With the new Superman movie soaring into theaters, it’s a good reminder that even heroes need the right tools to fight their battles—and so do MSPs. This week, our roundup is packed with powerful upgrades, bold moves, strategic integrations, and more that can help you save the day (and maybe your margins). Plus, we include new research on the rise in evasive tactics from cyber criminals and what you need to know, a CEO replacement, and a new education cred.
It’s time to suit up and scan the skies—there’s a lot happening across the channel. Happy reading!
Products and Solutions
Barracuda Launches Barracuda Entra ID Backup Premium
Barracuda Networks launched Barracuda Entra ID Backup Premium to safeguard Microsoft Entra ID environments from accidental and malicious data loss. Microsoft retains Entra ID data for only 30 days and recommends third-party backups. Barracuda Entra ID Backup Premium enables organizations to recover data well beyond Microsoft’s default limits.
Barracuda Entra ID Backup Premium is integrated with the BarracudaONE platform and protects 13 identity components needed to maintain a secure and resilient Microsoft Entra ID environment. These include users, groups, roles, administrative units, app registrations, audit logs, authentication and access policies, BitLocker keys, device management configurations, and more.
No installation, configuration, or manual patching are required for the cloud-based solution. MSPs can connect their Microsoft 365 tenant and start backing up Entra ID data in minutes. Advanced search, real-time monitoring, detailed audit logs, and five levels of role-based access control provide the visibility and control needed to manage identity protection efficiently and securely, according to the company.
Barracuda Entra ID Backup Premium supports both single and multitenant environments and is available now. MSPs can purchase the solution as a standalone offering or as a subscription with Barracuda Cloud-to-Cloud Backup.
Sophos Expands Visibility of Internal Exposures
Sophos expanded its Sophos Managed Risk capabilities with Internal Attack Surface Management (IASM), with technology powered by Tenable Nessus scanners. With this addition, Sophos Managed Risk now provides comprehensive visibility into internal and external weaknesses that threat actors could exploit.
The latest release of Sophos Managed Risk introduces unauthenticated internal scanning, which assesses a system from the perspective of an external attacker without user credentials or privileged access. This enables organizations to identify and mitigate high-risk vulnerabilities, such as open ports, exposed services, and misconfigurations.
Features of IASM for Sophos Managed Risk include regular automated vulnerability scanning to identify weaknesses affecting assets within the network, and AI-powered prioritization of vulnerabilities and guidance on patching and remediation priorities.
The new IASM capabilities are accessible through Sophos Managed Risk, an extended service with Sophos MDR, and available now for all new and existing Sophos Managed Risk customers, with no changes to licenses or pricing. MSPs can deploy Tenable Nessus scanners and schedule automated scans in their Sophos Central console.
OpenText Introduces a Secure Personal AI Assistant
The latest addition to the OpenText Aviator suite, MyAviator, is a secure, personal digital worker that enables individuals to securely interact with their own documents, extract insights, and generate content—all within the OpenText ecosystem.
“OpenText is committed to secure information management for the digital knowledge worker—it is how we will introduce new paradigms of work, and deliver faster, smarter, and more personalized outcomes for our customers,” said Mark J. Barrenechea, CEO and CTO of OpenText, in a press statement. “Our strategy is grounded in unifying organizations through secure information, service management, and process automation, powered by AI. We intend to help organizations thrive by creating a limitless digital workforce.”
Keeper Security Debuts Model Context Protocol AI Agent Integration for Secrets Management …
Keeper Security, a privileged access management provider, announced Model Context Protocol (MCP) AI Agent Integration for Keeper Secrets Manager. (MCP is an open standard designed to enable AI systems—especially large language models—to interact seamlessly with external tools, data sources, and services.) The new capability enables organizations to automate workflows through AI agents while enforcing strict security, access, and compliance controls.
The integration enables customers to securely connect and authorize their own third-party AI tools, such as local or cloud-based assistants, to interact with Keeper Secrets Manager under controlled conditions. With Keeper’s MCP, these tools can retrieve or manage secrets stored in the Keeper Vault without compromising Keeper’s zero-trust and zero-knowledge architecture.
“AI agents are becoming powerful tools for operational efficiency, but their access to sensitive data must be governed by strong controls,” said Craig Lurey, CTO and co-founder of Keeper Security. “With our Model Context Protocol integration, organizations can adopt AI responsibly while ensuring their digital assets remain protected.”
With this integration, Keeper Secrets Manager users can allow AI assistants to perform tasks such as generating secure passwords, retrieving and updating secrets, managing file attachments, and running system health checks—all within a secure, policy-driven environment.
… and Bitwarden Launches an MCP Server for Secure Integration Between AI Agents and Password Manager
Bitwarden, a provider of password, passkey, and secrets management, launched a new MCP server, enabling secure integration between AI agents and Bitwarden Password Manager.
The Bitwarden MCP server operates on a user’s local machine, keeping all client interactions within the local environment and minimizing exposure to external threats. The MCP server integrates with the Bitwarden Command Line Interface (CLI), a secure infrastructure for managing Bitwarden vault operations from the command prompt. Users may also choose a self-hosted deployment for greater control over system configuration and data residency.
The Bitwarden MCP server equips AI systems with controlled access to credential workflows, ensuring password generation and retrieval without compromising encryption or exposing sensitive information.
The MCP server is available now through the Bitwarden GitHub repository, with expanded distribution and documentation planned.
Partnerships & Integrations
Huntress Announces Collaboration with Microsoft
Huntress announced a collaboration with Microsoft to integrate Huntress security products with Microsoft 365 Business Premium and Microsoft Defender for Endpoint.
With seamless integration into Microsoft environments, Huntress’ purpose-built cybersecurity solutions unlock protection for endpoints, identities, and employees, backed by a 24/7 SOC.
“Huntress was founded to make enterprise-grade security accessible to all businesses,” said Chris Bisnett, CTO at Huntress, in a press statement. “Businesses worldwide trust Microsoft’s ecosystem, but often don’t fully use its potential due to limited resources or expertise. We deliver the technology and integrations needed to unlock the full value of Microsoft’s security solutions, empowering businesses of all sizes to operate securely and confidently in an evolving threat landscape.”
“With cyberattacks growing in both volume and complexity, businesses face mounting pressure to protect their environments with limited resources,” said Microsoft’s Steve Dispensa, corporate vice president of security, in a press statement. “Huntress’ integrations with Microsoft 365 Business Premium and Microsoft Defender for Endpoint empower organizations to not only strengthen their security posture but also fully benefit from their Microsoft security investments. Together, we’re equipping businesses worldwide to prioritize growth and innovation without compromising on security.”
M&A – MSPs
Carlsbad, Calif.-based Glass Box Technology, an MSP and IT solution integrator founded in 2012, announced a strategic investment from Panther Equity Group and Genesis Park. John Marler, a seasoned technology leader with deep industry expertise, also joined the company as CEO.
“In today’s rapidly evolving landscape, technology alone isn’t enough to deliver sustainable results,” said Marler. “True success comes from combining the right technology with the right people and process. That’s why continuous, high-touch managed services are becoming essential to achieving consistent, long-term outcomes for clients.”
“Thirteen years ago, we started Glass Box with a hands-on mindset and a deep commitment to earning our clients’ trust,” said Sharon de Luna, co-founder, in a press statement. “We’ve built this company around customers we believe in and employees who share our values. Change is constant in IT, and staying ahead is essential. That’s why we’re excited to partner with David [Eshaghian, managing partner at Panther Equity Group], Gina [Luna, managing partner at Genesis Park], and their teams, who not only believe in what we’ve built but are equally passionate about what comes next. With the addition of John Marler as CEO, we’re entering a new chapter—Glass Box 2.0—and we look forward to what we’ll accomplish together.”
Industry
ISACA Introduces New Designation: CISA Associate
ISACA announced a new designation, CISA Associate. The designation recognizes individuals who have passed the Certified Information Systems Auditor (CISA) exam, but do not yet have the required experience to become CISA certified.
“The CISA Associate designation was created to help students and graduates make a first big step in the IT audit profession and help organizations around the world in establishing more trust in digital ecosystems,” said Shannon Donahue, ISACA chief content and publishing officer, in a press statement.
Academic students who have fewer than five years of experience in IT auditing can pursue this designation when registering for the CISA exam. After passing the CISA exam, there is a $25 application fee to apply for the designation. There are no CPE requirements. However, those who receive the designation must maintain an active ISACA membership at any level to keep the designation. The designation expires after four years or after becoming CISA certified. Candidates will need the required work experience to earn the full CISA credential.
SonicWall Announces Elevate 2025: Regional Partner Events
SonicWall announced the return of Elevate, its regional partner event, which will relaunch this September as a series of roadshows in 25 cities across North America, Latin America, EMEA, and APJ. These in-person events bring together SonicWall executives, product experts, and channel partners.
Net-new partners who join the SecureFirst Partner Program during the event, schedule an onboarding meeting, and complete the onboarding process will receive a free TZ80 firewall and three months of the Managed Protection Service Suite, including a Cloud Secure Edge license, delivered directly to their address.
People
Timus Networks, a SASE platform for MSPs, appointed co-founder and former CTO Ahmet Polat as CEO, effective immediately. Polat succeeds Pinar Ormeci, who led the company through a defining period of product and partner growth. “This transition marks more than just a leadership change,” said co-founder and Chairman M. Tuğrul Tekbulut, in a press statement. “It reflects our evolution as a company, built by and for technologists who understand what MSPs really need. Ahmet has championed our product vision from day one and is the ideal leader to take this vision forward. We thank Pinar for laying the foundation and look ahead with great confidence.”
By the Numbers
New WatchGuard Research Reveals Attackers Are Defying Traditional Defenses
Evasive endpoint threats and email-borne malware threats are both on the rise, according to WatchGuard Technologies’ latest Internet Security Report for the first quarter of 2025.
The report reveals a 171% (quarter-over-quarter) increase in total unique malware detections, the highest the WatchGuard Threat Lab has recorded. Pair this with a significant increase in “zero day malware,” and this signals a sharp rise in evasive threats designed to bypass traditional security systems that rely on patterns to detect threats, according to the report.
The AI War Is Here
Notably, proactive machine learning detection offered by IntelligentAV (IAV) surged 323%, highlighting its critical role in detecting advanced malware. Gateway AntiVirus (GAV) hits increased by 30%, and Transport Layer Security (TLS) malware increased by 11 points, underscoring encrypted channels as a primary attack vector. The dramatic surge in IAV and heightened TLS malware emphasize attackers’ reliance on obfuscation and encryption, challenging conventional defenses. The findings stress the need for enhanced visibility and adaptive security to combat these sophisticated, concealed threats at scale.
The Threat Lab also observed a 712% increase in new malware threats on endpoints, after a consistent decline over the past three quarters. The top malware threat on the endpoint was LSASS dumper, a credential stealer used for tasks such as logging onto systems, managing passwords, and creating access tokens.
“The latest findings in the Q1 2025 Internet Security Report seem to support a larger cybersecurity industry trend: the AI war is here. Attackers are increasingly relying on social engineering and phishing techniques supercharged by AI tools,” said Corey Nachreiner, chief security officer for WatchGuard Technologies, in a press statement. “Attackers now have the capabilities to launch highly targeted campaigns at scale using automated pipelines, emphasizing the need for organizations to adopt robust, precise, and powerful security measures to stay ahead of the advancements in AI and the evolving cyber risks.”