Redington Limited has announced a strategic partnership with Picus Security. This collaboration extends the availability of Picus Security's highly acclaimed Security Control Validation Platform to a wider range of customers through Redington's extensive partner network, which comprises over 40,000 channel partners.
By joining forces with Picus Security, a recognized leader in the field of Breach and Attack Simulation technology, Redington aims to enhance customers' access to advanced security solutions. The Picus platform empowers organizations to measure the effectiveness of their security controls by simulating real-world cyber threats supplying actionable mitigations to address gaps in prevention and detection coverage.
R Venkatesh, President, Technology Solution Group, Redington Limited, “We are excited to embark on this strategic collaboration with Picus Security to bring their cutting-edge Security Validation Platforms to our extensive partner network. This collaboration reinforces Redington's commitment to providing innovative and robust security solutions to our customers. Together, we aim to empower organizations across industries with advanced tools to enhance their cyber resilience and effectively mitigate evolving threats.”
H Kalra, Regional Sales Director, India & SAARC Picus Security said, “We are delighted to join forces with Redington Limited in this strategic alliance, as it allows us to extend the availability of the Picus Security Validation Platform to a wider customer base in India. Redington's extensive partner network provides us with an unparalleled opportunity to deliver our advanced Breach and Attack Simulation technology to organizations seeking to measure and enhance their threat readiness. Together, we are committed to equipping businesses with the outcomes they need to keep pace with the latest threats, get the best ROI from their investments in security controls, and automate otherwise manual validation processes.”
The Picus Security Validation Platform provides a holistic view of security risks within and outside corporate networks. It is comprised of five licensable products:
● Security Control Validation: Simulates real-world cyber threats such as ransomware, to measure and help optimize the effectiveness of security controls to prevent and detect attacks.
● Attack Path Validation: Assesses an organization's security posture from an "assume breach" perspective, identifying high-risk attack paths to critical systems and users through lateral movement and evasive actions.
● Detection Rule Validation: Analyses the health and performance of SIEM detection rules, ensuring reliable threat alerts for SOC teams and the elimination of false positives.
● Attack Surface Validation: Enhances attack surface visibility with a consolidated and up-to-date view of an organization’s assets and supplies risk-related insights to guide vulnerability prioritization and endpoint security hygiene.
● Cloud Security Validation: Identifies cloud security misconfigurations and overly permissive identity and access management policies by auditing cloud workloads in AWS, Azure and GCP and by simulating cloud-specific attacks.
See What’s Next in Tech With the Fast Forward Newsletter
Tweets From @varindiamag
Nothing to see here - yet
When they Tweet, their Tweets will show up here.