoint Privilege Management Cloud Security Management About NCS Group NCS, a subsidiary of Singtel Group, is a leading technology services firm with presence in Asia Pacific and partners with governments and enterprises to advance communities through technology. Combining the experience and expertise of its 10,000-strong team across 55 specialisations, NCS provides differentiated and end-to-end technology services to clients with its NEXT capabilities in digital, cloud and platforms, as well as core offerings in application, infrastructure, engineering and cybersecurity. NCS also believes in building a strong partner ecosystem with leading technology players, research institutions and start-ups to support open innovation and co-creation. For more information, visit ncs.co. About BeyondTrust BeyondTrust is the worldwide leader in intelligent identity and access security, empowering organisations to protect identities, stop threats, and deliver dynamic access to empower and secure a work-from-anywhere world. Our integrated products and platform offer the industry's most advanced privileged access management (PAM) solution, enabling organizations to quickly shrink their attack surface across traditional, cloud and hybrid environments.

Read More

DATA SECURITY, PLATFORM SECURITY, SECURITY AUDIT AND COMPLIANCE

Skybox Security Unveils Industry's First SaaS Solution for Security Policy and Vulnerability Management Across Hybrid Environments

Skybox Security | October 12, 2022

Skybox Security today announced the next generation of its award-winning Security Posture Management Platform – including the industry's first Software-as-a-Service (SaaS) solution for Security Policy and Vulnerability Management. Propelling its global customer base into the next era of proactive cybersecurity, major innovations advance its platform that continuously tests attack feasibility, exposure, remediation options, and compliance across hybrid environments. "Today, we're delivering on our mission of building the world's leading Security Posture Management platform. "Skybox equips customers with the hybrid network modeling, path analysis, and automation they need to reduce the risk of a significant data breach by 55%. Our latest innovations are significant for customers that deploy on-prem, as well as customers that will benefit from our new SaaS solution. The new Skybox Cloud Edition offering capitalizes on the speed, scale, innovation, and productivity benefits powered by the cloud to drive the pursuit of broader digital business opportunities." Skybox Security CEO and Founder Gidi Cohen Expansion into Cyber Asset Attack Surface Management Challenging the status quo through a dynamic, fresh approach to Cyber Asset Attack Surface Management (CAASM), Skybox visualizes all assets through API integrations, identifies and prioritizes vulnerabilities using proprietary threat intelligence, sees gaps in security controls, and automatically provides remediation options. In addition, significant advancements to the proprietary Skybox network model enable customers to dynamically model operational technology, IT, and hybrid cloud environments – including all networking and security data related to a specific asset. According to Gartner Research: "CAASM enables security teams to improve basic security hygiene by ensuring security controls, security posture, and asset exposure are understood and remediated. Organizations that deploy CAASM reduce dependencies on homegrown systems and manual collection processes, and remediate gaps either manually or via automated workflows. Organizations can visualize security tool coverage, support attack surface management (ASM) processes, and correct systems of record that may have stale or missing data."1 Industry's first solution to automatically map vulnerabilities to malware type Skybox also introduced the industry's first Security Posture Management solution that connects Vulnerability Management with Threat Hunting. Building on its Exposure Management process that emphasizes publicly known vulnerabilities and identifies control gaps, Skybox now also associates vulnerabilities to malware by name, category, and distinct classes – including ransomware, Remote Access Trojans (RATs), botnets, cryptocurrency miners, trojans, and more. "Executives and board members want to know if their cybersecurity teams are staying ahead of the latest celebrity malware such as TrickBot, REMCOS, FormBook, AZORult, Ursnif, Agent Tesla, and NanoCore," said Ran Abramson, Threat Intelligence Analyst, Skybox Research Lab. "Powered by Skybox threat intelligence, CISOs have automated analysis that can prove they retired millions of malware and exploits. No other cybersecurity solution can provide customers with our advanced vulnerability prioritization and threat trend reporting." Expanded integrations eliminate complexity, reduce administrative burden, and provide more effective cybersecurity With over 150 integrations, Skybox Security is the only solution that builds an extensive model of a customer's unique hybrid environment, including all of the customer’s L3 devices. Expanded integrations include: Amazon Web Services (AWS): Expanded cloud capabilities include support of AWS firewalls in distributed mode. Reduce risk while validating compliance by eliminating permissive, obsolete, shadowed, and redundant rules. Cisco Application Centric Infrastructure (ACI): Adding new capabilities to its Cisco ACI integration, Skybox now delivers granular visibility into ACI Fabric tenants across spanning networking, micro-segmentation policies, and device attributes. Palo Alto Networks Prisma Cloud: Furthering its commitment to shift-left security practices, vulnerabilities in container images across DevOps toolchains can now be identified and prioritized for remediation via the Skybox multi-factor risk scoring algorithm. Skybox Cloud Edition accelerates customer value with increased flexibility, scalability, business agility, and resiliency Skybox Cloud Edition delivers the capabilities of the Skybox Security Posture Management Platform in a Software-as-a-Service (SaaS) offering to unlock additional business agility and resiliency benefits. First SaaS solution for Security Policy Management: Leapfrogging the competition, Cloud Edition capabilities reduce software installation maintenance tasks. Streamlined licensing and deployment are designed to meet customer demand. Advanced Vulnerability and Exposure Management: With the industry's most flexible deployment options for Vulnerability and Exposure Management (both on-premises and SaaS versions), customers can select the deployment model that aligns with their corporate and regulatory requirements. Limitless scalability: Manage security policies, prioritize vulnerabilities, and remediate exposures across the most complex on-premises, cloud, operational technology (OT), and hybrid environments. Automate, verify, and operationalize risk reduction. Faster deployment options: Cuts deployment time and reduces the need for procuring hardware, performing testing, and installing updates – enabling customers to unlock value faster. Customers with vast, global environments will reap huge benefits due to the size and diversity of their attack surface. Instant automatic updates: Customers benefit immediately from the latest product innovations and platform updates. Upgrades are much less disruptive, with no need for change management resources. Seamless, automated upgrades are critical given the dynamic threat and regulatory landscapes. Guaranteed availability: The solution is hosted in AWS for outstanding stability, performance, and guaranteed availability. Additionally, 24/7 monitoring of the tenants, across both the Network Operations Center (NOC) and Security Operations Center (SOC), maintains optimal network performance and performs real-time analysis for continuous threat mitigation. About Skybox Security Over 500 of the largest and most security-conscious enterprises in the world rely on Skybox for the insights and assurance required to stay ahead of dynamically changing attack surfaces. Our Security Posture Management Platform delivers complete visibility, analytics, and automation to quickly map, prioritize and remediate vulnerabilities across your organization. The vendor-agnostic solution intelligently optimizes security policies, actions, and change processes across all corporate networks and cloud environments. With Skybox, security teams can now focus on the most strategic business initiatives while ensuring enterprises remain protected.

Read More