{"id":3700,"date":"2021-08-26T12:55:55","date_gmt":"2021-08-26T10:55:55","guid":{"rendered":"https:\/\/partnernews.sophos.com\/en-us\/?p=3700"},"modified":"2022-04-22T15:05:48","modified_gmt":"2022-04-22T13:05:48","slug":"sophos-acquisitions-what-you-need-to-know","status":"publish","type":"post","link":"https:\/\/partnernews.sophos.com\/en-us\/2021\/08\/products\/sophos-acquisitions-what-you-need-to-know\/","title":{"rendered":"UKIN Tech News Update: Sophos Acquisitions \u2013 What you need to know"},"content":{"rendered":"<p>The cybercriminals never rest, and at Sophos neither do we. We are constantly on the lookout for exciting and innovative technology to take the fight to the cyber crooks.\u00a0 This month has been a particularly busy one as Sophos have acquired three separate security vendors to bolster our portfolio of products and services. Let\u2019s take a look at these purchases in more detail.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-3701 alignleft\" src=\"https:\/\/partnernews.sophos.com\/en-us\/wp-content\/uploads\/sites\/3\/2021\/08\/Capsule8.png\" alt=\"\" width=\"344\" height=\"187\" srcset=\"https:\/\/partnernews.sophos.com\/en-us\/wp-content\/uploads\/sites\/3\/2021\/08\/Capsule8.png 1071w, https:\/\/partnernews.sophos.com\/en-us\/wp-content\/uploads\/sites\/3\/2021\/08\/Capsule8.png?resize=300,163 300w, https:\/\/partnernews.sophos.com\/en-us\/wp-content\/uploads\/sites\/3\/2021\/08\/Capsule8.png?resize=768,418 768w, https:\/\/partnernews.sophos.com\/en-us\/wp-content\/uploads\/sites\/3\/2021\/08\/Capsule8.png?resize=1024,557 1024w\" sizes=\"auto, (max-width: 344px) 100vw, 344px\" \/><\/p>\n<p>The first vendor we\u2019ll look at is Capsule8. We are very excited to announce the acquisition of a pioneer and market leader of runtime visibility, detection and response for Linux production servers and containers covering both on-prem and cloud workloads. Driven by the dramatic growth in cloud platforms, Linux has become the dominant operating system for server workloads. Capsule8\u2019s high-performance, low-impact design is ideal for Linux servers, especially those used for high-scale workloads, production infrastructure and storing critical business data.<\/p>\n<p>The Capsule8 technology is being integrated into our Adaptive Cybersecurity Ecosystem (ACE), providing powerful and lightweight Linux server and cloud container security within this open platform. We will also feature Capsule8 technology in our Extended Detection and Response (XDR) solutions, Intercept X server protection products, and Sophos Managed Threat Response (MTR) and Rapid Response services. This will further expand and enhance Sophos\u2019 data lake and deliver continuous, fresh intelligence for advanced threat hunting, security operations and customer protection practices.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-3702 size-full alignright\" src=\"https:\/\/partnernews.sophos.com\/en-us\/wp-content\/uploads\/sites\/3\/2021\/08\/Braintrace.png\" alt=\"\" width=\"343\" height=\"187\" srcset=\"https:\/\/partnernews.sophos.com\/en-us\/wp-content\/uploads\/sites\/3\/2021\/08\/Braintrace.png 343w, https:\/\/partnernews.sophos.com\/en-us\/wp-content\/uploads\/sites\/3\/2021\/08\/Braintrace.png?resize=300,164 300w\" sizes=\"auto, (max-width: 343px) 100vw, 343px\" \/><\/p>\n<p>Next up we have Braintrace. Their Network Detection and Response (NDR) technology provides deep visibility into network traffic patterns, including encrypted traffic, without the need for Man-in-the-Middle (MitM) decryption. The Braintrace technology will also serve as the launchpad to collect and forward third-party event data from firewalls, proxies, virtual private networks (VPNs), and other sources. These additional layers of visibility and event ingestion will significantly improve threat detection, threat hunting and response to suspicious activity, especially for MTR and XDR customers that do not use Sophos Firewall.<\/p>\n<p>We will deploy Braintrace\u2019s NDR technology as a virtual machine, fed from traditional observability points such as a Switched Port Analyzer (SPAN) port or a network Test Access Point (TAP) to inspect both north-south traffic at boundaries or east-west traffic within networks. These deployments help discover threats inside any type of network, including those that remain encrypted, serving as a complement to the decryption capabilities of Sophos Firewall.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-3703 alignleft\" src=\"https:\/\/partnernews.sophos.com\/en-us\/wp-content\/uploads\/sites\/3\/2021\/08\/Refactr.png\" alt=\"\" width=\"345\" height=\"187\" \/><\/p>\n<p>Finally, we have Refractr. Their highly innovative DevSecOps automation platform bridges the gap between DevOps and cybersecurity. Automation not only improves speed, but it also improves consistency, reduces errors, and perhaps most importantly, allows us to better scale the scarce attention of security operations teams everywhere.<\/p>\n<p>The Refactr platform will not only help automate incident response, but effectively anything that has an API. In the months to come, you will see Sophos use this new technology to automate response and recovery playbooks, along with a multitude of IT, security, and DevSecOps processes through playbooks and pipelines that will be created and shared by us, our partners, and our customers.\u00a0In addition, Refactr will increase the operational efficiency of the MTR team including better scalability and faster response times. The MTR team will utilise Refactr to better automate the handling of incidents, with an emphasis on automating the response to an incident or automating the enrichment of incident data.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The cybercriminals never rest, and at Sophos neither do we. We are constantly on the lookout for exciting and innovative technology to take the fight to the cyber crooks.\u00a0 This month has been a particularly busy one as Sophos have [&hellip;]<\/p>\n","protected":false},"author":69,"featured_media":3000001190,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"advanced_seo_description":"","jetpack_seo_html_title":"","jetpack_seo_noindex":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[2],"tags":[170,17,16],"coauthors":[117],"class_list":["post-3700","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-products","tag-acquisition","tag-sophos-news","tag-technical-news"],"jetpack_featured_media_url":"https:\/\/partnernews.sophos.com\/en-us\/wp-content\/uploads\/sites\/3\/2020\/04\/featured-image-UKI-tech-update-Partner-app-icon-1600x960-1.png","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/partnernews.sophos.com\/en-us\/wp-json\/wp\/v2\/posts\/3700","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/partnernews.sophos.com\/en-us\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/partnernews.sophos.com\/en-us\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/partnernews.sophos.com\/en-us\/wp-json\/wp\/v2\/users\/69"}],"replies":[{"embeddable":true,"href":"https:\/\/partnernews.sophos.com\/en-us\/wp-json\/wp\/v2\/comments?post=3700"}],"version-history":[{"count":4,"href":"https:\/\/partnernews.sophos.com\/en-us\/wp-json\/wp\/v2\/posts\/3700\/revisions"}],"predecessor-version":[{"id":4764,"href":"https:\/\/partnernews.sophos.com\/en-us\/wp-json\/wp\/v2\/posts\/3700\/revisions\/4764"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/partnernews.sophos.com\/en-us\/wp-json\/"}],"wp:attachment":[{"href":"https:\/\/partnernews.sophos.com\/en-us\/wp-json\/wp\/v2\/media?parent=3700"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/partnernews.sophos.com\/en-us\/wp-json\/wp\/v2\/categories?post=3700"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/partnernews.sophos.com\/en-us\/wp-json\/wp\/v2\/tags?post=3700"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/partnernews.sophos.com\/en-us\/wp-json\/wp\/v2\/coauthors?post=3700"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}