Author Archives: Megan Carnes

SEC Cyber Regulations are Coming – Is Your Firm Ready?

The word “risk” is taking on a whole new meaning for the financial services sector in the coming months as the Security and Exchange Commission’s (SEC) burgeoning regulatory agenda has proposed a myriad of updates to existing regulation that will require enhanced cybersecurity and risk management capabilities. Hardly the Commission’s first foray into technology and cybersecurity, the landscape has long since shifted from “if” to “when” cybersecurity risk management will be formally codified in the federal register – and the time is now. Although the proposed language indicates that cybersecurity programs should be “tailored based on business operations”, many Registered Investment Advisers (RIA), Investment Companies (IC), and similar organizations lack the internal expertise to develop, implement, and administer cybersecurity risk management programs appropriate for their business size and complexity. Furthermore, the growing scarcity of information security resources (cyber workforce gap of 3.4 million globally / 436,000 in the US) has created challenges related to finding and retaining relevant talent. Now more than ever, firms need experienced partners capable of delivering managed technology, cybersecurity, and industry-specific advisory services in a cost-effective package that addresses business challenges while driving ROI.

Contact a Thrive Expert Today

 

Thou Shall Perform a Risk Assessment (and Other Requirements)

While there are distinct nuances between the requirements proposed in each of the rules, all of them are rooted in establishing robust cyber risk management programs. Firms need to first develop a foundation of written policies and procedures outlining risk analysis processes, risk detection capabilities, reporting, and risk treatment options. The program should combine both administrative and technical functions and must be overseen by a qualified information security practitioner. Typically, these requirements are achieved through risk assessment and incident response planning exercises. Conceptually, these requirements are not new, however, a majority of the regulated entity market has only some of the necessary components in place, and now must allocate resources to quickly mature their programs and capabilities.

The regulations also outline novel reporting requirements that further elevate the urgency for implementing robust programs. One of the most polarizing elements of the proposed Cybersecurity Risk Management rule is the mandatory 48-hour reporting threshold for submitting information regarding “significant” cybersecurity incidents to the SEC using a new form ADV-C. Proposed changes in Regulation S-P, which is more narrowly scoped to information systems and data sets pertaining to consumer financial information, also incorporates a 30 day requirement for notifying individuals of a cybersecurity incident or unauthorized access / use of their sensitive information. Although the timeframes may be adjusted as a result of industry review and feedback, the reporting requirements are expected to remain in finalized regulation.

With these requirements on the horizon, does your organization have the proper technical tools and processes to a) detect cybersecurity incidents and b) explicitly identify the information systems and/or data sets impacted by the incident? If not, you may be unable to limit your exposure when meeting the reporting requirements – if you don’t know which data was impacted, you’d have to notify all clients, for example.

A Checklist for Success – If Only It Were That Easy

For information security and IT compliance practitioners, a complete checklist of all things required to maintain continual compliance is the holy grail. Alas, one size does not fit all, especially with the modern dynamic threat landscape, ever-evolving regulatory cannon, and increasing globalization. Keeping in mind that each organization requires a bespoke blend of technology, doctrine, and personnel to fit their risk profile, the below list is a good starting point to begin evaluating your program maturity:

Administrative

  • Written Incident Response and Risk Management policies and procedures.
  • Written Risk Management policy, processes, testing, and reporting procedures.
  • Written Incident Response Plan (IRP).
  • Third party cybersecurity risk management and incident response processes.
  • Qualified professional administering the cybersecurity programs.
  • Qualified professionals capable of responding to detected cybersecurity incidents.
  • Formalized protocols for reporting incidents to the Commission and for notifying clients within the required timeframes.
  • Data classification, critical systems classification, classification of personal data within business systems.

Technical

  • Identity and Access Management (IAM) solution (configured to least privilege).
  • Multifactor authentication on all remote access vectors at a minimum.
  • Endpoint detection and response (EDR)
  • Network detection and response (e.g., MDR, XDR)
  • Security monitoring for all cloud environments (IaaS, SaaS, PaaS, etc.)
  • File and folder auditing, monitoring, reporting.
  • Encryption for data at rest and in transit.
  • 24×7 Security Operations Center (SOC) monitoring and response.
  • Security Incident and Event Management (SIEM) solution for log aggregation and preservation.
  • Security testing – Penetration testing and Vulnerability Scanning.
  • Vulnerability and patch management solution.

How Thrive Can Help

Whether your organization needs help developing policies and procedures, conducting risk assessments, managing your cyber program, or with beefing up your technical cyber defense capabilities, Thrive’s Compliance as a Service (CaaS) and financial services division is ready to deliver. Our 1300+ team has decades of experience supporting financial services clients and understands the industry-specific complexities.

Fill out the form below to contact Thrive today to learn more about our customizable solution packages and how we partner with our clients for the long term.


 

Links to Referenced Regulation and Source Material:
1 “Cybersecurity Risk management for Investment Advisers, Registered Investment Companies, and Business Development Companies”
2 “Cybersecurity Risk Management Rule for Broker-Dealers, Clearing Agencies, Major Security-Based Swap Participants, Municipal Securities rulemaking Board, National Securities Associations, National Securities Exchanges, Security-Based Swap Data Repositories, Security-Based Swap Dealers, and Transfer Agents”
3 “Regulation Compliance and Integrity (Reg-SCI)”
4 “Privacy of Consumer Financial Information and Safeguarding Customer Information (Reg S-P)"
5 (ISC)2 Cybersecurity Workforce Study 2022
Why I joined Thrive – The ability to deliver a superior customer experience

I joined Thrive to lead the European sales team and to work with a global brand with an outstanding reputation for innovating cybersecurity, Cloud and Collaboration managed services. I am excited about the opportunity that it presents for myself and the organisations I engage with day to day. The most key factor for me was the ability to deliver a superior customer experience.

It is apparent to everyone in this industry that the lack of resource is the most pressing challenge for Cybersecurity professionals. I have yet to meet a CISO who is awash with free time and has an armada of help available should they need it. The vast of majority of security professionals have multiple projects running simultaneously and are having to balance managing board expectations, running security ops, training the internal client and the multitude of vendor relationships that need to be serviced.

These challenges magnify even further in the smaller business as there is often no CISO and sometimes no member of the team with security in the title. It is often left to someone to manage security as a second job or voluntarily include it in their remit. I have come across organisations in the thousands of users with no head of cybersecurity. Sometimes this is due to rapid growth and sometimes unfortunately, it is due to the “we’ve never had a problem” mindset.

Lack of resource is often the driver when the customer goes to market for a cybersecurity project but I feel that sometimes that challenge is often deliberately misinterpreted by vendors to suit their project portfolios and strategies.  For instance, a vendor’s strategy could be built around AI and the rhetoric is that due to the AI tech there will be no need for additional resource. This strategy works well for the vendor as it’s able to sell high margin software, increasing the stock price and satisfying the shareholders but is it really solving the customers problem?

I have come across many customers in the last few years who have purchased appliances and software and are frankly in no better position than they were. They have no one to manage the output from the product they have purchased which can mean alerts can be missed and misunderstood. I have actually had a customer say to me about a security product they had purchased “I know it’s doing something but I have no idea how to interpret the alerts.”

Further to this, anyone who has recently been involved in the RFP for a cybersecurity solution will see from the myriad of responses they receive that there is always a misinterpretation of the core challenge, deliberately or not. This is due to the shear amount of cybersecurity vendors and often, the vendor strategy not being able to address the challenge. Customers are having to be prescriptive in their requirements to root out the misdirection and the partial responses. I have been delighted to see an increase militance from customers around staying true to solving their core challenge.

I believe that overcoming lack of available resource can be addressed by combination of people, process and technology. It was important to me to join an organisation that can help IT and security professionals with their full security programme and actually provide much needed relief for overworked and under stress cybersecurity professionals. At Thrive, we have the ability to sit side by side with the customer and work together to solve their challenges and that excites me!

A major farming supplier for leading global food service and retail brands partnered with Thrive to fortify security tools and IT infrastructure Download Now
CHALLENGE

The farming supplier is one of the largest in the U.S., serving brands, including Chick-fil-A, Walmart, Popeyes, KFC, Zaxby’s and Bojangles. The company was using a small, local MSP that did not have the resources it needed to manage or monitor current security tools and IT infrastructure. As a result, the burden of installation, configuration and management was placed on the company’s shoulders with limited internal IT resources.

SOLUTION

The company selected Thrive because of their expertise to optimize existing security investments and infrastructure. In addition, the supplier was impressed with Thrives’ consultative approach to fully understanding the needs of the internal IT team (helpdesk, security, infrastructure and advisory services) as well as the organizational needs such as cost-effective solutions and support for cyber insurance. Thrive provided a comprehensive suite of 24x7x365 Cybersecurity SOC services to fulfill stringent Cybersecurity insurance mandates and Managed Detection and Response to monitor and respond to threats around the clock. Thrive also implemented Managed Microsoft 365 Backup, Managed Patching, IT PROS, ServiceNow Tenant as a Service and Technical Advisory services.

RESULT

By outsourcing tedious IT tasks to Thrive, the supplier was able to free up more time for its IT team to focus on more pressing onsite initiatives. Thrive’s solutions also provided a desired scalable, predictable cost model to enhance the company’s bottom line.

How can Thrive help your business?

Thrive is a leading provider of outsourced IT Infrastructure designed to drive business outcomes by helping you get the most out of your IT.

To learn more about our services, CONTACT US

Vulnerability in SLED: How to Navigate Threats Targeting Education

State education agencies and school systems are on high alert due to a rise in ransomware attacks on K–12 educational institutions.

Computer systems in schools have been the target of cyberattacks, which delay access and interrupt digital and remote learning. In other cases, ransomware threatened to steal and leak private student information unless schools paid a ransom. As schools implement more technology in classrooms, the threat landscape is ever increasing.

The cost of most ransomware losses is downtime, which can be even more expensive than the settlements. Cyberattacks can also ruin an organization’s reputation. Since private schools and other educational institutions compete for student applications, this can have a greater impact.

If a school fails to protect critical data and practice effective cybersecurity, it will reflect poorly on that organization.

The following are the main risks to educational institutions:

  • Cyberattack: A person, group, or entity that generates all or some of an incident with the intent to compromise the security of a person or an organization.
  • Domain Spoofing: Establishing web domains that resemble trustworthy websites to deceive users who input URLs incorrectly or click on similar URLs.
  • Doxing: The act of gathering or disseminating personally identifiable information about a person online, usually with malevolent intent.
  • End-of-life Software: Outdated programs and devices that no longer receive patches, security upgrades, technical assistance, or bug fixes leave users open to assaults.
  • Phishing Emails: When someone poses as a reliable entity in an electronic contact in an attempt to steal sensitive information or data, such as usernames, passwords, credit card numbers, or bank account information.

Because educational systems have limited people, funds, and resources, and as cyber threats get more sophisticated, these IT infrastructures are at serious risk.

Here are several ways that Thrive can contribute to the digital security of educational organizations.

  • Thrive has a committed staff of cybersecurity engineers working around the clock to safeguard your mission-critical infrastructure.
  • To avoid data loss, Thrive advises your facility to back up its data to an impartial third party.
  • To reduce susceptibility, Thrive collaborates with your organization to detect security flaws.
  • To identify cybersecurity threats, Thrive builds a long-term strategy by learning about your organizational goals, people, procedures, and technologies.
  • Thrive delivers tailored security-managed services to safeguard your institution while reducing cyberattacks.

At Thrive, we have 700+ technical resources and IT experts with a cumulative 3,000+ years of experience managing security for educational institutions of all sizes, using the best technology to safeguard your network from online threats.

 

Don’t wait, contact us to learn more.

Finance industry revealed as the second least cyber-secure in the UK

Financial services firms are an increasingly attractive target for cybercriminals. In 2022, according to  IFA Magazine, the finance industry had 305,785 new security breaches, the second highest level in the UK. While the sector is aware of its risks and prioritises security accordingly, preventing and detecting attacks are challenging due to evolving and sophisticated cybercrime techniques.

Maintaining stability is the cornerstone of ensuring economic security for the United Kingdom. Organisations such as banks, building societies, insurance companies, and other companies providing infrastructure for the financial market are essential components of this economic sector. The government, the Bank of England, and key organisations, such as the Financial Conduct Authority (FCA), work together to protect against damage to this ecosystem.

50%+ increase in cyber incidents reported

In the last 12 months, the finance and insurance industry has suffered a 50%+ increase in the total number of cyber incidents reported to the FCA. These financial businesses are attractive targets and frequently experience Advanced Persistent Threat attacks or attempts to exploit ransomware such as Lazarus and Conti.

Within the last two years, many organisations in this sector faced significant impacts created by a record number of critical vulnerabilities, such as those in Microsoft Exchange Server and Log4j.  Most cyber incidents reported in 2021 were due to cyber attacks, resulting in significant ramifications such as the compromise or breach of company or personal data and 20% of incidents involved ransomware.

Controls in place to mitigate cyber attacks

Together with the Bank of England, regulators and government departments focus on preventing and mitigating large-scale cyber attacks on this sector.

However, despite being worth over £9 billion, with over 50,000 people now employed across the cybersecurity industry, the IT industry is still the least cyber-secure in the UK, having experienced 320,060 data breaches in 2022. (Source: IFA Magazine).

Increasing levels of security breaches

Digital transformation and the widespread adoption of remote working have created a wider attack surface and new security vulnerabilities. Suppose these gaps are not prevented, swiftly identified, or mitigated after detection. In that case, they can increase the risk of attack and the likelihood of incidents resulting in significant damage and disruption.

Cybersecurity & Third-Party Risk

The Bank of England’s bi-annual risk survey polled 65 executives in the UK financial sector. It showed that 74% of respondents believed that a cyber attack is the highest present risk to the financial industry, followed closely by inflation or a geo-political incident. Three-quarters are concerned that the probability of a high-impact cyber attack taking place before 2024 is high, an increase of 26% from the first half of 2022.

Sharp rise in reported cyber incidents

According to the UK Government’s Cybersecurity Breaches Survey of 2022, 39% of UK businesses experienced a cyber attack in 2022, with each episode costing them an average of £4,200 in loss of data or real value. Adapting company processes is vital in preventing a high-impact attack. It can help protect valuable customer data and commercial intellectual property and strengthen company systems and methodologies to reassure customers and investors.

Worse still, failing to protect data can open the door to significant financial penalties. In the event of a significant data breach, the Information Commissioner’s Office (ICO) has the authority to levy fines of up to £175 million, equivalent to 4% of the company’s annual revenue worldwide. The Cybersecurity Breaches Survey found that just over half (54%) of businesses had actively identified cybersecurity risks in the previous 12 months. Despite this, only 17% of all organisations in the UK had provided any kind of cybersecurity training for their employees.

How to improve cyber operational resilience

With more companies managing a remote workforce, cyber threats are an ever-complex risk. Remotely bridging laptops, tablets, mobile phones, and other wireless devices to corporate computer networks creates unexpected security vulnerabilities in cybersecurity and Cloud.

Thrive is an expert in working with clients across the financial services industry and offers a unique blend of managed services and consulting to ensure cyber security, compliance and performance.

With an extensive portfolio of cybersecurity services, Thrive offers experience, resources, and the expertise to create a cybersecurity plan that protects vital and sensitive data, SaaS applications, security programs, computer systems, end users, personal information and critical infrastructure from unauthorised access.

 

Contact Thrive today to learn how we can help your business stay secure in today’s digital age.

Thrive Appoints Steve Tilley as European Head of Sales

Industry veteran tapped to grow Thrive’s European customer base

FOXBOROUGH, Mass. – May 17, 2023 Thrive, a premier provider of cybersecurity and Cloud Managed Services, proudly announces the appointment of Steve Tilley to European Head of Sales. In this role, Tilley will be a pivotal force behind growing Thrive’s comprehensive managed cybersecurity and Cloud services, in Europe.

This leadership appointment stems from Thrive’s accelerated growth due to strategic acquisitions over the past two years of leading IT, cybersecurity, and Managed Services companies, including ONI, Custard and Edge Technology Group. As Thrive continues to expand its robust NextGen portfolio of managed cybersecurity and Cloud solutions, the company further strengthens its global position as a leading technology provider delivering end-to-end managed services to drive secure digital transformation for small to mid-sized enterprises across multiple industries in the U.S., Europe and Canada.

“I’m thrilled to work with a global brand with an outstanding reputation for innovating cybersecurity, Cloud and Collaboration managed services,” said Tilley. “I look forward to leading Thrive’s ever-expanding European operations and assisting businesses with secure, scalable, and flexible cybersecurity and Cloud technology to keep European businesses resilient and competitive in the digital age.”

Tilley has successfully led sales teams and accelerated the profitability at some of the world’s leading cybersecurity, Cloud, and IT companies across Europe and the US over the past 15 years, including SecureWorks, Zscaler, Agovo, Palo Alto Networks and more.

“It is with great pleasure that I announce the appointment of Steve Tilley to the role of European Head of Sales,” commented John Holland, Chief Revenue Officer at Thrive. “As Thrive rapidly expands its European presence, this new role is critical to enable European businesses to benefit from

For more information about Thrive, visit thrivenextgen.com.

 

###

 

About Thrive

Thrive is a leading provider of NextGen managed services designed to drive business outcomes through application enablement and optimization. The company’s Thrive5 Methodology utilizes a unique combination of its Application Performance Platform and strategic services to ensure each business application achieves peak performance, scale, uptime, and the highest level of security. For more information, visit thrivenextgen.com.

Thrive: LinkedIn, Twitter, Facebook, YouTube and Instagram

 

MEDIA CONTACT:

Stephanie Farrell

Thrive

VP of Marketing

sfarrell@thrivenextgen.com

617-952-0289

Employee Spotlight: Marc DesRoches, VP of Employee Experience

Welcome back to another installment of our “Thrive Spotlight” blog series.

Our featured Thrive employee is Marc DesRoches, Vice President of Employee Experience. Marc oversees all aspects of Human Resources at Thrive and is dedicated to elevating employee and customer engagement.

Marc lives in Dracut, a city just outside of Boston, where he enjoys spending time with his wife, Michelle, and his two children, Morgan and Mason. All with the same initials, he jokingly refers to every member of his family as an “MD.”

Marc is an avid sports fan and the former Commissioner of the Yawkey Baseball League, one of the finest amateur baseball leagues in the country. He also held the position of Director of Travel Ball at the RBI Academy in Boston.

When Marc isn’t watching sports, he likes to binge watch shows like Billions, Your Honor or The Blacklist.

Hi Marc! Can you tell us about your background and how you came to Thrive?

Early in my career, I made the shift from baseball recruiting to technical recruiting. I joined Thrive as a Talent Acquisition Manager in 2017 with a long-term eye on Human Resources. Our CEO and I used to be rivals on the baseball field for more than two decades, and we finally smartened up and decided to be on the same team. I am forever grateful.

Where did you go to school or get training?

I graduated from Providence College with a degree in Social Science, which specializes in subjects such as history, economics, sociology and psychology. For you Big Bang Theory fans, it’s everything Sheldon Cooper would laugh at, but I like people and he doesn’t. Since joining Thrive, I’ve obtained certificates in HR Analytics, HR Strategy, HR Management, and Employment Law from eCornell, as well as a SHRM-CP certification.

What do you most enjoy about working for Thrive?

I most enjoy helping people. As Thrive continues to grow, there are more people to help, so what’s not to like about that? I’m here to serve all of the great people at Thrive, so they can continue to take care of our customers and each other. I work with a great team of people who look at it the same way.

Any recent exciting projects at Thrive that you can tell us about?

I’m most excited about building a global umbrella to help us become OneThrive. Bringing things together from every direction is a constant and rewarding project. Along with this, overhauling the employee rewards/awards has been fun and challenging as well.

 

Are you interested in learning more about Thrive? Click here!

And don’t forget to follow us on Twitter and LinkedIn for the latest news and continue checking our blog for more in our “Thrive Employee Spotlight” series. Until next time…

How to Apply the New National Cyber Security Centre (NCSC) Toolkit to Your Business

The UK’s top cybersecurity specialists urge business executives to take a more active role in boosting their organisation’s cybersecurity as online threats continue to skyrocket.

The National Cyber Security Centre, part of GCHQ, has released new resources as part of its Cybersecurity Board Toolkit to help businesses become more secure.

This updated Board Toolkit is designed to assist board members and senior leaders across medium and large organisations to be more confident in discussing cybersecurity with key stakeholders.

While most board members do not have to be cybersecurity experts, they should know enough to discuss issues with critical personnel. The Board Toolkit helps members better understand the organisation’s cyber risk profile.

Here is a closer look at the refreshed recommendations and how working with cybersecurity experts can help your business and board members successfully govern online risk.

Create the Right Environment

Embedding Cybersecurity into Your Organisation: Cybersecurity goes beyond having “good IT” in the workplace. It should be integrated into risk management and decision-making, and all business divisions should know their cybersecurity responsibilities.

  • Thrive addresses cybersecurity gaps in your organisation by providing various expert, professional, and consultative services with an agnostic approach to identifying and prioritising risks that drive business decisions.

Developing a Positive Cybersecurity Culture: Security culture defines how employees should think about and approach security in an organisation. People, not just technology or processes, keep an organisation secure.

  • At Thrive, we provide employee training and education to help them understand the importance of cybersecurity and how to identify and prevent attacks. Building a security culture and reducing the risk of human error are now more essential than ever.

Growing Cybersecurity Expertise: Senior management should invest in staff, hire outside experts, and build a talent pipeline with specialised cybersecurity knowledge.

 

Get the Right Information to Support Decision Making

Identifying Critical Assets in Your Organisation: Risk management requires understanding how technical assets support business goals. The board must convey critical objectives to technical experts.

  • At Thrive, our cybersecurity services begin with comprehensive risk assessments to help businesses understand their unique vulnerabilities and develop a bespoke plan to protect them.

Understanding the Cybersecurity threat: Prioritising threats is necessary to avoid ineffectively defending against everything. It is essential to keep current, identify threats, and undertake threat assessments routinely.

  • With multi-layered end-user protection, Thrive protects your organisation in real-time to identify attacks and mitigate breaches. We provide holistic security solutions for your organisation to protect sensitive data in the Cloud and at all end-user access points.

Risk Management for Cybersecurity: Cybersecurity risk should be included in your overall risk management strategy rather than treated as a single topic (or as only an IT risk).

 

Take Steps to Manage Those Risks

Implementing Effective Cybersecurity Measures: Basic cybersecurity measures can limit cyber assaults and their reputational, financial, and legal effects. However, you must also customise your defences to your organisation’s top threats.

  • Thrive offers 24x7x365 monitoring and detection with top-of-the-line technology, ensuring that businesses are always protected.

Collaborating with Your Supply Chain and Partners: Building a clear picture of your suppliers (and working with them to establish their sub-contractors) is critical to gaining assurance that threats from the supply chain are understood and risks mitigated.

  • As a business, you need the best cybersecurity resources, trusted external partners, and the latest technology platforms that help to discover operational security gaps. Thrive helps develop a comprehensive action plan to remedy and mitigate threats.

Planning Your Response to Cyber Incidents: Cybersecurity events can cost an organisation money, productivity, reputation, and customers. Being prepared to recognise and promptly respond to problems can prevent the attacker from doing further harm and limit the financial and operational impact.

  • Besides data and revenue loss, your business could lose customer trust and have a tarnished brand reputation. Thrive’s disaster recovery services have helped companies recover quickly and minimise downtime.

 

Contact Thrive today to learn how we can help your business stay secure in today’s digital age.

Thrive Appoints Kenny Ash to Head of Channels

Luminary in channel leadership joins Thrive to grow the MSSP and MSP brand

FOXBOROUGH, Mass. – May 1, 2023Thrive, a premier provider of Cybersecurity and Digital Transformation Managed Services, proudly announces today that channel industry veteran Kenny Ash has been appointed as its new Head of Channels.

Ash is a well-known industry leader with more than a decade of dynamic global channel leadership experience. Before coming to Thrive, Ash served as the Vice President of Channel Sales for TierPoint, a leading national provider of information technology and data center services, including colocation, Cloud computing and managed IT services. After joining the company in 2016, he was instrumental in the success of TierPoint’s channel program. Ash also spent five years at Peak 10 in channel sales management and direct sales positions with a primary focus on partner acquisition, sales revenue and lead generation.

“I’m thrilled to join Thrive as the new Head of Channels,” said Ash. “Thrive’s growth has been on an extraordinary trajectory and I’m proud to lead a world-class channel team by unlocking new opportunities and partnerships to better serve the agent community and customers.”

In his new role, Ash is responsible for leading Thrive’s channel sales nationally and aligning the channel team with training, education and development while driving new partnerships.

“Kenny has demonstrated remarkable and proven channel sales leadership and we are excited to leverage his expertise to grow Thrive’s elite channel program,” said John Holland, CRO of Thrive. “Kenny’s forward-thinking, combined with our disruptive technology and our portfolio of advanced NextGen Managed Cybersecurity Services, will be a gamechanger in the channel space.”

For more information about Thrive, visit thrivenextgen.com.

 

###

 

About Thrive

Thrive is a leading provider of NextGen managed services designed to drive business outcomes through application enablement and optimization. The company’s Thrive5 Methodology utilizes a unique combination of its Application Performance Platform and strategic services to ensure each business application achieves peak performance, scale, uptime, and the highest level of security. For more information, visit thrivenextgen.com.

Thrive: LinkedIn, Twitter, Facebook, YouTube and Instagram

 

MEDIA CONTACT:

Stephanie Farrell

Thrive

VP of Marketing

sfarrell@thrivenextgen.com

617-952-0289

Thrive Acquires Storagepipe

Thrive, a premier provider of Cybersecurity, Cloud and Digital Transformation Managed Services, announced today that it has acquired Storagepipe, a world-class Cloud, Data Protection, Managed Services and Cybersecurity provider based in Toronto, Ontario. The acquisition will further expand Thrive’s global presence while allowing Storagepipe clients to leverage Thrive’s next-generation managed Cybersecurity and Cloud services, all powered by a proprietary automation platform.