Troye and Arctic Wolf join forces

Issue 2/3 2023 News & Events, Information Security, Security Services & Risk Management


Helen Kruger.

Troye has announced a strategic partnership with Arctic Wolf to enable Troye to provide customers with enhanced cybersecurity solutions and services that help protect their businesses from advanced cyber threats.

Arctic Wolf’s cloud-native security operations platform provides Troye’s customers with 24/7 monitoring, detection, and response capabilities. The platform uses machine learning and behavioural analytics to detect and respond to threats in real-time, ensuring that customers are protected from cyberattacks before they can cause significant harm.

Commenting on the partnership, Helen Kruger, MD of Troye says “Arctic Wolf’s expertise in security operations aligns with our mission to help our customers keep their businesses secure and productive. This partnership will allow us to enhance our cybersecurity offerings and deliver the peace of mind that our customers deserve.”

Troye’s cybersecurity solutions and services, combined with Arctic Wolf’s security operations platform will provide customers with a comprehensive security solution that protects against a range of threats, including malware, ransomware, and phishing attacks.

“Arctic Wolf is excited for the opportunity to support Troye’s efforts to expand their product portfolio by offering our security operations solutions, a critical capability that many of their customers are specifically requesting,” says Johnny Ellis, Director, EMEA Channels, Arctic Wolf.

“Cyberattacks threaten companies of every size, and organisations are increasingly seeing the need for external security operations expertise, especially when they don’t have the in-house cybersecurity talent to manage their evolving security needs,” he concludes.

For more information, contact Troye, +27 11 705 2757, helen@troye.co.za, www.troye.co.za




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Africa’s opportunity to shape the future of human-centred AI
AI & Data Analytics Security Services & Risk Management
Across the Global South, countries are not yet locked into decades of legacy AI systems, energy-intensive infrastructure, or governance frameworks designed for a different technological era. That creates something rare in technology development: a cleaner slate.

Read more...
AURA appoints Taryn Winer as global head of people
News & Events Security Services & Risk Management
Following its €13,5 million Series B funding round last year and accelerating international expansion, particularly across the United States, AURA has appointed Taryn Winer as global head of people.

Read more...
Gallagher Security releases new fence controllers
Perimeter Security, Alarms & Intruder Detection News & Events
Gallagher Security has announced the release of its new F5 and F6 Fence Controllers, marking the latest generation of enhanced-safety, monitored-pulse fence technology, designed to meet the demands of modern security environments.

Read more...
Paxton set to launch game-changing new system
Paxton Access Control & Identity Management News & Events
Access control is evolving fast. Installers and end users are looking for systems that are simple to install, easy to manage remotely, and flexible enough to scale. In response, Paxton is exploring how emerging technologies can reshape access control.

Read more...
95% do not have full trust in cybersecurity vendors
Information Security Security Services & Risk Management
Trust in cybersecurity vendors is fragile, difficult to measure, and increasingly shaping risk posture at both operational and board levels. Lack of verifiable transparency undermines cybersecurity decision-making, according to Sophos-backed research.

Read more...
The impact of misguided viral campaigns
News & Events Training & Education
For many years, traditional media have been perceived as slower, more inflexible, and less responsive compared to digital platforms. But in an ecosystem flooded with content, its value is becoming clearer: verification, context, and accountability.

Read more...
Understanding the Shared Responsibility Model
Infrastructure Security Services & Risk Management
While the cloud can certainly be a growth enabler in many ways, it can also introduce new security risks. Companies want to have a clear understanding of where their security duties end and where their cloud service provider’s begin.

Read more...
NEC XON secures mobile provider’s hybrid identities
NEC XON Access Control & Identity Management Information Security Commercial (Industry)
For a leading South African telecommunications operator, identity protection has become a strategic priority as identity-centric attacks proliferate across the industry. The company faced mounting pressure to secure both human and non-human identities across complex hybrid environments.

Read more...
Gallagher Security strengthens KwaZulu-Natal presence
Gallagher News & Events Integrated Solutions
Gallagher Security has reinforced its commitment to the KwaZulu-Natal region with its Command the Future event. The full-day event welcomed over 100 channel partners, end users, and consultants, marking Gallagher’s third major event in Durban.

Read more...
Rise in malicious insider threat reports
News & Events Information Security
Mimecast Study finds 46% of SA organisations report a rise in malicious insider threat reports over the past year: reveals disconnect between security awareness and technical controls as AI-powered attacks accelerate.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.