ConnectWise Signs Cybersecurity and Infrastructure Security Agency’s Secure by Design Pledge
Reinforcing commitment to cybersecurity
This is a Press Release edited by StorageNewsletter.com on October 8, 2024 at 2:00 pmConnectWise, LLC signed onto the Cybersecurity and Infrastructure Security Agency’s (CISA) Secure by Design pledge, further reinforcing its dedication to maintaining the highest cybersecurity standards.
This pledge highlights ConnectWise’s continued focus on providing secure solutions for MSPs in an evolving digital landscape.
“Signing the Secure by Design pledge is a natural extension of our longstanding commitment to cybersecurity,” said Patrick Beggs, chief information security officer, ConnectWise. “As an industry leader, we recognize our responsibility to not only provide innovative tools but to ensure they meet the highest security standards. This pledge reinforces our dedication to protecting our partners and their clients in an increasingly complex digital world.“
ConnectWise has been at the forefront of enhancing security measures for MSPs and their clients. The company’s involvement in the CISA’s Joint Cyber Defense Collaborative (JCDC) has been instrumental in shaping guidance for Remote Monitoring and Management (RMM) technologies. ConnectWise’s participation in the JCDC working group has been pivotal in addressing various high-level topics concerning MSPs and critical infrastructure. The company’s expertise and insights have contributed to developing strategies for enhancing cybersecurity across the industry.
“Our involvement with CISA and the JCDC has been a collaborative effort to elevate security standards across the board,” said Beggs. “By working closely with these organizations, we’ve been able to contribute meaningful insights and help shape guidance that benefits the entire MSP ecosystem. By prioritizing security at every level, we can collectively build a more resilient future for MSPs and their clients.“
The Secure by Design pledge aligns with ConnectWise’s ethos of making security an integral part of its software development process. This approach ensures that security considerations are embedded from the initial stages of product design through to deployment and beyond.