LevelBlue & SentinelOne forge alliance for enhanced security operations

LevelBlue has partnered with SentinelOne to deliver AI-driven security solutions, aimed at enhancing detection and response capabilities.

LevelBlue, a provider of managed security services, has entered into a global strategic partnership with SentinelOne, a company specialising in AI security. The collaboration is focused on delivering integrated, intelligence-driven security operations across organisations globally.

The partnership combines SentinelOne’s AI capabilities, including its Purple AI and Singularity Platform, with LevelBlue’s threat intelligence-led operations and Indigo security platform. The aim is to improve visibility, accelerate detection, and support response in complex digital environments.

Under the partnership, LevelBlue will act as a preferred global partner provider for SentinelOne, delivering managed detection and response (MDR) and managed security information and event management (SIEM) services. The relationship also includes incident response (IR), supporting organisations in preparing for, responding to, and recovering from cyber incidents.

The collaboration is intended to integrate AI-driven detection with human-led investigation and response. This approach is designed to reduce dwell time, improve remediation speed, and support cyber resilience. It also integrates SentinelOne’s SIEM analytics with LevelBlue’s Indigo platform to support security operations across different environments.

SentinelOne provides data ingestion, normalisation, and analytics, while LevelBlue focuses on investigation, response, and service delivery. The combined approach is intended to address the challenge of linking detection with response.

The offering aligns telemetry across endpoints, cloud workloads, and identities, with continuous monitoring and analyst-led triage. This supports earlier detection of threats, coordinated response, and visibility across hybrid environments.

As part of the partnership, LevelBlue has a team of more than 300 digital forensics and incident response professionals. The team supports organisations in responding to cyber incidents, including ransomware, nation-state activity, and large-scale breaches. Its incident response services include CREST-certified teams and retainer-based engagement models.
Kaseya reveals insights into the shifting MSP sector, spotlighting AI as pivotal amidst rising competition and economic pressures.

Cato Networks joins Westcon-Comstor's AWS Marketplace

Posted 4 days ago by Sophie Milburn
Westcon-Comstor has added Cato Networks to its AWS Marketplace programme, expanding cloud procurement options for partners.
WatchGuard Technologies has launched a new endpoint security portfolio that introduces changes to traditional EDR licensing models.
Hammer AI Works is an end-to-end ecosystem designed to support AI adoption across organisations.
Kyndryl has introduced Agentic Service Management to support the transition from traditional IT operations to AI-driven workflows.

Adapting cybersecurity certification for AI integration

Posted 5 days ago by Sophie Milburn
ISC2 has updated its certification exam guidance to include AI security concepts, reflecting changes in cybersecurity roles and responsibilities.
N-able enhances its Technology Alliance Program with Zensec's incident response and Atomatik's hyperautomation capabilities.
Lenovo introduces advancements to Lenovo 360, aiming to enhance predictability and growth for partners.