AI advances in N-able's SOC solutions

N-able introduces AI-driven detection features for its security operations centre (SOC) aimed at improving the identification of advanced cyber threats.

N-able has introduced new AI capabilities for its Security Operations Centre (SOC), delivered through enhancements to its Adlumin Managed Detection and Response (MDR) offering. The updates include detection technologies such as Anomalous PowerShell, DNS Disruption, and the Single-Event Process Execution (SEPE) AI model, aimed at improving detection of stealthy cyber threats.

Modern attackers often use legitimate tools such as PowerShell and DNS for malicious activity. Traditional security approaches can struggle to identify this type of behaviour, particularly when attacks extend beyond the endpoint. N-able’s 2026 State of the SOC Report highlights that a significant proportion of attacks occur across network, perimeter, cloud, or identity layers rather than solely on endpoints. The new capabilities are designed to improve visibility across identity, endpoint, and network activity to help identify suspicious behaviour.

Anomalous PowerShell Detection provides monitoring of PowerShell activity to identify potentially malicious command execution, including techniques where legitimate system tools are used for malicious purposes. It analyses PowerShell executions across monitored environments to detect unusual patterns.

DNS Disruption Alert uses machine learning to identify unusual DNS activity, including potential command-and-control (C2) communication, beaconing behaviour, and distributed denial-of-service (DDoS) patterns. It is intended to support detection of suspicious network communications that may not be identified through traditional endpoint monitoring.

The SEPE AI framework focuses on identifying unusual Windows process behaviour by analysing attributes such as process name, file path, and parent-child process relationships. It is designed to provide contextual information to support SOC analysis.

These updates form part of N-able’s broader approach to integrating AI capabilities into its security offerings, with the aim of supporting earlier detection of threats, automating parts of security workflows, and reducing operational workload for security teams.

The developments reflect the increasing complexity of cyber threats and the limitations of traditional detection methods, particularly in environments requiring visibility across multiple layers including endpoint, identity, and network activity.

inforcer introduces Copilot Manager to support MSPs in delivering AI services, including features related to monitoring and managing Shadow AI usage.
Guardz outlines how AI is influencing cybersecurity, with the report highlighting identity-related issues and vulnerabilities affecting MSPs, based...

Kaseya launches Agentic IT management platform

Posted 1 day ago by Sophie Milburn
Kaseya has introduced an autonomous IT management system that uses AI and unified data to support IT operations and security management.
Westcon-Comstor has integrated its value-added services into the Microsoft Marketplace, aiming to support partner operations and improve scalability.

Opus Technology achieves B Corp certification

Posted 1 day ago by Sophie Milburn
Opus Technology has earned B Corp status, joining a global community aiming for ethical and sustainable business practices.
Cisco has announced its Sovereign Critical Infrastructure portfolio targeting organisations in Europe, the Middle East, and Africa.
CloudClevr is entering a new growth phase following the completion of its integration programme, heading into FY27 with a strengthened operational...

Westcon-Comstor strengthens ties at RISK Conference 2026

Posted 1 week ago by Sophie Milburn
Westcon-Comstor outlines its role in RISK Conference 2026, emphasising regional collaboration and cybersecurity advancements in the Balkans.