Seattle, WA, USA
1996
  |  By Linda Kerr
Many managed service providers (MSPs) recognize the value of managed detection and response (MDR) services, both for their clients and for their own business. However, they run into a recurring obstacle that slows adoption: how to structure a pricing model that is clear, sustainable, and scalable.
  |  By Stephen Helm
The extended detection and response (XDR) market has evolved rapidly in recent years. What once seemed like a race to add new features is now giving way to a different debate: how to effectively integrate the different security layers that make up modern infrastructure. With increasingly distributed IT environments, including endpoints, identities, networks, and cloud applications, the volume of security signals that need to be analyzed to detect threats has multiplied.
  |  By The Editor
Managed service providers are under more pressure than ever—protecting multiple clients, managing growing toolsets, and responding to increasingly sophisticated cyber threats. But fragmented solutions, alert fatigue, and limited visibility can slow you down and impact the service your clients rely on. Today’s MSPs need more than just more tools.
  |  By Bill Munroe
We’ve been talking about zero trust for years, and for good reasons. The evolution of threats and the growing sophistication of attacks continue to underscore the need for an approach based on continuous validation, leaving behind the implicit trust that long defined traditional security.
  |  By WatchGuard
Integration embeds WatchGuard security operations inside HaloPSA, streamlining ticketing, provisioning, and billing workflows for MSPs.
  |  By Stephen Helm
WatchGuard Technologies has announced a new partnership with HaloPSA to help MSPs streamline security operations from alert to invoice. By integrating WatchGuard Cloud directly into HaloPSA, MSPs can automate ticketing, simplify provisioning, and improve billing accuracy—all within a single platform. The integration reduces manual effort, accelerates response times, and helps partners scale more efficiently while delivering stronger security services.
  |  By Carlos Arnal
Passwords are still necessary, but they are no longer sufficient. Using long, unique, and hard-to-guess passphrases remains best practice. The problem is what happens when one of those passwords falls into the wrong hands: the system doesn’t detect an intrusion—it simply sees a legitimate login. From that point on, the attacker moves through the environment like any other user.
  |  By WatchGuard
Enterprise-grade product features, combined with an agile and aggressive licensing model, offer MSPs maximum agility in the competitive Endpoint Detection and Response (EDR) market.
  |  By Andrew Kerr
Advanced threats rarely break into infrastructure in obvious ways. In many cases, they remain hidden for months, exploiting blind spots created by unmanaged personal devices (BYOD), applications adopted without the IT department’s oversight (shadow IT), unauthorized access points, or compromised devices operating as part of botnets. As networks evolve into hybrid environments and most traffic is encrypted, the context becomes fragmented and the attack surface expands.
  |  By The Editor
We’re proud to announce that WatchGuard Technologies has been named Best Cybersecurity Company in the 2026 Cybersecurity Excellence Awards, recognizing innovation and leadership across the cybersecurity industry. While industry recognition is always an honor, this award comes at a particularly important moment for cybersecurity teams worldwide.
  |  By WatchGuard Technologies
This week on the podcast, Marc and Corey sit down with Paul Harris, CEO of BGLA and Futurity Corp at WatchGuard's Impact Partner Conference in Tulum, to explore the evolving cybersecurity landscape across Latin America. Paul shares his journey from early days in cybersecurity to leading organizations in the region, while breaking down the biggest concerns facing LATAM SMBs today. The conversation also covers how AI is reshaping cybersecurity, the challenges of securing partners across diverse markets, and practical advice for business leaders looking to stay ahead of cyber risk in LATAM.
  |  By WatchGuard Technologies
Corey and Marc break down RedSun, a researcher-disclosed vulnerability that can escalate privileges to full system access, plus a major DDoS-for-hire takedown and Microsoft’s latest RDP security updates.
  |  By WatchGuard Technologies
This week on the podcast we discuss RedSun, the latest researcher-disclosed zero-day in Microsoft Windows. After that, we chat about a Europol-lead takedown of DDoS-for-hire services before ending with our thoughts on Microsoft's latest RDP security updates.
  |  By WatchGuard Technologies
This week on the podcast, we discuss Anthropic's Project Glasswing and what the Claude Mythos announcement means to cybersecurity. After that, we cover FrostArmada, a campaign from a Russian GRU-backed threat actor that has compromised tens of thousands of home networking routers. Finally we end with a chat about Google Chrome 146's new feature to protect against session hijacking.
  |  By WatchGuard Technologies
This week on the podcast, we cover the accidental Claude Code source code leak and what it means for users and the wider ecosystem. After that, we discuss the Axios supply chain compromise impacting users of a JavaScript library with over 100 million weekly downloads. We end with our thoughts on Browser Gate, the name given to allegations that Microsoft is illegally harvesting LinkedIn customer data for a competitive advantage.
  |  By WatchGuard Technologies
This week on the podcast, we discuss the US government's ban on foreign-manufactured consumer routers and its likely impact. After that, we cover a research post from Huntress on a recent phishing campaign leveraging OAuth Device Authentication flows to retain long-term access to compromised accounts. We end with a review of key takeaways from Google's Cloud Threat Horizons report for H1 2026.
  |  By WatchGuard Technologies
In this episode, Corey Nachreiner interviews WatchGuard Cybersecurity Analyst and Threat Emulation & Investigations Lead, Kristen Yang, about the path into cybersecurity, the evolution from threat hunting to leading investigations, and the realities of defending against modern attacks. They explore today’s threat landscape, incident response mistakes, red teaming lessons, MITRE ATT&CK, AI in security, and the skills analysts need most, plus a rapid-fire round to close things out.
  |  By WatchGuard Technologies
AI is everywhere in cybersecurity. For partners, the real question is not about the technology. It is about your people. Is AI replacing analysts, or making them more effective? In this session, we break down the differences between automation and augmentation and why they matter for MSPs delivering security services. Automation removes repetitive SOC work such as triage, enrichment, and basic containment. Augmentation strengthens human experts with faster investigation, clearer attack mapping, and smarter response decisions.
  |  By WatchGuard Technologies
This week on the podcast, we cover the cyber attack that managed to wipe more than 200,000 resources off of the medical technology giant Syryker's network. After that, we review a research post on a good chrome extension gone bad. We end by discussing a recent Microsoft threat intelligence post on how North Korean-backed threat actors have operationalize AI for job scams.
  |  By WatchGuard Technologies
This week on the podcast, we chat about an OpenClaw bot that moved beyond vulnerability research and into malicious activity. Before that, we cover an AI-discovered vulnerability in the pac4j-jwt authentication library before ending with a discussion on an upcoming California law designed to help make age verification in the digital age easier, but with massive consequences.
  |  By WatchGuard
Ransomware is one of the most talked about and publicized security threats in the modern era. What started as a few high-profile attacks caused by a handful of malware variants has developed into a virulent threat landscape in which increasingly unskilled attackers are able to execute highly effective ransomware campaigns against organizations of all sizes and levels of complexity. Small-to-midsize businesses disproportionately fall victim to ransomware, as they often lack the technical skills and tools needed to prevent infection.
  |  By WatchGuard
Risk-based authentication both enhances security and user experience by allowing you to rank the resources you want to protect based on risk level and type of user. This gives you the power to create rules that are unique to the security structure in your organization, therefore enabling more flexibility or higher protection only when necessary.
  |  By WatchGuard
Cyber attacks grab headlines almost daily. WatchGuard's award-winning network security platform not only provides one of the most complete suites of unified security controls on the market today to detect and prevent these attacks, but our strategy of sourcing the best scanning engines to integrate with our built-in defenses boosts security in critical attack areas. Take a closer look at the WatchGuard security platform's all-star team of best-in-class threat management services.
  |  By WatchGuard
In this eBook we provide you with suggestions on how to start providing some basic but vital security services that will improve the security posture of your customers while increasing your Average Revenue (ARPU), such as endpoint security set-up and monitoring.
  |  By WatchGuard
If you are in the retail or hospitality industries, it's important to know exactly how your network security solution maps to PCI DSS standards. This white paper presents a straight-forward review of PCI requirements and how the WatchGuard platform delivers the capabilities you need to ensure mandates are met.
  |  By WatchGuard
The coronavirus pandemic has exposed business continuity inadequacies at many organizations, and highlighted the slow pace of progress in digital transformation. This new reality necessitates a departure from a traditional network-centric security model that assumes every device and user within the network should be trusted. In this eBook we will explore how the dynamics of COVID-19 have impacted security, outline the importance of a zero-trust approach, and discuss how WatchGuard can help your business deliver the security you need during these trying times.
  |  By WatchGuard
Respected PCI-Qualified Security Assessor Coalfire recently completed a technical assessment of the WatchGuard Threat Detection and Response (TDR) solution, validating it for PCI DSS anti-malware use cases. Download the whitepaper to learn more!
  |  By WatchGuard
The coronavirus pandemic has exposed business continuity inadequacies at many organizations, and highlighted the slow pace of progress in digital transformation. This new reality necessitates a departure from a traditional network-centric security model that assumes every device and user within the network should be trusted.

WatchGuard has deployed nearly a million integrated, multi-function threat management appliances worldwide. Our signature red boxes are architected to be the industry's smartest, fastest, and meanest security devices with every scanning engine running at full throttle.

For 25 years, WatchGuard has pioneered cutting-edge cybersecurity technology and delivered it as easy-to-deploy and easy-to-manage solutions. With industry-leading network and endpoint security, secure Wi-Fi, multi-factor authentication, and network intelligence products and services, WatchGuard enables more than 250,000 small and midsize enterprises from around the globe to protect their most important assets including over 10 million endpoints.

The WatchGuard Difference:

  • Intelligent Protection: Effective protection against today’s vast number of evolving threats requires multiple services working intelligently together. Prevent, detect, and instantly respond to cyber attacks with automated policies.
  • Simplified Management: Managing security across your organization has never been simpler. Use out-of-the-box tools to quickly and easily deploy, configure, and maintain your security with the granularity of your choice.
  • Actionable Visiblity: Monitor and report on the health of your IT infrastructure. Actionable visibility tools enable you to proactively identify threats, while providing corrective action against known issues.

In a world where the cybersecurity landscape is constantly evolving, and new threats emerge each day, WatchGuard makes enterprise-grade cybersecurity technology accessible for every company.