Security

Home > Security

Cylance Compromise Assessments – How They Work and Why They Are Useful

Many organizations don’t have the in-house resources necessary to give cybersecurity the attention it demands, much less complete a compromise assessment. With the current technology talent gap, finding the expertise you need isn’t easy, and with limited IT teams, finding the bandwidth to focus on your cybersecurity strategy is difficult. But with cyberattacks occurring within 39 seconds, you [...]

2020-10-13T11:04:28-05:00April 10th, 2019|Security|

SOC-as-a-Service: The Arctic Wolf Approach to Cybersecurity

As an SMB, you likely have limited security staff. Your lean IT team does it’s best to provide coverage, but they’re already overwhelmed. You don’t have the time or resources to hire a comprehensive dedicated security team to provide SOC-as-a-Service. As a result, you have no one to monitor your firewalls, examine antivirus, or analyze your security structure. [...]

2020-10-13T11:08:15-05:00February 28th, 2019|Cybersecurity, Security|

Check Point Logging vs Traditional Network Traffic Log Analyzers

Most firewalls enable you to export a syslog file of filtered TCP/IP traffic, but many of them don’t include the tools such as a network traffic log to index and analyze firewall events. To get the benefits of a quality log analyzer, organizations are forced to either purchase these tools separately or build them in-house using open source [...]

2020-10-13T11:10:06-05:00January 31st, 2019|Security|

Security vs Short-Term Profitability: Enabling Long-Term Sustainability

Investing in security is expensive, and it’s often tempting to focus first on your current profitability. But not investing in security costs organizations even more. What is the takeaway concerning security vs short-term profitability? If you fail to implement a robust long-term, scalable security infrastructure in your environments from the start, then you run the risk of suffering [...]

2020-10-13T11:21:55-05:00December 19th, 2018|Cloud, Cybersecurity, Security|

Cisco ISE and Cisco DNA Pair for Increased Network Security

We’ve spoken before about the merits of Cisco’s Identity Services Engine (ISE) platform. As the market-leading, next-generation secure Network Access Control (NAC) solution, Cisco ISE provides the visibility and control that you need to safeguard your networks. More specifically, Cisco ISE’s software-defined platform: Detects and defends against threats Delivers actionable threat and mitigation data Provides granular user and [...]

2020-10-13T11:23:16-05:00December 7th, 2018|Infrastructure, Networking, Security|

Questions to Ask During Your Next Antivirus PoC

It’s expected that, when you purchase new hardware, the machine will come with antivirus software already installed. But this “complimentary” inclusion has the tendency to lull some end users into a false sense of security, leading them to believe that they don’t need to implement additional protection. Protecting your critical data should go well beyond relying on baseline, [...]

2020-10-13T11:27:05-05:00November 16th, 2018|Security|

Creating DDoS Resiliency in AWS

The average number of Distributed Denial of Service (DDoS) attacks doubled from January 2017 to January 2018. Not only are DDoS attacks growing in frequency, but they are also becoming more complex due to lack of security for IoT connected devices and recent Memcached software exploits. Are you secure in your DDoS resiliency in AWS? With Gartner predicting [...]

2020-10-13T11:34:28-05:00October 10th, 2018|Cloud, DDoS, Security|

Cloud Security Best Practices: Are You Secure?

You’ve heard it before. A company gets breached, its critical data made available, and its brand suffers as a result. Hacking events like these demonstrate how vulnerable organizations (and their users) can be. With such grim headlines, it’s not surprising that some companies are still reticent to adopt cloud technologies. Implementing and following cloud security best practices can [...]

2020-10-13T11:35:32-05:00October 2nd, 2018|Cloud, Security|

Gartner’s Market Guide for DDoS Mitigation Services

Distributed Denial of Service (DDoS) attacks have been on the rise, leaving organizations scrambling for more consistent ways to mitigate the risks. Gartner's Market Guide for DDoS Mitigation Services highlights the solutions that address these risks. Since 2013, DDoS Mitigation has grown steadily out of the Web Application Firewall (WAF) sector to become its own market. As it [...]

2020-10-13T11:37:51-05:00September 25th, 2018|Security|

Gigamon for Network Traffic Control: Planning Your Next Network Build

Despite the pace of IT innovation, there is still no one network tool that does everything well. As a result, companies need to layer their security tools to build the most robust line of defense and response protocols, like network traffic control. Addressing your visibility issues alone isn’t enough— if you do not configure all your components seamlessly, [...]

2020-10-13T11:39:08-05:00September 12th, 2018|Networking, Security|
Go to Top