cybersecurity
Showing posts with label cybersecurity. Show all posts

Palo Alto Networks Launches Prisma Browser for Business to Secure Small Business Workspaces

Friday, March 27, 2026


For many small businesses today, work happens inside a browser. From managing finances to communicating with customers and using AI tools, the browser has quietly become the modern office. But with that shift comes a growing risk, especially as cyber threats and AI misuse become more sophisticated.

Recognizing this gap, Palo Alto Networks has introduced a new solution designed specifically for smaller teams that need enterprise-level protection without added complexity.

A Secure Workspace Built for Modern Small Businesses

The company has officially launched Prisma Browser for Business, a browser-based workspace that combines productivity and security into a single platform.

Designed for small business environments, the solution allows teams to:
  • Access business apps securely from any device
  • Manage tools and workflows in one place
  • Stay protected against evolving cyber threats

It also includes built-in controls for AI usage, helping prevent sensitive data from being unintentionally exposed.

Why Browser Security Is Now a Business Priority

Small businesses rely heavily on browser-based tools. On average, teams use around 36 applications directly within their browsers.

However, this growing dependence comes with risk. A significant percentage of companies have experienced security incidents that originated in the browser, making it a key attack surface for cybercriminals.

At the same time, the rapid adoption of AI tools adds another layer of complexity. Without proper controls, employees may unknowingly expose sensitive data or trigger unintended actions through AI-powered platforms.

Bringing Enterprise-Level Protection to Smaller Teams

Anupam Upadhyaya, Senior Vice President of Product at Palo Alto Networks, explained that for many small businesses, the browser now functions as the central workplace.

He noted that traditional browsers were not designed to handle modern cyber threats or prevent AI-related data leaks. With this new solution, the company aims to deliver the same level of protection used by large enterprises, but in a format that is simple to deploy and manage.

Key Features That Power a Safer Workspace

Prisma Browser for Business introduces several capabilities tailored for small business needs:

Streamlined Workspace Management

Business owners can easily configure and control the applications and AI tools their teams rely on, ensuring secure access across devices and locations.

Built-In Threat Protection

The platform proactively blocks phishing attempts, ransomware, and fraud threats before they can impact operations.

AI Usage Controls

Teams can take advantage of AI tools for productivity while maintaining safeguards that prevent sensitive information from being shared or misused.

Addressing a Critical Gap in the Market

According to Anurag Agrawal, Analyst at TechAisle, Palo Alto Networks is solving a key challenge for small businesses. By combining secure access with productivity tools, the platform enables teams to work from anywhere without compromising security.

This approach is especially relevant as remote and hybrid work setups continue to expand.

Enterprise-Grade Security, Simplified

Palo Alto Networks is known for processing billions of threats daily for some of the world’s largest organizations. With Prisma Browser for Business, that same level of protection is now accessible to smaller companies.

Currently available in the United States, the platform offers a 30-day free trial and can be set up quickly, allowing businesses to secure their operations in just a few steps.

A Smarter Way to Work Securely

As cyber risks continue to evolve, small businesses can no longer rely on basic tools to protect their operations. Investing in a secure workspace is becoming essential, not just for protection but also for maintaining productivity and trust.

For growing teams looking to simplify their tech stack while strengthening security, solutions like Prisma Browser for Business offer a practical starting point. It combines ease of use with robust protection, helping businesses stay focused on growth without compromising safety.
Read More

ManageEngine Endpoint Central Launches EDR and Zero Trust Access for Smarter Endpoint Security


As cyber threats become more advanced and workforces grow more distributed, endpoint security is quickly becoming a top priority for businesses. Devices are no longer just tools for productivity. They are now key entry points for cyberattacks, making it critical for organizations to rethink how they manage and secure them.

That is where ManageEngine is making its next move. By expanding its flagship platform, the company is helping enterprises simplify security while staying ahead of increasingly sophisticated threats.

Endpoint Central Evolves into a Unified Security Platform

Endpoint Central, ManageEngine’s unified endpoint management and security platform, now includes endpoint detection and response and secure private access capabilities.

These additions aim to strengthen endpoint protection through:
  • AI-powered threat detection
  • Automated remediation
  • Zero Trust-based access to internal applications

The goal is simple. Bring endpoint management, security, and access control into one system instead of relying on disconnected tools.

Why Businesses Are Moving Away from Fragmented Security Tools

Modern enterprises are managing a growing number of devices across remote and hybrid environments. This shift has made endpoints both operational hubs and prime targets for attacks.

Many organizations still depend on separate tools for device management, threat detection, and remote access.

This fragmented setup creates inefficiencies and security gaps. At the same time, attackers are leveraging AI to scale threats like ransomware, making traditional defenses less effective.

Even VPN-based access is becoming outdated, as it often grants broad network access once credentials are verified. This increases risk, especially if those credentials are compromised.

According to Chirag Mehta of Constellation Research, endpoint security is now a race against time. Detecting and containing threats early, while enforcing stricter access controls, is critical to minimizing damage.

How EDR and Secure Private Access Strengthen Protection

By integrating EDR and secure private access into Endpoint Central, ManageEngine enables IT and security teams to work from a single layer of endpoint intelligence.

This unified approach delivers faster threat detection and investigation through shared telemetry, immediate remediation actions such as patching and configuration updates, and streamlined workflows using a single lightweight agent and centralized console.

Mathivanan Venkatachalam of ManageEngine shared that as environments become more distributed, endpoints are now the main enforcement point for both security and access control. With these new capabilities, organizations can move from reactive defense to more autonomous and proactive security operations.

Key Features That Drive Autonomous Endpoint Security

The latest update enhances Endpoint Central with several advanced capabilities:

Deep Visibility and Attack Tracking

The platform correlates endpoint data across processes, files, and network activity. It maps behaviors to frameworks like MITRE ATT&CK, helping teams trace attacker movement and investigate incidents faster.

AI-Powered Threat Detection

Behavioral analytics and artificial intelligence detect complex threats, including file-less malware and evasive attack techniques, allowing earlier intervention.

Unified Response and Ransomware Recovery

Security teams can isolate compromised devices, terminate threats, restore encrypted files, and deploy patches from a single console. This reduces downtime and strengthens system resilience.

AI-Guided Investigations

The system surfaces relevant data and attack patterns to assist analysts, making threat hunting faster and more accessible even for smaller teams.

Context-Aware Secure Access

Secure private access uses identity-based policies to verify every access request, ensuring only trusted devices can connect to critical applications.

Industry Recognition Validates Platform Performance

Endpoint Central continues to receive strong validation from leading industry bodies. Its malware protection capabilities have earned certification from AV-Comparatives, highlighting its low system impact and efficient performance.

ManageEngine has also been named a Challenger in the 2026 Gartner Magic Quadrant, recognized as a Leader in the IDC MarketScape and the only vendor awarded Customers’ Choice in the 2025 Gartner Peer Insights Voice of the Customer. These recognitions reinforce the platform’s growing role in the endpoint security space.

Availability and Deployment Options

The new EDR and secure private access features are now available as add-ons for Endpoint Central. Organizations can deploy the platform either on-premises or as a SaaS solution, depending on their IT requirements.

Currently, Endpoint Central supports more than 31,000 organizations worldwide, managing endpoints across Windows, macOS, Linux, ChromeOS, and mobile devices.

A Smarter Approach to Endpoint Security

As cyber threats continue to evolve, businesses need security solutions that are not only powerful but also streamlined. ManageEngine’s latest update reflects a broader shift toward unified, AI-driven platforms that reduce complexity while improving response times.

For organizations looking to modernize their endpoint security strategy, adopting an integrated approach like Endpoint Central can help close gaps, improve visibility, and build stronger resilience against today’s threats.
Read More

Palo Alto Networks Asia Pacific Cybersecurity Predictions 2024

Friday, January 26, 2024

Cybersecurity Predictions 2024

Palo Alto Networks, the global cybersecurity leader, has recently released its 2024 cybersecurity predictions for Asia Pacific – 5 key insights from industry leaders to help organisations ensure a secure future.

2023 saw organisations witness unprecedented levels of cybercrime. Palo Alto Networks’ State of Cybersecurity Report found that the Philippines experienced the highest number of disruptive attacks in Southeast Asia, with 29% of local organisations experiencing a 50% or more increase in incidents. Furthermore, the firm also received the most number of calls to its incident response team ever in October 2023. Cybercriminals have used ransomware to target critical infrastructures and found novel techniques to exploit emerging technologies like generative AI to ill-effect. 

Predicting cybersecurity trends for 2024 will be especially important if organisations want to get ahead of modern cyberattackers. With stakes higher than ever, organisations need to take a holistic approach – accounting for macroeconomic factors, emerging technologies, and cloud risks among others. 

Ian Lim, Regional Chief Security Officer, Palo Alto Networks, said, “In 2023, we’ve seen mature organisations, who invest heavily in cybersecurity, still falling victim to debilitating cyberattacks. This is due to the tenacity and ingenuity of attackers who exploit cyber hygiene issues or find novel ways to compromise legacy defences. Another key reason for these breaches lies in the complexity of security capabilities in most modern organisations. They use an average of 31.58 disparate security tools to protect their highly interconnected and innovative environments. The lack of correlation and the level of noise generated by these tools creates immense visibility gaps and dampens their ability for detection and response.” 

He added, “Going into 2024, highly motivated cybercriminals, nation state attackers and hacktivists will continue to innovate, expand and exploit – not much we can do to slow that down. However, we could and should definitely address the complexity of our security capabilities with AI to make them more effective and cost efficient.” 

Here are the five cybersecurity trends to watch out for in 2024:

1. Hacktivism: the modern crusade 

2023 saw numerous instances of broadcast events being disrupted by climate activists. This year, this protest could take the shape of a cyber-first-campaign. With significant events like the Olympics, the Euros, and regional elections coming up, hacktivists will look to further their cause to audiences in the millions. Previously, a high level of technical expertise was necessary, but the cybercrime-as-a-service model has lowered this threshold. Now, it only takes an extremely motivated activist with sufficient funds.

Tumultuous geopolitical climate will provide opportunities for hacktivists to gain notoriety for their group and sympathy for their cause. Most hacktivist activity is via Distributed-Denial-of-Service (DDoS) attacks. For example, during the G20 Summit in India, more than 30 groups of hacktivists from neighbouring countries attacked more than 600 websites of government and private entities through DDoS attacks, defacements, and data leaks. 

In 2024, organisations should evaluate their risk profile according to the evolving threat landscape and ensure coverage not only for financially motivated attacks but also for hacktivism and nation-state attacks. 

2. AI’s role in cybersecurity will evolve, for good and bad 

Since ChatGPT’s launch in October 2022, there have been concerns worldwide regarding its potential to democratise cybercrime. Despite having guardrails to prevent malicious applications, a few creative prompts can get ChatGPT to generate near flawless phishing emails that sound “weirdly human” at immense scale. We’ve seen attackers use Gen AI in novel ways like deepfake and voice technology to scam banks out of millions. Companies adopting Gen AI must be wary about the vulnerabilities of model poisoning, data leakage, prompt injection attacks, etc. Attackers will continue to exploit innovation gaps with the increased use of Gen AI for legitimate use cases.

Hence, one of the AI Cybersecurity trends we expect to see in 2024 is the maturation on how we protect enterprise-level use of Gen AI. This involves making sure that security controls, vulnerability management and threat monitoring activities are embedded through the entire lifecycle of AI development projects. Gen AI will further embed itself into cybersecurity capabilities. Its ability to summarise, weed through noise, and give concise summaries of security events is far greater than a human analyst’s (especially at the scale a modern SOC operates). With LLMs getting better by the day, we are bound to see more sophisticated applications that move beyond just being a clever and occasionally-hallucinating chatbot. 

3. Operational technology will remain the low-hanging fruit

Operational Technology is the heart of any industrial organisation. As the primary generator of revenue, OT systems must have a high level of cyber maturity. However many organisations still believe OT environments are protected by an air gap, whereas IT/OT convergence has resulted in OT being more connected than ever to IT and also, in many cases, to the cloud. This has expanded the attack surface and greatly increased the risk to OT networks, without the investment in cyber controls. 

A breach of OT systems can not only result in lost revenue, but also potentially, injuries or loss of life. A cyber secure OT environment is also a safe and reliable OT environment. A Zero Trust architecture will protect the most critical OT systems from threats, while allowing organisations to focus on their digital transformation. 2024 will see organisations invest in OT cyber security maturity to protect their most important business systems and manage the increased risk to an acceptable level.

4. Consolidation to enable the next frontier in cybersecurity 

Unit 42’s Cloud Threat Report (Volume 7) found that on average, security teams take approximately 6 days to resolve a security alert, with 60% of organisations taking longer than 4 days. In a threat landscape where attackers only require a few hours to find and exploit vulnerabilities, 4-6 days is just way too long. Organisations with disparate security tools that are not well integrated have a harder time deploying automation and orchestration. This is a major setback to reducing the mean time to detect and the mean time to respond. 

In addition to the lacklustre threat response, organisations with siloed solutions are having a hard time securing their rapid digital transformation initiatives. Alongside macroeconomic headwinds and workforce challenges, enterprises are looking to consolidate their vendor spread and reduce complexities. Put simply, it is way easier to manage the cybersecurity stack if there is one point of contact when a crisis inevitably strikes. Over the long term, it reduces costs and yields better results. This is thanks to the increased visibility and seamless integration that comes with a unified security offering. More organisations are waking up to these benefits and thus 2024 will see customers focus on reducing complexities and turning to consolidated cybersecurity stacks. 

5. Securing multi and hybrid cloud will be a focus 

Per the State of Cybersecurity survey, APAC organisations are moving large chunks of their infrastructure to the cloud, with 44% adjusting their cybersecurity strategy to adopt cloud security. Early adopters of cloud typically start with a single hyperscaler. Naturally, the single cloud model would adopt native security tools from their chosen Cloud Service Provider (CSP). Through the course of time they experience issues and outages that can only be addressed by adopting a multi or hybrid cloud strategy. This multicloud journey would most likely necessitate a review on their existing cloud security paradigm as native CSP security tools do not seamlessly translate to different CSPs. 

In 2024, organisations that have to contend with multi or hybrid cloud projects would move to establishing a more unified approach to security when dealing with more than one cloud provider. Rationalising cloud security tools across the entire development lifecycle will also be a focus as this provides much higher visibility, correlation and security monitoring.

Read More
...