Palisade is rolling out targeted enhancements that help MSPs detect identity attacks, run large-scale phishing drills, and manage endpoint agents more easily — all while investing in AI and detection improvements to increase protection and speed response.
A: The most important updates include expanding identity threat detection to new platforms, large-scale phishing simulation features, simplified agent uninstall workflows, and investments in AI-driven detection engines. These changes aim to reduce time-to-detect and give MSPs stronger controls across endpoints and cloud apps. Reporting was improved so administrators can track training results and incident timelines more easily. The company also emphasized stronger partner integrations and curated security controls. Together, these updates focus on operational efficiency and measurable risk reduction.
A: Yes — Palisade is launching a beta for Google Workspace to extend Identity Threat Detection and Response (ITDR). The beta opens access to threat hunting and automated remediation for Google logs, giving MDR teams tools like account suspension and step-by-step response actions. Early participants can test real incidents detected by the research team and provide feedback. This expansion helps MSPs protect mixed-cloud customers without forcing heavy manual work. Contact your Palisade success manager to request early access.
A: Palisade now supports continuous, recurring phishing campaigns using multiple templates and native‑language content for users in markets including Spanish, French, German, Dutch, Hebrew, Portuguese, and English. Campaigns can be sent on schedules, and training completion is tracked per template, per user, and per campaign for trend analysis. Administrators get detailed performance metrics to measure improvement in employee resilience over time. Templates can be localized to improve realism and engagement. This reduces training overhead and turns phishing preparedness into a measurable program.
A: Uninstalling endpoint agents is now a one-click action from the Devices page with automatic audit logging for traceability. The new flow removes the need for manual cleanup and shows clear device states such as active, missing permissions, pending uninstall, and uninstalled. Each uninstall operation is recorded in the device audit log so teams can review who made changes and when. Filters make it easier to locate devices needing attention at a glance. This streamlines offboarding devices and improves operational hygiene.
A: Palisade plans major improvements across detection engines, curated partner controls, and AI-driven insights and automations. The R&D investment focuses on deeper research, faster detection, and usable automations that reduce human toil. Partners will see new integrations designed to improve efficacy and orchestration. Expect feature rollouts that prioritize measurable detection improvements and operational automation. Palisade is positioning these updates to deliver higher protection with less overhead for MSPs.
A: The updates reduce complexity while raising protection levels, enabling MSPs to secure many small customers without scaling staff proportionally. Automated detection and remediation, plus recurring phishing programs, shift routine work from humans to the platform. Improved reporting and audit logs provide the visibility needed for compliance and customer conversations. Multi-cloud identity coverage helps MSPs support diverse environments. Overall, MSPs can offer stronger outcomes with more predictable processes.
A: Reporting now shows completed training performance by template, user, and campaign so MSPs can identify trends and target remediation. Incident timelines include detection, automated response, and administrator actions with timestamps to speed post‑incident reviews. These reports make it easier to demonstrate progress to customers and prioritize follow-ups. Export or share options simplify distribution of findings with stakeholders. Clear metrics translate platform activity into business value.
A: To join the beta, reach out to your Palisade success manager or account representative to request early access. The beta is intended for active participants who will test detections applied to Google logs and share feedback. Early adopters help refine detection logic and response playbooks, accelerating GA readiness. Participation often includes guided onboarding from Palisade’s threat research team. This is a fast route to expand managed identity protection for Google customers.
A: Palisade is applying AI for faster correlation of signals, automated insights, and repeatable remediation playbooks that reduce manual work. AI-driven detection engines improve signal-to-noise, prioritizing high‑risk alerts for human review. Automation capabilities can perform routine responses, enabling analysts to focus on complex incidents. Research teams use AI to discover new attack methods and refine detection logic. The net effect is higher efficiency and faster mean time to resolution.
A: Palisade recently won industry recognition for its unified cybersecurity platform, including product awards and analyst badges that validate the platform’s impact. These honors reflect consistent product improvements and customer outcomes. Recognition signals to MSPs that the platform is trusted by peers and analysts. It also supports partner conversations when demonstrating value to prospective customers. Awards are an external measure of the platform’s maturity and market fit.
A: Enhanced filters let administrators quickly surface devices by state—active, missing permissions, pending uninstall, or uninstalled—so they can prioritize action. This reduces time spent hunting for devices with issues and clarifies next steps during client support or device decommissioning. Quick filters combined with audit logs enable efficient troubleshooting and compliance checks. Teams can apply bulk actions or review single-device histories as needed. The result is cleaner device inventories and fewer unresolved endpoint gaps.
A: The best place to start is the Palisade website for product docs, platform overviews, and contact options. Visit the Palisade unified cybersecurity platform to explore features, request demos, or connect with support: Palisade unified cybersecurity platform. You can also request beta access through your account team and subscribe to product updates for early announcements. Documentation and support articles provide step-by-step guides for new features. This helps teams assess fit and plan rollouts for their customers.
A: The beta is a precursor to full release; availability depends on feedback and validation from early participants. Palisade plans to expand access following successful beta testing and iterative improvements.
A: Yes, templates support multiple languages and can be scheduled to send in users’ native languages for higher realism and engagement.
A: Uninstalling removes agent-based protections from a device and should be planned; audit logs record the action but restoring protections requires reinstalling the agent.
A: By expanding ITDR and integrating with multiple cloud providers, Palisade centralizes detections and responses across M365 and Google Workspace, reducing tool sprawl for MSPs.
A: Contact your Palisade account team or visit https://palisade.email/ to request demos, beta participation, or product documentation.