Welcome!

News Feed Item

Latisys Expands Threat and Compliance Management Services Suite

Alchemy Security's Virtual Security Operations Center and AlienVault's Unified Security Management Platform Underpins Latisys' Compliant IT Infrastructure Services Delivery Platform

ASHBURN, VA -- (Marketwired) -- 05/27/14 -- In response to increasing demand for highly secure and audit-ready IT infrastructure services, Latisys, a leading provider of hybrid cloud hosting and data center solutions, today announced a significant expansion to its suite of managed security and professional services designed to holistically address enterprise risk & compliance management challenges faced by organizations today.

Latisys has partnered with Alchemy Security, a leading information security solutions provider with recognized expertise in security information event management (SIEM) deployment and operations, to expand its suite of Threat and Compliance Management Services (TCMS).

Based on Alchemy's Virtual Security Operations Center (vSOC) and leveraging AlienVault's Unified Security Management platform and Open Threat Exchange (OTX), Latisys' TCMS suite forms the basis of a growing portfolio of managed security & compliance solutions designed to provide security controls to enterprises hosting their infrastructure on Latisys' unified Cloud-Enabled Systems Infrastructure (CESI) platform.

Latisys' TCMS establishes a critical consolidation point for an organization's security monitoring. It enables enterprises to continuously evaluate the risk profile of their IT assets by intelligently detecting, analyzing, prioritizing, and alerting on new and emerging threats and vulnerabilities as they arise, and it addresses other core components required for robust security strategies. Latisys' TCMS encompasses:

  • Real-Time Monitoring and Correlation
  • Threat Intelligence
  • File Integrity Monitoring
  • Vulnerability Scanning
  • Incident Management Support
  • Compliance Tracking and Reporting
  • Auditor Response Support
  • Network and Application Penetration Testing*
  • Web-application and source code reviews*
  • PCI DSS ASV scanning*
  • Compliance Gap Analysis*
  • Risk Assessments*
  • Policy Development*

According to Gartner, organizations are failing at early breach detection, with more than 70% of breaches going undetected by the breached organization.1 Traditional defense-in-depth approaches are simply not sufficient to detect targeted attacks leading enterprises to look towards holistic services providers for comprehensive threat & risk management solutions that understand the threat landscape and what to do about new and emerging threats.

"Leading service providers are growing their threat management capabilities as large and mid-size enterprises become increasingly targeted," said Wendy Nather, Research Director, Security, for 451 Research. "The new threat and compliance management services from Latisys -- based on Alchemy and AlienVault -- have a great advantage in that they support customer autonomy and privacy. The SIEM license ownership and logs stay with the customer, which is an important requirement for many organizations."

"Managing information security risk has become a critical factor in any company's success or failure," said Pete Stevenson, CEO of Latisys. "Malicious, sophisticated attacks are on the rise and their impact has become more serious and costly for organizations that lack adequate protection. Our enterprise customers depend on us to properly augment their risk management strategies, meet compliance requirements and optimize their business processes. That's part of serving as an extension of their team."

"Latisys recognizes the importance of offering and integrating a broad range of professional and managed security services that would be very difficult for a customer to cost-effectively replicate in their own environment," said Joe Bonnell, Founder & CEO of Alchemy Security. "It's really all about the right combination of tools, processes and people -- working seamlessly in a solution tailored to each client's unique security posture. By providing a comprehensive set of professional services and managed solutions required to fully meet their security and compliance objectives, Latisys' customers benefit from Alchemy's deep expertise in driving robust security solutions, while addressing the cost effective availability solutions that Latisys regularly provides their customers."

"AlienVault is recognized globally for its ability to provide real-time threat data and is an established solution for thousands of companies and government institutions," said Justin Endres, SVP Worldwide Sales at AlienVault. "Alchemy Security is a premier partner with a deep understanding of SIEM technologies. We are very pleased to have been selected by Alchemy as the exclusive provider of unified security management and crowd sourced threat intelligence to Latisys who is focused on providing customers with a holistic view of threats to their environment and the intelligence to rapidly respond."

Latisys' unified CESI platform is audited to ensure alignment with the physical controls and information security policies for key regulatory standards and government requirements including:

  • The Payment Card Industry (PCI) Data Security Standard (DSS) 2.0
  • The Health Insurance Portability and Accountability Act (HIPAA) report for physical controls
  • The Gramm-Leach-Bliley Act (GLBA) -- otherwise known as the Financial Services Modernization Act of 1999

Overall, nearly 1,000 enterprises and government organizations rely on Latisys as their trusted provider of critical IT infrastructure solutions underpinning their business. With a Net Promoter score of 46, Latisys leads the IaaS industry in customer satisfaction.

About Alchemy Security
Alchemy Security provides strategic and enduring information security solutions for compliance, security intelligence, and business imperative initiatives. A holistic and cost effective approach to IT asset protection delivers the right balance of support, service and consultation to global retail, banking, technology, and health care organizations. For more information on how Alchemy Security can help secure your organization, call us at 970-453-2827 or visit us at www.alchemysecurity.com.

About AlienVault
AlienVault is the champion of mid-size organizations that lack sufficient staff, security expertise, technology or budget to defend against modern threats. Our Unified Security Management (USM) platform provides all of the essential security controls required for complete security visibility, and is designed to enable any IT or security practitioner to benefit from results on day one. Powered by the latest AlienVault Labs Threat Intelligence and the Open Threat Exchange -- the world's largest crowd-sourced threat intelligence exchange -- AlienVault USM delivers a unified, simple and affordable solution for threat detection and compliance management. AlienVault is a privately held company headquartered in Silicon Valley and backed by Trident Capital, Kleiner Perkins Caufield & Byers, GGV Capital, Intel Capital, Sigma West, Adara Venture Partners, Top Tier Capital and Correlation Ventures. For more information visit www.AlienVault.com or follow us on Twitter.

About Latisys
Latisys is a leading provider of hybrid cloud hosting and data center solutions to medium-sized businesses, enterprise customers and government agencies. With a heritage serving business customers since 1994, and multiple high-density data centers across the United States -- and now in the United Kingdom -- Latisys offers a scalable outsourced IT infrastructure platform that provides customers with what they need, when they need it. As a client-centric company -- with state of the art data centers in Ashburn, Virginia, Chicago, Denver, Irvine, California and London -- Latisys is quickly becoming the IaaS platform of choice for companies that seek a truly flexible IT infrastructure partner. Call 1-866-956-9594, visit www.latisys.com or follow us on Twitter at twitter.com/latisys for additional information. All Systems Grow.

1) Gartner - Using SIEM for Targeted Attack Detection - published: March 12, 2014

** Subject to additional professional services engagement

LATISYS CONTACT:
Carter B. Cromley
Email Contact
(703) 861-7245

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Latest Stories
You think you know what’s in your data. But do you? Most organizations are now aware of the business intelligence represented by their data. Data science stands to take this to a level you never thought of – literally. The techniques of data science, when used with the capabilities of Big Data technologies, can make connections you had not yet imagined, helping you discover new insights and ask new questions of your data. In his session at @ThingsExpo, Sarbjit Sarkaria, data science team lead ...
SYS-CON Events announced today the Kubernetes and Google Container Engine Workshop, being held November 3, 2016, in conjunction with @DevOpsSummit at 19th Cloud Expo at the Santa Clara Convention Center in Santa Clara, CA. This workshop led by Sebastian Scheele introduces participants to Kubernetes and Google Container Engine (GKE). Through a combination of instructor-led presentations, demonstrations, and hands-on labs, students learn the key concepts and practices for deploying and maintainin...
Security, data privacy, reliability, and regulatory compliance are critical factors when evaluating whether to move business applications from in-house, client-hosted environments to a cloud platform. Quality assurance plays a vital role in ensuring that the appropriate level of risk assessment, verification, and validation takes place to ensure business continuity during the migration to a new cloud platform.
Extracting business value from Internet of Things (IoT) data doesn’t happen overnight. There are several requirements that must be satisfied, including IoT device enablement, data analysis, real-time detection of complex events and automated orchestration of actions. Unfortunately, too many companies fall short in achieving their business goals by implementing incomplete solutions or not focusing on tangible use cases. In his general session at @ThingsExpo, Dave McCarthy, Director of Products...
WebRTC is bringing significant change to the communications landscape that will bridge the worlds of web and telephony, making the Internet the new standard for communications. Cloud9 took the road less traveled and used WebRTC to create a downloadable enterprise-grade communications platform that is changing the communication dynamic in the financial sector. In his session at @ThingsExpo, Leo Papadopoulos, CTO of Cloud9, discussed the importance of WebRTC and how it enables companies to focus...
Security, data privacy, reliability and regulatory compliance are critical factors when evaluating whether to move business applications from in-house client hosted environments to a cloud platform. In her session at 18th Cloud Expo, Vandana Viswanathan, Associate Director at Cognizant, In this session, will provide an orientation to the five stages required to implement a cloud hosted solution validation strategy.
UpGuard has become a member of the Center for Internet Security (CIS), and will continue to help businesses expand visibility into their cyber risk by providing hardening benchmarks to all customers. By incorporating these benchmarks, UpGuard's CSTAR solution builds on its lead in providing the most complete assessment of both internal and external cyber risk. CIS benchmarks are a widely accepted set of hardening guidelines that have been publicly available for years. Numerous solutions exist t...
Up until last year, enterprises that were looking into cloud services usually undertook a long-term pilot with one of the large cloud providers, running test and dev workloads in the cloud. With cloud’s transition to mainstream adoption in 2015, and with enterprises migrating more and more workloads into the cloud and in between public and private environments, the single-provider approach must be revisited. In his session at 18th Cloud Expo, Yoav Mor, multi-cloud solution evangelist at Cloudy...
A critical component of any IoT project is what to do with all the data being generated. This data needs to be captured, processed, structured, and stored in a way to facilitate different kinds of queries. Traditional data warehouse and analytical systems are mature technologies that can be used to handle certain kinds of queries, but they are not always well suited to many problems, particularly when there is a need for real-time insights.
Verizon Communications Inc. (NYSE, Nasdaq: VZ) and Yahoo! Inc. (Nasdaq: YHOO) have entered into a definitive agreement under which Verizon will acquire Yahoo's operating business for approximately $4.83 billion in cash, subject to customary closing adjustments. Yahoo informs, connects and entertains a global audience of more than 1 billion monthly active users** -- including 600 million monthly active mobile users*** through its search, communications and digital content products. Yahoo also co...
"Software-defined storage is a big problem in this industry because so many people have different definitions as they see fit to use it," stated Peter McCallum, VP of Datacenter Solutions at FalconStor Software, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
Extreme Computing is the ability to leverage highly performant infrastructure and software to accelerate Big Data, machine learning, HPC, and Enterprise applications. High IOPS Storage, low-latency networks, in-memory databases, GPUs and other parallel accelerators are being used to achieve faster results and help businesses make better decisions. In his session at 18th Cloud Expo, Michael O'Neill, Strategic Business Development at NVIDIA, focused on some of the unique ways extreme computing is...
"We're bringing out a new application monitoring system to the DevOps space. It manages large enterprise applications that are distributed throughout a node in many enterprises and we manage them as one collective," explained Kevin Barnes, President of eCube Systems, in this SYS-CON.tv interview at DevOps at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
Amazon has gradually rolled out parts of its IoT offerings in the last year, but these are just the tip of the iceberg. In addition to optimizing their back-end AWS offerings, Amazon is laying the ground work to be a major force in IoT – especially in the connected home and office. Amazon is extending its reach by building on its dominant Cloud IoT platform, its Dash Button strategy, recently announced Replenishment Services, the Echo/Alexa voice recognition control platform, the 6-7 strategic...
The best-practices for building IoT applications with Go Code that attendees can use to build their own IoT applications. In his session at @ThingsExpo, Indraneel Mitra, Senior Solutions Architect & Technology Evangelist at Cognizant, provided valuable information and resources for both novice and experienced developers on how to get started with IoT and Golang in a day. He also provided information on how to use Intel Arduino Kit, Go Robotics API and AWS IoT stack to build an application tha...