Welcome!

Agile Computing Authors: Rishi Bhargava, Pat Romanski, Liz McMillan, Carmen Gonzalez, ManageEngine IT Matters

News Feed Item

Latisys Expands Threat and Compliance Management Services Suite

Alchemy Security's Virtual Security Operations Center and AlienVault's Unified Security Management Platform Underpins Latisys' Compliant IT Infrastructure Services Delivery Platform

ASHBURN, VA -- (Marketwired) -- 05/27/14 -- In response to increasing demand for highly secure and audit-ready IT infrastructure services, Latisys, a leading provider of hybrid cloud hosting and data center solutions, today announced a significant expansion to its suite of managed security and professional services designed to holistically address enterprise risk & compliance management challenges faced by organizations today.

Latisys has partnered with Alchemy Security, a leading information security solutions provider with recognized expertise in security information event management (SIEM) deployment and operations, to expand its suite of Threat and Compliance Management Services (TCMS).

Based on Alchemy's Virtual Security Operations Center (vSOC) and leveraging AlienVault's Unified Security Management platform and Open Threat Exchange (OTX), Latisys' TCMS suite forms the basis of a growing portfolio of managed security & compliance solutions designed to provide security controls to enterprises hosting their infrastructure on Latisys' unified Cloud-Enabled Systems Infrastructure (CESI) platform.

Latisys' TCMS establishes a critical consolidation point for an organization's security monitoring. It enables enterprises to continuously evaluate the risk profile of their IT assets by intelligently detecting, analyzing, prioritizing, and alerting on new and emerging threats and vulnerabilities as they arise, and it addresses other core components required for robust security strategies. Latisys' TCMS encompasses:

  • Real-Time Monitoring and Correlation
  • Threat Intelligence
  • File Integrity Monitoring
  • Vulnerability Scanning
  • Incident Management Support
  • Compliance Tracking and Reporting
  • Auditor Response Support
  • Network and Application Penetration Testing*
  • Web-application and source code reviews*
  • PCI DSS ASV scanning*
  • Compliance Gap Analysis*
  • Risk Assessments*
  • Policy Development*

According to Gartner, organizations are failing at early breach detection, with more than 70% of breaches going undetected by the breached organization.1 Traditional defense-in-depth approaches are simply not sufficient to detect targeted attacks leading enterprises to look towards holistic services providers for comprehensive threat & risk management solutions that understand the threat landscape and what to do about new and emerging threats.

"Leading service providers are growing their threat management capabilities as large and mid-size enterprises become increasingly targeted," said Wendy Nather, Research Director, Security, for 451 Research. "The new threat and compliance management services from Latisys -- based on Alchemy and AlienVault -- have a great advantage in that they support customer autonomy and privacy. The SIEM license ownership and logs stay with the customer, which is an important requirement for many organizations."

"Managing information security risk has become a critical factor in any company's success or failure," said Pete Stevenson, CEO of Latisys. "Malicious, sophisticated attacks are on the rise and their impact has become more serious and costly for organizations that lack adequate protection. Our enterprise customers depend on us to properly augment their risk management strategies, meet compliance requirements and optimize their business processes. That's part of serving as an extension of their team."

"Latisys recognizes the importance of offering and integrating a broad range of professional and managed security services that would be very difficult for a customer to cost-effectively replicate in their own environment," said Joe Bonnell, Founder & CEO of Alchemy Security. "It's really all about the right combination of tools, processes and people -- working seamlessly in a solution tailored to each client's unique security posture. By providing a comprehensive set of professional services and managed solutions required to fully meet their security and compliance objectives, Latisys' customers benefit from Alchemy's deep expertise in driving robust security solutions, while addressing the cost effective availability solutions that Latisys regularly provides their customers."

"AlienVault is recognized globally for its ability to provide real-time threat data and is an established solution for thousands of companies and government institutions," said Justin Endres, SVP Worldwide Sales at AlienVault. "Alchemy Security is a premier partner with a deep understanding of SIEM technologies. We are very pleased to have been selected by Alchemy as the exclusive provider of unified security management and crowd sourced threat intelligence to Latisys who is focused on providing customers with a holistic view of threats to their environment and the intelligence to rapidly respond."

Latisys' unified CESI platform is audited to ensure alignment with the physical controls and information security policies for key regulatory standards and government requirements including:

  • The Payment Card Industry (PCI) Data Security Standard (DSS) 2.0
  • The Health Insurance Portability and Accountability Act (HIPAA) report for physical controls
  • The Gramm-Leach-Bliley Act (GLBA) -- otherwise known as the Financial Services Modernization Act of 1999

Overall, nearly 1,000 enterprises and government organizations rely on Latisys as their trusted provider of critical IT infrastructure solutions underpinning their business. With a Net Promoter score of 46, Latisys leads the IaaS industry in customer satisfaction.

About Alchemy Security
Alchemy Security provides strategic and enduring information security solutions for compliance, security intelligence, and business imperative initiatives. A holistic and cost effective approach to IT asset protection delivers the right balance of support, service and consultation to global retail, banking, technology, and health care organizations. For more information on how Alchemy Security can help secure your organization, call us at 970-453-2827 or visit us at www.alchemysecurity.com.

About AlienVault
AlienVault is the champion of mid-size organizations that lack sufficient staff, security expertise, technology or budget to defend against modern threats. Our Unified Security Management (USM) platform provides all of the essential security controls required for complete security visibility, and is designed to enable any IT or security practitioner to benefit from results on day one. Powered by the latest AlienVault Labs Threat Intelligence and the Open Threat Exchange -- the world's largest crowd-sourced threat intelligence exchange -- AlienVault USM delivers a unified, simple and affordable solution for threat detection and compliance management. AlienVault is a privately held company headquartered in Silicon Valley and backed by Trident Capital, Kleiner Perkins Caufield & Byers, GGV Capital, Intel Capital, Sigma West, Adara Venture Partners, Top Tier Capital and Correlation Ventures. For more information visit www.AlienVault.com or follow us on Twitter.

About Latisys
Latisys is a leading provider of hybrid cloud hosting and data center solutions to medium-sized businesses, enterprise customers and government agencies. With a heritage serving business customers since 1994, and multiple high-density data centers across the United States -- and now in the United Kingdom -- Latisys offers a scalable outsourced IT infrastructure platform that provides customers with what they need, when they need it. As a client-centric company -- with state of the art data centers in Ashburn, Virginia, Chicago, Denver, Irvine, California and London -- Latisys is quickly becoming the IaaS platform of choice for companies that seek a truly flexible IT infrastructure partner. Call 1-866-956-9594, visit www.latisys.com or follow us on Twitter at twitter.com/latisys for additional information. All Systems Grow.

1) Gartner - Using SIEM for Targeted Attack Detection - published: March 12, 2014

** Subject to additional professional services engagement

LATISYS CONTACT:
Carter B. Cromley
Email Contact
(703) 861-7245

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

@ThingsExpo Stories
"IoT is going to be a huge industry with a lot of value for end users, for industries, for consumers, for manufacturers. How can we use cloud to effectively manage IoT applications," stated Ian Khan, Innovation & Marketing Manager at Solgeniakhela, in this SYS-CON.tv interview at @ThingsExpo, held November 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA.
Whether your IoT service is connecting cars, homes, appliances, wearable, cameras or other devices, one question hangs in the balance – how do you actually make money from this service? The ability to turn your IoT service into profit requires the ability to create a monetization strategy that is flexible, scalable and working for you in real-time. It must be a transparent, smoothly implemented strategy that all stakeholders – from customers to the board – will be able to understand and comprehe...
Everyone knows that truly innovative companies learn as they go along, pushing boundaries in response to market changes and demands. What's more of a mystery is how to balance innovation on a fresh platform built from scratch with the legacy tech stack, product suite and customers that continue to serve as the business' foundation. In his General Session at 19th Cloud Expo, Michael Chambliss, Head of Engineering at ReadyTalk, discussed why and how ReadyTalk diverted from healthy revenue and mor...
Extracting business value from Internet of Things (IoT) data doesn’t happen overnight. There are several requirements that must be satisfied, including IoT device enablement, data analysis, real-time detection of complex events and automated orchestration of actions. Unfortunately, too many companies fall short in achieving their business goals by implementing incomplete solutions or not focusing on tangible use cases. In his general session at @ThingsExpo, Dave McCarthy, Director of Products...
Information technology is an industry that has always experienced change, and the dramatic change sweeping across the industry today could not be truthfully described as the first time we've seen such widespread change impacting customer investments. However, the rate of the change, and the potential outcomes from today's digital transformation has the distinct potential to separate the industry into two camps: Organizations that see the change coming, embrace it, and successful leverage it; and...
20th Cloud Expo, taking place June 6-8, 2017, at the Javits Center in New York City, NY, will feature technical sessions from a rock star conference faculty and the leading industry players in the world. Cloud computing is now being embraced by a majority of enterprises of all sizes. Yesterday's debate about public vs. private has transformed into the reality of hybrid cloud: a recent survey shows that 74% of enterprises have a hybrid cloud strategy.
You have great SaaS business app ideas. You want to turn your idea quickly into a functional and engaging proof of concept. You need to be able to modify it to meet customers' needs, and you need to deliver a complete and secure SaaS application. How could you achieve all the above and yet avoid unforeseen IT requirements that add unnecessary cost and complexity? You also want your app to be responsive in any device at any time. In his session at 19th Cloud Expo, Mark Allen, General Manager of...
The 20th International Cloud Expo has announced that its Call for Papers is open. Cloud Expo, to be held June 6-8, 2017, at the Javits Center in New York City, brings together Cloud Computing, Big Data, Internet of Things, DevOps, Containers, Microservices and WebRTC to one location. With cloud computing driving a higher percentage of enterprise IT budgets every year, it becomes increasingly important to plant your flag in this fast-expanding business opportunity. Submit your speaking proposal ...
DevOps is being widely accepted (if not fully adopted) as essential in enterprise IT. But as Enterprise DevOps gains maturity, expands scope, and increases velocity, the need for data-driven decisions across teams becomes more acute. DevOps teams in any modern business must wrangle the ‘digital exhaust’ from the delivery toolchain, "pervasive" and "cognitive" computing, APIs and services, mobile devices and applications, the Internet of Things, and now even blockchain. In this power panel at @...
Major trends and emerging technologies – from virtual reality and IoT, to Big Data and algorithms – are helping organizations innovate in the digital era. However, to create real business value, IT must think beyond the ‘what’ of digital transformation to the ‘how’ to harness emerging trends, innovation and disruption. Architecture is the key that underpins and ties all these efforts together. In the digital age, it’s important to invest in architecture, extend the enterprise footprint to the cl...
Bert Loomis was a visionary. This general session will highlight how Bert Loomis and people like him inspire us to build great things with small inventions. In their general session at 19th Cloud Expo, Harold Hannon, Architect at IBM Bluemix, and Michael O'Neill, Strategic Business Development at Nvidia, discussed the accelerating pace of AI development and how IBM Cloud and NVIDIA are partnering to bring AI capabilities to "every day," on-demand. They also reviewed two "free infrastructure" pr...
Businesses and business units of all sizes can benefit from cloud computing, but many don't want the cost, performance and security concerns of public cloud nor the complexity of building their own private clouds. Today, some cloud vendors are using artificial intelligence (AI) to simplify cloud deployment and management. In his session at 20th Cloud Expo, Ajay Gulati, Co-founder and CEO of ZeroStack, will discuss how AI can simplify cloud operations. He will cover the following topics: why clou...
"Dice has been around for the last 20 years. We have been helping tech professionals find new jobs and career opportunities," explained Manish Dixit, VP of Product and Engineering at Dice, in this SYS-CON.tv interview at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
More and more brands have jumped on the IoT bandwagon. We have an excess of wearables – activity trackers, smartwatches, smart glasses and sneakers, and more that track seemingly endless datapoints. However, most consumers have no idea what “IoT” means. Creating more wearables that track data shouldn't be the aim of brands; delivering meaningful, tangible relevance to their users should be. We're in a period in which the IoT pendulum is still swinging. Initially, it swung toward "smart for smar...
The Internet of Things will challenge the status quo of how IT and development organizations operate. Or will it? Certainly the fog layer of IoT requires special insights about data ontology, security and transactional integrity. But the developmental challenges are the same: People, Process and Platform and how we integrate our thinking to solve complicated problems. In his session at 19th Cloud Expo, Craig Sproule, CEO of Metavine, demonstrated how to move beyond today's coding paradigm and sh...
We are always online. We access our data, our finances, work, and various services on the Internet. But we live in a congested world of information in which the roads were built two decades ago. The quest for better, faster Internet routing has been around for a decade, but nobody solved this problem. We’ve seen band-aid approaches like CDNs that attack a niche's slice of static content part of the Internet, but that’s it. It does not address the dynamic services-based Internet of today. It does...
In his keynote at 18th Cloud Expo, Andrew Keys, Co-Founder of ConsenSys Enterprise, provided an overview of the evolution of the Internet and the Database and the future of their combination – the Blockchain. Andrew Keys is Co-Founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life sett...
The WebRTC Summit New York, to be held June 6-8, 2017, at the Javits Center in New York City, NY, announces that its Call for Papers is now open. Topics include all aspects of improving IT delivery by eliminating waste through automated business models leveraging cloud technologies. WebRTC Summit is co-located with 20th International Cloud Expo and @ThingsExpo. WebRTC is the future of browser-to-browser communications, and continues to make inroads into the traditional, difficult, plug-in web ...
20th Cloud Expo, taking place June 6-8, 2017, at the Javits Center in New York City, NY, will feature technical sessions from a rock star conference faculty and the leading industry players in the world. Cloud computing is now being embraced by a majority of enterprises of all sizes. Yesterday's debate about public vs. private has transformed into the reality of hybrid cloud: a recent survey shows that 74% of enterprises have a hybrid cloud strategy.
WebRTC is the future of browser-to-browser communications, and continues to make inroads into the traditional, difficult, plug-in web communications world. The 6th WebRTC Summit continues our tradition of delivering the latest and greatest presentations within the world of WebRTC. Topics include voice calling, video chat, P2P file sharing, and use cases that have already leveraged the power and convenience of WebRTC.