The alliance aims to develop integrated security systems and share threat intelligence, and lists partners including Google, Cloudflare, CrowdStrike, SentinelOne and Microsoft as founding members. Top cybersecurity vendors have joined Mandiant’s newly launched Cyber Alliance Program, formed to help develop integrated security systems and share threat intelligence.The alliance, announced this week, is open to partners offering a wide variety of applications for endpoint, network, and cloud security, as well as identity, authentication, security information, and event management.Mandiant is no stranger to cybersecurity partnerships. In April, it announced a partnership with CrowdStrike, in a deal that will allow Mandiant to use the CrowdStrike Falcon endpoint protection platform and subscription offerings for its own incident response and consulting services. Mandiant will also be working to integrate its offerings with Google Cloud Platform, when its acquisition by the cloud giant closes as expected later this year. “Mandiant has been building a strong partner integration ecosystem for years and we’ve re-envisioned our partner program from the ground up,” said Marshall Heilman, chief technology officer at Mandiant, in a blog post. The launch of the alliance will allow Mandiant and its partners to merge threat intelligence, validation, incident response, and managed services through product platforms, Heilman said.Partnership benefits of the Mandiant Cyber Alliance Program include access to threat intelligence, technical integration into the Mandiant Advantage platform, exclusive sponsorship, and partner opportunities at Mandiant mWISE events, among others. Mandiant’s flagship partners include: Cloudflare, CrowdStrike, Google Cloud, InnerActiv, Interos, IronNet, Microsoft, Netskope, Nozomi Networks, Nucleus Security, SentinelOne, SimSpace, SnapAttack and Trellix, among others.Mandiant opens managed defense beta program to customersA new beta program for Mandiant’s managed detection and response (MDR) service, called Managed Defense, also leverages partnerships to enhance the offering’s capabilities.Open to select CrowdStrike Falcon and SentinelOne Singularity Endpoint customers, the beta program offers 24/7 access to Mandiant cybersecurity experts for alert monitoring, prioritization and investigation.“Elite partners like SentinelOne and CrowdStrike enable us to evolve our Managed Defense service and deliver highly adaptable and intelligence-led solutions that allow organizations to maximize current technology investments and strengthen their cyber defenses,” said Dave Baumgartner, executive vice president of Managed Solutions at Mandiant, in a press release.Mandiant Managed Defense is a MDR service driven by Mandiant frontline expertise and threat intelligence. The company’s defenders hunt across endpoints, network, email, cloud and operational technology infrastructure Related content news Google launches Google Threat Intelligence at RSA Conference The new addition to Google Cloud Security is designed to give security teams information to inform approaches to protecting against external threats, managing attack surfaces, and mitigating digital risks. By Sascha Brodsky May 06, 2024 4 mins Google Cloud Functions Cloud Security Security Software brandpost Sponsored by Elastic Search + RAG: The 1-2 punch transforming the modern SOC with AI-driven security analytics AI is modernizing how SOCs function, triaging countless alerts down to a handful of attacks that matter most. By Mike Nichols, Product for Security at Elastic May 06, 2024 3 mins Artificial Intelligence how-to Download the Zero Trust network access (ZTNA) enterprise buyer’s guide From the editors of our sister publication Network World, this enterprise buyer’s guide helps network and security IT staff understand what ZTNA can do for their organizations and how to choose the right solution. By Josh Fruhlinger and steve_zurier May 06, 2024 1 min Zero Trust Access Control Network Security news Germany blames Russian hackers for months-long cyber espionage The attacks by Russia-backed Fancy Bear used an Outlook exploit to compromise several German officials’ accounts. By Shweta Sharma May 06, 2024 4 mins Advanced Persistent Threats Hacker Groups PODCASTS VIDEOS RESOURCES EVENTS SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe