logo
SentinelOne improves cloud migration for AWS customers

SentinelOne improves cloud migration for AWS customers

Tahawul Tech18-06-2025
SentinelOne, a global leader in AI-powered security, announced that it has joined the Amazon Web Services (AWS) Independent Software Vendor (ISV) Workload Migration Program, a program that supports AWS Partner Network (APN) members with a Software-as-a-Service (SaaS) offering on AWS, to drive and deliver workload migrations.
By participating in the AWS ISV Workload Migration Program, SentinelOne will offer AWS customers accelerated secure cloud migrations support to help them rapidly migrate securely with modern, AI-powered CNAPP capabilities. With the new program, SentinelOne will use incremental funding, technical support, and go-to-market support from AWS to ensure customers benefit from reduced migration timelines and costs as they transition their software to the cloud. With SentinelOne's AI-powered Singularity Cloud Security, they also gain real-time visibility and protection throughout the migration journey—whether moving from on-premises or another cloud environment—ensuring a secure and seamless transition to AWS.
'Through our participation in the AWS ISV Workload Migration Program, SentinelOne is helping customers accelerate secure cloud migrations with end-to-end protection and visibility', said Ric Smith, President of Product, Technology, and Operations, SentinelOne. 'Whether moving from on-prem or another cloud to AWS, organisations can count on us to deliver the security they need throughout their journey–realising the performance, speed, agility, and cost benefits of the cloud'.
SentinelOne's Singularity Cloud Security combines agentless and agent-based protection to provide deep visibility, continuous posture management, and real-time threat detection across cloud environments. Whether customers are migrating from on-premises or other cloud providers, SentinelOne empowers them to maintain end-to-end visibility and protection across current and future environments, making it an ideal solution for today's hybrid operating models. Through close collaboration with channel, services, and technical partners, SentinelOne integrates seamlessly into broader migration project teams, helping customers move faster, reduce risk, and confidently embrace the speed and scale of the cloud.
SentinelOne's solutions are available globally. To learn more, visit sentinelone.com/platform/cloud-security.
Image Credit: SentinelOne
Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

Fortinet Report: OT Cybersecurity Risk elevates within Executive Leadership Ranks
Fortinet Report: OT Cybersecurity Risk elevates within Executive Leadership Ranks

Zawya

timean hour ago

  • Zawya

Fortinet Report: OT Cybersecurity Risk elevates within Executive Leadership Ranks

More than half (52%) of organizations report that the CISO/CSO is responsible for OT, up from 16% in 2022, while 95% of organizations report that the C-suite is responsible for OT, up from 41% in 2022 Fortinet® (NASDAQ: FTNT), the global cybersecurity leader driving the convergence of networking and security, today announced the findings from its global 2025 State of Operational Technology and Cybersecurity Report. The results represent the current state of operational technology (OT) cybersecurity and highlight opportunities for continued improvement for organizations to secure an ever-expanding IT/OT threat landscape. In addition to trends and insights impacting OT organizations, the report offers best practices to help IT and OT security teams better secure their cyber-physical systems. 'The seventh installment of the Fortinet State of Operational Technology and Cybersecurity Report shows that organizations are taking OT security more seriously. We see this trend reflected in a notable increase in the assignment of responsibility for OT risk to the C-suite, alongside an uptick in organizations self-reporting increased rates of OT security maturity,' said Nirav Shah, Senior Vice President, Products and Solutions, at Fortinet. 'Alongside these trends, we're seeing a decrease in the impact of intrusions in organizations that prioritize OT security. Everyone from the C-suite on down needs to commit to protecting sensitive OT systems and allocating the necessary resources to secure their critical operations.' Key findings from the global survey include: Responsibility for OT security continues to elevate within executive ranks: There has been a significant increase in the global trend of corporations planning to integrate cybersecurity under the CISO or other executives. As accountability continues to shift into executive leadership, OT security is elevated to a high-profile issue at the board level. The top internal leaders who influence OT cybersecurity decisions are now most likely to be the CISO or CSO by an increasingly wide margin. Now more than half (52%) of organizations report that the CISO/CSO is responsible for OT, up from 16% in 2022. For all C-suite roles, this has spiked to 95%. Additionally, the number of organizations intending to move OT cybersecurity under CISO in the next 12 months has increased from 60% to 80% in 2025. OT cybersecurity maturity is affecting the impact of intrusions: Self-reported OT security maturity has made notable progress this year. At the basic Level 1, 26% of organizations report establishing visibility and implementing segmentation, up from 20% in the previous year. The largest number of organizations state their security maturity is at the Level 2 access and profiling phase. The report also found a correlation between maturity and attacks. Those organizations that report being more mature (higher of Levels 0–4) are seeing fewer attacks or indicate that they are better able to handle lower-sophistication tactics, such as phishing. It's worth noting that some tactics, such as advanced persistent threats (APT) and OT malware, are difficult to detect, and less mature organizations may not have the security solutions in place to determine they exist. Overall, although nearly half of organizations experienced impacts, the impact of intrusions on organizations is declining, with a noteworthy reduction in operational outages that impacted revenue, which dropped from 52% to 42%. Adopting cybersecurity best practices is having a positive impact: In addition to the Levels of maturity affecting the impact of intrusions, it appears that adopting best practices such as implementing basic cyber hygiene and better training and awareness are having a real impact, including a significant drop in business email compromise. Other best practices include incorporating threat intelligence, which spiked (49%) since 2024. Additionally, the report saw a significant decrease in the number of OT device vendors, which is a sign of maturity and operational efficiency. More organizations (78%) are now using only one to four OT vendors, which indicates that many of these organizations are consolidating vendors as part of their best practices. Cybersecurity vendor consolidation is also a sign of maturity and corresponds to Fortinet customer experiences with the Fortinet OT Security Platform. Unified networking and security at remote OT sites enhanced visibility and reduced cyber risks, leading to a 93% reduction in cyber incidents vs. a flat network. The simplified Fortinet solutions also led to a 7x improvement in performance through reductions in triage and setup.1 Best Practices Fortinet's global 2025 State of Operational Technology and Cybersecurity Report provides actionable insights for organizations to strengthen their security posture. Organizations can address OT security challenges by adopting the following best practices: Establish visibility and compensating controls for OT assets: Organizations need the ability to see and understand everything that's on their OT networks. Once visibility is established, organizations then need to protect critical devices and ones that may be vulnerable, which requires protective compensating controls that are designed for sensitive OT devices. Capabilities such as protocol-aware network policies, system-to-system interaction analysis, and endpoint monitoring can detect and prevent compromise of vulnerable assets. Deploy segmentation: Reducing intrusions requires a hardened OT environment with strong network policy controls at all access points. This kind of defensible OT architecture starts with creating network zones or segments. Standards such as ISA/IEC 62443 specifically call for segmentation to enforce controls between OT and IT networks and between OT systems. Teams should also evaluate the overall complexity of managing a solution and consider the benefits of an integrated or platform-based approach with centralized management capabilities. Integrate OT into security operations (SecOps) and incident response planning: Organizations should be maturing toward IT/OT SecOps. To get there, OT needs to be a specific consideration for SecOps and incident response plans, largely because of some of the distinctions between OT and IT environments, from unique device types to the broader consequences of an OT breach impacting critical operations. One key step in this direction is to have playbooks that include your organization's OT environment. This kind of advanced preparation will foster better collaboration across IT, OT, and production teams to adequately assess cyber and production risks. It can also ensure that the CISO has proper awareness, prioritization, budget, and personnel allocations. Consider a platform approach to your overall security architecture: To address rapidly evolving OT threats and an expanding attack surface, many organizations have assembled a broad array of security solutions from different vendors. This has yielded an overly complex security architecture that inhibits visibility while placing an increased burden on limited security team resources. A platform-based approach to security can help organizations consolidate vendors and simplify their architecture. A robust security platform with specific capabilities for both IT networks and OT environments can provide solution integration for improved security efficacy while enabling centralized management for enhanced efficiency. Integration can also provide a foundation for automated responses to threats. Embrace OT-specific threat intelligence and security services: OT security depends on timely awareness and precise analytical insights about imminent risks. A platform-based security architecture should also apply AI-powered threat intelligence for near-real-time protection against the latest threats, attack variants, and exposures. Organizations should ensure their threat intelligence and content sources include robust, OT-specific information in their feeds and services. Report Overview The Fortinet 2025 State of Operational Technology and Cybersecurity Report is based on data from a global survey of more than 550 OT professionals, conducted by a third-party research company. Survey respondents were from different locations around the world, including Australia, New Zealand, Argentina, Brazil, Canada, Mainland China, Colombia, Denmark, Egypt, France, Germany, Hong Kong, India, Indonesia, Israel, Italy, Japan, Malaysia, Mexico, Norway, Philippines, Poland, Portugal, Singapore, South Africa, South Korea, Spain, Taiwan, Thailand, United Kingdom, and the United States, among others. Respondents represent a range of industries that are heavy users of OT, including: manufacturing, transportation/logistics, healthcare/pharma, oil, gas, and refining, energy/utilities, chemical/petrochemical, and water/wastewater. Most of those surveyed, regardless of title, are deeply involved in cybersecurity purchasing decisions. Many respondents are responsible for operations technology at their organization and/or have reporting responsibility for manufacturing or plant operations. About Fortinet Fortinet (Nasdaq: FTNT) is a driving force in the evolution of cybersecurity and the convergence of networking and security. Our mission is to secure people, devices, and data everywhere, and today we deliver cybersecurity everywhere our customers need it with the largest integrated portfolio of over 50 enterprise-grade products. Well over half a million customers trust Fortinet's solutions, which are among the most deployed, most patented, and most validated in the industry. The Fortinet Training Institute, one of the largest and broadest training programs in the industry, is dedicated to making cybersecurity training and new career opportunities available to everyone. Collaboration with esteemed organizations from both the public and private sectors, including Computer Emergency Response Teams ('CERTS'), government entities, and academia, is a fundamental aspect of Fortinet's commitment to enhance cyber resilience globally. FortiGuard Labs, Fortinet's elite threat intelligence and research organization, develops and utilizes leading-edge machine learning and AI technologies to provide customers with timely and consistently top-rated protection and actionable threat intelligence.

LSEG Global Cloud Survey: Financial services firms embrace cloud to drive competitiveness
LSEG Global Cloud Survey: Financial services firms embrace cloud to drive competitiveness

Zawya

timean hour ago

  • Zawya

LSEG Global Cloud Survey: Financial services firms embrace cloud to drive competitiveness

82% use hybrid/multi-cloud 91% are advancing AI via cloud Financial services firms around the world are accelerating their adoption of cloud technologies to enhance agility, resilience, and innovation, not merely to reduce costs, according to new research conducted by LSEG (London Stock Exchange Group). The global survey of 453 financial services executives reveals that 87% of firms have increased their investment in cloud over the past two years, with a growing emphasis on strategic outcomes such as scalability, revenue growth, and AI enablement. The research shows that 82% of firms now operate with either a multi-cloud or hybrid-cloud strategy, reflecting a shift toward flexibility and risk diversification. However, this evolution is not without its challenges. 84% of respondents have had to adjust their cloud strategies in response to regulatory frameworks such as the EU's Digital Operational Resilience Act (DORA) and General Data Protection Regulation (GDPR). Stuart Brown, Group Head of Data & Feeds, LSEG: 'The results of our survey show that adopting cloud is no longer a technology or engineering led decision; it is a key business imperative. Companies are increasingly driving meaningful value from cloud, improving operational resilience, and preparing for the next wave of innovation. Over the next three years, that innovation will be driven by AI and machine learning, with financial institutions increasingly using cloud to power fraud detection, risk management, data analytics and generative AI.' Security remains a top concern. Nearly half of respondents (47%) cite the sophistication of cyberattacks as their primary worry, followed closely by concerns around data privacy and breaches. Despite this, 92% say operational resilience is a critical or very important factor when selecting a cloud provider underscoring the importance of trust and reliability in cloud partnerships. Firms are seeing tangible benefits from cloud adoption. 54% of respondents report that they have migrated and are already seeing value, particularly in areas like risk management, customer engagement, and enterprise data access. For instance, 83% of firms using cloud for risk management have already completed migration, the highest among all use cases. Interestingly, ROI is increasingly measured by strategic outcomes: 51% assess cloud success by scalability, 47% by revenue growth, and 47% by improved security and resilience. Only 34% prioritize immediate cost savings signaling a shift in how cloud value is perceived. That said, 61% of firms still report reduced IT infrastructure costs, especially in regions like EMEA and APAC, where multi-cloud strategies are more prevalent due to regulatory complexity. The survey found that 91% of firms are either already using or planning to use cloud services for AI initiatives within the next 12 months. Generative AI (60%), fraud detection (50%), and risk management (50%) are the top use cases. Moreover, 84% of respondents say their organizations are somewhat or very advanced in AI adoption, with investment firms leading the way. As firms look to the future, many are also reconsidering their cloud service models. While SaaS remains dominant today (43%), there is growing interest in Platform as a Service (PaaS) and Infrastructure as a Service (IaaS), a sign that firms may be preparing to build more bespoke applications in-house. Click (here) to view the full report. About LSEG LSEG is a leading global financial markets infrastructure and data provider, playing a vital social and economic role in the world's financial system. With our open approach, trusted expertise and global scale, we enable the sustainable growth and stability of our customers and their communities. We are dedicated partners with extensive experience, deep knowledge and a worldwide presence in data and analytics; indices; capital formation; and trade execution, clearing and risk management across multiple asset classes. LSEG is headquartered in the United Kingdom, with significant operations in 65 countries across EMEA, North America, Latin America and Asia Pacific. We employ over 26,000 people globally, more than half located in Asia Pacific. LSEG's ticker symbol is LSEG. Contact Tarek Fleihan Global Communications, LSEG newsroom@

Cloud, data and AI: How to harness the new engines of progress
Cloud, data and AI: How to harness the new engines of progress

Gulf Business

time2 hours ago

  • Gulf Business

Cloud, data and AI: How to harness the new engines of progress

Image: Supplied When it comes to investments in artificial intelligence (AI), the numbers are staggering. Saudi Arabia and the UAE just announced plans to buy hundreds of thousands of advanced AI chips. And at France's 'AI Action Summit' earlier this year, public and private actors pledged investments surpassing EUR 300bn to advance AI in Europe. It is very clear that expectations about the economic benefits of this technology are sky high. Yet, a recent McKinsey survey found that more than 80 per cent of organisations worldwide are not yet seeing any tangible impact on their The key to the answer is that AI is not a stand-alone technology. For its benefits to materialize, AI has to be deeply embedded in business processes. And for that, companies have to put three pillars in place: modern cloud software, modern data management, and a consistent stack of AI technologies linking with them. It starts with software All successful companies use software to organise and optimise their business operations – from order intake and procurement to production, delivery and customer service. Yet, many enterprises still rely on legacy on-premise software – that is, a wide range of programs installed on the company's local IT servers. This 'software landscape' often consists of disparate applications plugged together – heavily modified over the years and frequently not up to date with the latest innovations. These complex systems are costly to maintain, and they make it difficult for companies and their leaders to respond to challenges and opportunities with agility and speed. AI applications, too, face major obstacles in legacy systems: They have a hard time grasping the company's inner workings, making sense of fragmented and widely distributed datasets, and may not be able to find certain key information. The first step towards powerful business AI, therefore, is the move from legacy on-premise software to modern cloud software – that is applications that are centrally managed and maintained in professional data centers, constantly updated with new innovations, and tightly linked so information can flow freely between the different parts of the company. For companies today, this so-called cloud migration is faster, smoother and more transparent than ever before – thanks to the proven methods and advanced digital tools now available. And the prize is larger than ever before, too: integrated cloud applications work together out of the box and cover the company's software needs end-to-end across departments. This integration allows a car maker, for example, to reduce time and cost – say, from receiving an order through the vehicle's production to its final delivery. Similar benefits extend to all other industries and workflows. A cloud migration, consequently, is more than an IT project: it is the digital foundation for a thorough modernisation of the entire enterprise, for moving from 'good' to 'great'. Once in the cloud, companies can add advanced data management solutions with little effort. Think of advanced data management as a magic filing cabinet: it automatically stores and organises all documents, all information, all data automatically in the right place and in perfect order – always up to date, perfectly searchable, without duplicates and errors, smartly annotated, and everything in the right context. Cloud and data In their combination, integrated At the same time, they enable AI technologies to access, understand, and facilitate transactions across the company – assisting human users with repetitive tasks as well as with deep analyses and insights. And the next evolution is already at hand: Based on integrated cloud applications and data management, digital coworkers – also known as 'AI agents' – are now able to carry out complex work assignments. For example: find overdue invoices, identify what went wrong, resolve the issue, and make sure payment targets are met. Realising the tremendous benefits of AI is thus about going on a journey: from on-premise software to cloud applications, then onwards to modern data management and the use of AI agents throughout the enterprise. It is this journey that unlocks the tremendous potential so many see in AI – and enables us to completely reimagine how our businesses and economies are run. The writer is the CEO of SAP SE.

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store