logo
Cytracom Acquires Tentacle to Advance Security Risk Management Capabilities and Empower MSPs as Risk Advisors

Cytracom Acquires Tentacle to Advance Security Risk Management Capabilities and Empower MSPs as Risk Advisors

Yahoo13-06-2025

MCKINNEY, Texas, June 13, 2025 /PRNewswire/ -- Cytracom, a leading provider of Secure Access Service Edge (SASE) and Unified Communications as a Service (UCaaS) solutions for Managed Service Providers (MSPs), today announced the acquisition of Tentacle, a modern platform that helps organizations manage cybersecurity assessments, monitor third-party risk, and operationalize Governance, Risk, and Compliance (GRC) programs.
This acquisition represents a significant advancement in Cytracom's Security Risk Management (SRM) strategy and further aligns with the company's mission to empower MSPs to grow beyond traditional IT services and embrace a more strategic advisory role, guiding their clients through the evolving discipline of risk management. With increased scrutiny from regulatory bodies and mounting pressure from cyber insurers, MSPs are being called upon to act as true Risk Advisors, helping clients meet compliance mandates and improve their overall security posture. The integration of Tentacle into the Cytracom platform delivers a robust response to this need, offering structured, repeatable, and collaborative tools that make it easier for MSPs to deliver value-added risk and compliance services.
Cytracom entered the SRM category through the acquisition of Telivy, introducing capabilities that enable MSPs to automate risk assessments, deliver recurring compliance documentation, and drive consultative engagements. Tentacle builds upon this foundation by allowing partners to centralize security program data, collaborate in real time with clients and third parties, and map internal practices to industry frameworks such as HIPAA, PCI, and FTC Safeguards. Its platform not only reduces the administrative burden of ongoing assessments but also provides the structure needed to move from one-time reviews to ongoing program management.
"MSPs are increasingly being asked to manage risk as much as they manage technology," said Zane Conkle, CEO of Cytracom. "This shift creates both a challenge and an opportunity. With the acquisition of Tentacle, we're giving our partners the platform they need to step into this evolving role with confidence—helping clients navigate compliance, track progress over time, and build programs that stand up to external scrutiny, while also enabling MSPs to clearly demonstrate the ongoing value of their services."
The rising demand for compliance-focused services is one of the most urgent trends in the MSP channel. SMB clients now face requirements driven by regulatory frameworks, industry-specific mandates, and cyber insurance audits. Tentacle's ability to organize and share assessment data, manage third-party relationships, and ensure audit readiness positions it as a key component of Cytracom's vision to simplify and scale SRM and GRC management for the channel.
"This is another step forward in building a complete platform that empowers MSPs to connect the modern workforce—securely, reliably, and within the evolving frameworks of GRC," said John Tippett, Chief Commercial Officer. "Whether it's unified communications, secure access, or risk management, our focus remains on making these capabilities accessible, intuitive, and impactful for the partners who deliver them every day."
By integrating Tentacle into its broader infrastructure software platform, Cytracom continues to deepen its investment in the tools MSPs need to succeed in a risk- and compliance-driven world.
"We've been investing heavily in Telivy as a platform for recurring cybersecurity assessments and compliance workflows," added Rob McDonald, Chief Product Officer at Cytracom. "Bringing in Tentacle's proven technology allows us to combine their robust architecture with our existing development strategy, resulting in a dramatic acceleration of what we can bring to market. It significantly advances our mission to give MSPs scalable, differentiated tools for security and compliance."
With solutions spanning VoIP, SASE, and SRM, Cytracom continues to equip partners to deliver critical infrastructure that is secure, scalable, and compliant—all from a single, unified platform built exclusively for the MSP channel.
About Cytracom
Cytracom, a Sverica Capital Management portfolio company, provides critical infrastructure technologies for businesses, delivering cloud-based unified communications and secure networking solutions tailored for managed service providers (MSPs) and small to medium-sized businesses (SMBs). By simplifying complex technologies, Cytracom ensures that businesses remain connected, secure, and resilient in an ever-evolving digital landscape. Our solutions, including SRM, GRC, UCaaS, and SASE platforms, are designed to empower businesses with the essential technologies they need to thrive. Headquartered in McKinney, Texas, Cytracom supports partners and customers across North America. To learn more, visit cytracom.com.
Media Contact: Dana Liedholm | dliedholm@cytracom.com
View original content to download multimedia:https://www.prnewswire.com/news-releases/cytracom-acquires-tentacle-to-advance-security-risk-management-capabilities-and-empower-msps-as-risk-advisors-302481457.html
SOURCE Cytracom
Fehler beim Abrufen der Daten
Melden Sie sich an, um Ihr Portfolio aufzurufen.
Fehler beim Abrufen der Daten
Fehler beim Abrufen der Daten
Fehler beim Abrufen der Daten
Fehler beim Abrufen der Daten

Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

Teradyne (NasdaqGS:TER) Revamps By-Laws to Modernize Shareholder Procedures and Director Elections
Teradyne (NasdaqGS:TER) Revamps By-Laws to Modernize Shareholder Procedures and Director Elections

Yahoo

time6 hours ago

  • Yahoo

Teradyne (NasdaqGS:TER) Revamps By-Laws to Modernize Shareholder Procedures and Director Elections

On June 20, 2025, Teradyne implemented significant amendments to its By-Laws, adjusting nomination and proposal notice windows and clarifying voting standards. Over the past month, Teradyne's stock price moved 9% amid these changes, potentially reflecting investor confidence in enhanced governance practices. Although the broader market has remained flat, the recent gains by the company could suggest that these internal updates resonated positively with market participants, aligning with an overall upward market trend over the past year. This internal shift may have added weight to Teradyne's modest divergence from the market's flat performance. Buy, Hold or Sell Teradyne? View our complete analysis and fair value estimate and you decide. These 17 companies survived and thrived after COVID and have the right ingredients to survive Trump's tariffs. Discover why before your portfolio feels the trade war pinch. The recent amendments to Teradyne's by-laws could potentially reinforce investor confidence, aligning with broader market interests in strong governance. Over a longer five-year span, Teradyne's total shareholder return of 7.61% provides context for its performance, despite the stock's short-term fluctuations. This return contrasts with the company's one-year underperformance, as it lagged behind both the overall US market and the semiconductor industry, indicating room for improvement. The governance changes could influence Teradyne's revenue and earnings positively, particularly in the context of its strategic focus on AI, robotics, and automation. These areas are anticipated to boost revenue, though current geopolitical and tariff concerns could pose risks. Analysts forecast an annual revenue growth of 12.3% and a rise in profit margins to 24.7%, indicating a potential upside, even if challenges persist. The recent share price movement following the changes, while reflective of immediate investor sentiment, shows a notable gap against the consensus price target of US$99.83, which represents a 25.8% potential increase from the current US$74.07. This suggests that investors might be weighing the company's long-term strategic initiatives against current uncertainties. Our valuation report unveils the possibility Teradyne's shares may be trading at a discount. This article by Simply Wall St is general in nature. We provide commentary based on historical data and analyst forecasts only using an unbiased methodology and our articles are not intended to be financial advice. It does not constitute a recommendation to buy or sell any stock, and does not take account of your objectives, or your financial situation. We aim to bring you long-term focused analysis driven by fundamental data. Note that our analysis may not factor in the latest price-sensitive company announcements or qualitative material. Simply Wall St has no position in any stocks mentioned. Companies discussed in this article include NasdaqGS:TER. This article was originally published by Simply Wall St. Have feedback on this article? Concerned about the content? with us directly. Alternatively, email editorial-team@ Error in retrieving data Sign in to access your portfolio Error in retrieving data Error in retrieving data Error in retrieving data Error in retrieving data

Debunking Three Cliches Entrenched In The Cybersecurity Industry
Debunking Three Cliches Entrenched In The Cybersecurity Industry

Forbes

timea day ago

  • Forbes

Debunking Three Cliches Entrenched In The Cybersecurity Industry

JC Gaillard, Founder & CEO, Corix Partners | Board Advisor | Non-Exec Director | Author "The Cybersecurity Spiral of Failure" getty I have been writing about cybersecurity leadership, management and governance issues since 2015. What drove me to writing was primarily the low level of cybersecurity maturity I was coming across in many large firms as part of my day-to-day field work as a consultant. For me, it was difficult to understand why corporations that would have had cybersecurity practices—and budgets—for decades were still struggling with fundamental pillars of good practice, such as identity management or patch deployment. Analyzing and highlighting the dynamics of what I ended up calling the 'cybersecurity spiral of failure' has been at the heart of my work throughout the last 10 years. Another aspect that has been fascinating for me over the past decade is the number of topics that keep coming up cyclically in cybersecurity articles, and how a similar analysis keeps appearing in what has effectively become a typical echo chamber (and it started before generative AI started writing those pieces). In this article, I would like to deconstruct three of these ideas, which in my view embody the problems still facing the cybersecurity narrative and highlight why it is key to avoid shallow and outdated positions on those matters. This is typical of a mindset that goes back to the first decade of this century, in what was still the early days of cybersecurity practices (the first CISO jobs appeared in the late '90s). Many senior executives used to see cyberattacks as low-probability/low-impact events that would be dealt with if and when they occurred, and they often saw compliance requirements as an arbitrary regulatory imposition. CISOs and their consultants built the 'cybersecurity as an enabler' narrative to try to break those deadlocks, in an attempt to reach into some form of business logic. But by doing so, I noticed they were ignoring endemic short-termism and deep-rooted cognitive biases at the heart of the business attitude on the matter, and there is no evidence that the 'enablement' narrative ever worked, beyond generating headlines across the industry. As my organization showed in 2019 when analyzing the cybersecurity evolution across the first two decades of the century, it is the advent of the cloud and the acceleration of cyberattacks it triggered after 2010 that led to a change in perception, with the dominant center of interests for executives shifting from risk and compliance to incidents and breaches. The second decade of the century became truly a 'realization decade,' during which cybersecurity gradually started to be seen as a necessary barrier in the face of real threats: not something that needs to be justified to 'enable' the business to function, but something that needs to be in place to 'protect' the business, its customers, its brand and shareholder value. This is also typical of the same outdated mindset and is often heard, even nowadays, in relation to the CISO reporting line. This is one of the first topics I wrote about in 2015, and at the time, it was already one of the oldest fixations in the cybersecurity industry. It is conceivable that 20 years ago, some CIOs might have followed their business bosses in their low-probability/low-impact assessment of cyber threats and denied CISOs the resources they were asking for. Every CIO has the right to choose the battles they want to fight, and this one was often seen as too difficult. Given the avalanche of cyberattacks we have been seeing over the past 15 years, I don't think this type of attitude is common today, or even sustainable. As a matter of fact, business leaders—most of them—are well aware of the inevitability of cyberattacks, and 'Are we spending enough on cyber?' has become a more common question for CIOs than 'Why do we need to spend on that?' Organizations where this mindset persists often have a deep-rooted problem and may be in denial about the state of their cyber exposure. Wherever you place the reporting line of the CISO in those organizations, the problems will likely remain. This is a more recent line of thought that has emerged throughout the last decade in the face of the sophistication of cyber threats, and this view tends to see security training and awareness development as the central pillar of any cyber strategy. To me, this is short-sighted, even if there is no denying that cybercrime targets people and that social engineering is key in many attack patterns. What is misguided here is to believe that you can change people's attitude at this level by explaining to them what to do or not to do, and broadly speaking, get them to change their attitudes through logic and reasoning. Many unsafe attitudes in the office are rooted in unsafe social practices and cognitive biases, and changing requires a cultural shift, not just training. Fundamentally, you protect what you care about, and it is only a sense of care for the firm, its values and its people that can lead to an embedded desire to protect the firm's data and information assets. That has to start with the leadership team embodying the right example and needs to cascade down from the very top of the organization. So there is indeed a 'human firewall,' but it is a cultural one driven from the top, not one driven bottom-up or sideways by CISOs through tools and leaflets. Forbes Business Council is the foremost growth and networking organization for business owners and leaders. Do I qualify?

Global Markets Mixed; U.S. Markets Resume After Holiday
Global Markets Mixed; U.S. Markets Resume After Holiday

Wall Street Journal

time2 days ago

  • Wall Street Journal

Global Markets Mixed; U.S. Markets Resume After Holiday

Global markets were mixed Friday after the U.S. holiday, with contract expiries adding some complexity to moves in oil. U.S. stock futures pointed to a slightly weaker open when trading resumes, even after President Trump's delay to a decision on U.S. involvement in the Israel-Iran conflict improved risk sentiment a touch elsewhere. Oil pared recent gains, the dollar edged lower and Treasurys were pretty much flat early in Europe.

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store