
SonicWall Redefines Cybersecurity, Sets New Standard with Next Generation Network Security Solutions Built for MSPs
SINGAPORE - Media OutReach Newswire - 6 May 2025 - SonicWall today unveiled a full suite of products and services purpose-built to empower and meet the evolving needs of Managed Service Providers (MSPs) and their customers with end-to-end cyber protection and profitable service expansion. At the core of this unveiling are new next-generation mid-range and high-end firewalls (NGFW) built for medium-sized businesses with embedded advanced threat protection.
These new offerings include Managed Protection Security Services (MPSS) Firewall Management with 24/7 monitoring that allows MSPs of any size to offer managed firewall services backed by SonicWall's SonicSentry Network Operations Center (NOC) team. Delivered through the unified, cloud-native SonicPlatform , the service establishes a new industry standard by dramatically reducing cyber exposure, simplifying operations, and maximizing visibility, all backed by expert, always-on security teams and reinforced by a groundbreaking cyber warranty.
'SonicWall's new standard for cybersecurity marks a pivotal moment in our evolution as an innovator expanding into a platform-based cybersecurity leader,' said SonicWall President and CEO Bob VanKirk. 'As we continue to listen to our partners and evolve with their changing needs, we are consolidating fragmented tools into one secure, scalable, and smart platform. With this launch, we are bringing together industry-leading firewall threat performance, cloud-based ZTNA to replace legacy VPNs, co-managed NOC and SOC services and an industry-first cybersecurity warranty so MSPs have every tool they need to ensure the businesses they serve are safe, in a scalable and cost-effective way.'
Debasish Mukherjee, Vice President of Sales, APJ at SonicWall said, 'Across APJ, MSPs and mid-sized businesses are under constant pressure to protect diverse IT environments while navigating resource constraints. SonicWall's unified platform and co-managed services are purpose-built to support this reality - empowering partners to scale with confidence, deliver 24/7 protection, and unlock new revenue opportunities through simplified, enterprise-grade cybersecurity.'
Solutions for Simplified, Scalable Cybersecurity
SonicWall is bringing together the tools MSPs need to deliver layered, AI-driven security, from next-generation firewalls and endpoint protection to secure remote access and advanced policy control, managed in one intuitive interface.
Designed to eliminate fragmented tools and reduce operational complexity, SonicWall is making it easier than ever for MSPs to offer secure, scalable and smart solutions:
Secure: Gen 8 Firewalls (NSa 2800/3800): Mid-enterprise, high-performance NGFW built for more demanding SMB environments with advanced threat protection.
Zero Trust Network Access (ZTNA): Raising the bar relative to implementation and ease of use, with one-click ZTNA connector for secure, simple, policy-based access with dramatically improved network performance and security versus legacy VPN.
Managed Protection Security Services (MPSS): Backed by SonicSentry NOC team the new MPSS bundle extends our partner's bench with a team of network security professionals to ensure firewalls are configured, deployed and updated correctly to provide the best threat protection possible. MPSS is a must have service from SonicWall that will fast become the industry standard for firewall management.
Scalable: NSM 3.0: SaaS and on-premises platform offering unparalleled visibility and efficiency with harmonized cloud/on-box management.
Smart: SonicPlatform: A unified, cloud-native platform for centralizing management of all SonicWall appliances, services, and third-party integrations.
SonicWall AI for Monitoring & Insight (SAMI): Embedded AI/automation to streamline management, speed resolution, and reduce alert fatigue.
'Over the past two years, we've focused on listening to our partners and addressing their challenges as cyberattacks accelerate, response times lag, and cybersecurity solutions grow increasingly complex,' said SonicWall Chief Product Officer Peter Burke. 'As a result, we have made dramatic improvements to the features and scalability of our firewall management platform and integrated them into a unified platform for account, security and network management that should simplify use and make partners more efficient. By consolidating end-to-end management and delivering key capabilities for scale and security, we're empowering partners to focus on growth, expanding their services, increasing profitability, and delivering greater value to their customers.'
Peace of Mind with 24/7 Support and Industry-First Cyber Warranty
The launch includes enhanced support through SonicSentry, SonicWall's global Managed Extended Detection and Response (MXDR) team, and MPSS. Built for MSPs, these co-managed services allow them to profitably deepen their bench and extend their service capabilities with 24x7 monitoring, health checks, patch management, and optimized firewall deployment.
Security is no longer just about protection; it's about trust and resilience. When combined with SonicWall's partnership with Cysurance , SonicWall deployments can qualify for a tiered cyber warranty of up to $1 million, the industry's first offering of its kind. Managed deployments through MPSS double the coverage for participating customers.
'SonicWall's MPSS, will allow MSPs to deliver top-tier security to customers without the burden of constant firewall management,' said Meriplex Channel Manager Greg Starr. 'By offloading the complexities of firewall management, SonicWall partners will be able to deliver premium security services backed by 24/7 expert support and enhanced cyber warranty protection. This not only strengthens client trust but also opens new revenue opportunities for us as a partner, allowing us to scale and grow more efficiently.'
MSPs and SMBs Scale and Succeed
SonicWall's next-generation solutions are designed with the unique needs of MSPs in mind: Multi-Tenant Architecture: Manage multiple clients efficiently through one platform.
Flexible Subscription Licensing: Monthly/annual options support the MSSP model.
Ecosystem Integration: Seamless third-party integrations for operational efficiency.
End-to-End Coverage: From endpoint to edge, SonicWall delivers centralized protection and compliance.
With this comprehensive announcement, SonicWall continues its history of innovation providing products and services that support our channel partners need to scale securely, profitably, and with confidence.
For more information, visit: www.sonicwall.com .
Hashtag: #SonicWall
The issuer is solely responsible for the content of this announcement.
About SonicWall
SonicWall is a cybersecurity forerunner with more than 30 years of expertise and is recognized as the leading partner-first company. With the ability to build, scale and manage security across the cloud, hybrid and traditional environments in real-time, SonicWall provides seamless protection against the most evasive cyberattacks across endless exposure points for increasingly remote, mobile and cloud-enabled users. With its own threat research center, SonicWall can quickly and economically provide purpose-built security solutions to enable any organization—enterprise, government agencies and SMBs—around the world. For more information, visit www.sonicwall.com or follow us on Twitter , LinkedIn , Facebook and Instagram .
Hashtags

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles


Associated Press
14 hours ago
- Associated Press
Sunlight Real Estate Investment Trust ("Sunlight REIT") Interim Results for the Six Months Ended 30 June 2025
HONG KONG SAR - Media OutReach Newswire - 11 August 2025 - Henderson Sunlight Asset Management Limited (the 'Manager') announces the interim results of Sunlight REIT for the six months ended 30 June 2025 (the 'Reporting Period'). Sunlight REIT recorded a 4.8% year-on-year decline in revenue to HK$391.2 million for the Reporting Period. Net property income was down by 5.4% to HK$307.4 million and the cost-to-income ratio was 21.4%. Distributable income was relatively sturdy with a mild drop of 1.8% to HK$168.6 million, reflecting the positive impact from an approximately 14% savings in cash interest expense to HK$91.5 million. The Board has resolved to declare an interim distribution per unit of HK 9.1 cents, representing a payout ratio of 93.8% and an annualized distribution yield of 8.1% based on the closing price of HK$2.26 on the last trading day of the Reporting Period. At 30 June 2025, the appraised value of Sunlight REIT's real estate portfolio was HK$17,630.5 million. Total assets stood at HK$18,220.2 million, while its net assets attributable to unitholders came in at HK$12,634.1 million, implying a net asset value of HK$7.27 per unit. Operating Highlights The overall occupancy rate of Sunlight REIT's portfolio at 30 June 2025 was 89.2% as compared to 91.3% at 31 December 2024, of which the office occupancy rate dropped to 90.0%, while the retail occupancy rate came in at 87.6%. At 30 June 2025, the passing rent of the office portfolio declined mildly by 1.2% from six months ago to HK$31.7 per sq. ft., while that of the retail portfolio was stable at HK$65.5 per sq. ft. At 30 June 2025, the occupancy rate of Dah Sing Financial Centre was 90.6%, while its passing rent remained steady at HK$36.3 per sq. ft. As for the retail portfolio, Sheung Shui Centre Shopping Arcade recorded a lower occupancy rate of 87.0% at 30 June 2025, but its passing rent registered a slight improvement to HK$105.2 per sq. ft. Meanwhile, due to the departure of an education tenant in the second quarter of 2025, the occupancy rate of Metro City Phase I Property slipped to 87.1%, while its passing rent was HK$53.9 per sq. ft. Mr. Au Siu Kee, Alexander, Chairman of the Manager, said, 'Hong Kong's commercial property market has yet to benefit from a more stable economic setting as the ongoing headwinds remain stiff, and the pressure of negative rental reversion is likely to stay. However, we are delighted to report that the refinancing of borrowings maturing in the next 12 months is progressing smoothly with favourable indicative pricing, underscoring the financial strength of Sunlight REIT. In sum, while it is envisaged that operational hurdles are bound to persist, the possibility of lower funding costs may help alleviate pressure on distributable income.' Remarks: Attached financial highlights of 2025 interim results of Sunlight REIT. Financial Highlights of 2025 Interim Results (in HK$' million, unless otherwise specified) Note: The comparative figures are derived from the condensed interim financial statements for the 12 months ended 30 June 2024. Disclaimer: The information contained in this press release does not constitute an offer or invitation to sell or the solicitation of an offer or invitation to purchase or subscribe for units in Sunlight REIT in Hong Kong or any other jurisdiction. Hashtag: #SunlightREIT #REIT The issuer is solely responsible for the content of this announcement. About Sunlight REIT Listed on The Stock Exchange of Hong Kong Limited since 21 December 2006, Sunlight REIT (stock code: 435) is a real estate investment trust authorized by the Securities and Futures Commission, and constituted by the trust deed dated 26 May 2006 (as amended and restated) (the 'Trust Deed'). It offers investors the opportunity to invest in a diversified portfolio of 11 office and six retail properties in Hong Kong with a total gross rentable area of approximately 1.3 million sq. ft. The office properties are located in both core and decentralized business areas, while the retail properties are situated in regional transportation hubs, new towns and urban areas with high population density. About the Manager The Manager of Sunlight REIT is an indirect wholly-owned subsidiary of Henderson Land Development Company Limited. Its main responsibility is to manage Sunlight REIT and all of its assets in accordance with the Trust Deed in the sole interest of its unitholders.


Politico
16 hours ago
- Politico
Black Hat and DEF CON offer lessons for Congress
With help from John Sakellariadis Driving the day — After a week in Las Vegas talking to some of the top cybersecurity professionals in the country, your host compiled three key takeaways from Black Hat and DEF CON for federal lawmakers. HAPPY MONDAY, and welcome to MORNING CYBERSECURITY! John and I are back on the East Coast after Black Hat and DEF CON. By the end, I successfully convinced a small group of reporters to go to The Rainforest Cafe with me. It was a real bonding moment. Anyone else get into any fun side quests? Drop me a line at dnickel@ Follow POLITICO's cybersecurity team on X at @RosiePerper,@johnnysaks130,@delizanickel and @magmill95, or reach out via email or text for tips. You can also follow @POLITICOPro on X. Want to receive this newsletter every weekday? Subscribe to POLITICO Pro. You'll also receive daily policy news and other intelligence you need to act on the day's biggest stories. On The Hill HIGHLIGHTS — Cybersecurity professionals converged on Las Vegas last week for the back-to-back Black Hat and DEF CON cyber conferences. Top cyber experts from the private and public sectors highlighted some of the biggest challenges and innovations in the industry today, from the scope of U.S. adversaries' cyber capabilities to how federal cuts are impacting the country's cyber posture. — No target is 'too small': During the conference, the cybersecurity community detailed that foreign adversaries such as China have the hacking capabilities to cast a wide net in cyberspace. And no entity involved in vital U.S. defense operations is too small to be considered an attractive target for foreign hackers, according to a top NSA official. 'China's hacking resources outnumber those of the U.S. and allies combined, and China has stolen more corporate data from the United States than any other nation in the world,' said Bailey Bickley, chief of defense industrial base defense at the NSA's Cybersecurity Collaboration Center, which helps U.S. defense contractors protect their networks. Bickley said during a Black Hat keynote that many of the 'small companies' in the defense industrial base often 'think what they do is not important enough' to be targeted by Chinese-backed hacking groups. 'But when you have the significant resources like that to conduct mass-scanning and mass exploitation, there is no company and no target too small,' she said. Cybersecurity experts have long warned that any device connected to the internet can be a key gateway for hackers to breach a network. At DEF CON on Sunday, officials from the U.S. Coast Guard disclosed last year's discovery of a little-known device that potentially left ports across the country exposed to Chinese hacking. Kenny Miltenberger, a lieutenant commander for a Coast Guard cyber protection teams, told John that many of the port operators weren't even aware of the devices, cellular modems embedded in cranes and support infrastructure made by a Chinese company. 'The good news story here is we're finding a lot of vulnerabilities on cranes, and our partners are mitigating those,' Miltenberger said on the Coast Guard's work to help operators find and plug cyber vulnerabilities. — 'Too close to the bone': Meanwhile, experts spoke out about the impacts of the Trump administration's cuts to federal cyber agencies, including CISA and the Pentagon's Cyber Command and Defense Information Systems Agency. 'You've cut assets at CISA and in other places … we're less able to make a government contribution to the collective welfare of the cyber ecosystem,' said Chris Inglis, former national cyber director, on the sidelines of Black Hat. Congress has previously examined how cuts to the federal cyber workforce and funding could hurt the country's ability to defend itself long-term. Inglis added that though he isn't aware of the specific number of positions cut from cyber agencies, 'I do think we should be concerned about cutting those capacities too close to the bone.' — AI everywhere: The role that artificial intelligence is playing in global cyber operations was one of the key topics of discussion. Michael Leland, field CTO of cyber firm Island, told your host at Black Hat that the U.S. and its adversaries see AI as 'the great force multiplier.' 'AI is going to be used as a tool, both by the [U.S. government], but the adversaries are leveraging it against us in the opposite way,' he said, highlighting reports of adversarial use of AI — including Russian-linked hackers using the tech to spread disinformation and Iranian-linked hackers using AI to ramp up the scope of phishing campaigns. At DEF CON on Friday, the Defense Advanced Research Projects Agency announced the winners of a years-long competition to build AI models to autonomously find and patch vulnerabilities in open-source code used across critical infrastructure networks. For experts like John Watters, CEO of cyber risk firm iCounter, entities will have to walk a fine line of embracing AI while also ensuring it is implemented securely. 'AI is being deployed everywhere by everybody, individually,' he told your host. 'AI [is being] fully embraced by adversaries, and defenders are still kind of looking at, 'What's the risk of doing it? And [how] should it be regulated?' At the Agencies COAST TO COAST — Hackers at DEF CON concentrated their efforts on attacking a 20-foot Coast Guard Auxiliary vessel, a self-driving Pentagon naval drone and software from the largest U.S. ports. John reported on Sunday that the decision to focus hacker efforts at the conference on maritime vessels and technology signals two pressing worries: that recreational boats, U.S. ports and commercial ships are increasingly hooked up to the internet, and that the U.S. military isn't prepared for the cyber assault many expect China to launch if it invades Taiwan. 'The South China Sea is where the next generation of autonomous warfare and homeland defense will be demonstrated,' said Duncan Woodbury, executive director of the conference's Maritime Hacking Village — which made its debut at this year's conference. — Boosting security: The demonstration at DEF CON comes as the U.S. Coast Guard implemented a final rule last month that requires U.S.-flagged ships and ports to beef up their network defenses. The Coast Guard also received an injection of $25 billion in Congress' recent reconciliation bill, which will enable it to ramp up its cybersecurity measures. Critical infrastructure TSUNAMI OF THREATS — A small army of hackers are coming together to protect one of the country's most vulnerable sectors: water systems. Jake Braun, former acting principal deputy national cyber director, unveiled a new group at this year's DEF CON to help beef up water systems' cyber defenses. 'We've both the urgency of the threat and the potential of a community-driven solution,' Braun, co-founder of the group, told your host. He added that the new group, known as DEF CON Franklin, was unveiled after a nine-month pairing period of DEF CON hackers with small water utilities across four states. Cyberattacks on water treatment facilities could lead to potentially fatal consequences, including shutting off water access completely to altering the chemical balance of the water. — Zoom out: Cyber experts have signaled that the water sector faces significant gaps in cybersecurity funding and expertise, which was demonstrated by cyberattacks against water facilities in the U.S. by Iranian-linked hackers in 2023. 'Protecting our nation's critical infrastructure isn't a want but a necessity, and for the nearly 50,000 water systems nationwide, they need the tools and resources to not only be cyber aware but cyber resilient,' said Matt Holmes, CEO of the National Rural Water Association. Hacked INFORMANTS AT RISK — Officials are worried that Latin American drug cartels are among the groups that obtained sensitive court information from a massive breach of the federal judiciary's case filing system. John and POLITICO's Josh Gerstein reported on Friday that judicial officials with knowledge of the cyberattack are concerned cartels could weaponize the stolen data to identify witnesses in cases the federal government has opened against them or gain insights on criminal investigations, such as arrest and search warrants. — Zoom out: As of Friday, at least a dozen district courts across the country are believed to have been directly impacted by the ongoing breach of the digital case filing system — known as CM/ECF. The incident is believed to be one of the most severe cyberattacks on a federal court filing system in years. While it's unclear if the cartels were directly connected to the breaches, it's possible that they could purchase data from the hackers with access to the system. Quick Bytes TROLL TOLL — Cybersecurity researchers unmasked a prolific scamming operation that involves the infamous unpaid toll or undelivered mail item texts, writes Zack Whittaker for TechCrunch. 'ANSWER MACHINE' — President Donald Trump's new AI search tool on Truth Social contradicts the president by saying the 2020 election wasn't stolen, and the Jan. 6, 2021, Capitol riot was violent and linked to Trump's 'baseless claims of widespread election fraud,' reports Drew Harwell for The Washington Post. PRIVACY PLEASE — Apple's AI ecosystem, known as Apple Intelligence, routinely transmits sensitive user data to company servers beyond what its privacy policies inform, cyber firm Lumia Security revealed, Greg Otto writes for CyberScoop. INVESTING IN THE CYBER TALENT POOL — The non-profit NobleReach foundation last week announced its second-ever cohort of public-interest cyber and emerging tech scholars. The 28 recent graduates and earlier-career professionals will take up one-year posts at places including the Department of Defense, city of Pittsburgh, and Oklahoma City, and the state of Maryland. Chat soon. Stay in touch with the whole team: Rosie Perper (rperper@ John Sakellariadis (jsakellariadis@ Maggie Miller (mmiller@ and Dana Nickel (dnickel@
Yahoo
3 days ago
- Yahoo
'Tracking Everyone, All the Time': What Americans Need To Know About Israel's Secret Eavesdropping Program
Nowadays, it seems that the limit to government surveillance is neither the law nor technological capabilities; it's storage space. In the 1990s, the U.S. National Security Agency was "annually converting more than 22 million pounds of secret documents into cheap, soluble slurry" in order to make room for more, according to Body of Secrets by James Bamford. In 2014, the NSA spent $1.5 billion on a massive data center in Utah riddled with electrical problems. But Unit 8200, the Israeli equivalent of the NSA, seems to have figured out a simple workaround for the problem: Contract it out to private industry. A joint investigative report by The Guardian and the Israeli publications +972 Magazine and Local Call revealed on Wednesday that Unit 8200 has been storing massive amounts of intercepted phone audio on Microsoft's Azure cloud service. Microsoft, which pleaded ignorance of what the Israeli government was using its servers for, is not the only American institution involved in setting up the program. Its architect, who trained under U.S. military instructors, may have created a blueprint for future mass surveillance in other countries. The cloud-powered surveillance program was the brainchild of Brig. Gen. Yossi Sariel, the former commander of Unit 8200. Sariel spent 2019 at the National Defense University, a U.S. Department of Defense academy for American and foreign national security professionals, The Washington Post reported last year. In 2020, he "returned to Israel brimming with plans," according to the Post, and took command of Unit 8200 from 2021 until last year. One of those plans, this week's reporting revealed, was to work with private cloud providers. Under Sariel's tenure, Unit 8200's ability to retain and process audio data massively increased. The unit has gone from wiretapping tens of thousands of subjects to recording millions of people's calls, according to the report. Unit 8200 officers told The Guardian and +972 that the unofficial mantra of the project was "a million calls per hour." (The combined population of Israel and the Palestinian territories is 14 million.) Leaked files suggest that Unit 8200 had a goal of storing 70 percent of its data on Azure and that the Israeli military already had 11,500 terabytes of data in total stored on an Azure server in the Netherlands by July 2025. That would be the equivalent of 200 million hours of audio, although it's not clear how much of those 11,500 terabytes comes from Unit 8200's phone intercepts. Microsoft confirmed that Unit 8200 was a customer of its data security services but said that it had "no information" about the data stored on its servers. After the report was published, the Israeli military put out a statement claiming that "Microsoft is not and has not been working with the [Israel Defense Forces] on the storage or processing of data." Even before the surveillance revelations, the relationship between Microsoft and the Israeli government was a subject of controversy. Several Microsoft employees have been fired for publicly protesting over the issue. Most recently, engineer Joe Lopez was fired in May 2025 after shouting "Microsoft is killing Palestinians" during CEO Satya Nadella's keynote speech. Beyond the specifics of the Israeli-Palestinian conflict, however, the new reporting carries some lessons about the future of surveillance. Monitoring begets more monitoring; governments set up dragnets in response to security threats, then realize how useful the data is for other goals. The cycle used to be limited by data storage capacity. Nowadays, private industry is increasingly willing and able to fulfill governments' appetite for surveillance capacity, though it's also afraid of bad press and legal liability. Sariel became interested in mass surveillance data collection after a 2015 wave of lone-wolf Palestinian attacks that were impossible to predict by conventional investigative techniques. Someone "decides to perpetrate an attack using a kitchen knife to stab a victim, or the family vehicle to run people over," Sariel wrote in 2021 under a pseudonym, which The Guardian exposed as his last year. "Sometimes the person doesn't even know a day before that he or she is going to commit such an attack. In these cases, traditional intelligence agencies are helpless. How can such an attack be predicted or prevented?" Intelligence officers told +972 Magazine that Sariel became obsessed with "tracking everyone, all the time," and "suddenly, the public became our enemy." While some officers insisted that the surveillance dragnet has saved lives, another portrayed it as a machine that constantly creates pretexts for more aggressive action. "These people get entered into the system, and the data on them just keeps growing," an intelligence officer who recently served in the West Bank told +972. "When they need to arrest someone and there isn't a good enough reason to do so, [the surveillance repository] is where they find the excuse. We're now in a situation where almost no one in the [Palestinian] territories is 'clean,' in terms of what intelligence has on them." For all its technical sophistication, Israeli intelligence failed to anticipate the Hamas attacks of October 7, 2023. (In fact, Israeli leaders' overconfidence in their high-tech defense may have led them to miss signs of an impending war.) Yet those attacks became another reason to expand the data collection, because the army was preparing to take "long-term control" of Gaza, an intelligence officer told +972. Israeli officials were also uncomfortable with putting such sensitive data in the hands of a foreign third party. Documents from the Israeli justice ministry, obtained by +972, warned that cloud services based in other countries could be exposed to legal liability or even be forced to hand over intelligence data. After the war in Gaza began, Microsoft officials warned Israeli counterparts not to use its services for lethal military targeting, a source at Microsoft told The Guardian. If recent history is any indication, U.S. officials will be watching these challenges closely. The Bush administration looked to Israeli precedents for justifying war-on-terror measures legally, and American police have often incorporated trips to Israel into their counterterrorism training. The "start-up nation" may soon become a model for public-private surveillance partnerships as well. The post 'Tracking Everyone, All the Time': What Americans Need To Know About Israel's Secret Eavesdropping Program appeared first on Solve the daily Crossword