SecBI to Support Orange Polka in Augmenting Managed Cyber Services

SecBI, which offers solutions for cyber threat detection and network traffic analysis, has announced an agreement with Orange Polska (WSE: OPL), a convergent operator in the Polish market and member of the Orange Group, in the field of network security.

The agreement includes active cooperation to broaden Orange’s network security competence and extends to joint marketing activities and network security knowledge sharing, including joint participation in industry events and conferences. The agreement will also allow both sides to exchange technology knowledge through reference visits, share information from conducted research, and undertake actions to further enhance mutual market leadership.

The strategic partnership was signed following a proof-of-concept (PoC) by SecBI running several use cases — ranging from advanced malware detection to Bitcoin mining — that resulted in the identification of numerous threats.

“This partnership is aimed at enhancing our current portfolio of cybersecurity services, particularly in SOC-as-a-Service, breach response, triaging, and hunting,” said Tomasz Matuła, Director of ICT Infrastructure and Cybersecurity at Orange Polska. “SecBI’s Autonomous Investigation™ technology allows us to offer new services such as threat hunting as a service. In addition, the visibility provided by SecBI’s full scope narrative of each attack, coupled with barely any false positive alerts, greatly increases our teams’ efficiency.”

Gilad Peleg, CEO of SecBI, said, “We are thrilled that Orange quickly understood the value of our technology and decided to embrace it on both a technical and commercial level. We’re confident that our Autonomous Investigation technology will boost Orange’s added value in the managed security market with the efficiencies it brings to the SOC, as well as innovative threat hunting services.”

SecBI’s Autonomous Investigation™ technology is based on unsupervised machine learning that analyzes network traffic to detect complex and stealthy cybersecurity threats. It instantly unveils an attack’s full scope, accelerating detection and threat hunting, and optimizing response and mitigation. Security analysts are presented with complete attack narratives including actionable information, giving them visibility of all users, devices and infection points involved in an attack, enabling rapid and accurate remediation.