CRITICALSTART’s NEW Partner Portal through Salesforce Communities is now live! This move to Salesforce Communities will allow our partner community more visibility and hands-on access to deal registrations, leads, marketing content, and more.
If you had a previous partner portal login, you received an email on November 14 with login instructions from Salesforce PRM Communities. Please follow the directions in the email to login to the portal.
If you are new to the Partner Portal, please apply here.
Our Managed Detection and Response SPIFF program promotion runs through January 31, 2022. Don’t miss your chance to claim these payouts:
SALES DEMO SPIFF – $500 each to Sales Rep and SE for a registered opportunity and demo meeting scheduled and held.
CLOSED DEAL SPIFF – Starting at $1,000 and up to $7,000.
Eligible Vendors + CRITICALSTART MDR
(Microsoft Azure Sentinel, Microsoft Defender Endpoint, Palo Alto Networks, Carbon Black Response, CrowdStrike, CylancePROTECT, Devo, SentinelOne, Splunk)
For additional details, please contact your Channel Manager.
A publicly traded facility management company with annual revenues of $6B and more than 100,000 employees wanted to free up their security team to focus on additional security tasks and reduce the enterprise’s overall risk level.
The right solution would need the ability to see and react to alerts coming from Microsoft Defender for Endpoint and Microsoft Azure Sentinel, so the company could achieve full ROI on their security tool investments.
The customer chose CRITICALSTART Managed Detection and Response services in a one-year deal, worth $495K to the channel partner. During the 60-day sales cycle, our MDR service delivery model aligned with the customer’s defined success criteria to beat out BlueVoyant and replaced Dell SecureWorks threat intelligence.
Key requirements included expertise in the Microsoft security stack, a US-based SOC, contractual SLAs, expert-level response capabilities, and the ability for the customer to access provider-collected data in a transparent manner.
CRITICALSTART Managed Detection and Response (MDR) services for Microsoft, Splunk, Devo, and SentinelOne* now include a new no-cost feature: CRITICALSTART Threat Navigator.
Threat Navigator helps our Cyber Research Unit manage the hundreds of detection rules generated by the security tool, the custom content we produce based on curated threat intel, and the constant rewriting of detection rules.
This feature delivers more robust context to our SOC analysts so they can make quicker, more precise decisions when investigating potential threats in a customer’s environment and consistently communicate about the customer’s security posture.
Key customer benefits include:
For more customer benefits and details, see the Cyber Research Unit – Threat Navigator folder in the or contact your CRITICALSTART SC. Stay tuned for details on a January 2022 training session we will offer on these offerings.
*Support for Threat Navigator for CrowdStrike, VMWare CarbonBlack, and Palo Alto is slated for GA in January 2022.
Palo Alto Networks Cortex™ XSOAR and ServiceNow
Cortex XSOAR is a comprehensive security orchestration, automation, and response (SOAR) platform that unifies case management, automation, real-time collaboration, and threat intel management to serve security teams across the incident lifecycle.
For customers of CRITICALSTART and Palo Alto Networks who use XSOAR as their “single pane of glass” orchestration tool, this bi-directional sync between XSOAR and our Zero Trust Analytics Platform (ZTAP) will deliver immediate value to them. That’s because it fits into their existing workflows without requiring the customer analyst to pivot to ZTAP unless desired.
The ZTAP app is available for download within the XSOAR Marketplace in the customer’s Cortex XSOAR console.
ServiceNow is a workflow automation platform and ticketing tool that enables organizations to improve operational efficiencies. ServiceNow streamlines and automates routine work tasks to resolve everyday internal IT issues that process and catalog customer service requests.
For customers of ServiceNow and CRITICALSTART, this bi-directional sync between ServiceNow and ZTAP allows them to monitor alerts and share information more effectively. They can address critical incidents in real time without leaving the ServiceNow interface.
The ZTAP app is available for download via the ServiceNow Store.
For additional information about these integrations, please contact your Channel Account Manager.
In this blog post, we detail a range of threats facing the shipping industry, offer actionable solutions, and provide a downloadable summary of our November Cyber Threat Intelligence Report.
Connected technologies that make cities smarter can also make cities more vulnerable. Read our latest blog on solutions like encryption, identity governance, and other super smart ideas that address these vulnerabilities.
There’s a new malware endgame – but we know how to address it, and more importantly, how to prevent it. In our latest blog post, we soothe fears around sinister-sounding killware and offer some cybersecurity remedies to keep healthcare and other critical infrastructures safe.
Join our webinars!
See us in person at RSA Conference 2022 – February 7-10 in San Francisco! The Critical Start booth will be in the South Hall at Booth #1861. You can also join us for a Partner Appreciation Lunch on Tuesday, Feb. 8 from 11-1pm PST. Register here.
CRITICALSTART® and MOBILESOC® are federally registered trademarks owned by Critical Start. Critical Start also claims trademark rights in the following: Cyber Operations Risk & Response™ platform, and Trusted Behavior Registry®. Any unauthorized use is expressly prohibited.