During this fiscal year, Sophos intends to incorporate Capsule8 technology into its own offerings.
Acquired for an undisclosed amount, Sophos will integrate Capsule8 technology, which is geared at Linux cyber security, into its Adaptive Cybersecurity Ecosystem to provide Linux server and cloud container security later this fiscal year, for an undisclosed fee.
Capsule8 technology will also be included to Sophos Managed Threat Response and Rapid Response services, as well as its Extended Detection and Response solutions, Intercept X server protection products.
Commenting on the development, Dan Schiappa, Chief Product Officer at Sophos, said “Comprehensive server protection is a crucial component of any effective cyber security strategy that organisations of all sizes are increasingly focused on, especially as more workloads move to the cloud,”
“With Capsule8, Sophos is delivering advanced, differentiated solutions to protect server environments, and expanding its position as a leading global cybersecurity provider.”
According to its research arm SophosLabs, it believes that it will be able to provide greater protection against hackers using Tactics, Techniques and Procedures (TTP) that particularly target Linux systems, which often go after server software exploits, by leveraging Capsule8’s Linux cyber security technology.
Schiappa said “Attackers today are incredibly aggressive and nimble as they adapt their TTPs to focus on the easiest, largest or fastest-growing opportunities. As more organisations shift to Linux servers, adversaries have noticed and they are adapting and customising their approaches to attack these systems,”
“To stay protected, organisations must factor in a strong, but lightweight layer of Linux security that automatically integrates and shares intelligence with endpoint, network and other security layers and platforms within an estate.”
He added “We will provide this industry-leading capability and strategically important visibility and detection by combining Capsule8 with our Adaptive Cybersecurity Ecosystem products and services, greatly enhancing the ability to find and eliminate suspicious activity before it becomes malicious,”