Trading

watchTowr Redefines Approach On Attack Surface Management Via Orange Collaboration


KUALA LUMPUR, Cybersecurity company, watchTowr has announced a partnership with Orange Business, a global network and digital integrator, to bring the watchTowr Platform onboard as a key external attack surface management (EASM) solution for strategic customers across the Asia Pacific (APAC) region.

In a statement, watchTowr said this partnership will reinforce cybersecurity solutions offered through the group’s Orange Cyberdefense subsidiary.

watchTowr Vice President, APAC, Elvina Liow said today’s channel excels at providing services that help detect breaches and respond to attacks, but there is significant white space in preventing attacks.

‘That’s precisely what watchTowr offers: a platform to identify and validate exposures in customers’ attack surface before breaches happen. We also work closely with partners to support customers in effective remediation efforts.

‘By combining the power of our platform with Orange’s deep expertise in managed security services, we can deliver unmatched value to our c
ustomers, helping them strengthen their security postures,’ Liow said.

Meanwhile, Orange Business Head of Security, APAC, Philip Lee said: ‘Unlike legacy approaches that deliver ineffective audits or inaccurate assessments, the watchTowr Platform continuously validates ways hackers can gain access to a company’s systems.’

In addition, the company will work with Orange Business to further expand its presence in the APAC region and globally.

Orange Business will leverage its extensive value-added advisory and managed services in conjunction with its cybersecurity expertise secured by Orange Cyberdefense to accelerate the adoption of the watchTowr platform among its target enterprise customers.

Built by offensive security experts and backed by real-world research, the watchTowr Continuous Automated Red Teaming platform delivers true attack surface visibility across known and unknown assets and helps defenders quickly validate weaknesses and exposures before attacks occur.

Source: BERNAMA News Agency